Skip to main content

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 70))

  • 1445 Accesses

Abstract

In Cloud environments, resources are provided as services to endusers over the internet upon request. Resources’ coordination in the Cloud enables users to reach their resources anywhere and anytime. Ensuring the security in Cloud environment plays an important role, as customers often store important information on Cloud storage services. These services are not always trusted by the data owners. Customers are wondering about the integrity and the availability of their data in the Cloud. Users need to save their data from outsider and insider attackers (i.e. attacker within service providers’ coordination’s). Moreover, any collateral damage or errors of Cloud services provider arises as a concern as well. Most of the vital security needs and issues regarding data Cloud services are mentioned in this chapter. The purpose of this chapter is to examine recent research related to data security and to address possible solutions. Research of employing uncommon security schemes into Cloud environments has received an increasing interest in the literature, although these schemes are neither mature nor rigid yet. This work aspires to promote the use of security protocols due to their ability to reduce security risks that affect users of data Cloud services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Grandison, T., Maximilien, E.M., Thorpe, S.S.E., Alba, A.: Towards a formal definition of a computing Cloud. In: 6th WorldCongress on Services, SERVICES, pp. 191–192. IEEE Computer Society (2010)

    Google Scholar 

  2. Mell, P., Grance, T.: The NIST definition of Cloud Computing. National Institute of Standards, USA (2011)

    Google Scholar 

  3. Fensel, D., Facca, F.M., Simperl, E., Toma, I.: Service science. In: Semantic Web Services, chapter 3, pp. 25–35. Springer (2011)

    Google Scholar 

  4. Papazoglou, M.P.: Service-oriented computing: concepts, characteristicsand directions. In: Fourth International Conference on Web InformationSystems Engineering, WISE 2003, pp. 3–12. IEEE Computer Society (2003)

    Google Scholar 

  5. Carroll, M., Kotzfie, P., van der Merwe, A.: Secure Cloud computing: benefits, risks and controls. In: Information Security SouthAfrica, ISSA, pp. 1–9. IEEE Computer Society (2011)

    Google Scholar 

  6. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey on security issues and solutions at differentlayers of Cloud computing. J. Supercomput. 63(2), 561–592 (2013)

    Google Scholar 

  7. Zissis, D., Lekkas, D.: Addressing Cloud computing security issues. Future Gener. Comput. Syst. 28, 583–592 (2012)

    Google Scholar 

  8. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey on security issues and solutions at differentlayers of Cloud computing. J. Supercomput. 63(2), 561–592 (2013)

    Google Scholar 

  9. Rong, C., Nguyen, S.T., Jaatun, M.G.: Beyond lightning: a survey on security challenges in Cloud computing. Comput. Electr. Eng. 39(1), 47–54 (2013)

    Google Scholar 

  10. El-Zawawi, N., Hamdy, M., El-Gohary, R., Tolba, M.F.: A database watermarking service with a trusted authority architecture for Cloud environment. Int. J. Comput. Appl. 69(13), 1–9 (2013)

    Google Scholar 

  11. Ryan, M.D.: Cloud computing security: the scientific challenge, and a survey of solutions. J. Syst. Softw. 86(9), 2263–2268 (2013)

    Google Scholar 

  12. Pearson, S., Yee, G.: Privacy and Security for Cloud Computing. Springer, London (2013)

    Google Scholar 

  13. Elmasri, R.: Fundamental of database systems, 6th edn. (chapter 24). Pearson Education, London (2011)

    Google Scholar 

  14. Imran, S., Hyder, I.: Security issues in databases. In: International Conference on Future Information Technology and ManagementEngineering. IEEE Computer Society (2009)

    Google Scholar 

  15. DhineshBabu, L.D., Venkata Krishna, P., Mohammed Zayan, A., Panda, V.: An analysis of security related issues in Cloud computing. In: 4th International Conference Contemporary Computing, IC3. Springer (2011)

    Google Scholar 

  16. Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing. IEEE Computer Society (2009)

    Google Scholar 

  17. Rawat, S., Chowdhary, R., Dr. Bansal, A.: Data integrity of cloud data storages (cdss) in cloud. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(3), 588–592 (2013)

    Google Scholar 

  18. Motghare, S., Mohod, P.S., Khandait, S.P., Jaiswal, A.: Framework of data integrity for cross cloud environment using cpdp scheme. Int. J. Adv. Res. Comput. Sci. 4(4), 55–59 (2013)

    Google Scholar 

  19. Abbadi, I.M., Deng, M., Nalin, M., Martin, A., Petkovic, M., Baroni, I., Sanna, A.: Trustworthy middleware services in the Cloud. In: Third International Workshop on Cloud Data Management, CloudDB ’11, pp. 33–40. ACM Digital Library (2011)

