A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing

The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloud remains a tempting trend from a financial perspective, there are several other aspects that must be taken into account by companies before they decide to do so. One of the most important aspect refers to security: while some cloud computing security issues are inherited from the solutions adopted to create such services, many new security questions that are particular to these solutions also arise, including those related to how the services are organized and which kind of service/data can be placed in the cloud. Aiming to give a better understanding of this complex scenario, in this article we identify and classify the main security concerns and solutions in cloud computing, and propose a taxonomy of security in cloud computing, giving an overview of the current status of security in this emerging technology.

[1]  Andrew P. Martin,et al.  myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[2]  Tim Mather,et al.  Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.

[3]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[4]  T. S. Raghu,et al.  Privacy and Security Practices in the Arena of Cloud Computing - A Research in Progress , 2010, AMCIS.

[5]  Dawn Song,et al.  Proceedings of the 2009 ACM workshop on Cloud computing security , 2009, CloudCom 2009.

[6]  Ling Tian,et al.  Identity-Based Authentication for Cloud Computing , 2009, CloudCom.

[7]  A. Sadeghi,et al.  Token-Based Cloud Computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency , 2010 .

[8]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[9]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[10]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[11]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[12]  Christopher E. Dabrowski,et al.  VM Leakage and Orphan Control in Open-Source Clouds , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[13]  Tim Mather,et al.  Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.

[14]  Liang Yan,et al.  Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.

[15]  L. Youseff,et al.  Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.

[16]  Marcos A. Simplício,et al.  A quantitative analysis of current security concerns and solutions for cloud computing , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[17]  Eugene Ciurana,et al.  Google App Engine , 2009 .

[18]  David W. Chadwick,et al.  Security APIs for My Private Cloud - Granting access to anyone, from anywhere at any time , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[19]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[20]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[21]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[22]  Martin Knahl,et al.  An Autonomous Agent Based Incident Detection System for Cloud Environments , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[23]  John C. Grundy,et al.  Emerging Security Challenges of Cloud Virtual Infrastructure , 2016, APSEC 2010.

[24]  Frank Leymann,et al.  Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[25]  Vladimir A. Oleshchuk,et al.  Security and privacy in the cloud a long-term view , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[26]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[27]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[28]  Andrew P. Martin,et al.  myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment , 2011, CloudCom.