A Survey on Secure Cloud: Security and Privacy in Cloud Computing

Cloud computing is an emerging technology that is still unclear to many security problems. The security problem becomes amplified under the cloud model as new dimensions enter into the problem scope related to the architecture, multi-tenancy, layer dependency, and elasticity. This survey paper introduces a detailed analysis of the cloud security problem. In this paper various existing approaches related to data encryption and message authentications are discussed. After study the existing approaches, issues and challenges are point out during data processing over the cloud. Instead of only encryption or authentication, this paper suggests attribute based encryption and attribute based authentication together, during communication over the cloud for achieving better security.

[1]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[2]  Lei Zhang,et al.  Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.

[3]  John W. Rittinghouse,et al.  Cloud Computing: Implementation, Management, and Security , 2009 .

[4]  Gao Xiaopeng,et al.  VNSS: A network security sandbox for virtual computing environment , 2010, 2010 IEEE Youth Conference on Information, Computing and Telecommunications.

[5]  Ronald L. Krutz,et al.  Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .

[6]  M. Sethumadhavan,et al.  Novel mutual authentication protocol for cloud computing using secret sharing and steganography , 2014, The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014).

[7]  Shyam Nandan Kumar,et al.  Review on Network Security and Cryptography , 2015 .

[8]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[9]  Eduardo B. Fernandez,et al.  Three Misuse Patterns for Cloud Computing , 2013 .

[10]  Ramaswamy Chandramouli,et al.  State of security readiness , 2010, CROS.

[11]  Ravi Pendse,et al.  Security in multi-tenancy cloud , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.

[12]  Jonathan Katz,et al.  Efficient cryptographic protocols preventing man-in-the-middle attacks , 2002 .

[13]  Dustin Owens,et al.  Securing Elasticity in the Cloud , 2010, ACM Queue.

[14]  Jing Zhang,et al.  Research on key technology for SaaS , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).

[15]  Raheem A. Beyah,et al.  MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[16]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[17]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[18]  Shyam Nandan Kumar,et al.  World towards Advance Web Mining: A Review , 2015 .

[19]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[20]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[21]  Jia-Lun Tsai,et al.  A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2015, IEEE Systems Journal.

[22]  Daniel Mellado,et al.  Security Analysis in the Migration to Cloud Environments , 2012, Future Internet.

[23]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[24]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[25]  Daniele Catteddu,et al.  Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .

[26]  Timothy Grance,et al.  Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .

[27]  Jie Wu,et al.  Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011, Comput. Secur..

[28]  Yi Ding,et al.  Network security for virtual machine in cloud computing , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[29]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[30]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[31]  Hui Li,et al.  The technical security issues in cloud computing , 2013, Int. J. Inf. Commun. Technol..

[32]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[33]  T. Grance,et al.  SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing , 2011 .

[34]  Mazleena Salleh,et al.  Biometric encryption to enhance confidentiality in Cloud computing , 2014, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).

[35]  Sakshi Kaushal,et al.  Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.

[36]  Sherman S. M. Chow,et al.  Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.

[37]  Cor-Paul Bezemer,et al.  Multi-tenant SaaS applications: maintenance dream or nightmare? , 2010, IWPSE-EVOL '10.

[38]  P. Praveen Chandar,et al.  Hierarchical attribute based proxy re-encryption access control in cloud computing , 2014, 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014].

[39]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[40]  Muttukrishnan Rajarajan,et al.  Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption , 2012, IEEE Transactions on Parallel and Distributed Systems.

[41]  Atsuko Miyaji,et al.  A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2009, Int. J. Appl. Cryptogr..

[42]  John C. Grundy,et al.  An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.

[43]  Krishnashree Achuthan,et al.  Preventing Insider Attacks in the Cloud , 2011, ACC.

[44]  B AmaneY.,et al.  Security Issues in Cloud Computing , 2011, HPAGC.

[45]  Duncan S. Wong,et al.  Secure Outsourced Attribute-Based Signatures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[46]  Matthew Metheny,et al.  Security and Privacy in Public Cloud Computing , 2013, CloudCom 2013.

[47]  Rainer Steinwandt,et al.  Multi-authority attribute-based encryption with honest-but-curious central authority , 2012, Int. J. Comput. Math..

[48]  Gary Anthes,et al.  Security in the cloud , 2010, Commun. ACM.

[49]  Frank Gens,et al.  Cloud Computing Benefits, risks and recommendations for information security , 2010 .

[50]  Angelos Stavrou,et al.  SQLProb: a proxy-based architecture towards preventing SQL injection attacks , 2009, SAC '09.

[51]  Shyam Nandan Kumar DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds , 2015 .

[52]  Harit Shah,et al.  Security Issues on Cloud Computing , 2013, ArXiv.

[53]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[54]  CaoZhenfu,et al.  Secure threshold multi authority attribute based encryption without a central authority , 2008, Inf. Sci..

[55]  Levent Ertaul,et al.  Security Challenges in Cloud Computing , 2010, Security and Management.

[56]  Tim Mather,et al.  Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.

[57]  Jeremy M. Kaplan,et al.  Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds , 2017, IEEE Transactions on Cloud Computing.

[58]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[59]  M. Mambo,et al.  Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .

[60]  Shalini Kaleeswaran,et al.  On covert channels between virtual machines , 2012, Journal in Computer Virology.

[61]  Tatsuaki Okamoto,et al.  Decentralized Attribute-Based Signatures , 2013, Public Key Cryptography.

[62]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[63]  Jen-Ho Yang,et al.  An ID-Based User Authentication Scheme for Cloud Computing , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[64]  Justin Clarke,et al.  SQL Injection Attacks and Defense , 2009 .

[65]  Allison Bishop,et al.  Revocation Systems with Very Small Private Keys , 2010, 2010 IEEE Symposium on Security and Privacy.

[66]  Tal Garfinkel,et al.  When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.

[67]  Hideki Imai,et al.  Dual-Policy Attribute Based Encryption , 2009, ACNS.

[68]  Ke Xu,et al.  Mobile Mashup: Architecture, Challenges and Suggestions , 2009, 2009 International Conference on Management and Service Science.

[69]  Trent Jaeger,et al.  Outlook: Cloudy with a Chance of Security Challenges and Improvements , 2010, IEEE Security & Privacy.

[70]  J. Reuben,et al.  A Survey on Virtual Machine Security , 2007 .

[71]  Hai Jin,et al.  Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform , 2015, IEEE Transactions on Cloud Computing.

[72]  Shyam Nandan Kumar Cryptography during Data Sharing and Accessing Over Cloud , 2015 .

[73]  John Viega,et al.  Cloud Computing and the Common Man , 2009, Computer.