Abstract
The cloud is next generation platform that provides dynamic resource pooling, virtualization and high resource availability. It is one of today’s most enticing technology areas due to its advantages like cost efficiency and flexibility. There are significant or persistent concerns about the cloud computing those are impeding momentum and will compromise the vision of cloud computing as a new information technology procurement model. A general understanding of cloud computing refers to the concept of grid computing, utility computing, software as a service, storage in cloud and virtualization. It enables the virtual organization to share geographically distributed resources as they pursue common goals, assuming the absence of central location, omniscience and an existing trust relationship. This paper is a survey more specific to the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Julisch, K., Hall, M.: Security and Control in the Cloud. Information Security Journal: A Global Perspective 19(6), 299–309 (2010)
Balachandra, R.K., Ramakrishna, P.V., Rakshit, K.: Cloud Security Issues. In: IEEE International Conference on Services Computing, pp. 517–520 (2009)
Cheng, G., Jin, H., Zou, D., Zhang, X.: “Building Dynamic and Transparent Integrity Measurement and Protection for Virtualized Platform in Cloud Computing. Concurrency and Computation: Practice and Experience 22, 1893–1910 (2010)
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, L., Lee, G.: Above the clouds: A Berkeley View of Cloud Computing. University of California, Berkeley, Tech. Rep. USB-EECS-2009, vol. 28, pp. 23-29 (2009)
Zissis, D., Lekkas, D.: Addressing Cloud Computing Security Issues. Future Generation Computer System (2010) Article in Press, http://dx.doi.org/10.1016/j.future.2010.12.006
Yamaguchi, T., Hashiyama, T., Okuma, S.: A Study on Reconfigurable Computing System Cryptography. In: IEEE International Conference on Cloud Computing, vol. 4, pp. 2965–2968 (2000)
Yuefa, D., Bo, W., Yaqiang, G., Quan, Z.: Data Security Model for Cloud Computing. In: International Workshop on Information Security and Applications, pp. 141–144 (2009)
Tribhuwan, M.R., Bhuyar, V.A., Pirzade, S.: Ensuring Data Storage Security in Cloud Computing Through Two Way Handshake Based on Token Management. In: International Conference on Advances in Recent Technology in Communication and Computing, pp. 386–389 (2010)
Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F.: Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds. In: IEEE International Conference on Cloud Computing, pp. 244–251 (2010)
Ramgovind, S., Eloff, M., Smith, E.: The Management of Security in Cloud Computing. In: IEEE International Conference on Service Computing, pp. 126–130 (2010)
Almulla, S.A., Yeun, C.Y.: Cloud Computing Security Management. In: IEEE International Conference on Service Computing, pp. 121–126 (2010)
Somani, U., Lakhani, K., Mundra, M.: Implementing Digital Signature with RSA Encryption Algorithm to Enhance Data Security of Cloud in Cloud Computing. In: IEEE International Conference on Parallel, Distributed and Grid Computing, pp. 85–94 (2010)
Sato, H., Kanai, A., Tanimoto, S.: A Cloud Trust Model in a Security Aware Cloud. In: IEEE International symposium on Applications and the Internet, pp. 121–124 (2010)
Kaufman, L.M.: Data Security in the World of Cloud Computing. IEEE Security and Privacy 7(4) (2009)
Amazon Web Services (AWS), http://aws.amazon.com
Shen, Y., Li, K., Yang, L.T.: Advanced Topics in Cloud Computing. Journal of Network and Computer Applications 12, 301–310 (2010)
Subashini, S., Kavitha, V.: A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications 34, 1–11 (2010)
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J.: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control. In: CCSW, Chicago, Illinois, USA (2009)
Lombardi, F., Pietro, R.D.: Secure Virtualization for Cloud Computing. Journal of Network and Computer 12, 407–412 (2010)
Google App Engine, http://code.google.com/appengine
Caslo, V., Rak, M., Vilano, U.: Identity Federation in Cloud Computing. In: IEEE International Conference on Information Assurance and Security, pp. 253–259 (2010)
Casola, V., Mazzeo, A., Mazzocca, N., Victoriana, V.: A Security Metric for Public key Infrastructures. Journal of Computer Security 15(2), 78–85 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sharma, P., Sood, S.K., Kaur, S. (2011). Security Issues in Cloud Computing. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds) High Performance Architecture and Grid Computing. HPAGC 2011. Communications in Computer and Information Science, vol 169. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22577-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-22577-2_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22576-5
Online ISBN: 978-3-642-22577-2
eBook Packages: Computer ScienceComputer Science (R0)