Survey on Security Issues and Solutions in Cloud Computing

  IJCTT-book-cover
 
International Journal of ComputerTrends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-8 Number-3                          
Year of Publication : 2014
Authors : D.Gnanavelu , Dr. G.Gunasekaran
DOI :  10.14445/22312803/IJCTT-V8P123

MLA

D.Gnanavelu , Dr. G.Gunasekaran. "Survey on Security Issues and Solutions in Cloud Computing". International Journal of Computer Trends and Technology (IJCTT) V8(3):126-130, February 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Cloud computing is a combination of several key technologies that have evolved and matured over the years. Cloud computing has a potential for cost savings to the enterprises but the security risk are also enormous. Cloud computing weakness include list of issues such as the security and privacy of business data being hosted in remote 3rd party data centers, being lock-in to a platform, reliability/performance concerns, and the fears of making the wrong decision before the industry begins to mature. We show Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats and possible countermeasures. This paper show how we secure the cloud security, privacy and reliability when a third party is processing sensitive data. In this paper, we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources.

References
[1] Wang, Lizhe; von Laszewski, Gregor; Kunze, Marcel; Tao, Jie. Cloud computing: A Perspective study, Proceedings of the Grid Computing Environments (GCE) workshop. Held at the Austin Civic Center: Austin, Texas: 16 November 2008.
[2] Seny Kamara, Kristin Lauter, “Cryptographic cloud storage”, Lecture Notes in Computer Science, Financial Cryptography and Data Security, pp. 136- 149, vol. 6054, 2010. DOI: 10.1007/978-3-642-14992-4_13
[3] S. Bhardwaj, L. Jain, and S. Jain, “Cloud computing: A study of infrastructure as a service (IAAS)”, International Journal of engineering and information Technology, 2(1):60–63, 2010.
[4] J. F. Yang and Z. B. Chen, “Cloud Computing Research and Security Issues,” 2010 IEEE International Conference on Computational Intelligence and Software Engineering (CiSE), Wuhan pp. 1-3, DOI= 10-12 Dec. 2010.
[5] Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, 2009.
[6] Xiaojun Yu; Qiaoyan Wen, "A View about Cloud Data Security from Data Life Cycle," Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on , vol., no., pp.1-4, 10-12 Dec. 2010.
[7] Cloud Computing Use Case Discussion Group, Cloud Computing Use Cases Whitepaper v4.0, July 2010.
[8] Smith, S., & Weingart, S. (1999). Building a high performance, programmable secure coprocessor [Special Issue on Computer Network Security] Computer Networks, 31, 831–860. doi:10.1016 S1389-1286(98)00019-X
[9] Teswanich, W., & Chittayasothorn, S. (2007). A Transformation of RDF Documents and Schemas to Relational Databases. IEEE Pacific Rim Conferences on Communications, Computers, and Signal Processing, 38-41.
[10] Krishna Chaitanya.Y, Bhavani Shankar.Y, Kali Rama Krishna.V andV Srinivasa Rao, Study of security issues in Cloud Computing, International Journal of Computer Science and Technology ,Vol. 2, No. 3, Sept 2011
[11] Aderemi A. Atayero, Oluwaseyi Feyisetan , Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption, Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No. 10, October 2011
[12] Kuyoro S. O, Ibikunle.F and Awodele O, Challenges and Security Issues in Cloud Computing International Journal of Computer Networks, Vol. 3, No. 5, pp. 247-255, 2011
[13] Armbrust, M. et. al., (2009), “Above the clouds: A Berkeley view of Cloud Computing”, UC Berkeley EECS, Feb 2010.
[14] Ramgovind, S.; Eloff, M.M.; Smith, E., "The management of security in Cloud computing," Information Security for South Africa, 2010, vol., no., pp.1-7, 2-4 Aug. 2010.
[15] Pradeep Kumar Tiwari, Dr. Bharat Mishra. “ Cloud Computing Security Issues, Challenges and Solution” International Journal of Emerging Technology and Advanced Engineering ,ISSN 2250-2459, Volume 2, Issue 8, August 2012
[16] Buyya R, Chee Shin Y, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems; 2009; 25(6):599–616.
[17]Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and computer Applications; 2011; 4(1):1–11.
[18] Takabi H, Joshi J B D, Ahn G. Security and privacy challenges in cloud computing environments. IEEE Security & Privacy; 2010;8(6) :24–31.
[19] Sangroya A, Kumar S, Dhok J, Varma V. Towards analyzing data security risks in cloud computing environments. Communications in Computer and Information Science; 2010; 54:255–265.

Keywords
Cloud Computing, Risk, IaaS, PaaS, SaaS, Security, Quality Assurance.