CFP last date
21 October 2024
Reseach Article

Security Aspects of Cloud Computing

by Kunal Chadha, Anvita Bajpai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 40 - Number 8
Year of Publication: 2012
Authors: Kunal Chadha, Anvita Bajpai
10.5120/4987-7251

Kunal Chadha, Anvita Bajpai . Security Aspects of Cloud Computing. International Journal of Computer Applications. 40, 8 ( February 2012), 43-47. DOI=10.5120/4987-7251

@article{ 10.5120/4987-7251,
author = { Kunal Chadha, Anvita Bajpai },
title = { Security Aspects of Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 40 },
number = { 8 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 43-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume40/number8/4987-7251/ },
doi = { 10.5120/4987-7251 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:27:33.663020+05:30
%A Kunal Chadha
%A Anvita Bajpai
%T Security Aspects of Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 40
%N 8
%P 43-47
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is the new buzz word in today’s computing world. Although there is huge buzz, many people are confused as to exactly what cloud computing is, especially as the term can be used to mean almost anything. The paper is categorized in three parts. The first part of this paper briefly explains the cloud computing model. The second part of paper follows a discussion on what security threats and challenges pose in front of this technology. While the final part focuses on how virtualization plays an important role in cloud computing and talks about techniques for securing the virtual machines over the cloud. The paper talks about what assumptions are made by existing kernel integrity-checking mechanisms which may not work in cloud environment and finally discuss an integrity discovery system using secure introspection [1] for virtual environments which ensures high security.

References
  1. M. Christodorescu, R. Sailer, D.L. Schales, D. Sgandurra, D. Zamboni. “Cloud Security Is Not (Just) Virtualization Security”. Conference on Computer and Communications Security Proceedings of the 2009 ACM workshop on Cloud computing security.
  2. J. Wei, X. Zhang, G. Ammons, V. Bala, P. Ning. “Managing Security of Virtual Machine Images in a Cloud Environment”. CCSW '09: Proceedings of the 2009 ACM workshop on Cloud computing security November 2009.Source: ACM Guide to Computing Literature.
  3. I. Foster, Y. Zhao, I.Raicu, S. Lu, "Cloud Computing and Grid Computing 360-Degree Compared", Grid Computing Environments Workshop, 2008.
  4. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the Clouds: A Berkeley View of Cloud Computing", UC Berkeley Reliable Adaptive Distributed Systems Laboratory, February 10, 2009.
  5. P. Mell, T. Grance, "The NIST Definition of Cloud Computing", Jan. 2011, U.S. Department of Commerce.
  6. R. Ferriman, "The benefits of Cloud Computing", White Paper.
  7. Third-Brigade. White Paper: Cloud Computing Secsurity: Making Virtual Machines Cloud-Ready.
  8. A. Kumar, Kunal Chadha, K. Asawa, "Framework for vulnerability reduction in real time intrusion detection and prevention systems using SOM based IDS with Netfilter-Iptables", IJCSIS Vol. 8 No. 4, July 2010 ISSN 1947-5500 International Journal of Computer Science & Information.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing cloud delivery model cloud deployment model advantages of cloud security concern in cloud security measures in cloud virtualization and secure introspection.