Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Security in Cloud Computing

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 96 - Number 15
Year of Publication: 2014
Authors:
Rajarshi Roy Chowdhury
10.5120/16870-6767

Rajarshi Roy Chowdhury. Article: Security in Cloud Computing. International Journal of Computer Applications 96(15):24-30, June 2014. Full text available. BibTeX

@article{key:article,
	author = {Rajarshi Roy Chowdhury},
	title = {Article: Security in Cloud Computing},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {96},
	number = {15},
	pages = {24-30},
	month = {June},
	note = {Full text available}
}

Abstract

Cloud computing refers to high scalable computing applications, storages and platforms as a service to companies, individuals and governments. Therefore, SMB (Small and Medium Business) organizations are adapting cloud computing services gradually to save cost and to increase efficiency in their business environment. While cloud service benefits and robustness are comprehensible, but now more concern about security in cloud computing "How much secure is cloud computing environment?". Noted that security is one of the main barrier for continuing growth of cloud computing. For some major security risks and issues enterprises and individuals are unwilling to deploy their data and applications in cloud environment. In this paper, the main objective is to identified major security risks and issues those are need to think about during deployment and development of services in cloud and the way how to mitigate those security risks and issues. However, it is significant to know that, cloud computing is not insecure primarily, it just needs to be managed and accessed securely.

References

  • S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol. 34, Issue 1, pp. 1-11, 2011.
  • M. Carroll, A. Van der Merwe, P. Kotze, Secure cloud computing: Benefits, risks and controls, Information Security South Africa (ISSA), pp. 1-9, September 2011.
  • S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol. 34, Issue 1, pp. 1-11, July 2010.
  • D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems, 2011.
  • National Institute of Standards and Technology, NIST Cloud Computing Program, 2010 [Accessed on: 18 October 2011].
  • Chonka, Y. Xiang, W. Zhou, A. Bonti, Cloud security defence to protect cloud computing against HTTP-DOS and XML-Dos attacks, Journal o Network and Computer Applications, vol. 34, pp. 1097-1107, 2010.
  • Grobauer, T. Walloschek, E. Stocker, Understanding Cloud Computing Vulnerabilities, Security & Privacy, IEEE, vol. 9, Issue 2, pp. 50-57, March 2011.
  • B. ,Thuraisingham, V. , Khadilkar, A. , Gupta, M. , Kantarcioglu, L. , Khan, Secure data storage and retrival in the clod, Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2010 6th International Conference on, pp. 1-8, May 2011.
  • Z. , Chen, J. , Yoon, IT Auditing to Assure a Secure Cloud Computing, Services (SERVICES-1), 2010 6th World Congress on, pp. 253-259, September 2010.
  • J. , Wayne, T. , Grance, Guidelines on Security and Privacy in Public Cloud Computing, U. S. Department of Commerce, January 2011. http://csrc. nist. gov/publications/drafts/800-144/Draft-SP-800-144_cloud-computing. pdf [Accessed on: 23 October 2011].