Cloud Computing Data Breach

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-47 Number-1
Year of Publication : 2017
Authors : Abdalla Alameen
DOI :  10.14445/22312803/IJCTT-V47P105

MLA

Abdalla Alameen "Cloud Computing Data Breach". International Journal of Computer Trends and Technology (IJCTT) V47(1):42-49, May 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Nowadays, Cloud Computing services extend to all businesses due to their benefits and easy usability. The most important issue of cloud is security. Due to their advantages, most business are now using these cloud computing applications, with data being stored and used through their cloud computing application. As these cloud services providers are resources for data, security is primary for maintaining their integrity and privacy. This paper has focused on issues related to the data breach. Data breach occurs because of various loopholes present in the entities of cloud computing. We have discussed issues which can help the researchers to apply new methodology to overcome the threats.

References
[1] Abdalla Alameen , 2015, Building a Robust Client-Side Protection Against Cross Site Request Forgery, International Journal of Advanced Computer Science and Applications(IJACSA), 6(6): 64-70.
[2] Mell, P. , & Grance, T. 2011. The NIST definition of Cloud Computing, The National Institute of Standards & Technology, U.S. Department of Commerce.
[3] Rochwerger, B., Breitgand, D., Levy, E., Galis, A.,Nagin, K., Llorente, I.M., Montero, R., Wolfsthal, Y., Elmroth, E., Caceres, J., &, Ben-Yehuda, M. 2009. The reservoir model and architecture for open federated cloud computing, IBM Journal of Research and Development. 53(4): 535- 545.
[4] Pallis, G. 2010. Cloud computing: the new frontier of internet computing, IEEE Internet Computing, 1(5):70-3.
[5] Kaufman, L.M. 2009. Data security in the world of cloud computing, IEEE Security & Privacy, 7(4):61-4.
[6] Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. 2011. Enabling public auditability and data dynamics for storage security in cloud computing, IEE Transactions on Parallel and Distributed Systems, 22(5):847-59.
[7] Chen, Z., Dong, W., Li, H., Zhang, P., Chen, X., & Cao, J. 2014. Collaborative network security in multi-tenant data center for cloud computing. Tsinghua Science and Technology, 19(1): 82-94.
[8] Tari, Z., Yi, X., Premarathne, U.S., Bertok, P., & Khalil, I. 2015. Security and Privacy in Cloud Computing: Vision, Trends, and Challenges, IEEE Journal of Cloud Computing (2):30-38.
[9] Wang, C., Wang, Q., Ren, K., & Lou, W. 2010. Privacypreserving public auditing for data storage security in cloud computing. In INFOCOM-2010, Proceedings of 29th conference on Information Communications, 525-533.
[10] Wang, C., Ren, K., Lou, W., & Li, J. 2010. Toward publicly auditable secure cloud data storage services. IEEE Network, 24(4):19-24.
[11] Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22(5):847-59.
[12] Yang, K., & Jia, X. 2012. Data storage auditing service in cloud computing: challenges, methods, and opportunities, World Wide Web, 15(4):409-428.
[13] Wang, B., Li, B., & Li, H. 2012. Oruta: Privacy-preserving public auditing for shared data in the cloud. In Proceedings of IEEE 5th International Conference on Cloud Computing (CLOUD), 295-302.
[14] Yang, K., & Jia, X. 2013. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 24(9):1717-26.
[15] Wang, B., Li, B., & Li, H. 2012. Knox: privacy- preserving auditing for shared data with large groups in the cloud, Applied Cryptography and Network Security, 507-525).
[16] Wang, Q., Wang, C., Li, J., Ren, K., & Lou, W. 2009.
Enabling public verifiability and data dynamics for storage security in cloud computing. In Proceedings of 14th European Conference on research in computer security, France, 355-370.
[17] Xiao, Z., & Xiao, Y. 2013. Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials, 15(2):843-59.
[18] Takabi, H., Joshi, J.B., & Ahn, G.J. 2010. Security and privacy challenges in cloud computing environments, IEEE Security & Privacy, 1(6):24-31.
[19] Kaufman, L.M. 2009. Data security in the world of cloud computing. IEEE Security & Privacy, 7(4):61- 64.
[20] Subashini, S., & Kavitha, V. 2011. A survey on security issues in service delivery models of cloud computing, Journal of network and computer applications,34(1):1-1.
[21] Pearson, S. 2009.Taking account of privacy when designing cloud computing services.In Proceedings of the 2009 ICSE Workshop on Software Engineering and Challenges of Cloud Computing, 44-52.
[22] Verizon. 2014. Data Breach Investigations Report. [23] Choo, K.K. 2014. A cloud security risk-management strategy. IEEE Cloud Computing, 1(2):52-6.
[24] Choo, K.K. 2014. Legal issues in the cloud. IEEE Cloud Computing, 1(1):94-6.
[25] Horvath, A.S., & Agrawal, R. 2015. Trust in cloud computing. In Southeast Con 2015, 1-8.
[26] Rathi, A., & Parmar, N. 2015. Secure Cloud Data Computing with Third Party Auditor Control. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), 145-152).
