A review on cloud computing security issues & challanges

The new developments in the field of information technology offered the people enjoyment, comforts and convenience. Cloud computing is one of the latest developments in the IT industry also known as on-demand computing. It provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructures. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. This technology has the capacity to admittance a common collection of resources on request. It is proving extremely striking to cash-strapped IT departments that are wanted to deliver better services under pressure. When this cloud is made available for the general customer on pay per use basis, then it is called public cloud. When customer develops their own applications and run their own internal infrastructure then is called private cloud. Integration and consolidation of public and private cloud is called hybrid cloud. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. These issues are arises during the deployment of mostly public cloud because in public cloud infrastructure customer is not aware where the data store & how over the internet. In this paper security privacy & trust issues of cloud computing are reviewed. The paper includes some surveys conducted by IDC that show the motivation for the adoption of cloud computing. The paper identifies the issues and the solution to overcome these problems. The paper also contain the security model named security access control services SACS is analyzed through the Hadoop map reduce framework and the experimental results are obtained that compare the system performance with SACS model and without SACS model. Once the attack starts up, the performance which using security model is better than not using one. So the cloud computing with the proposed security model has the more stable performance when facing the attack threat, especially a variety of stacks at the same time.

[1]  Sanjay Ghemawat,et al.  MapReduce: simplified data processing on large clusters , 2008, CACM.

[2]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[3]  Marios D. Dikaiakos,et al.  Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.

[4]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[5]  Abzetdin Adamov,et al.  The truth about cloud computing as new paradigm in IT , 2009, 2009 International Conference on Application of Information and Communication Technologies.

[6]  Rich Maggiani Cloud computing is changing how we communicate , 2009, 2009 IEEE International Professional Communication Conference.

[7]  Jianfeng Yang,et al.  Cloud Computing Research and Security Issues , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.

[8]  Peeyush Mathur,et al.  Cloud computing: New challenge to the entire computer industry , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).

[9]  Shufen Zhang,et al.  Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.

[10]  Chun-Jung Chen,et al.  Information security issue of enterprises adopting the application of cloud computing , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[11]  Yong Tang,et al.  Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[12]  Xue Jing,et al.  A Brief Survey on the Security Model of Cloud Computing , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.

[13]  Chuang Lin,et al.  Evaluation of user behavior trust in cloud computing , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[14]  Wayne A. Jansen,et al.  Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[15]  O. KuyoroS. Cloud Computing Security Issues and Challenges , 2011 .

[16]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[17]  Mohamed,et al.  Data Security Model for Cloud Computing , 2013 .

[18]  S. K. Dubey,et al.  Security and Privacy in Cloud Computing: A Survey , 2013 .