Skip to main content
Log in

Cloud Computing Security Issues: a Stakeholder’s Perspective

  • Survey Article
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Cloud computing is a rising technology that has gained significant attention over past decades. It offers various features such as-on-demand access, broad-network access, unlimited resource pool, etc. Despite so many merits, cloud computing has been full several challenges. Security indeed has remained one of the biggest challenges. Researchers, all over world, have been working on designing different types of security mechanism which can work on different levels on cloud environment. However, the literature on cloud security is quite wide and touches several issues pertaining to different stakeholders. The current study addresses the above issue by presenting a detailed review of challenges of security that are faced by different stake holders, such as cloud service provider (CSP), cloud user (CU), etc. This study will help the various researchers to find all security concerns at one place with critical reviews.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. G. Rastogi, R. Sushil (2015) Cloud computing implementation: Key issues and solutions, in 2015 International Conference on Computing for Sustainable Global Development, INDIACom 2015.

  2. Lee J. A view of cloud computing. Int J Networked Distrib Comput. 2013;1(1):2–8. https://doi.org/10.2991/ijndc.2013.1.1.2.

    Article  Google Scholar 

  3. Khalil IM, Khreishah A, Azeem M. Cloud computing security: a survey. Computers. 2014;3(1):1–35. https://doi.org/10.3390/computers3010001.

    Article  Google Scholar 

  4. Grobauer B, Walloschek T, Stöcker E. Understanding cloud computing vulnerabilities. IEEE Secur Priv. 2011;9(2):50–7. https://doi.org/10.1109/MSP.2010.115.

    Article  Google Scholar 

  5. Singh A. Security concerns and vulnerabilities in cloud computing: a qualitative analysis. Int J Inf Technol. 2019;11(4):683–90. https://doi.org/10.1007/s41870-018-0108-1.

    Article  Google Scholar 

  6. P. G. Neumann (2004) Security and privacy. In: Computer Science Handbook, Second Ed., CRC Press, pp. 77–1–77–5. https://doi.org/10.4324/9781315115757-7.

  7. Ardagna CA, Asal R, Damiani E, Vu QH. From security to assurance in the cloud: a survey. ACM Comput Surv. 2015;48:1. https://doi.org/10.1145/2767005.

    Article  Google Scholar 

  8. Kumar R, Goyal R. On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Comput Sci Rev. 2019;33:1–48. https://doi.org/10.1016/j.cosrev.2019.05.002.

    Article  MathSciNet  Google Scholar 

  9. Phaphoom N, Wang X, Samuel S, Helmer S, Abrahamsson P. A survey study on major technical barriers affecting the decision to adopt cloud services. J Syst Softw. 2015;103:167–81. https://doi.org/10.1016/j.jss.2015.02.002.

    Article  Google Scholar 

  10. Hsu CL, Lin JCC. Factors affecting the adoption of cloud services in enterprises. Inf Syst E-bus Manag. 2016;14(4):791–822. https://doi.org/10.1007/s10257-015-0300-9.

    Article  Google Scholar 

  11. Rastogi G, Sushil R. Secured identity management system for preserving data privacy and transmission in cloud computing. Int J Futur Gener Commun Netw. 2018;11(1):23–36. https://doi.org/10.14257/ijfgcn.2018.11.1.03.

    Article  Google Scholar 

  12. Journal A, Basic OF. Cloud computing adoption by business organization: a systematic review. Aust J Basic Appl Sci. 2017;11(November):17–28. https://doi.org/10.22587/ajbas.2017.11.13.3.

    Article  Google Scholar 

  13. G. Rastogi, R. Sushil, A Review Paper on Cloud Identity Management Systems, Int. Conf. Cloud Comput. Big Data, June 2016, Phuket, Thailand.

  14. M. Almorsy, J. Grundy, I. Müller (2016) An analysis of the cloud computing security problem. Available: https://arxiv.org/abs/1609.01107. Accessed July 2020

  15. Takabi H, Joshi JBD, Ahn GJ. Security and privacy challenges in cloud computing environments. IEEE Secur Priv. 2010. https://doi.org/10.1109/MSP.2010.186.

    Article  Google Scholar 

  16. Rizvi S, Ryoo J, Kissell J, Aiken W, Liu Y. A security evaluation framework for cloud security auditing. J Supercomput. 2018;74(11):5774–966. https://doi.org/10.1007/s11227-017-2055-1.

    Article  Google Scholar 

  17. Ramachandra G, Iftikhar M, Khan FA. A 2Survey on security in cloud computing. Procedia Comput Sci. 2017;110(2012):465–72. https://doi.org/10.1016/j.procs.2017.06.124.

    Article  Google Scholar 

  18. Subramanian N, Jeyaraj A. Recent security challenges in cloud computing. Comput Electr Eng. 2018;71:28–422. https://doi.org/10.1016/j.compeleceng.2018.06.006.

    Article  Google Scholar 

  19. Tabrizchi H, Kuchaki Rafsanjani M. A survey on security challenges in cloud computing: issues, threats, and solutions no. 0123456789. New York: Springer US; 2020.

    Google Scholar 

  20. M. Drozdova, S. Rusnak, P. Segec, J. Uramova, M. Moravcik (2017) Contribution to cloud computing security architecture. ICETA 2017—15th IEEE Int. Conf. Emerg. eLearning Technol. Appl. Proc., no. February 2018. doi: https://doi.org/10.1109/ICETA.2017.8102480.

  21. Ryoo J, Rizvi S, Aiken W, Kissell J. Cloud security auditing: challenges and emerging approaches. IEEE Secur Priv. 2014;12(6):68–74. https://doi.org/10.1109/MSP.2013.132.

    Article  Google Scholar 

  22. Guzek M, Gniewek A, Bouvry P, Musial J, Blazewicz J. Cloud brokering: current practices and upcoming challenges. IEEE Cloud Comput. 2015;2(2):40–7. https://doi.org/10.1109/MCC.2015.32.

    Article  Google Scholar 

  23. S. R. Lenkala, S. Shetty, K. Xiong (2013) Security risk assessment of cloud carrier. Proc.—13th IEEE/ACM Int. Symp. Clust. Cloud, Grid Comput. CCGrid 2013, pp. 442–449. doi: https://doi.org/10.1109/CCGrid.2013.28.

  24. Rastogi G, Verma H, Sushil R. Determining factors influencing cloud services adotion in India. Serbian J Manag. 2018;13(2):335–52.

    Article  Google Scholar 

  25. Verma G, Chakroborty R. A hybrid privacy preserving scheme using finger print detection in cloud environment. Ingenierie des systemes d'information. 2019;24(3):343–51.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Garima Verma.

Ethics declarations

Conflict of Interest

We hereby declare that this manuscript is an original work and is not under consideration for publication in any other journal. All authors have approved the submission of the manuscript to the respective journals.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Computational Statistics” guest edited by Anish Gupta, Mike Hinchey, Vincenzo Puri, Zeev Zalevsky, and Wan Abdul Rahim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Verma, G., Adhikari, S. Cloud Computing Security Issues: a Stakeholder’s Perspective. SN COMPUT. SCI. 1, 329 (2020). https://doi.org/10.1007/s42979-020-00353-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-020-00353-2

Keywords

Navigation