CFP last date
20 May 2024
Reseach Article

Security Issues in Cloud Computing: A survey

by Rizwana Shaikh, M. Sasikumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 44 - Number 19
Year of Publication: 2012
Authors: Rizwana Shaikh, M. Sasikumar
10.5120/6369-8736

Rizwana Shaikh, M. Sasikumar . Security Issues in Cloud Computing: A survey. International Journal of Computer Applications. 44, 19 ( April 2012), 4-10. DOI=10.5120/6369-8736

@article{ 10.5120/6369-8736,
author = { Rizwana Shaikh, M. Sasikumar },
title = { Security Issues in Cloud Computing: A survey },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 44 },
number = { 19 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 4-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume44/number19/6369-8736/ },
doi = { 10.5120/6369-8736 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:36:23.157494+05:30
%A Rizwana Shaikh
%A M. Sasikumar
%T Security Issues in Cloud Computing: A survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 44
%N 19
%P 4-10
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is attracting great attention nowadays. The elastic nature of cloud makes it suitable for almost any type of organization. The major challenge faced by cloud users and providers are security concerns towards cloud services. These security issues acts as a barrier in the growth of cloud computing. The trust between provider and users is the most important factor to be considered for a cloud service and application. The notion of trust among the various cloud users is also essential to promote the reputation of various cloud providers and their offered services. Here we present an analysis of security issues in a cloud environment. Solution exists to a certain extent for various issues. There are trust based solutions available to provide security in various collaborative environments. Analysis of these solutions can be used to think about a trust based solution in a cloud computing environment.

References
  1. Pearson, S. "Taking account of privacy when designing cloud computing services" Software Engineering Challenges of Cloud Computing, 2009, pages, 44 – 52, Vancouver, BC.
  2. Jensen, M. Schwenk, J. Gruschka, N. Iacono, "On technical security issues in Cloud" IEEE International Conference on Cloud Computing, 2009, pages 109-16, Germany.
  3. Arshad, J. Townend, P. Jie Xu , "Quantification of Security for compute Intensive Workloads in Clouds", 15th International Conference on Parallel and Distributed Systems, School of Computation, pages 478-486, Dec. 2009, UK.
  4. Saurabh, "Security issues in cloud Computing", http://serl. iiit. ac. in/cs6600/saurabh. ppt, 2009.
  5. David Sherry," Cloud Computing: Security Risks and Compliance Implications", http://media. techtarget. com/searchFinancialSecurity/downloads/FISD09_Breakout_Session5_CloudComputing_Sherry. pdf, June 2009, Brown University.
  6. Gartner "Seven Cloud Computing Security Risks", http://www. infoworld. com/d/security-central/gartner-seven-cloud-computing-security-risks-853?page=0,1, July 2008.
  7. Carl Almond, "A Practical Guide to Cloud Computing Security", http://www. avanade. com/Documents/Research%20anad%20Insights/practicalguidetocloudcomputingsecurity574834. pdf, August 2009.
  8. Diana Kelley," Cloud computing security model overview: Network infrastructure issues", http://searchcloudsecurity. techtarget. com/tip/, 2009.
  9. Kevin Jackson, "Secure Cloud Computing: An Architecture Ontology Approach" http://sunset. usc. edu/gsaw/gsaw2009/s12b/jackson. pdf, DataLine, 2009.
  10. Ji Hu Klein, "A Benchmark of transparent data encryption for migration of web application in cloud", Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pages 735 – 740, Chengdu.
  11. Tetsuya, M. Kazuhiro, S. Hirotsugu, K. "A system for search, access restrictions and agents in the Clouds", Ninth Annual International Symposium on Applications and the Internet Cloud, 2009. Pages 201-204, Japan.
  12. Descher, M. Masser, P. Feilhauer, T. Tjoa, A. M. Huemer, D. , "Retaining data control to the Client in Infrastructure Cloud", International Conference on Availability, Reliability and Security, 2009, pages 9-16, Dornbirn.
  13. Lalana Kagal, Tim Finin, and Anupam Joshi, "Trust-Based Security in Pervasive Computing Environments", Computing and Processing 2001, pages 154-157, Baltimore, MD.
  14. Naima Iltaf, Mahmud U, Kamran F "Security &Trust Enforcement in Pervasive Computing Environment", HONET 2006, pages 1-5, NUST Pakistan.
  15. Rui He; Jianwei Niu; Man Yuan; Jianping Hu; "A novel cloud-based trust model for pervasive computing", The Fourth International Conference on Computer and Information Technology,2004, pages 693 – 700, China.
  16. Zhaoyu Liu and Daoxi Xiu, "Agent-based Automated Trust Negotiation for Pervasive Computing", Second International Conference on Embedded Software and Systems, 2005, pages,1-8, USA.
  17. J Basu and V Callaghan, "Towards A trust based Approach to Security and User Confidence in pervasive computing Systems", The IEE International Workshop on Intelligent Environments, 2005, pages 223 – 229, UK.
  18. Tao Sun, Mieso K. Denko, "Distributed Trust Management Scheme in the Pervasive Computing Environment", Canadian Conference on Electrical and Computer Engineering 2007, pages 1219-22,Guelph.
  19. Shangyuan Guan, Xiaoshe Dong, Weiguo Wu, Yiduo Mei, Shihua Liao," Trust Management and Service Selection in Pervasive Computing Environments", International Conference on Computational Intelligence and Security
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Pervasive Computing Security Trust