Cloud Computing and Security Issues in the Cloud

Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing environment remains at the core of interest. Cloud based services and service providers are being evolved which has resulted in a new business trend based on cloud technology. With the introduction of numerous cloud based services and geographically dispersed cloud service providers, sensitive information of different entities are normally stored in remote servers and locations with the possibilities of being exposed to unwanted parties in situations where the cloud servers storing those information are compromised. If security is not robust and consistent, the flexibility and advantages that cloud computing has to offer will have little credibility. This paper presents a review on the cloud computing concepts as well as security issues inherent within the context of cloud computing and cloud infrastructure.

[1]  Hai Jin,et al.  Efficient Password-based Two Factors Authentication in Cloud Computing , 2012 .

[2]  R. K. Bunkar,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2014 .

[3]  Jianhua Che,et al.  Study on the Security Models and Strategies of Cloud Computing , 2011 .

[4]  Ruxandra- tefania Petre Data mining in Cloud Computing , 2012 .

[5]  Kangchan Lee Security Threats in Cloud Computing Environments 1 , 2012 .

[6]  Florin Ogigau-Neamtiu,et al.  CLOUD COMPUTING SECURITY ISSUES , 2012 .

[7]  Marinela Mircea Addressing Data Security in the Cloud , 2012 .

[8]  V. T. Raja,et al.  Protecting the privacy and security of sensitive customer data in the cloud , 2012, Comput. Law Secur. Rev..

[9]  Antonio Puliafito,et al.  Virtual machine provisioning through satellite communications in federated Cloud environments , 2012, Future Gener. Comput. Syst..

[10]  Marcos A. Simplício,et al.  A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.

[11]  G. Rajesh Babu,et al.  Security Risks Associated with the Cloud Computing , 2015 .

[12]  Syed M. Rahman,et al.  An Overview of the Security Concerns in Enterprise Cloud Computing , 2011, ArXiv.

[13]  Subhajyoti Bandyopadhyay,et al.  Cloud computing - The business perspective , 2011, Decis. Support Syst..

[14]  Jinjun Chen,et al.  A confidence-based filtering method for DDoS attack defense in cloud environment , 2013, Future Gener. Comput. Syst..

[15]  Carla Merkle Westphall,et al.  Management and Security for Grid, Cloud and Cognitive Networks , 2011 .

[16]  Noriswadi Ismail,et al.  Cursing the Cloud (or) Controlling the Cloud? , 2011, Comput. Law Secur. Rev..

[17]  S. O. Kuyoro,et al.  Cloud computing security issues and challenges , 2011 .

[18]  Shabnam Sharma,et al.  COMPARATIVE ANALYSIS OF VARIOUS AUTHENTICATION TECHNIQUES IN CLOUD COMPUTING , 2013 .

[19]  Roger Clarke,et al.  Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..

[20]  Ashish Kumar World of Cloud Computing & Security , 2012, CloudCom 2012.

[21]  K. Popovic,et al.  Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.

[22]  Valentina Casola,et al.  The CloudGrid approach: Security analysis and performance evaluation , 2013, Future Gener. Comput. Syst..

[23]  Kangchan Lee Security Threats in Cloud Computing Environments , 2012 .

[24]  David Teneyuca Internet cloud security: The illusion of inclusion , 2011, Inf. Secur. Tech. Rep..

[25]  Ahmed E. Youssef Exploring Cloud Computing Services and Applications , 2012 .

[26]  Matjaz B. Juric,et al.  Towards a unified taxonomy and architecture of cloud frameworks , 2013, Future Gener. Comput. Syst..

[27]  Won Kim,et al.  Cloud Computing: Today and Tomorrow , 2009, J. Object Technol..

[28]  Bhavani M. Thuraisingham,et al.  Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..

[29]  Subhajyoti Bandyopadhyay,et al.  Cloud Computing - The Business Perspective , 2011, 2011 44th Hawaii International Conference on System Sciences.

[30]  Takuya Suzuki,et al.  Security Architectures for Cloud Computing , 2010 .

[31]  Swarnpreet Singh,et al.  Cost breakdown of Public Cloud Computing and Private Cloud Computing and Security Issues , 2012 .

[32]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[33]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[34]  John J. Rehr,et al.  A high performance scientific cloud computing environment for materials simulations , 2012, Comput. Phys. Commun..

[35]  Andrew P. Martin,et al.  Trust in the Cloud , 2011, Inf. Secur. Tech. Rep..

[36]  Atish,et al.  Securing Software as a Service Model of Cloud Computing: Issues and Solutions , 2014 .

[37]  Edwin Baker,et al.  Hey, you, get off of that cloud? , 2009, Comput. Law Secur. Rev..

[38]  Stephen Mason,et al.  Digital evidence and 'cloud' computing , 2011, Comput. Law Secur. Rev..

[39]  Patrick S. Ryan,et al.  Trust in the clouds , 2012, Comput. Law Secur. Rev..

[40]  Aderemi A. Atayero,et al.  Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption , 2011 .

[41]  A. B. M. Shawkat Ali,et al.  A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..

[42]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[43]  Dana Petcu,et al.  Portable Cloud applications - From theory to practice , 2013, Future Gener. Comput. Syst..

[44]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[45]  Yi Mu,et al.  Identity-based data storage in cloud computing , 2013, Future Gener. Comput. Syst..

[46]  Abdelmajid Hassan Mansour Emam Additional Authentication and Authorization using Registered Email-ID for Cloud Computing , 2013 .

[47]  Seng-phil Hong,et al.  A Consolidated Authentication Model in Cloud Computing Environments , 2012 .

[48]  Jie Xu,et al.  A novel intrusion severity analysis approach for Clouds , 2013, Future Gener. Comput. Syst..

[49]  Edwin Baker,et al.  Knowing the past to understand the present1 - issues in the contracting for cloud based services , 2011, Comput. Law Secur. Rev..