Abstract
Cloud computing is a rising technology that has gained significant attention over past decades. It offers various features such as-on-demand access, broad-network access, unlimited resource pool, etc. Despite so many merits, cloud computing has been full several challenges. Security indeed has remained one of the biggest challenges. Researchers, all over world, have been working on designing different types of security mechanism which can work on different levels on cloud environment. However, the literature on cloud security is quite wide and touches several issues pertaining to different stakeholders. The current study addresses the above issue by presenting a detailed review of challenges of security that are faced by different stake holders, such as cloud service provider (CSP), cloud user (CU), etc. This study will help the various researchers to find all security concerns at one place with critical reviews.
Similar content being viewed by others
References
G. Rastogi, R. Sushil (2015) Cloud computing implementation: Key issues and solutions, in 2015 International Conference on Computing for Sustainable Global Development, INDIACom 2015.
Lee J. A view of cloud computing. Int J Networked Distrib Comput. 2013;1(1):2–8. https://doi.org/10.2991/ijndc.2013.1.1.2.
Khalil IM, Khreishah A, Azeem M. Cloud computing security: a survey. Computers. 2014;3(1):1–35. https://doi.org/10.3390/computers3010001.
Grobauer B, Walloschek T, Stöcker E. Understanding cloud computing vulnerabilities. IEEE Secur Priv. 2011;9(2):50–7. https://doi.org/10.1109/MSP.2010.115.
Singh A. Security concerns and vulnerabilities in cloud computing: a qualitative analysis. Int J Inf Technol. 2019;11(4):683–90. https://doi.org/10.1007/s41870-018-0108-1.
P. G. Neumann (2004) Security and privacy. In: Computer Science Handbook, Second Ed., CRC Press, pp. 77–1–77–5. https://doi.org/10.4324/9781315115757-7.
Ardagna CA, Asal R, Damiani E, Vu QH. From security to assurance in the cloud: a survey. ACM Comput Surv. 2015;48:1. https://doi.org/10.1145/2767005.
Kumar R, Goyal R. On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Comput Sci Rev. 2019;33:1–48. https://doi.org/10.1016/j.cosrev.2019.05.002.
Phaphoom N, Wang X, Samuel S, Helmer S, Abrahamsson P. A survey study on major technical barriers affecting the decision to adopt cloud services. J Syst Softw. 2015;103:167–81. https://doi.org/10.1016/j.jss.2015.02.002.
Hsu CL, Lin JCC. Factors affecting the adoption of cloud services in enterprises. Inf Syst E-bus Manag. 2016;14(4):791–822. https://doi.org/10.1007/s10257-015-0300-9.
Rastogi G, Sushil R. Secured identity management system for preserving data privacy and transmission in cloud computing. Int J Futur Gener Commun Netw. 2018;11(1):23–36. https://doi.org/10.14257/ijfgcn.2018.11.1.03.
Journal A, Basic OF. Cloud computing adoption by business organization: a systematic review. Aust J Basic Appl Sci. 2017;11(November):17–28. https://doi.org/10.22587/ajbas.2017.11.13.3.
G. Rastogi, R. Sushil, A Review Paper on Cloud Identity Management Systems, Int. Conf. Cloud Comput. Big Data, June 2016, Phuket, Thailand.
M. Almorsy, J. Grundy, I. Müller (2016) An analysis of the cloud computing security problem. Available: https://arxiv.org/abs/1609.01107. Accessed July 2020
Takabi H, Joshi JBD, Ahn GJ. Security and privacy challenges in cloud computing environments. IEEE Secur Priv. 2010. https://doi.org/10.1109/MSP.2010.186.
Rizvi S, Ryoo J, Kissell J, Aiken W, Liu Y. A security evaluation framework for cloud security auditing. J Supercomput. 2018;74(11):5774–966. https://doi.org/10.1007/s11227-017-2055-1.
Ramachandra G, Iftikhar M, Khan FA. A 2Survey on security in cloud computing. Procedia Comput Sci. 2017;110(2012):465–72. https://doi.org/10.1016/j.procs.2017.06.124.
Subramanian N, Jeyaraj A. Recent security challenges in cloud computing. Comput Electr Eng. 2018;71:28–422. https://doi.org/10.1016/j.compeleceng.2018.06.006.
Tabrizchi H, Kuchaki Rafsanjani M. A survey on security challenges in cloud computing: issues, threats, and solutions no. 0123456789. New York: Springer US; 2020.
M. Drozdova, S. Rusnak, P. Segec, J. Uramova, M. Moravcik (2017) Contribution to cloud computing security architecture. ICETA 2017—15th IEEE Int. Conf. Emerg. eLearning Technol. Appl. Proc., no. February 2018. doi: https://doi.org/10.1109/ICETA.2017.8102480.
Ryoo J, Rizvi S, Aiken W, Kissell J. Cloud security auditing: challenges and emerging approaches. IEEE Secur Priv. 2014;12(6):68–74. https://doi.org/10.1109/MSP.2013.132.
Guzek M, Gniewek A, Bouvry P, Musial J, Blazewicz J. Cloud brokering: current practices and upcoming challenges. IEEE Cloud Comput. 2015;2(2):40–7. https://doi.org/10.1109/MCC.2015.32.
S. R. Lenkala, S. Shetty, K. Xiong (2013) Security risk assessment of cloud carrier. Proc.—13th IEEE/ACM Int. Symp. Clust. Cloud, Grid Comput. CCGrid 2013, pp. 442–449. doi: https://doi.org/10.1109/CCGrid.2013.28.
Rastogi G, Verma H, Sushil R. Determining factors influencing cloud services adotion in India. Serbian J Manag. 2018;13(2):335–52.
Verma G, Chakroborty R. A hybrid privacy preserving scheme using finger print detection in cloud environment. Ingenierie des systemes d'information. 2019;24(3):343–51.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
We hereby declare that this manuscript is an original work and is not under consideration for publication in any other journal. All authors have approved the submission of the manuscript to the respective journals.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Computational Statistics” guest edited by Anish Gupta, Mike Hinchey, Vincenzo Puri, Zeev Zalevsky, and Wan Abdul Rahim.
Rights and permissions
About this article
Cite this article
Verma, G., Adhikari, S. Cloud Computing Security Issues: a Stakeholder’s Perspective. SN COMPUT. SCI. 1, 329 (2020). https://doi.org/10.1007/s42979-020-00353-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-020-00353-2