Skip to main content
Book cover

ICDSMLA 2019 pp 160–171Cite as

Dimensional Insight to Innovations in Security Aspects of Cloud Computing

  • Conference paper
  • First Online:
  • 72 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 601))

Abstract

Computing remotely also brings with it the most sensitive and significant aspect of data security. Data being resident on server and infrastructure that are opaque to users bring with it the huge advantage of ridding users of all the infrastructure operational liabilities. But this also means the data owned by users navigates through routes either unknown or no control territory. This glaringly brings security of data on cloud with high vulnerability. This paper explores dimensionally various such vulnerabilities, and related strategies to circumvent them does involve a sensitive disection of modern technology in today’s world of computing. An insights through various levels of infrastructure, application, data and network architecture gives this research enough evidence that complexities involved in solutioning the security problems of cloud computing is nevertheless a path most discussed and debated. Further much attention is needed to all the vulnerabilities discussed and solutioning them comprehensively.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Han S, Xing J (2011) Ensuring data storage security through a novel third party auditor scheme in cloud computing. In: IEEE international conference on cloud computing and intelligence systems

    Google Scholar 

  2. Thamizhselvan M, Raghuraman R, Gershon Manoj S, Victer Paul P (2015) A novel security model for cloud using trusted third party encryption. In: International conference on innovations in information, embedded and communication systems (ICIIECS)

    Google Scholar 

  3. Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing

    Google Scholar 

  4. Kaura WCN, Lal A (2017) Survey paper on cloud computing security. In: International conference on innovations in information, embedded and communication systems (ICIIECS)

    Google Scholar 

  5. Baek J, Vu QH, Liu JK, Huang X, Xiang Y (2015) A secure cloud computing based framework for big data information management of smart grid. IEEE Trans Cloud Comput 3(2)

    Google Scholar 

  6. Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115

    Google Scholar 

  7. Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592

    Google Scholar 

  8. Zuo P, Hua Y, Wang C, Xia W, Cao S, Zhou Y, Sun Y (2018) Mitigating traffic-based side channel attacks in bandwidth-efficient cloud storage. In: IEEE international parallel and distributed processing symposium (IPDPS)

    Google Scholar 

  9. Mollah MB, Azad MAK, Vasilakos A (2017) Security and privacy challenges in mobile cloud computing: survey and way ahead. J Netw Comput Appl 84:38–54

    Google Scholar 

  10. Rao RV, Selvamani K (2015) Data security challenges and its solutions in cloud computing. Procedia Comput Sci 48:204–209

    Google Scholar 

  11. Jensen M, Schwenk J, Gruschka N, Iacono LL (2009) On technical security issues in cloud computing. In: IEEE international conference on cloud computing

    Google Scholar 

  12. Horvath III AS, Agrawal R (2015) Trust in cloud computing

    Google Scholar 

  13. Opara-Martins J, Sahandi R, Tian F (2016) Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective. J Cloud Comput

    Google Scholar 

  14. Yimam D, Fernandez EB (2016) A survey of compliance issues in cloud computing. J Internet Serv Appl

    Google Scholar 

  15. Mei J, Li K, Ouyang A, Li K (2015) A profit maximization scheme with guaranteed quality of service in cloud computing. IEEE Trans Comput 64(11)

    Google Scholar 

  16. AlJahdali H, Albatli A, Garraghan P, Townend P, Lau L, Xu J (2014) Multi-tenancy in cloud computing. In: IEEE 8th international symposium on service oriented system engineering

    Google Scholar 

  17. Pant VK, Prakash J, Asthana A (2015) Three step data security model for cloud computing based on RSA and steganography techniques. In: International conference on green computing and internet of things (ICGCIoT)

    Google Scholar 

  18. Zafar F, Khan A, Malik SUR, Ahmed M, Anjum A, Iqbal M, Javed N, Alam M, Jamil F (2017) A survey of cloud computing data integrity schemes: design challenges, taxonomy and future trends. Comput Secur 65:29–49

