Security Concerns in Cloud Computing

The rate of threats against IT systems is directly proportional to the rate of growing technology. The emergence of new technology requires researchers and practitioner's attention to discover new threats in order to make it reliable. Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Security issues in cloud computing is shown to be the biggest obstacle that could subvert the wide benefits of cloud computing. The new concepts that the cloud introduces, such as multi-tenancy, creates new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for other systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide comprehensive study of cloud computing security that includes classification of known security threats and the state-of-the-art practices in the endeavor to calibrate these threats. This paper also provides the dependency level within classification and provides a solution in form of preventive actions rather than proactive actions.

[1]  Issa M. Khalil,et al.  Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks , 2007, Ad Hoc Networks.

[2]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[3]  Abhinav Mishra,et al.  Cloud computing security considerations , 2011, 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).

[4]  Zhixiong Chen,et al.  IT Auditing to Assure a Secure Cloud Computing , 2010, 2010 6th World Congress on Services.

[5]  Wasim A. Al-Hamdani,et al.  Who can you trust in the cloud?: a review of security issues within cloud computing , 2011, InfoSecCD.

[6]  Ronald Maier,et al.  Challenges in Cross-Organizational Security Management , 2012, 2012 45th Hawaii International Conference on System Sciences.

[7]  Sally Sieloff Magnan,et al.  Research Design: Qualitative and Quantitative Approaches , 1997 .

[8]  Vikas Kumar,et al.  Cloud security assessment and identity management , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).

[9]  Jun-jie Wang,et al.  Security issues and countermeasures in cloud computing , 2011, Proceedings of 2011 IEEE International Conference on Grey Systems and Intelligent Services.

[10]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[11]  Pritesh Jain,et al.  A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment , 2011, 2011 World Congress on Information and Communication Technologies.

[12]  Nitha Rachel Suresh,et al.  Security concerns for cloud computing in aircraft data networks , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[13]  Alexander Pretschner,et al.  Implementing Trust in Cloud Infrastructures , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[14]  M Hasan Islam,et al.  Cloud computing security auditing , 2011, The 2nd International Conference on Next Generation Information Technology.

[15]  Ranko Popovic,et al.  A comparison and security analysis of the cloud computing software platforms , 2011, 2011 10th International Conference on Telecommunication in Modern Satellite Cable and Broadcasting Services (TELSIKS).

[16]  Saman A. Zonouz,et al.  A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[17]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[18]  Shubhashis Sengupta,et al.  Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.

[19]  Aarthi,et al.  Towards Secure and Dependable Storage Services in Cloud Computing , 2014 .

[20]  Issa M. Khalil,et al.  Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping , 2009, Ad Hoc Networks.

[21]  Yin Hu,et al.  Analysis and Research about Cloud Computing Security Protect Policy , 2011, 2011 International Conference on Intelligence Science and Information Engineering.

[22]  Pearl Brereton,et al.  Performing systematic literature reviews in software engineering , 2006, ICSE.

[23]  Marcos A. Simplício,et al.  A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.

[24]  Doan B. Hoang,et al.  Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Models for Healthcare Cloud , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[25]  Zaigham Mahmood,et al.  Data Location and Security Issues in Cloud Computing , 2011, 2011 International Conference on Emerging Intelligent Data and Web Technologies.

[26]  Jean-Henry Morin,et al.  Towards Cloud Computing SLA Risk Management: Issues and Challenges , 2012, 2012 45th Hawaii International Conference on System Sciences.

[27]  J. Creswell Qualitative inquiry and research design: choosing among five traditions. , 1998 .

[28]  Farzad Sabahi,et al.  Virtualization-level security in cloud computing , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[29]  Li Xiang,et al.  The study on data security in Cloud Computing based on Virtualization , 2011, 2011 IEEE International Symposium on IT in Medicine and Education.

[30]  Issa M. Khalil,et al.  MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks , 2008, SecureComm.

[31]  Issa M. Khalil,et al.  Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure , 2011, IEEE Transactions on Mobile Computing.

[32]  Akhil Behl Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation , 2011, 2011 World Congress on Information and Communication Technologies.

[33]  Eystein Mathisen,et al.  Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).

[34]  Si Mao-xin,et al.  Notice of RetractionWireless broadband application technology investigation of IPv6 optical network cloud computing , 2010, 2010 6th International Conference on Advanced Information Management and Service (IMS).

[35]  M. Roberts Masillamani,et al.  Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.