Abstract
In the era of big data and IoT, rate of data generation is very high which needs lot of space. So it is not feasible to store such huge data locally. Hence, to cater the large storage need cloud based storage models has evolved. With the increasing demand of cloud storage, occurrence frequency of security threats has increased exponentially. The steep rise in threat incidences cannot be ignored, as cloud storage model is being used for storing confidential data. Increased threat rate cause decline in the acceptance rate of cloud-based storage models besides it numerous benefits. In this paper, we are evaluating our existing proposal by applying it on an open source cloud based system. Evaluation is done by comparing the threats identified using our approach and threats reported on it by CVE.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Liu, F., et al.: NIST cloud computing reference architecture: recommendations of the national institute of standards and technology. NIST Special Publication 500-292, Gaithersburg (2011)
Honer, P.: Cloud computing security requirements and solutions: a systematic literature review. In: 19th Twenty Student Conference on IT (2013)
Rong, C., Nguyen, S., Jaatun, M.: Beyond lighting: a survey on security challenges in cloud computing. Comput Elect. Eng. 39(1), 47–54 (2013)
Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. Proc. Eng. 15, 2852–2856 (2011). Advances in control engineering and information science
Che, J., Duan, Y., Zhang, T., Fan, J.: Study on the security models and strategies of cloud computing. Proc. Eng. 23, 586–593 (2011). International conference on power electronic and engineering application
Ficco, M., Palmieri, F., Castiglione, A.: Modeling security requirements for cloud-based system development. Concurrency Comput.: Pract. Experience 27(8), 2107–2124 (2015)
Islam, S., Mouratidis, H., Edgar, R.W.: A goal-driven risk management approach to support security and privacy analysis of cloud- based system. In: Mario Piattini, E.F.-M. (ed.) Security Engineering for Cloud Computing. IGI Global, Hershey (2011)
Naveed, R., Abbas, H.: Security requirements specification framework for cloud users. In: Park, J., Stojmenovic, I., Xhafa, F. (eds.) Future Information Technology. LNEE, vol. 276, pp. 297–305. Springer, Berlin (2014). https://doi.org/10.1007/978-3-642-40861-8_43
Jaiswal, S., Gupta, D.: Security requirements prioritiztion. Softw. Eng. Res. Pract. 673–679 (2009)
Chatterjee, K., Gupta, D., De, A.: A framework for development of secure software. CSI Trans. ICT 1(1), 143–157 (2013)
Jaiswal, S., Gupta, D.: Int. J. Syst. Assur. Eng. Manag. 8(Suppl 2), 1419 (2017). https://doi.org/10.1007/s13198-017-0612-x
Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50–57 (2011)
Fernandes, D., Soares, L., Gomes, J., Freire, M., Ińacio, P.: Security issues in cloud environments—a survey. Int. J. Inf. Secur. (IJIS) 13(2), 113–170 (2014)
Vu, Q.H., Pham, T.-V., Truong, H.-L., Dustdar, S., Asal, R.: DEMODS: a description model for data-as-a-service. In: 26th IEEE International Conference on Advanced Information Networking and Applications, pp. 605–612. IEEE (2012)
Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutorials 15(2), 843–859 (2013)
Firesmith, D.G.: Engineering security requirements. J. Object Technol. 2(1), 53–68 (2003)
CVE Details: owncloud: vulnerability statistics. www.cvedetails.com: https://www.cvedetails.com/product/22262/Owncloud-Owncloud.html?vendor_id=11929 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jaiswal, S., Gupta, D. (2019). Security Validation of Cloud Based Storage. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ören, T., Kashyap, R. (eds) Advances in Computing and Data Sciences. ICACDS 2019. Communications in Computer and Information Science, vol 1046. Springer, Singapore. https://doi.org/10.1007/978-981-13-9942-8_55
Download citation
DOI: https://doi.org/10.1007/978-981-13-9942-8_55
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9941-1
Online ISBN: 978-981-13-9942-8
eBook Packages: Computer ScienceComputer Science (R0)