    Google Scholar 

  20. Abbadi, I.M.: Middleware services at Cloud application layer. In: First International Conference Advances in Computing and Communications (ACC 2011), vol. 193 of CCIS, pp. 557–571 (2011)

    Google Scholar 

  21. Petkovic, M., Baroni, I., Deng, M., Nalin, M., Marco, A.: Towards trustworthy health platform Cloud. In: SecureData Management, vol. 7482 of SDM, pp. 162–175. Springer (2012)

    Google Scholar 

  22. Corradi, A.: Database security management for healthcare SAAS in theamazon awsCloud. In: IEEE Symposium on Computers and Communications, ISCC ’12, pp. 812–819. IEEE Computer Society (2012)

    Google Scholar 

  23. Abbadi, I.M., Alawneh, M.: A framework for establishingtrust in the Cloud. Comput. Electr. Eng. 38(5), 1073–1087 (2012)

    Google Scholar 

  24. Li, W., Ping, L.: Trust model to enhance security and interoperability of Cloud environment. In: First International Conference, CloudCom, vol. 5931, pp. 69–79. Springer (2009)

    Google Scholar 

  25. Abbadi, I.M.: Middleware services at Cloud virtual layer. In: 11th IEEE International Conference on Computer and Information Technology, CIT, pp. 115–120. IEEE Computer Society (2011)

    Google Scholar 

  26. Bajpai, D., Vardhan, M., Kushwaha, D.S.: Authentication and authorization interface using security service level agreements for accessing Cloud services. In: 5th International Conference onContemporary Computing-IC3, volume 306 of Communications in Computer and Information Science, pp. 370–382. Springer (2012)

    Google Scholar 

  27. Ko, R.K.L., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., Lee, B.S.: TrustCloud: a framework for accountability and trust in Cloud computing. In: IEEE World Congress on Services (SERVICES). IEEE Computer Society (2011)

    Google Scholar 

  28. Campbell, R.H. Montanari, M., Farivar, R.: A middleware for assured Clouds. J. Internet Serv. Appl. 3, 87–94 (2012)

    Google Scholar 

  29. Arasu, A., Blanas, S., Eguro, K., Joglekar, M., Kaushik, R., Kossmann, D., Ramamurthy, R., Upadhyaya, P., Venkatesan, R.: Secure database as a service with cipherbase. In: ACM SIGMOD International Conference on Management of Data, SIGMOD ’13, pp. 1033–1036. ACM Digital Library (2013)

    Google Scholar 

  30. Yonghong, Y.: Privacy protection in secure database service. In: International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE Computer Society (2010)

    Google Scholar 

  31. Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy-aware data storage and processing in Cloud computing architectures. In: IEEE International Conference on Dependable, Autonomic andSecure Computing (2009)

    Google Scholar 

  32. Ranchal, R., Bhargava, B., Othmane, L.B., Lilien, L., Kim, A., Kang, M., Linderman, M.: Protection of identity information in Cloud computing without trusted third party. In: IEEE Symposiumon Reliable Distributed Systems, SRDS, pp. 368–372 (2010)

    Google Scholar 

  33. Ruan, A., Martin, A.: RepCloud: achieving fine-grained Cloud TCB attestation with reputation systems. In: The sixth ACM Workshop onScalable Trusted Computing, STC ’11, pp. 3–14. ACM Digital Library (2011)

    Google Scholar 

  34. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preservingpublic auditing for data storage security in Cloud computing. In: IEEEINFOCOM, pp. 1–9 (2010)

    Google Scholar 

  35. Aradhana, M., Chana, I.: Developing trust policies for Cloud scenarios. In: 2nd International Conference on Computer and Communication Technology, ICCCT, pp. 389–393. IEEE Computer Society (2011)

    Google Scholar 

  36. Sato, H., Kanai, A., Tanimoto, S.: A Cloud trust model in a security aware Cloud. In: 10th IEEE/IPSJ International Symposium on Applications andthe Internet (SAINT), pp. 121–124 (2010)

    Google Scholar 

  37. Zawawi, N., El-Gohary, R., Hamdy, M., Tolba, M.F.: A novel watermarking approach for data integrity and non-repudiation in rational databases. In: Advanced Machine Learning Technologies and Applications, vol. 322 of Communications in Computerand Information Science, pp 532–542. Springer, Heidelberg (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nour Zawawi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Zawawi, N., El-Eliemy, M.H., El-Gohary, R., Tolba, M.F. (2014). Security Issues on Cloud Data Services. In: Hassanien, A., Kim, TH., Kacprzyk, J., Awad, A. (eds) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43616-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43616-5_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43615-8

  • Online ISBN: 978-3-662-43616-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics