An Analysis of Security Related Issues in Cloud Computing

Over the past two decades, the scenario in the computing world has evolved from client-server to distributed systems and then to central virtualization called as cloud computing. Computing world is moving towards Cloud Computing and it remains as buzzword of the current era. Earlier, users had complete control over their processes and data stored in personal computer where as in cloud, cloud vendor provides services and data storage in remote location over which the client has no control or information. As application and data processing takes place in public domain outside the designated firewall, several security concerns and issues arise. The main objective of the paper is to provide an overall security perspective in cloud Computing and highlight the security concerns and other issues. The paper also highlights few technical security issues in cloud computing.

[1]  Ammar Khalid Cloud Computing: Applying Issues in Small Business , 2010, 2010 International Conference on Signal Acquisition and Processing.

[2]  Jörg Schwenk,et al.  Stronger TLS bindings for SAML assertions and SAML artifacts , 2008, SWS '08.

[3]  Aviel D. Rubin,et al.  Risks of the Passport single signon protocol , 2000, Comput. Networks.

[4]  Jörg Schwenk,et al.  TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management , 2008, BIOSIG.

[5]  Martín Abadi,et al.  Code-Carrying Authorization , 2008, ESORICS.

[6]  Jörg Schwenk,et al.  Risks of the CardSpace Protocol , 2009, ISC.

[7]  M. Eloff,et al.  Internet of people, things and services - the convergence of security, trust and privacy , 2009 .

[8]  Mitchell Kapor,et al.  The self-governing Internet: coordination by design , 1997 .

[9]  Siani Pearson,et al.  Towards accountable management of identity and privacy: sticky policies and enforceable tracing services , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[10]  Thomas Groß,et al.  Security analysis of the SAML single sign-on browser/artifact profile , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[11]  Sebastian Gajek,et al.  On the Insecurity of Microsoft's Identity Metasystem , 2008 .

[12]  Dmitri Botvich,et al.  Trust and Privacy , 2012, Collaborative Financial Infrastructure Protection.

[13]  John McCarthy,et al.  Recursive functions of symbolic expressions and their computation by machine, Part I , 1960, Commun. ACM.

[14]  Tom Scavo,et al.  SAML V2.0 Holder-of-Key Web Browser SSO Profile Version 1.0 , 2009 .

[15]  Tibor Jager,et al.  A Browser-Based Kerberos Authentication Scheme , 2008, ESORICS.