Abstract
Cloud Computing is a new technology, widely used in different areas, allowing easy and on-demand access through the internet to a shared set of configurable computing resources. The adoption of this new technology within companies is restricted by security constraints. In this paper, we present the most significant risks that could affect organizations intending to deploy Cloud technology and security measures to be in place to reduce the impact of risks based on a literature review.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Okuhara, M., Shiozaki, S.T.: Security architectures for cloud computing. Fujitsu Sci. Tech. J. 46, 397–402 (2010)
Kuyoro, S.O., Ibikunle, F., Awodele, O.: Cloud computing security issues and challenges. Int. J. Comput. Netw. 3, 247–255 (2011)
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: European Conference on Research in Computer Security, pp. 355–370 (2009)
Brender, N., Markov, I.: Risk perception and risk management in cloud computing: results from a case study of Swiss companies. Int. J. Inf. Manag. 33, 726–733 (2013)
Fujitsu Research Institute, Personal data in the cloud: A global survey of consumer attitudes. http://www.fujitsu.com/downloads/SOL/fai/reports/fujitsu_personal-data-in-the-cloud.pdf
Mell, P., Grance, T.: The NIST definition of cloud computing (v15), National Institute of Standards and Technology (NIST) (2009). http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
Jadeja, Y., Modi, K.: Cloud computing - concepts, architecture and challenges. In: International Conference on Computing, Electronics and Electrical Technologies (2012)
Saggar, R., Saggar, S., Khurana, N.: Cloud computing: designing different system architecture depending on real-world examples. Int. J. Comput. Sci. Inf. Technol. 5, 5025–5029 (2014)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28, 583–592 (2012)
Al Morsy, M., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of APSEC 2010 Cloud Workshop (2010)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)
Begum, F.: Cloud computing and its security concerns a survey. Int. J. Res. 3, 1082–1088 (2014)
Raj, B.J.: Cloud computing security issues in infrastructure as a service. Int. J. Adv. Res. Trends Eng. Technol. 2, 246–250 (2015)
Shwetha, S.: Survey on security issues and problems in cloud computing virtual machines. Int. J. Comput. Sci. Inf. Technol. 4, 755–760 (2013)
Patidar, P., Bhardwaj, A.: Network security through SSL in cloud computing environment. Int. J. Comput. Sci. Inf. Technol. 2, 2800–2803 (2011)
Bala, A., Chana, I.: Fault tolerance- challenges, techniques and implementation in cloud computing. Int. J. Comput. Sci. Issues 9, 288–293 (2012)
Padhy, R.P., Patra, M.R., Satapathy, S.C.: Cloud computing: security issues and research challenges. Int. J. Comput. Sci. Inf. Technol. Secur. 1, 136–146 (2011)
European Network and Information Security Agency (ENISA). https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment
Gartner. http://www.infoworld.com/article/2652198/security/gartner--seven-cloud-computing-security-risks.html
Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 1–13 (2013)
Lee, K.: Security threats in cloud computing environments. Int. J. Secur. Appl. 6, 25–32 (2012)
Latif, R., Abbas, H., Assar, S., Ali, Q.: Cloud computing risk assessment: a systematic literature review. Future Inf. Technol. 276, 285–295 (2013)
The Great Seal of the seal of approval. https://law.resource.org/pub/in/bis/S04/is.iso.iec.13335.1.2004.pdf
Kulkarni, G., Gambhir, J., Patil, T., Dongare, A.: A security aspects in cloud computing. In: IEEE 3rd International Conference on Computer Science and Automation Engineering, pp. 547–550 (2012)
Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: IEEE Second Conference on Cloud Computing Technology and Science (2010)
Shah, H., Anandane, S.S., Shrikanth, S.: Security issues on cloud computing. Int. J. Comput. Sci. Inf. Secur. 11, 25–34 (2013)
Hashizume, K., Rosado, D.G., Medina, E.F., Fernandez, E.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 1–13 (2013)
Chou, Y., Oetting, J.: Risk assessment for cloud-based IT systems. Int. J. Grid High Perform. Comput. 3, 1–13 (2011)
Tripathi, A., Mishra, A.: Cloud computing security considerations. In: IEEE International Conference on Signal Processing, Communications and Computing, pp. 1–5 (2011)
Kleber, V., Schulter, A., Westphall, C.B., Westphall, C.M.: Intrusion detection techniques for grid and cloud computing environment. IT Professional IEEE Comput. 12, 38–43 (2010)
Julisch, K., Hall, M.: Security and control in the cloud. Inf. Secur. J. Global Perspect. 19, 299–309 (2010)
Khajeh-Hosseini, A., Sommerville, I., Bogaerts, J., Teregowda, P.: Decision support tools for cloud migration in the enterprise. In: IEEE International Conference on Cloud Computing, pp. 541–548 (2011)
Adineh, M., Hariri, N.: Risks identification and ranking in information technology projects based on cloud computing. Kuwait Chapter Arab. J. Bus. Manag. Rev. 3, 216–277 (2014)
Ayala, L.C., Vega, M., Vargas, L.M.: Emerging threats, risk and attacks in distributed systems: cloud computing. Innov. Adv. Comput. Inf. Syst. Sci. Eng. 152, 37–51 (2013)
Rahul, S.S., Rai, J.K.: Security & privacy issues in cloud computing. Int. J. Eng. Res. Technol. 2, 1–6 (2013)
Youssef, E.A., Alageel, M.: A framework for secure cloud computing. Int. J. Comput. Sci. Issues 9, 487–500 (2012)
Viseur, R., Charlier, E., Van de borne, M.: Comment gérer le risque de lock-in technique en cas d’usage de services de cloud computing? 16ème colloque CREIS-TERMINAL (2014)
Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Comput. Soc. 14, 14–21 (2010)
Rittinghouse, J.W., Ransome, J.F.: Cloud Computing: Implementation, Management, and Security, pp. 301–308. CRC Press, Boca Raton (2010)
Julisch, K., Hall, M.: Security and control in the cloud. Inf. Secur. J. Glob. Perspect. 19, 299–309 (2010)
Kumar, A.: World of cloud computing & security. Int. J. Cloud Comput. Serv. Sci. 1, 53–58 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ben Rebah, H., Ben Sta, H. (2018). Cloud Computing: Potential Risks and Security Approaches. In: Bissyande, T., Sie, O. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 208. Springer, Cham. https://doi.org/10.1007/978-3-319-66742-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-66742-3_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-66741-6
Online ISBN: 978-3-319-66742-3
eBook Packages: Computer ScienceComputer Science (R0)