Abstract
Most of the organizations are stuck in a situation to cloudify due to concerns regarding security of sensitive data. Cloud computing provides many aids to the users and organizations in accordance with expenditure and savings. Other than these benefits, cloud computing has some hurdles that result in restriction of it’s usage. Cloud security is the bigger hurdle which is regularly taken into consideration. This paper will give a broad view of major threats challenges in security which are encountered in cloud computing. Cloud computing entities include cloud user, cloud provider, and data owner. The study is carried out based on selection of open-source cloud offerings. This paper can be an exploration tool for any IT person to gain knowledge into security-related risks and challenges which are concerned with cloud computing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Khan, N., Al-Yasiri, A.: Cloud security threats and techniques to strengthen cloud computing adoption framework. In: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications. IGI Global, pp. 268–285 (2018)
Luigi, C., et al.: Cloud security: emerging threats and current solutions. Comput. Electr. Eng. 59, 126–140 (2017)
Al Awadhi, E., Salah, K., Martin, T.: Assessing the security of the cloud environment. In: 2013 7th IEEE GCC Conference and Exhibition (GCC) (2013)
Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, IEEE (2012)
Walker, K.: Cloud security alliance announces software defined perimeter (sdp) initiative (online) (2013). https://cloudsecurityalliance.org/media/news/csa-announcessoftware-defined-perimeter-sdp-initiative/. Accessed October, 2014
Yu, W., et al.: Protecting your own private key in cloud: security, scalability and performance. In: 2018 IEEE Conference on Communications and Network Security (CNS), IEEE (2018)
Subramanian, N., Jeyaraj, A.: Recent security challenges in cloud computing. Comput. Electr. Eng. 71, 28–42 (2018)
Laniepce, S., et al.: Engineering intrusion prevention services for iaas clouds: the way of the hypervisor. In: 2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE), IEEE (2013)
Bose, R., Sarddar, D.: A secure hypervisor-based technology create a secure cloud environment. Int. J. Emerg. Res. Manage. Technol. ISSN (2014): 2278-9359
Fernandes, D.A.B., et al.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113–170 (2014)
Jansen, W., Grance, T.: Sp 800-144. Guidelines on Security and Privacy in Public Cloud Computing (2011)
Nanavati, M., et al.: Cloud security: a gathering storm. Commun. ACM 57(5), 70–79 (2014)
Deshmukh, R.V., Devadkar, K.K.: Understanding DDoS attack & its effect in cloud environment. Proc. Comput. Sci. 49, 202–210 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chitturi, A.K., Swarnalatha, P. (2020). Exploration of Various Cloud Security Challenges and Threats. In: Das, K., Bansal, J., Deep, K., Nagar, A., Pathipooranam, P., Naidu, R. (eds) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 1057. Springer, Singapore. https://doi.org/10.1007/978-981-15-0184-5_76
Download citation
DOI: https://doi.org/10.1007/978-981-15-0184-5_76
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0183-8
Online ISBN: 978-981-15-0184-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)