Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing.

[1]  Nicholas S. R. Walliman Your Undergraduate Dissertation: The Essential Guide for Success , 2004 .

[2]  Levent Ertaul,et al.  Security Challenges in Cloud Computing , 2010, Security and Management.

[3]  Mahmoud Al-Ayyoub,et al.  SDSecurity: A Software Defined Security experimental framework , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[4]  Lee Gillam,et al.  Cloud Computing, Principles, Systems and Applications , 2010, Cloud Computing.

[5]  Adil Al-Yasiri,et al.  Framework for cloud computing adoption: A road map for Smes to cloud migration , 2016, ArXiv.

[6]  Christoph Meinel,et al.  Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).

[7]  Karuna Pande Joshi,et al.  A Semantic Approach to Cloud Security and Compliance , 2015, 2015 IEEE 8th International Conference on Cloud Computing.

[8]  D. M. Hutton,et al.  Securing the Cloud: Cloud Computer Security Techniques and Tactics , 2012 .

[9]  Lingdi Ping,et al.  Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.

[10]  Ammar Khalid Cloud Computing: Applying Issues in Small Business , 2010, 2010 International Conference on Signal Acquisition and Processing.

[11]  Stanislav Nedev,et al.  Exploring the factors influencing the adoption of Cloud computing and the challenges faced by the business , 2014 .

[12]  Georgios I. Doukidis,et al.  Trends in information technology in small businesses , 1994 .

[13]  John W. Rittinghouse,et al.  Cloud Computing: Implementation, Management, and Security , 2009 .

[14]  Yaser Jararweh,et al.  PEP-side caching: An insider threat port , 2013, 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI).

[15]  Yi Ding,et al.  Network security for virtual machine in cloud computing , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[16]  Yaser Jararweh,et al.  Mitigating insider threat in cloud relational databases , 2016, Secur. Commun. Networks.

[17]  Maria Azua Himmel Qualitative Analysis of Cloud Computing Risks and Framework for the Rationalization and Mitigation of Cloud Risks , 2012 .

[18]  Ravi Pendse,et al.  Security in multi-tenancy cloud , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.

[19]  Wayne A. Jansen,et al.  Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[20]  Temesgen Kitaw Damenu,et al.  Cloud Security Risk Management: A Critical Review , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[21]  Martin Gilje Jaatun,et al.  Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings , 2009, CloudCom.

[22]  Kevin Curran,et al.  Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..

[23]  John C. Grundy,et al.  An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.

[24]  Bhavani Shankar,et al.  Study of security issues in cloud computing , 2011 .

[25]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.