[27] Kobsa, A., Knijnenburg, B.P., & Livshits, B. 2014. Let`s do it at my place instead?: Attitudinal and behavioral study of privacy in client-side personalization. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ( 81-90).
[28] Otsuka, H., Watanabe, Y., & Matsumoto, Y. 2015. Learning from Before and After Recovery to Detect Latent Misconfiguration. In 39th annual IEEE Computer Software and Applications Conference (COMPSAC), 3:141-148.
[29] Gupta, S., Kumar, P., & Abraham, A. A Resource Efficient Integrity Monitoring and Response Approach for Cloud Computing Environment, In Pattern Analysis,Intelligent Security and the Internet of Things, 335-349.
[30] Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. 2014. Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & tutorials, 16(1):369-92.
[31] Khan, A.R., Othman, M., Madani, S.A., & Khan, S.U. 2014. A survey of mobile cloud computing application models. IEEE Communications Surveys & Tutorials, 6(1):393-413.
[32] Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., & Brandic, I. 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation computer systems, 25(6):599-616.
[33] Zhou, M., Zhang, R., Xie, W., Qian, W., & Zhou, A. 2010. Security and privacy in cloud computing: A survey. In IEEE 6th International conference on Semantics Knowledge and Grid, 105-112.
[34] Yang, K., & Jia, X. 2012. Data storage auditing service in cloud computing: challenges, methods and opportunities, World Wide Web, 15(4):409-28.
[35] Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., & Fu, K. Plutus: Scalable Secure File Sharing on Untrusted Storage. InFast 2003, 3: 29-42.
[36] Grobauer, B., Walloschek, T., & Stöcker, E. 2011. Understanding cloud computingvulnerabilities. IEEE Security & privacy, 9(2):50-7.
[37] Chang, V., Kuo, Y. H., & Ramachandran, M. 2016. Cloud computing adoptionframework: A security framework for business clouds, Future Generation Computer Systems, 57:24-41.
[38] Han, E.E. 2015. Detection of Web Application Attacks with Request Length Module and Regex Pattern Analysis. In Proceedings of International conference on Genetic and Evolutionary Computing, 157-165.
[39] Li, H., Wang, S., Tian, X., Wei, W., & Sun, C. 2015. A Survey of Extended Role- Based Access Control in Cloud Computing. In Proceedings of the 4th International Conference on Computer Engineering and Networks, 821- 831).
[40] Shyam, G.K., & Manvi, S.S. 2015. Resource allocation in cloud computing using agents. In IEEE Interantional conference on Advance Computing (IACC), 458-463).
[41] Sowmiya, M., & Adimoolam, M. 2014. Secure cloud storage model with hidden policy attribute based access control. In IEEE International conference on Recent Trends in Information Technology (ICRTIT), (1-6).
[42] Kolhar, M., Abualhaj, M.M., & Rizwan, F. 2016. QoS Design Consideration for Enterprise and Provider’s Network at Ingress and Egress Router for VoIP protocols,International Journal of Electrical and Computer Engineering (IJECE), 6(1):21-26.
[43] Li, H., Wang, S., Tian, X., Wei, W., & Sun, C. A Survey of Extended Role-Based Access Control in Cloud Computing. In Proceedings of the 4th International Conference on Computer Engineering and Networks, 821-831.
[44] Kamoun, M., Labidi, W., & Sarkiss, M. 2015. Joint resource allocation and offloading strategies in cloud Communications(ICC), 5529-5534.
[45] Park, J.S., Sandhu, R. Secure cookies on the Web. IEEE internet computing. 2000 Jul 1(4):36-44.
[46] Bellare M, Canetti, R., & Krawczyk, H. 1996. Keying hash functions for message authentication. In Advances in Cryptology—CRYPTO’96, 1-15).
[47] Lu, Q., Xu, X., Bass, L., Zhu, L., & Zhang, W. 2015. A Tail-Tolerant Cloud API Wrapper. IEEE Software, 32(1):76-82.
[48] Yuan, D., Park, S., Huang, P., Liu, Y., Lee, M.M., Tang, X., Zhou, Y., & Savage, S.2012. Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. In OSDI, 12: 293-306.
[49] Tan, V., Groth, P., Miles, S., Jiang, S., Munroe, S., a SOA-based provenance system. In Provenance and Annotation of Data, 203-211).
[50] Xing, X., Liu, B., & Ling, D. Neural Network PID Control based Scheduling.Mechanism for Cloud Computing, Appl. Math, 9(2):789-96.
[51] Ahuja, M.S., Kaur, R., & Kumar, D. 2015. Trend Towards the Use of Complex Networks in Cloud Computing Environment. International Journal of Hybrid Information Technology, 8(3): 31-40.
[52] Sandhu, R., Sood, S.K. 2015. Scheduling of big data applications on distributed cloud based on QoS parameters, Cluster Computing, 18(2):817-28.
[53] Ranjan, R., Benatallah, B., Dustdar, S., & Papazoglou, M.P. 2015. Cloud Resource Orchestration Programming: Overview, Issues, and Directions, IEEEJournal of Internet Computing, 19(5):46-56.
[54] Shyam, G.K., & Manvi, S.S. 2015. Resource allocation in cloud computing using agents. In IEEE International conference on Advance Computing (IACC), 458-463.
[55] Zargar, S.T., Joshi, J., & Tipper, D. 2013. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks, IEEE Communications Surveys Tutorials, 2046-69.

Keywords
Cloud Computing, Data Breach, Virtual instances, API, DDoS.