Cloud Computing Security: An Issue of Concern

Cloud computing is an emerging technology exemplar that migrate current technological and computing concepts into utility-like solutions. Cloud computing as a ubiquitous on-demand model for accessing common resources over a network. The main idea of cloud computing is to deliver both software and hardware as services. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the issues of great concern to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to grow and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this paper, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives.

[1]  M. Roberts Masillamani,et al.  Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.

[2]  Zhixiong Chen,et al.  IT Auditing to Assure a Secure Cloud Computing , 2010, 2010 6th World Congress on Services.

[3]  Eystein Mathisen,et al.  Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).

[4]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[5]  H. Bernard,et al.  Data Management and Analysis Methods , 2000 .

[6]  Peter Desnoyers,et al.  Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing , 2011, 2011 IEEE 10th International Symposium on Network Computing and Applications.

[7]  Issa M. Khalil,et al.  An OFDMA-based MAC protocol for under water acoustic wireless sensor networks , 2009, IWCMC.

[8]  Issa M. Khalil,et al.  MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks , 2008, SecureComm.

[9]  Ranko Popovic,et al.  A comparison and security analysis of the cloud computing software platforms , 2011, 2011 10th International Conference on Telecommunication in Modern Satellite Cable and Broadcasting Services (TELSIKS).

[10]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[11]  Rajkumar Buyya,et al.  A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..

[12]  Sabrina De Capitani di Vimercati,et al.  Data protection in outsourcing scenarios: issues and directions , 2010, ASIACCS '10.

[13]  Akhil Behl Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation , 2011, 2011 World Congress on Information and Communication Technologies.

[14]  Nils Gruschka,et al.  Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[15]  V. Braun,et al.  Using thematic analysis in psychology , 2006 .

[16]  Vikas Kumar,et al.  Cloud security assessment and identity management , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).

[17]  M Hasan Islam,et al.  Cloud computing security auditing , 2011, The 2nd International Conference on Next Generation Information Technology.

[18]  Zaigham Mahmood,et al.  Data Location and Security Issues in Cloud Computing , 2011, 2011 International Conference on Emerging Intelligent Data and Web Technologies.

[19]  Shubhashis Sengupta,et al.  Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.

[20]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[21]  Issa M. Khalil,et al.  SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks , 2009, 2009 IEEE Symposium on Computers and Communications.

[22]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[23]  Issa M. Khalil MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[24]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[25]  Yin Hu,et al.  Analysis and Research about Cloud Computing Security Protect Policy , 2011, 2011 International Conference on Intelligence Science and Information Engineering.

[26]  Yi-Ming Chen,et al.  Retrospective detection of malware attacks by cloud computing , 2010, 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[27]  Pritesh Jain,et al.  A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment , 2011, 2011 World Congress on Information and Communication Technologies.

[28]  Issa M. Khalil ELMO: Energy Aware Local Monitoring in Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[29]  A. B. M. Shawkat Ali,et al.  A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..

[30]  Jun-jie Wang,et al.  Security issues and countermeasures in cloud computing , 2011, Proceedings of 2011 IEEE International Conference on Grey Systems and Intelligent Services.