Advertisement

Exploration of Various Cloud Security Challenges and Threats

  • Arun Krishna Chitturi
  • Purushotham SwarnalathaEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1057)

Abstract

Most of the organizations are stuck in a situation to cloudify due to concerns regarding security of sensitive data. Cloud computing provides many aids to the users and organizations in accordance with expenditure and savings. Other than these benefits, cloud computing has some hurdles that result in restriction of it’s usage. Cloud security is the bigger hurdle which is regularly taken into consideration. This paper will give a broad view of major threats challenges in security which are encountered in cloud computing. Cloud computing entities include cloud user, cloud provider, and data owner. The study is carried out based on selection of open-source cloud offerings. This paper can be an exploration tool for any IT person to gain knowledge into security-related risks and challenges which are concerned with cloud computing.

Keywords

Security challenges Security in cloud computing Major problems in cloud security 

References

  1. 1.
    Khan, N., Al-Yasiri, A.: Cloud security threats and techniques to strengthen cloud computing adoption framework. In: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications. IGI Global, pp. 268–285 (2018)Google Scholar
  2. 2.
    Luigi, C., et al.: Cloud security: emerging threats and current solutions. Comput. Electr. Eng. 59, 126–140 (2017)Google Scholar
  3. 3.
    Al Awadhi, E., Salah, K., Martin, T.: Assessing the security of the cloud environment. In: 2013 7th IEEE GCC Conference and Exhibition (GCC) (2013)Google Scholar
  4. 4.
    Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, IEEE (2012)Google Scholar
  5. 5.
    Walker, K.: Cloud security alliance announces software defined perimeter (sdp) initiative (online) (2013). https://cloudsecurityalliance.org/media/news/csa-announcessoftware-defined-perimeter-sdp-initiative/. Accessed October, 2014
  6. 6.
    Yu, W., et al.: Protecting your own private key in cloud: security, scalability and performance. In: 2018 IEEE Conference on Communications and Network Security (CNS), IEEE (2018)Google Scholar
  7. 7.
    Subramanian, N., Jeyaraj, A.: Recent security challenges in cloud computing. Comput. Electr. Eng. 71, 28–42 (2018)CrossRefGoogle Scholar
  8. 8.
    Laniepce, S., et al.: Engineering intrusion prevention services for iaas clouds: the way of the hypervisor. In: 2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE), IEEE (2013)Google Scholar
  9. 9.
    Bose, R., Sarddar, D.: A secure hypervisor-based technology create a secure cloud environment. Int. J. Emerg. Res. Manage. Technol. ISSN (2014): 2278-9359Google Scholar
  10. 10.
    Fernandes, D.A.B., et al.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113–170 (2014)CrossRefGoogle Scholar
  11. 11.
    Jansen, W., Grance, T.: Sp 800-144. Guidelines on Security and Privacy in Public Cloud Computing (2011)Google Scholar
  12. 12.
    Nanavati, M., et al.: Cloud security: a gathering storm. Commun. ACM 57(5), 70–79 (2014)CrossRefGoogle Scholar
  13. 13.
    Deshmukh, R.V., Devadkar, K.K.: Understanding DDoS attack & its effect in cloud environment. Proc. Comput. Sci. 49, 202–210 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Arun Krishna Chitturi
    • 1
  • Purushotham Swarnalatha
    • 1
    Email author
  1. 1.VIT UniversityVelloreIndia

Personalised recommendations