    Google Scholar 

  19. Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4)

    Google Scholar 

  20. Xu H, Qiu X, Sheng Y, Luo L, Xiang Y (2018) A Qos-driven approach to the cloud service addressing attributes of security. IEEE Access 6

    Google Scholar 

  21. Luna J, Taha A, Trapero R, Suri N (2017) Quantitative reasoning about cloud security using service level agreements. IEEE Trans Cloud Comput 5(3)

    Google Scholar 

  22. Al Hamid HA, Rahman SMM, Hossain MS, Almogren A, Alamri A (2017) A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5

    Google Scholar 

  23. Feng B, Ma X, Guo C, Shi H, Fu Z, Qiu T (2016) An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access 4

    Google Scholar 

  24. Ali M, Bilal K, Khan SU, Veeravalli B, Li K, Zomaya AY (2018) DROPS: division and replication of data in cloud for optimal performance and security. IEEE Trans Cloud Comput 6(2)

    Google Scholar 

  25. Modi KJ, Kapadia N (2018) Securing healthcare information over cloud using hybrid approach. In: Progress in advanced computing and intelligent engineering, pp 63–74

    Google Scholar 

  26. Paladi N, Gehrmann C, Michalas A (2017) Providing user security guarantees in public infrastructure clouds. IEEE Trans Cloud Comput 5(3)

    Google Scholar 

  27. Chang V, Ramachandran M (2016) Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput 9(1)

    Google Scholar 

  28. Grzonka D, Jakobik A, Kołodziej J, Pllana S (2018) Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security. Future Gener Comput Syst 86:1106–1117

    Google Scholar 

  29. Ali M, Malik SUR, Khan SU (2017) DaSCE: data security for cloud environment with semi-trusted third party. IEEE Trans Cloud Comput 5(4)

    Google Scholar 

  30. Verginadis Y, Michalas A, Gouvas P, Schiefer G, Hubsch G, Paraskakis I (2017) PaaSword: a holistic data privacy and security by design framework for cloud services. J Grid Comput 15(2):219–234

    Google Scholar 

  31. Zhang Y, Chen X, Li J, Wonge DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61

    Google Scholar 

  32. Li J, Zhangb Y, Chene X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12

    Google Scholar 

  33. Chang V, Kuo Y-H, Ramachandran M (2016) Cloud computing adoption framework a security framework for business clouds. Future Gener Comput Syst 57:24–41

    Google Scholar 

  34. Zhou S, Wu L, Jin C (2017) A privacy-based SLA violation detection model for the security of cloud computing. China Commun. 14(9)

    Google Scholar 

  35. Sanghi A, Chaudhary S, Dave M (2017) Enhance the data security in cloud computing by text steganography. In: Smart trends in systems, security and sustainability, pp 241–248

    Google Scholar 

  36. Tyagi M, Manoria M, Mishra B (2018) A framework for data storage security in cloud. In: Advances in data and information sciences, pp 263–272

    Google Scholar 

  37. Hussain SA, Fatima M, Saeed A, Raza I, Shahzad RK (2017) Multilevel classification of security concerns in cloud computing. Appl Comput Inform 13(1):57–65

    Google Scholar 

  38. Sookhak M, Gani A, Khan MK, Buyya R (2017) Dynamic remote data auditing for securing big data storage in cloud computing. Inf Sci 380(20):101–116

    Google Scholar 

  39. He D, Kumar N, Khan MK, Wang L, Shen J (2018) Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst J 12(2)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. V. Manjushree .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Manjushree, C.V., Nandakumar, A.N. (2020). Dimensional Insight to Innovations in Security Aspects of Cloud Computing. In: Kumar, A., Paprzycki, M., Gunjan, V. (eds) ICDSMLA 2019. Lecture Notes in Electrical Engineering, vol 601. Springer, Singapore. https://doi.org/10.1007/978-981-15-1420-3_18

Download citation

Publish with us

Policies and ethics