Abstract
In Cloud environments, resources are provided as services to endusers over the internet upon request. Resources’ coordination in the Cloud enables users to reach their resources anywhere and anytime. Ensuring the security in Cloud environment plays an important role, as customers often store important information on Cloud storage services. These services are not always trusted by the data owners. Customers are wondering about the integrity and the availability of their data in the Cloud. Users need to save their data from outsider and insider attackers (i.e. attacker within service providers’ coordination’s). Moreover, any collateral damage or errors of Cloud services provider arises as a concern as well. Most of the vital security needs and issues regarding data Cloud services are mentioned in this chapter. The purpose of this chapter is to examine recent research related to data security and to address possible solutions. Research of employing uncommon security schemes into Cloud environments has received an increasing interest in the literature, although these schemes are neither mature nor rigid yet. This work aspires to promote the use of security protocols due to their ability to reduce security risks that affect users of data Cloud services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Grandison, T., Maximilien, E.M., Thorpe, S.S.E., Alba, A.: Towards a formal definition of a computing Cloud. In: 6th WorldCongress on Services, SERVICES, pp. 191–192. IEEE Computer Society (2010)
Mell, P., Grance, T.: The NIST definition of Cloud Computing. National Institute of Standards, USA (2011)
Fensel, D., Facca, F.M., Simperl, E., Toma, I.: Service science. In: Semantic Web Services, chapter 3, pp. 25–35. Springer (2011)
Papazoglou, M.P.: Service-oriented computing: concepts, characteristicsand directions. In: Fourth International Conference on Web InformationSystems Engineering, WISE 2003, pp. 3–12. IEEE Computer Society (2003)
Carroll, M., Kotzfie, P., van der Merwe, A.: Secure Cloud computing: benefits, risks and controls. In: Information Security SouthAfrica, ISSA, pp. 1–9. IEEE Computer Society (2011)
Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey on security issues and solutions at differentlayers of Cloud computing. J. Supercomput. 63(2), 561–592 (2013)
Zissis, D., Lekkas, D.: Addressing Cloud computing security issues. Future Gener. Comput. Syst. 28, 583–592 (2012)
Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey on security issues and solutions at differentlayers of Cloud computing. J. Supercomput. 63(2), 561–592 (2013)
Rong, C., Nguyen, S.T., Jaatun, M.G.: Beyond lightning: a survey on security challenges in Cloud computing. Comput. Electr. Eng. 39(1), 47–54 (2013)
El-Zawawi, N., Hamdy, M., El-Gohary, R., Tolba, M.F.: A database watermarking service with a trusted authority architecture for Cloud environment. Int. J. Comput. Appl. 69(13), 1–9 (2013)
Ryan, M.D.: Cloud computing security: the scientific challenge, and a survey of solutions. J. Syst. Softw. 86(9), 2263–2268 (2013)
Pearson, S., Yee, G.: Privacy and Security for Cloud Computing. Springer, London (2013)
Elmasri, R.: Fundamental of database systems, 6th edn. (chapter 24). Pearson Education, London (2011)
Imran, S., Hyder, I.: Security issues in databases. In: International Conference on Future Information Technology and ManagementEngineering. IEEE Computer Society (2009)
DhineshBabu, L.D., Venkata Krishna, P., Mohammed Zayan, A., Panda, V.: An analysis of security related issues in Cloud computing. In: 4th International Conference Contemporary Computing, IC3. Springer (2011)
Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing. IEEE Computer Society (2009)
Rawat, S., Chowdhary, R., Dr. Bansal, A.: Data integrity of cloud data storages (cdss) in cloud. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(3), 588–592 (2013)
Motghare, S., Mohod, P.S., Khandait, S.P., Jaiswal, A.: Framework of data integrity for cross cloud environment using cpdp scheme. Int. J. Adv. Res. Comput. Sci. 4(4), 55–59 (2013)
Abbadi, I.M., Deng, M., Nalin, M., Martin, A., Petkovic, M., Baroni, I., Sanna, A.: Trustworthy middleware services in the Cloud. In: Third International Workshop on Cloud Data Management, CloudDB ’11, pp. 33–40. ACM Digital Library (2011)
Abbadi, I.M.: Middleware services at Cloud application layer. In: First International Conference Advances in Computing and Communications (ACC 2011), vol. 193 of CCIS, pp. 557–571 (2011)
Petkovic, M., Baroni, I., Deng, M., Nalin, M., Marco, A.: Towards trustworthy health platform Cloud. In: SecureData Management, vol. 7482 of SDM, pp. 162–175. Springer (2012)
Corradi, A.: Database security management for healthcare SAAS in theamazon awsCloud. In: IEEE Symposium on Computers and Communications, ISCC ’12, pp. 812–819. IEEE Computer Society (2012)
Abbadi, I.M., Alawneh, M.: A framework for establishingtrust in the Cloud. Comput. Electr. Eng. 38(5), 1073–1087 (2012)
Li, W., Ping, L.: Trust model to enhance security and interoperability of Cloud environment. In: First International Conference, CloudCom, vol. 5931, pp. 69–79. Springer (2009)
Abbadi, I.M.: Middleware services at Cloud virtual layer. In: 11th IEEE International Conference on Computer and Information Technology, CIT, pp. 115–120. IEEE Computer Society (2011)
Bajpai, D., Vardhan, M., Kushwaha, D.S.: Authentication and authorization interface using security service level agreements for accessing Cloud services. In: 5th International Conference onContemporary Computing-IC3, volume 306 of Communications in Computer and Information Science, pp. 370–382. Springer (2012)
Ko, R.K.L., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., Lee, B.S.: TrustCloud: a framework for accountability and trust in Cloud computing. In: IEEE World Congress on Services (SERVICES). IEEE Computer Society (2011)
Campbell, R.H. Montanari, M., Farivar, R.: A middleware for assured Clouds. J. Internet Serv. Appl. 3, 87–94 (2012)
Arasu, A., Blanas, S., Eguro, K., Joglekar, M., Kaushik, R., Kossmann, D., Ramamurthy, R., Upadhyaya, P., Venkatesan, R.: Secure database as a service with cipherbase. In: ACM SIGMOD International Conference on Management of Data, SIGMOD ’13, pp. 1033–1036. ACM Digital Library (2013)
Yonghong, Y.: Privacy protection in secure database service. In: International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE Computer Society (2010)
Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy-aware data storage and processing in Cloud computing architectures. In: IEEE International Conference on Dependable, Autonomic andSecure Computing (2009)
Ranchal, R., Bhargava, B., Othmane, L.B., Lilien, L., Kim, A., Kang, M., Linderman, M.: Protection of identity information in Cloud computing without trusted third party. In: IEEE Symposiumon Reliable Distributed Systems, SRDS, pp. 368–372 (2010)
Ruan, A., Martin, A.: RepCloud: achieving fine-grained Cloud TCB attestation with reputation systems. In: The sixth ACM Workshop onScalable Trusted Computing, STC ’11, pp. 3–14. ACM Digital Library (2011)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preservingpublic auditing for data storage security in Cloud computing. In: IEEEINFOCOM, pp. 1–9 (2010)
Aradhana, M., Chana, I.: Developing trust policies for Cloud scenarios. In: 2nd International Conference on Computer and Communication Technology, ICCCT, pp. 389–393. IEEE Computer Society (2011)
Sato, H., Kanai, A., Tanimoto, S.: A Cloud trust model in a security aware Cloud. In: 10th IEEE/IPSJ International Symposium on Applications andthe Internet (SAINT), pp. 121–124 (2010)
Zawawi, N., El-Gohary, R., Hamdy, M., Tolba, M.F.: A novel watermarking approach for data integrity and non-repudiation in rational databases. In: Advanced Machine Learning Technologies and Applications, vol. 322 of Communications in Computerand Information Science, pp 532–542. Springer, Heidelberg (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Zawawi, N., El-Eliemy, M.H., El-Gohary, R., Tolba, M.F. (2014). Security Issues on Cloud Data Services. In: Hassanien, A., Kim, TH., Kacprzyk, J., Awad, A. (eds) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43616-5_19
Download citation
DOI: https://doi.org/10.1007/978-3-662-43616-5_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43615-8
Online ISBN: 978-3-662-43616-5
eBook Packages: EngineeringEngineering (R0)