Levels of Security Issues in Cloud Computing

Nowadays, Cloud computing is booming in most of the IT industry. Most of the organizations are moving to cloud computing due to various reasons. It provide elastic architecture accessible through internet and also it eliminate the setting up of high cost computing infrastructure for the IT based solutions and services. Cloud computing is pay-per-use model, on-demand network access to a shared pool of configurable computing resources like Application-as a service, Platform as a services and infrastructure as a services. In this paper, survey of security issues at different levels such as application level, host level and network level is presented.

[1]  Roberto Di Pietro,et al.  Transparent security for cloud , 2010, SAC '10.

[2]  Rich Maggiani Cloud computing is changing how we communicate , 2009, 2009 IEEE International Professional Communication Conference.

[3]  Sugata Sanyal,et al.  A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.

[4]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[5]  Jennifer Rexford,et al.  Autonomous security for autonomous systems , 2008, Comput. Networks.

[6]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[7]  Dieter Gollmann,et al.  Securing Web applications , 2008, Inf. Secur. Tech. Rep..

[8]  Siani Pearson,et al.  A client-based privacy manager for cloud computing , 2009, COMSWARE '09.

[9]  Ian Rathie An Approach to Application Security , 2002 .

[10]  Jonathan Katz,et al.  Efficient cryptographic protocols preventing man-in-the-middle attacks , 2002 .

[11]  Marios D. Dikaiakos,et al.  Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.

[12]  Peng Ning,et al.  Managing security of virtual machine images in a cloud environment , 2009, CCSW '09.

[13]  Robert L. Grossman,et al.  The Case for Cloud Computing , 2009, IT Professional.

[14]  Mounir Frikha,et al.  Malicious sniffing systems detection platform , 2004, 2004 International Symposium on Applications and the Internet. Proceedings..

[15]  Daiyuan Peng,et al.  Resource allocation for security services in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).