Security issues in cloud computing

This paper presents a comprehensive study on the challenges and issues of security in cloud computing. We first look into the impacts of the distinctive characteristics of cloud computing, namely, multi-tenancy, elasticity and third party control, upon the security requirements. Then, we analyze the cloud security requirements in terms of the fundamental issues, i.e., confidentiality, integrity, availability, trust, and audit and compliance. Furthermore, we discuss the taxonomy for security issues in cloud computing. Finally, we summarize the security issues in cloud computing by a cloud security architecture.

[1]  Stefanos Gritzalis,et al.  Quality assured trusted third parties for deploying secure internet-based healthcare applications , 2002, Int. J. Medical Informatics.

[2]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[3]  Despina Polemi Trusted third party services for health care in Europe , 1998, Future Gener. Comput. Syst..

[4]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[5]  edkar,et al.  A Review on Cloud Computing Vulnerabilities , 2014 .

[6]  Frank Gens,et al.  Cloud Computing Benefits, risks and recommendations for information security , 2010 .

[7]  G. Sahoo,et al.  A Secure Cloud Computing , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[8]  Six Strategies for Defense-in-Depth Securing the Network from the Inside , .

[9]  Steve Elky An Introduction to Information System Risk Management , 2007 .

[10]  Challa Narasimham,et al.  Data security in cloud using RSA , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[11]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[12]  Harit Shah,et al.  Security Issues on Cloud Computing , 2013, ArXiv.

[13]  Wenjun Zhang,et al.  Integrated Security Framework for Secure Web Services , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.

[14]  Sumit Goyal,et al.  Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review , 2014 .

[15]  Levent Ertaul,et al.  Security Challenges in Cloud Computing , 2010, Security and Management.

[16]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[17]  V. K. Agrawal,et al.  Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.

[18]  Martin Gilje Jaatun,et al.  Deployment models: Towards eliminating security concerns from cloud computing , 2010, 2010 International Conference on High Performance Computing & Simulation.

[19]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[20]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[21]  Dennis K. Holstein,et al.  Trust but Verify Critical Infrastructure Cyber Security Solutions , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[22]  Liang-Jie Zhang,et al.  CCOA: Cloud Computing Open Architecture , 2009, 2009 IEEE International Conference on Web Services.

[23]  H. A. Dinesha,et al.  A Review on Hybrid Techniques of Security In Cloud Computing , 2014 .

[24]  Weidong Liu,et al.  Security Issues and Solutions in Cloud Computing , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[25]  Hu Shuijing,et al.  Data Security: The Challenges of Cloud Computing , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.

[26]  Gail-Joon Ahn,et al.  Role-based privilege and trust management , 2005, Comput. Syst. Sci. Eng..

[27]  Lakshmi Sobhana Kalli,et al.  Market-Oriented Cloud Computing : Vision , Hype , and Reality for Delivering IT Services as Computing , 2013 .

[28]  Vijay Varadharajan,et al.  Dynamic trust enhanced security model for trusted platform based services , 2011, Future Gener. Comput. Syst..

[29]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.