Skip to main content

Cloud Computing: Potential Risks and Security Approaches

  • Conference paper
  • First Online:
e-Infrastructure and e-Services for Developing Countries (AFRICOMM 2016)

Abstract

Cloud Computing is a new technology, widely used in different areas, allowing easy and on-demand access through the internet to a shared set of configurable computing resources. The adoption of this new technology within companies is restricted by security constraints. In this paper, we present the most significant risks that could affect organizations intending to deploy Cloud technology and security measures to be in place to reduce the impact of risks based on a literature review.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.nist.gov.

References

  1. Okuhara, M., Shiozaki, S.T.: Security architectures for cloud computing. Fujitsu Sci. Tech. J. 46, 397–402 (2010)

    Google Scholar 

  2. Kuyoro, S.O., Ibikunle, F., Awodele, O.: Cloud computing security issues and challenges. Int. J. Comput. Netw. 3, 247–255 (2011)

    Google Scholar 

  3. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: European Conference on Research in Computer Security, pp. 355–370 (2009)

    Google Scholar 

  4. Brender, N., Markov, I.: Risk perception and risk management in cloud computing: results from a case study of Swiss companies. Int. J. Inf. Manag. 33, 726–733 (2013)

    Article  Google Scholar 

  5. Fujitsu Research Institute, Personal data in the cloud: A global survey of consumer attitudes. http://www.fujitsu.com/downloads/SOL/fai/reports/fujitsu_personal-data-in-the-cloud.pdf

  6. Mell, P., Grance, T.: The NIST definition of cloud computing (v15), National Institute of Standards and Technology (NIST) (2009). http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf

  7. Jadeja, Y., Modi, K.: Cloud computing - concepts, architecture and challenges. In: International Conference on Computing, Electronics and Electrical Technologies (2012)

    Google Scholar 

  8. Saggar, R., Saggar, S., Khurana, N.: Cloud computing: designing different system architecture depending on real-world examples. Int. J. Comput. Sci. Inf. Technol. 5, 5025–5029 (2014)

    Google Scholar 

  9. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28, 583–592 (2012)

    Article  Google Scholar 

  10. Al Morsy, M., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of APSEC 2010 Cloud Workshop (2010)

    Google Scholar 

  11. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)

    Article  Google Scholar 

  12. Begum, F.: Cloud computing and its security concerns a survey. Int. J. Res. 3, 1082–1088 (2014)

    Google Scholar 

  13. Raj, B.J.: Cloud computing security issues in infrastructure as a service. Int. J. Adv. Res. Trends Eng. Technol. 2, 246–250 (2015)

    Google Scholar 

  14. Shwetha, S.: Survey on security issues and problems in cloud computing virtual machines. Int. J. Comput. Sci. Inf. Technol. 4, 755–760 (2013)

    Google Scholar 

  15. Patidar, P., Bhardwaj, A.: Network security through SSL in cloud computing environment. Int. J. Comput. Sci. Inf. Technol. 2, 2800–2803 (2011)

    Google Scholar 

  16. Bala, A., Chana, I.: Fault tolerance- challenges, techniques and implementation in cloud computing. Int. J. Comput. Sci. Issues 9, 288–293 (2012)

    Google Scholar 

  17. Padhy, R.P., Patra, M.R., Satapathy, S.C.: Cloud computing: security issues and research challenges. Int. J. Comput. Sci. Inf. Technol. Secur. 1, 136–146 (2011)

    Google Scholar 

  18. European Network and Information Security Agency (ENISA). https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment

  19. Gartner. http://www.infoworld.com/article/2652198/security/gartner--seven-cloud-computing-security-risks.html

  20. Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 1–13 (2013)

    Google Scholar 

  21. Lee, K.: Security threats in cloud computing environments. Int. J. Secur. Appl. 6, 25–32 (2012)

    Google Scholar 

  22. Latif, R., Abbas, H., Assar, S., Ali, Q.: Cloud computing risk assessment: a systematic literature review. Future Inf. Technol. 276, 285–295 (2013)

