Skip to main content

Exploration of Various Cloud Security Challenges and Threats

  • Conference paper
  • First Online:
Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1057))

Abstract

Most of the organizations are stuck in a situation to cloudify due to concerns regarding security of sensitive data. Cloud computing provides many aids to the users and organizations in accordance with expenditure and savings. Other than these benefits, cloud computing has some hurdles that result in restriction of it’s usage. Cloud security is the bigger hurdle which is regularly taken into consideration. This paper will give a broad view of major threats challenges in security which are encountered in cloud computing. Cloud computing entities include cloud user, cloud provider, and data owner. The study is carried out based on selection of open-source cloud offerings. This paper can be an exploration tool for any IT person to gain knowledge into security-related risks and challenges which are concerned with cloud computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Khan, N., Al-Yasiri, A.: Cloud security threats and techniques to strengthen cloud computing adoption framework. In: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications. IGI Global, pp. 268–285 (2018)

    Google Scholar 

  2. Luigi, C., et al.: Cloud security: emerging threats and current solutions. Comput. Electr. Eng. 59, 126–140 (2017)

    Google Scholar 

  3. Al Awadhi, E., Salah, K., Martin, T.: Assessing the security of the cloud environment. In: 2013 7th IEEE GCC Conference and Exhibition (GCC) (2013)

    Google Scholar 

  4. Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, IEEE (2012)

    Google Scholar 

  5. Walker, K.: Cloud security alliance announces software defined perimeter (sdp) initiative (online) (2013). https://cloudsecurityalliance.org/media/news/csa-announcessoftware-defined-perimeter-sdp-initiative/. Accessed October, 2014

  6. Yu, W., et al.: Protecting your own private key in cloud: security, scalability and performance. In: 2018 IEEE Conference on Communications and Network Security (CNS), IEEE (2018)

    Google Scholar 

  7. Subramanian, N., Jeyaraj, A.: Recent security challenges in cloud computing. Comput. Electr. Eng. 71, 28–42 (2018)

    Article  Google Scholar 

  8. Laniepce, S., et al.: Engineering intrusion prevention services for iaas clouds: the way of the hypervisor. In: 2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE), IEEE (2013)

    Google Scholar 

  9. Bose, R., Sarddar, D.: A secure hypervisor-based technology create a secure cloud environment. Int. J. Emerg. Res. Manage. Technol. ISSN (2014): 2278-9359

    Google Scholar 

  10. Fernandes, D.A.B., et al.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113–170 (2014)

    Article  Google Scholar 

  11. Jansen, W., Grance, T.: Sp 800-144. Guidelines on Security and Privacy in Public Cloud Computing (2011)

    Google Scholar 

  12. Nanavati, M., et al.: Cloud security: a gathering storm. Commun. ACM 57(5), 70–79 (2014)

    Article  Google Scholar 

  13. Deshmukh, R.V., Devadkar, K.K.: Understanding DDoS attack & its effect in cloud environment. Proc. Comput. Sci. 49, 202–210 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Purushotham Swarnalatha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chitturi, A.K., Swarnalatha, P. (2020). Exploration of Various Cloud Security Challenges and Threats. In: Das, K., Bansal, J., Deep, K., Nagar, A., Pathipooranam, P., Naidu, R. (eds) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 1057. Springer, Singapore. https://doi.org/10.1007/978-981-15-0184-5_76

Download citation

Publish with us

Policies and ethics