A Survey of Security Concerns, Mechanisms and Testing in Cloud Environment

Distributed Computing is a form of computing in which a group of independent systems are connected to a computer network. Cloud Computing is one of the emerging domain in the field of Computer Science. With the help of cloud computing, the computing services can be delivered over the internet. Before the advent of cloud computing, the business applications were found to be complicated, expensive and the software and hardware requirements of these applications were daunting. These issues were resolved in cloud computing since the hardware and software are maintained by the cloud vendors. Another advantage of using cloud computing is that it follows pay-per-use technology which means that the user only pays for the resources he/ she consumes. The main goal of the security principles in cloud computing is to ensure that the Confidentiality, Integrity, and Availability of the data are preserved. This paper presents an extensive survey of the security threats; its countermeasures and testing that are available in cloud computing.

[1]  Wei Zhao,et al.  A Framework of Testing as a Service , 2009, 2009 International Conference on Management and Service Science.

[2]  Katina Michael,et al.  Cloud computing data breaches a socio-technical review of literature , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[3]  Dimitris Gritzalis,et al.  The Insider Threat in Cloud Computing , 2011, CRITIS.

[4]  Mehdi Merouane An approach for detecting and preventing DDoS attacks in campus , 2017, Automatic Control and Computer Sciences.

[5]  Bu-Sung Lee,et al.  TrustCloud: A Framework for Accountability and Trust in Cloud Computing , 2011, 2011 IEEE World Congress on Services.

[6]  Fang Liu,et al.  Network traffic and user behavior analysis of mobile reading applications , 2016, 2016 Sixth International Conference on Information Science and Technology (ICIST).

[7]  Edgar R. Weippl,et al.  The Role and Security of Firewalls in IaaS Cloud Computing , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[8]  Yasir Ahmed Hamza,et al.  Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing , 2013 .

[9]  Andrew Vance Flow based analysis of Advanced Persistent Threats detecting targeted attacks in cloud computing , 2014, 2014 First International Scientific-Practical Conference Problems of Infocommunications Science and Technology.

[10]  N. Jaisankar,et al.  A Review on Various Trust Models in Cloud Environment , 2017 .

[11]  M. Sasikumar,et al.  Trust Model for Measuring Security Strength of Cloud Computing Service , 2015 .

[12]  Hira Sathu,et al.  Analysis and Prevention of Account Hijacking Based INCIDENTS in Cloud Environment , 2015, 2015 International Conference on Information Technology (ICIT).

[13]  Mohamed Rida,et al.  A survey of intrusion detection systems for cloud computing environment , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).