Total views : 496

A Study of Security and Privacy Issues at Service Models of Cloud Computing

Affiliations

  • School of Information Technology and Engineering, VIT University, Vellore – 632014, Tamil Nadu, India

Abstract


Objectives: Presently, cloud computing is efficiently sharing data and resources over the internet. It is composed of five crucial characteristics such as On-Demand self-service, Resource Pooling, Broad network access, Rapid elasticity and Measured Service. With these characteristics cloud computing is introduced with some open issues like, Security, Availability, Scalability, and Interoperability. Traditional techniques cannot keep cloud computing secure fully. In cloud deployment and delivery models, mostly arrives the privacy and security issues. Hence, cloud computing security and its techniques are hot topic for researchers. Methods: To deal with the current security issues in IT market, industries are developing their architectural models with having strong level of security to their data center. Findings: In this paper, cloud security and privacy issues are analyzed and cloud deployment model security is explored. Moreover, service models of cloud computing are also described with its security issues. The observation from this study is to consider Audit as the important parameter in presenting security solution that covers maximum parameters of security, which are taken into consideration from literature. Application/ Improvements: This paper studied about the cloud security concerns and brings a new challenge to the cloud service provider and a parameter wise comparison of existing security solutions. Based on these comparison a new security model is proposed which describes user‘s security requirements.

Keywords

Cloud Computing Security, Cloud Technologies, Data Security Attacks, Deployment Models, Service Delivery Model.

Full Text:

 |  (PDF views: 435)

References


  • Jennings R. Cloud computing with the windows azure platform. John Wiley and Sons; 2010 Dec 29.
  • Buyya R, Ranjan R, Calheiros RN. Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services. Algorithms and Architectures for Parallel Processing; 2010 May 21. p. 13–31.
  • Janbeglou M, Yan W. A novel agent-based framework in bridge-mode hypervisors of cloud security. 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing Springer Berlin Heidelberg; 2013. p. 467–79.
  • Fernandes DA, Soares LF, Gomes JV, Freire MM, Inácio PR. Security issues in cloud environments: A survey. International Journal of Information Security. 2014 Apr 1; 13(2):113–70.
  • Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems. 2009 Jun 30; 25(6):599–616.
  • Krutz RL, Vines RD. Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing; 2010 Aug 9.
  • Rajarajeswari S, Somasundaram K. Data confidentiality and privacy in cloud computing. Indian Journal of Science and Technology. 2016 Jan 19; 9(4):1–8.
  • Sheshasaayee A, Margaret TS. The challenges of business intelligence in cloud computing. Indian Journal of Science and Technology. 2015 Dec 3; 8(36):1–6.
  • Varadharajan V, Tupakula U. Security as a service model for cloud environment. IEEE Transactions on Network and Service Management. 2014 Mar, 11(1):60–75.
  • Jog M, Madiajagan M. Cloud Computing: Exploring security design approaches in infrastructure as a service. 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM), IEEE; 2012 Dec 8. p. 156–9.
  • Chen D, Zhao H. Data security and privacy protection issues in cloud computing. 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE). 2012 Mar 23; 1:647–51.
  • Mace JC, Van Moorsel A, Watson P. The case for dynamic security solutions in public cloud workflow deployments. 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W); 2011 Jun 27. p. 111–16.
  • So K. Cloud computing security issues and challenges. International Journal of Computer Networks. 2011, 3(5):247–55.
  • Zhou M, Zhang R, Xie W, Qian W, Zhou A. Security and privacy in cloud computing: A survey. 2010 Sixth International Conference on Semantics Knowledge and Grid (SKG); 2010 Nov 1. p. 105–112.
  • Rimal BP, Jukan A, Katsaros D, Goeleven Y. Architectural requirements for cloud computing systems: An enterprise cloud approach. Journal of Grid Computing. 2011 Mar 1, 9(1):3–26.
  • Bhushan SB, Reddy P, Subramanian DV, Gao XZ. Systematic survey on evolution of cloud architectures. International Journal of Autonomous and Adaptive Communications Systems, Inderscience. 2015.
  • Liu W. Research on cloud computing security problem and strategy. 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet); 2012. p. 1216–19.
  • Manjusha R, Ramachandran R. Secure authentication and access system for cloud computing auditing services using associated digital certificate. Indian Journal of Science and Technology. 2015 Apr 1; 8(S7):220–7.
  • Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications. 2011 Jan 31; 34(1):1.
  • Rajathi A, Saravanan N. A survey on secure storage in cloud computing. Indian Journal of Science and Technology. 2013 Apr 1; 6(4):4396–401.
  • Bhushan SB, Reddy P, Subramanian DV, Gao XZ. Systematic survey on evolution of cloud architectures. International Journal of Autonomous and Adaptive Communications Systems, Inderscience. 2015.
  • Mohan K, Aramudhan M. Ontology based access control model for healthcare system in cloud computing. Indian Journal of Science and Technology. 2015 May 4; 8(S9):218–22.
  • Beulah S, Dhanaseelan FR. Survey on security issues and existing solutions in cloud storage. Indian Journal of Science and Technology. 2016 Apr 14; 9(13):1–8.
  • Vaquero LM, Rodero–Merino L, Morán D. Locking the sky: A survey on IaaS cloud security. Computing. 2011 Jan 1; 91(1):93–118.
  • Fusenig V, Sharma A. Security architecture for cloud networking. 2012 International Conference on Computing, Networking and Communications (ICNC); 2012 Jan 30. p. 45–9.
  • Celesti A, Tusa F, Villari M, Puliafito A. Security and cloud computing: Intercloud identity management infrastructure. 2010 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE); 2010 Jun 28. p. 263–5.
  • Kaufman C, Perlman R, Speciner M. Network security: Private communication in a public world. Prentice Hall Press; 2002 Apr 22.
  • Alarifi S, Wolthusen SD. Mitigation of cloud-internal denial of service attacks. 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE); 2014 Apr 7. p. 478–83.
  • Bicakci K, Unal D, Ascioglu N, Adalier O. Mobile authentication secure against man-in-the-middle attacks. 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud); 2014 Apr 8. p. 273–6.
  • Behl A. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. 2011 World Congress on Information and Communication Technologies (WICT); 2011 Dec 11. p. 217–22.
  • Sheshasaayee A, Margaret TS. The challenges of business intelligence in cloud computing. Indian Journal of Science and Technology. 2015 Dec 3; 8(36):1–6.
  • Christodorescu M, Sailer R, Schales DL, Sgandurra D, Zamboni D. Cloud security is not (just) virtualization security: A short paper. Proceedings of the 2009 ACM workshop on Cloud Computing Security; 2009 Nov 13. p. 97–102.
  • Durairaj M, Manimaran A. A study on security issues in cloud based e-learning. Indian Journal of Science and Technology. 2015 Apr 1; 8(8):757–65.
  • Kalloniatis C, Mouratidis H, Islam S. Evaluating cloud deployment scenarios based on security and privacy requirements. Requirements Engineering. 2013 Nov 1; 18(4):299–319.
  • Mather T, Kumaraswamy S, Latif S. Cloud security and privacy: an enterprise perspective on risks and compliance. O'Reilly Media, Inc.; 2009 Sep 4.

Refbacks

  • »
  • »
  • »
  • »
  • »
  • »


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.