Survey on Security Issues and Challenges in Cloud Computing

Authors(2) :-M. Savithiri, A. Mercy

Cloud computing is a promising technology in the creation of the mixture of traditional computing technology. The network technology includes grid computing, distributed computing parallel computing and so on. It has transformed the software support for large systems from the server to a service-oriented paradigm. It aims to build a perfect system with powerful computing capability throughout a large number of relatively low-cost computing entity, and using the advanced Service models like SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) to distribute the powerful computing capacity to end users hands. This paper tackles the security risks and challenges and certain solutions also followed since security is one of the most critical aspects in cloud computing due to the sensitivity of user’s data.

Authors and Affiliations

M. Savithiri
Assistant Professor, Department of Computer Science, Dr N.G.P Arts and Science College, Coimbatore, Tamilnadu, India
A. Mercy
M Phil Research scholar, Department of Computer Science, Dr N.G.P Arts and Science College, Coimbatore, Tamilnadu, India

Cloud computing, security issues, privacy issues, thread issue, security challenges

  1. Mell P and Grance T 2011 The NIST definition of cloud computing Retrieved from http://dx.doi.org/10.6028/NIST.SP.800-145
  2. Cloud Security Alliance 2018 The The dirty dozen: Cloud Computing Top Threat in 2018 Retrieved from https://downloads.cloudsecurityalliance.org/assets/research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf
  3. Qi. Zhang Lu. Cheng, Raouf Boutaba, "Cloud computing: state-of-the-art and research challenges", "The Brazilian Computer Society", April 2010.
  4. T. T. W. Group et al., "The notorious nine: cloud computing top threats in 2013," Cloud Security Alliance, 2013.
  5. W. A. Jansen, "Cloud Hooks: Security and Privacy Issues in Cloud Computing," Proceedings of the 44th Hawaii International Conference on System Sciences, 2011.
  6. Ashktorab, V., & Taghizadeh, S. R. (2012). Security Threats and Countermeasures in Cloud Computing. International Journal of Application or Innovation in Engineering & Management (IJAIEM) , Vol. 1(2), pp. 234-245.
  7. Khorshed, M.T., A.S. Ali, and S.A. Wasimi, A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation computer systems, 2012. 28(6): p. 833-851.
  8. LIU, F., YAROM, Y., GE, Q., HEISER, G., AND LEE, R. B. Last-Level Cache Side-Channel Attacks are Practical. In IEEE Symposium on Security and Privacy - SP (2015), IEEE Computer Society, pp. 605-622.
  9. McDowell M 2009 Understanding denial-of-service attack Retrieved from https://www.us-cert.gov/ncas/tips/ST04-015
  10. Ashktorab, V., & Taghizadeh, S. R. (2012). Security Threats and Countermeasures in Cloud Computing. International Journal of Application or Innovation in Engineering & Management (IJAIEM) , Vol. 1(2), pp. 234-245.
  11. Kandias M, Virvilis N and Gritzalis D 2011 The insider threat in cloud computing Proc. of 6th International Conf. on Critical Infrastructure Security 95-106
  12. Shin S H and Kobara K 2010 Towards secure cloud storage Demo for CloudCom2010
  13. https://www.questsys.com/files/Challenges-Benefits-Cloud-Computing.pdf

Publication Details

Published in : Volume 3 | Issue 2 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 195-201
Manuscript Number : CSEIT1831405
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

M. Savithiri, A. Mercy, "Survey on Security Issues and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 2, pp.195-201, January-February-2018. |          | BibTeX | RIS | CSV

Article Preview