Survey on Security Issues and Challenges in Cloud Computing
Keywords:
Cloud computing, security issues, privacy issues, thread issue, security challengesAbstract
Cloud computing is a promising technology in the creation of the mixture of traditional computing technology. The network technology includes grid computing, distributed computing parallel computing and so on. It has transformed the software support for large systems from the server to a service-oriented paradigm. It aims to build a perfect system with powerful computing capability throughout a large number of relatively low-cost computing entity, and using the advanced Service models like SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) to distribute the powerful computing capacity to end users hands. This paper tackles the security risks and challenges and certain solutions also followed since security is one of the most critical aspects in cloud computing due to the sensitivity of user’s data.
References
- Mell P and Grance T 2011 The NIST definition of cloud computing Retrieved from http://dx.doi.org/10.6028/NIST.SP.800-145
- Cloud Security Alliance 2018 The The dirty dozen: Cloud Computing Top Threat in 2018 Retrieved from https://downloads.cloudsecurityalliance.org/assets/research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf
- Qi. Zhang Lu. Cheng, Raouf Boutaba, "Cloud computing: state-of-the-art and research challenges", "The Brazilian Computer Society", April 2010.
- T. T. W. Group et al., "The notorious nine: cloud computing top threats in 2013," Cloud Security Alliance, 2013.
- W. A. Jansen, "Cloud Hooks: Security and Privacy Issues in Cloud Computing," Proceedings of the 44th Hawaii International Conference on System Sciences, 2011.
- Ashktorab, V., & Taghizadeh, S. R. (2012). Security Threats and Countermeasures in Cloud Computing. International Journal of Application or Innovation in Engineering & Management (IJAIEM) , Vol. 1(2), pp. 234-245.
- Khorshed, M.T., A.S. Ali, and S.A. Wasimi, A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation computer systems, 2012. 28(6): p. 833-851.
- LIU, F., YAROM, Y., GE, Q., HEISER, G., AND LEE, R. B. Last-Level Cache Side-Channel Attacks are Practical. In IEEE Symposium on Security and Privacy - SP (2015), IEEE Computer Society, pp. 605-622.
- McDowell M 2009 Understanding denial-of-service attack Retrieved from https://www.us-cert.gov/ncas/tips/ST04-015
- Ashktorab, V., & Taghizadeh, S. R. (2012). Security Threats and Countermeasures in Cloud Computing. International Journal of Application or Innovation in Engineering & Management (IJAIEM) , Vol. 1(2), pp. 234-245.
- Kandias M, Virvilis N and Gritzalis D 2011 The insider threat in cloud computing Proc. of 6th International Conf. on Critical Infrastructure Security 95-106
- Shin S H and Kobara K 2010 Towards secure cloud storage Demo for CloudCom2010
- https://www.questsys.com/files/Challenges-Benefits-Cloud-Computing.pdf
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.