    Article  Google Scholar 

  23. The Great Seal of the seal of approval. https://law.resource.org/pub/in/bis/S04/is.iso.iec.13335.1.2004.pdf

  24. Kulkarni, G., Gambhir, J., Patil, T., Dongare, A.: A security aspects in cloud computing. In: IEEE 3rd International Conference on Computer Science and Automation Engineering, pp. 547–550 (2012)

    Google Scholar 

  25. Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: IEEE Second Conference on Cloud Computing Technology and Science (2010)

    Google Scholar 

  26. Shah, H., Anandane, S.S., Shrikanth, S.: Security issues on cloud computing. Int. J. Comput. Sci. Inf. Secur. 11, 25–34 (2013)

    Google Scholar 

  27. Hashizume, K., Rosado, D.G., Medina, E.F., Fernandez, E.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 1–13 (2013)

    Article  Google Scholar 

  28. Chou, Y., Oetting, J.: Risk assessment for cloud-based IT systems. Int. J. Grid High Perform. Comput. 3, 1–13 (2011)

    Article  Google Scholar 

  29. Tripathi, A., Mishra, A.: Cloud computing security considerations. In: IEEE International Conference on Signal Processing, Communications and Computing, pp. 1–5 (2011)

    Google Scholar 

  30. Kleber, V., Schulter, A., Westphall, C.B., Westphall, C.M.: Intrusion detection techniques for grid and cloud computing environment. IT Professional IEEE Comput. 12, 38–43 (2010)

    Google Scholar 

  31. Julisch, K., Hall, M.: Security and control in the cloud. Inf. Secur. J. Global Perspect. 19, 299–309 (2010)

    Article  Google Scholar 

  32. Khajeh-Hosseini, A., Sommerville, I., Bogaerts, J., Teregowda, P.: Decision support tools for cloud migration in the enterprise. In: IEEE International Conference on Cloud Computing, pp. 541–548 (2011)

    Google Scholar 

  33. Adineh, M., Hariri, N.: Risks identification and ranking in information technology projects based on cloud computing. Kuwait Chapter Arab. J. Bus. Manag. Rev. 3, 216–277 (2014)

    Article  Google Scholar 

  34. Ayala, L.C., Vega, M., Vargas, L.M.: Emerging threats, risk and attacks in distributed systems: cloud computing. Innov. Adv. Comput. Inf. Syst. Sci. Eng. 152, 37–51 (2013)

    Google Scholar 

  35. Rahul, S.S., Rai, J.K.: Security & privacy issues in cloud computing. Int. J. Eng. Res. Technol. 2, 1–6 (2013)

    Google Scholar 

  36. Youssef, E.A., Alageel, M.: A framework for secure cloud computing. Int. J. Comput. Sci. Issues 9, 487–500 (2012)

    Google Scholar 

  37. Viseur, R., Charlier, E., Van de borne, M.: Comment gérer le risque de lock-in technique en cas d’usage de services de cloud computing? 16ème colloque CREIS-TERMINAL (2014)

    Google Scholar 

  38. Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Comput. Soc. 14, 14–21 (2010)

    Google Scholar 

  39. Rittinghouse, J.W., Ransome, J.F.: Cloud Computing: Implementation, Management, and Security, pp. 301–308. CRC Press, Boca Raton (2010)

    Google Scholar 

  40. Julisch, K., Hall, M.: Security and control in the cloud. Inf. Secur. J. Glob. Perspect. 19, 299–309 (2010)

    Article  Google Scholar 

  41. Kumar, A.: World of cloud computing & security. Int. J. Cloud Comput. Serv. Sci. 1, 53–58 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hassen Ben Rebah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ben Rebah, H., Ben Sta, H. (2018). Cloud Computing: Potential Risks and Security Approaches. In: Bissyande, T., Sie, O. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 208. Springer, Cham. https://doi.org/10.1007/978-3-319-66742-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66742-3_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66741-6

  • Online ISBN: 978-3-319-66742-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics