Skip to main content

A Review on Security Issue in Security Model of Cloud Computing Environment

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Computations in Engineering Systems

Abstract

Cloud computing is recently everyone uses increasing tendency in distributed and parallel computing environment changes. Cloud is an Internet. It works the largest group of interconnected individual desktop computers or network servers; these are used public cloud or private cloud or hybrid. It’s an active implementation by IT industry resource and remote provisioning scalable and measured documents and decentralized its resources. It is different security issues facing cloud environmental. Cloud computing consists of different services providing. One of the Software as a Service (SaaS) has on many business orientated application. It is shared software and resources and information are available on demand device access in public it allows cost and complexity of service providers to access and operational costs anytime and anywhere uses provide cloud services. Another service is a IaaS is provides protect security customer’s knowledge, functions also secured. Other models Platform as a Service (PaaS) clouds. Security of PaaS clouds forms multitenant access control. Its privacy protected together the service provides and user security. problems., security and threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)

    Article  Google Scholar 

  2. D.A. Fernandes, L.F. Soares, J.V. Gomes, M.M. Freire, P.R. Inácio, Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113–170 (2014)

    Article  Google Scholar 

  3. S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  4. H. Takabi, J.B. Joshi, G.J. Ahn, Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)

    Article  Google Scholar 

  5. A. Sangroya, S. Kumar, J. Dhok, V. Varma, Towards analyzing data security risks in cloud computing environments. in International Conference on Information Systems, Technology and Management, (Springer, Berlin, Heidelberg, 11 Mar 2010), pp. 255–265

    Google Scholar 

  6. G. Boss, P. Malladi, D. Quan, L. Lerge gni, H. Hall, Cloud computing. (2009) http://www.ibm.com/developerswork/webspehre/Zones/hipods/library.html

  7. P.K. Chouhan, F. Yao, S. Sezer, Software as a service: understanding security issues. in Science and Information Conference (SAI), (IEEE, 28 Jul 2015), pp. 162–170

    Google Scholar 

  8. S. Pearson, A.. Benameur, in Privacy, Security and Trust Issues Arising from Cloud Computing. 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), (IEEE, 30 Nov 2010), pp. 693–702

    Google Scholar 

  9. J. Kong, A practical approach to improve the data privacy of virtual machines. in 2010 IEEE 10th international conference on Computer and information technology (cIT), IEEE, 2010, pp. 936–941

    Google Scholar 

  10. R.M. Esteves, C. Rong, Social impact of privacy in cloud computing. In 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom),). IEEE, 30 Nov 2010, pp. 593–596

    Google Scholar 

  11. M. Miller, Cloud Computing: Web-Based Applications that Change the Way You Work and Collaborate Online. Que publishing, 2008

    Google Scholar 

  12. G. Reese, Cloud application architectures: building applications and infrastructure in the cloud. O’Reilly Media, Inc., 1 Apr 2009

    Google Scholar 

  13. T. Mather, S. Kumaraswamy, S. Latif, Cloud Security and Privacy: an Enterprise Perspective on Risks and Compliance. O’Reilly Media, Inc., 2009

    Google Scholar 

  14. S.W. Smith, S. Weingart, Building a high-performance, programmable secure coprocessor. Comput. Netw. 31(8), 831–836 (1999)

    Article  Google Scholar 

  15. B.H. Krishna, S. Kiran, G. Murali, R. Pradeep Kumar Reddy, Security issues in service model of cloud computing environment. Procedia Comput. Sci. 87, 246–251 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Venkatakotireddy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Venkatakotireddy, G., Thirumala Rao, B., Vurukonda, N. (2018). A Review on Security Issue in Security Model of Cloud Computing Environment. In: Dash, S., Naidu, P., Bayindir, R., Das, S. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, vol 668. Springer, Singapore. https://doi.org/10.1007/978-981-10-7868-2_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7868-2_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7867-5

  • Online ISBN: 978-981-10-7868-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics