Analyzing Cloud Computing Security Issues and Challenges

  • Neeti Mehra
  • Shalu Aggarwal
  • Ankita Shokeen
  • Deepa Bura
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 710)

Abstract

Cloud computing is the model of computing based on Internet. This is used for completing the computer’s need by providing necessary data and computer resources. Most of the companies use cloud computing for avoiding the purchasing cost of servers. Therefore, it becomes essential to study various issues associated with cloud computing. One of major issues that industries face is security issue. In this paper, we aim to study various key attributes of cloud computing, important characteristics of cloud model. Further, the paper discusses security issues, limitations of existing approach, and possible solutions associated with cloud computing approach.

Keywords

Cloud computing Security issues Services over Internet 

Notes

Acknowledgements

Authors would like to express the gratitude Dr. Kiran Khatter, Research Mentor of CL Educate—Accendere Knowledge Management Services Pvt. Ltd. for her constant guidance and comments on an earlier version of the manuscript. Although any errors are our own and should not tarnish the reputations of these esteemed persons.

References

  1. 1.
    Singh, H. (2015). A Review Of Cloud Computing Security Issues. International Journal Of Education And Management Engineering (Ijeme), 5(5), 32.Google Scholar
  2. 2.
    Sultan, N. A. (2011). Reaching for the “cloud”: How SMEs can manage. International journal of information management, 31(3), 272–278.Google Scholar
  3. 3.
    Weinhardt, C., Anandasivam, A., Blau, B., Borissov, N., Meinl, T., Michalk, W., & Stößer, J. (2009). Cloud computing–a classification, business models, and research directions. Business & Information Systems Engineering, 1(5), 391–399.Google Scholar
  4. 4.
    Susarla, A., Barua, A., & Whinston, A. B. (2003). Understanding the service component of application service provision: empirical analysis of satisfaction with ASP services. MIS quarterly, 27(1), 91–123.Google Scholar
  5. 5.
    Robison, S. (2008). The next wave: Everything as a service. Executive Viewpoint: www.hp.com.
  6. 6.
    Wang, B., & Xing, H. (2011, June). The application of cloud computing in education informatization. In Computer Science and Service System (CSSS), 2011 International Conference on (pp. 2673–2676). IEEE.Google Scholar
  7. 7.
    El-Gazzar, R. F. (2014, June). A literature review on cloud computing adoption issues in enterprises. In International Working Conference on Transfer and Diffusion of IT (pp. 214–242). Springer, Berlin, Heidelberg.Google Scholar
  8. 8.
    Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.Google Scholar
  9. 9.
    Alvi, F. A., Choudary, B. S., Jaferry, N., & Pathan, E. (2012). Review on cloud computing security issues & challenges. iaesjournal.com, 2.Google Scholar
  10. 10.
    Zhang, S., Zhang, S., Chen, X., & Huo, X. (2010, January). Cloud computing research and development trend. In Future Networks, 2010. ICFN’10. Second International Conference on (pp. 93–97). Ieee.Google Scholar
  11. 11.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., … & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.Google Scholar
  12. 12.
    Gharat, M. A. A., & Mhamunkar, M. D. E. Disaster Recovery in Cloud Computing.Google Scholar
  13. 13.
    Voorsluys, W, Broberg, J, Venugopal, S, Buyya, R. (2009) Cost of virtual machine live migration in clouds: A performance evaluation. Proceedings of the 1st International Conference on Cloud Computing (CloudCom 2009), Springer, Beijing, China, 33.Google Scholar
  14. 14.
    Gopalakrishnan, A. (2009). Cloud computing identity management. SETLabs briefings, 7(7), 45–54.Google Scholar
  15. 15.
    Nuñez, D., & Agudo, I. (2014). BlindIdM: A privacy-preserving approach for identity management as a service. International Journal of Information Security, 13(2), 199–215.Google Scholar
  16. 16.
    Takabi, H., & Joshi, J. B. (2012). Semantic-based policy management for cloud computing environments. International Journal of Cloud Computing, 1(2–3), 119–144.Google Scholar
  17. 17.
    Vaquero, L. M., Rodero-Merino, L., & Morán, D. (2011). Locking the sky: a survey on IaaS cloud security. Computing, 91(1), 93–118.Google Scholar
  18. 18.
    Sabahi, F. (2011, May). Cloud computing security threats and responses. In Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on (pp. 245–249). IEEE.Google Scholar
  19. 19.
    Probst, C. W., Sasse, M. A., Pieters, W., Dimkov, T., Luysterborg, E., & Arnaud, M. (2012). Privacy penetration testing: How to establish trust in your cloud provider. In European Data Protection: In Good Health? (pp. 251–265). Springer Netherlands.Google Scholar
  20. 20.
    Squicciarini, A., Sundareswaran, S., & Lin, D. (2010, July). Preventing information leakage from indexing in the cloud. In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on (pp. 188–195). IEEE.Google Scholar
  21. 21.
    Kretzschmar, M., & Hanigk, S. (2010, October). Security management interoperability challenges for collaborative clouds. In Systems and Virtualization Management (SVM), 2010 4th International DMTF Academic Alliance Workshop on (pp. 43–49). IEEE.Google Scholar
  22. 22.
    Wang, Q., Wang, C., Li, J., Ren, K., & Lou, W. (2009, September). Enabling public verifiability and data dynamics for storage security in cloud computing. In European symposium on research in computer security (pp. 355–370). Springer Berlin Heidelberg.Google Scholar
  23. 23.
    Chou, T. S. (2013). Security threats on cloud computing vulnerabilities. International Journal of Computer Science & Information Technology, 5(3), 79.Google Scholar
  24. 24.
    Srinivasan, M. K., Sarukesi, K., Rodrigues, P., Manoj, M. S., & Revathy, P. (2012, August). State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment. In Proceedings of the international conference on advances in computing, communications and informatics (pp. 470–476). ACM.Google Scholar
  25. 25.
    Zhang, S., Zhang, S., Chen, X., & Huo, X. (2010, January). Cloud computing research and development trend. In Future Networks, 2010. ICFN’10. Second International Conference on (pp. 93–97). Ieee. Account and service hacking.Google Scholar
  26. 26.
    Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602–622.Google Scholar
  27. 27.
    Rocha, F., Gross, T., & van Moorsel, A. (2013, March). Defense-in-depth against malicious insiders in the cloud. In Cloud Engineering (IC2E), 2013 IEEE International Conference on (pp. 88–97). IEEE.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Neeti Mehra
    • 1
  • Shalu Aggarwal
    • 1
  • Ankita Shokeen
    • 1
  • Deepa Bura
    • 1
  1. 1.Faculty of Engineering and Technology, Department of Computer Science & EngineeringManav Rachna International UniversityFaridabadIndia

Personalised recommendations