Cloud Computing Security: A Survey

Cloud computing brings new possibilities for individuals and firms to utilize computing as a utility. It utilizes computing power irrelevant of user’s location and devices. Thus it has become more demanding due to its performance, high computing power, cheapness, elasticity, accessibility, scalability and availability. Cloud computing offers ubiquitous operation with different security challenges. In this paper we discuss security challenges and vulnerabilities as well as limitations of current security modules. This paper will serve as a baseline guide for new researchers in this area. Keywords: cloud computing security, infrastructure-as-a-service(IAAS), Platform-as-a-Service(PAAS), Software-as-a-Service(SAAS), private cloud, public cloud, hybrid cloud, trust, vulnerabilities.

[1]  Satish Muppidi,et al.  Data Security in Cloud Computing with Elliptic Curve Cryptography , 2012 .

[2]  Amit Chugh,et al.  SURVEY PAPER ON CLOUD STORAGESECURITY , 2013 .

[3]  Zahir Tari,et al.  Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.

[4]  O. KuyoroS.,et al.  Cloud computing security issues and challenges , 2011 .

[5]  Ashutosh Saxena,et al.  Data integrity proofs in cloud storage , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[6]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[7]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[8]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[9]  Mohamed,et al.  Data Security Model for Cloud Computing , 2013 .

[10]  John C. Grundy,et al.  An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.

[11]  Susheel Kumar,et al.  Cloud Storage and its Secure Overlay Techniques , 2014 .

[12]  K. S. Wagh,et al.  Securing Data Transfer in Cloud Environment , 2014 .

[13]  Osman Ghazali,et al.  Trust Management in Cloud Computing: A Critical Review , 2012, ArXiv.

[14]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[15]  Issa M. Khalil,et al.  Cloud Computing Security: A Survey , 2014, Comput..

[16]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[17]  Vasudeva Varma,et al.  Towards Analyzing Data Security Risks in Cloud Computing Environments , 2010, ICISTM.