Security Issues on Cloud Computing

The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet.Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure and operational expenditure.In order for this to become reality, however, there are still some challenges to be solved. Amongst these are security and trust issues, since the user data has to be released to the Cloud and thus leaves the protection sphere of the data owner. Most of the discussions on these topics are mainly driven by arguments related to organisational means. This paper focuses on various security issues arising from the usage of Cloud services and especially by the rapid development of Cloud computing arena. It also discusses basic security model followed by various High Level Security threats in the industry.

[1]  Robin L. Sherman,et al.  Distributed systems security , 1992, Comput. Secur..

[2]  Daniele Catteddu and Giles Hogben Cloud Computing. Benefits, risks and recommendations for information security , 2009 .

[3]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[4]  S. H. Krishnaveni,et al.  A Study of Data Storage Security Issues in Cloud Computing , 2015 .

[5]  Despina Polemi Trusted third party services for health care in Europe , 1998, Future Gener. Comput. Syst..

[6]  Ladan Tahvildari,et al.  A Reference Model for Developing Cloud Applications , 2011, CLOSER.

[7]  Levent Ertaul,et al.  Security Challenges in Cloud Computing , 2010, Security and Management.

[8]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[9]  George Reese,et al.  Cloud Application Architectures - Building Applications and Infrastructure in the Cloud , 2009 .

[10]  Gamal Attiya,et al.  A secure cloud storage system combining time-based one-time password and automatic blocker protocol , 2016, 2015 11th International Computer Engineering Conference (ICENCO).

[11]  Qian Wang,et al.  Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.

[12]  Mayuri R. Gawande,et al.  Analysis of Data Confidentiality Techniques in Cloud Computing , 2014 .

[13]  Rich Maggiani Cloud computing is changing how we communicate , 2009, 2009 IEEE International Professional Communication Conference.

[14]  Aleksey Kolupaev,et al.  CAPTCHAs: Humans vs. Bots , 2008, IEEE Security & Privacy.

[15]  Gerald Brose,et al.  Rainbow Tables , 2011, Encyclopedia of Cryptography and Security.

[16]  Tyler Moore,et al.  Examining the impact of website take-down on phishing , 2007, eCrime '07.

[17]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[18]  Michael D. Ernst Static and dynamic analysis: synergy and duality , 2003 .

[19]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[20]  H. A. Dinesha,et al.  A Review on Hybrid Techniques of Security In Cloud Computing , 2014 .

[21]  Hu Shuijing,et al.  Data Security: The Challenges of Cloud Computing , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.

[22]  John C. Henderson,et al.  Preparing for the Future: Understanding the Seven Capabilities of Cloud Computing , 2010, MIS Q. Executive.

[23]  Er. Harpreet Kaur,et al.  Cloud Computing : A Review , 2013 .

[24]  Daniele Catteddu,et al.  Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .

[25]  V. K. Agrawal,et al.  Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.

[26]  Rajkumar Buyya,et al.  InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services , 2010, ICA3PP.

[27]  Zhuoqing Morley Mao,et al.  Automated Classification and Analysis of Internet Malware , 2007, RAID.

[28]  A. Ashok Kumar,et al.  Two layer security for data storage in cloud , 2015, 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE).

[29]  Kangchan Lee Security Threats in Cloud Computing Environments 1 , 2012 .

[30]  Moustafa Ghanem,et al.  Improving Resource Utilisation in the Cloud Environment Using Multivariate Probabilistic Models , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[31]  Jeff Yucong Luo,et al.  Secure Cloud Storage , 2014 .

[32]  edkar,et al.  A Review on Cloud Computing Vulnerabilities , 2014 .

[33]  Jianfeng Yang,et al.  Cloud Computing Research and Security Issues , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.

[34]  Challa Narasimham,et al.  Data security in cloud using RSA , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[35]  Sumit Goyal,et al.  Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review , 2014 .

[36]  Eugene Ciurana,et al.  Google App Engine , 2009 .

[37]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[38]  Marianne Winslett,et al.  A unified scheme for resource protection in automated trust negotiation , 2003, 2003 Symposium on Security and Privacy, 2003..

[39]  Peter Oehlert,et al.  Violating Assumptions with Fuzzing , 2005, IEEE Secur. Priv..