A quantitative analysis of current security concerns and solutions for cloud computing

AbstractThe development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloud remains a tempting trend from a financial perspective, there are several other aspects that must be taken into account by companies before they decide to do so. One of the most important aspect refers to security: while some cloud computing security issues are inherited from the solutions adopted to create such services, many new security questions that are particular to these solutions also arise, including those related to how the services are organized and which kind of service/data can be placed in the cloud. Aiming to give a better understanding of this complex scenario, in this article we identify and classify the main security concerns and solutions in cloud computing, and propose a taxonomy of security in cloud computing, giving an overview of the current status of security in this emerging technology.

[1]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[2]  T. S. Raghu,et al.  Privacy and Security Practices in the Arena of Cloud Computing - A Research in Progress , 2010, AMCIS.

[3]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[4]  Frank Leymann,et al.  Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[5]  Liang Yan,et al.  Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.

[6]  Vladimir A. Oleshchuk,et al.  Security and privacy in the cloud a long-term view , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[7]  A. Sadeghi,et al.  Token-Based Cloud Computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency , 2010 .

[8]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[9]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[10]  Ling Tian,et al.  Identity-Based Authentication for Cloud Computing , 2009, CloudCom.

[11]  Rabia Khan Interoperability and Portability among Open Clouds Using FIPA Agent , 2012 .

[12]  Christopher E. Dabrowski,et al.  VM Leakage and Orphan Control in Open-Source Clouds , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[13]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[14]  David W. Chadwick,et al.  Security APIs for My Private Cloud - Granting access to anyone, from anywhere at any time , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[15]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[16]  Tim Mather,et al.  Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.

[17]  Daniele Catteddu and Giles Hogben Cloud Computing. Benefits, risks and recommendations for information security , 2009 .

[18]  A. Zahariev Google App Engine , 2009 .

[19]  Martin Knahl,et al.  An Autonomous Agent Based Incident Detection System for Cloud Environments , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[20]  L. Youseff,et al.  Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.

[21]  Andrew P. Martin,et al.  myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[22]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[23]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[24]  John C. Grundy,et al.  Emerging Security Challenges of Cloud Virtual Infrastructure , 2016, APSEC 2010.

[25]  Marcos A. Simplício,et al.  A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.

[26]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.