Research Article | Open Access | Download PDF
Volume 4 | Issue 4 | Year 2013 | Article Id. IJCTT-V4I4P110 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I4P110
Security Issues and Solutions for Cloud Computing
Sherin Sreedharan, G.Kalpana
Citation :
Sherin Sreedharan, G.Kalpana, "Security Issues and Solutions for Cloud Computing," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 4, pp. 494-498, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I4P110
Abstract
The “lower costs” of cloud services, “flexibility” and the “speed of deployment” are all vastly demanded by most of the organizations in today’s world. However, a common concern remains amongst large enterprises is about the handover of the control of data to cloud providers. It is true that many technology hosting businesses are equipped to provide basic cloud services, but it is necessary for users to be satisfied that the host can protect the confidentiality, integrity and availability of data with controls and measures that are extensive, efficient and sophisticated. However, the perception of complicating a cloud’s architecture, simply because of apparent security risks, should be resisted; a fine line has to be drawn between practicality and security. This paper gives an insight into the understanding on CLOUD, the service models available, Key challenges in setting up the CLOUD, focuses on the Security Issues related to CLOUD and describes the Security reference model.
Keywords
Infrastructure-as-a-Service (IaaS); Platform-as-a-Service (PaaS); Software-as-a-Service (SaaS); Virtual Machine (VM).
References
[1] “Security and high availability in cloud computing environments” , IBM Global Technology Services Technical White Paper ,IBM , June 2011
[2] "Swamp computing" a.k.a. Cloud Computing". Web Security Journal. 2009-12-28. Retrieved 2010-01-25
[3] V. Krishna Reddy, B. Thirumal Rao, Dr. L.S.S. Reddy, P.Sai Kiran “Research Issues in Cloud Computing “ Global Journal of Computer Science and Technology, Volume 11,Issue 11, July 2011
[4] "Thunderclouds: Managing SOA-Cloud Risk", Philip Wik". Service Technology Magazine. 2011-10. Retrieved 2011-21-21.
[5] What cloud computing really means. InfoWorld. http://www.infoworld.com/d/cloudcomputing/what-cloud-computingreally-means-031?page=0,0
[6] K. Thirupathi Rao et al., “High Level Architecture to Provide Cloud Services Using Green DataCenter”, in Advances in Wireless and Mobile Communications (AWMC) Volume 3 Number 2, pp 109-119, Research India Publication ISSN 0973-6972 (2010).
[7] Top 7 threats to cloud computing. HELP NET SECURITY. http://www.netsecurity.org/secworld.php?id=8943
[8] M.Jensen, N.Gruschka et al., “The impact of flooding Attacks on network based services” Proceedings of the IEEE International conference on Availability, Reliability and Security (ARES) 2008.
[9] Mathisen, “Security Challenges and Solutions in Cloud Computing” 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST2011) , Daejeon, Korea, 31 May -3 June 2011.
[10] “Cloud Security Questions? Here are “http://cloudcomputing.syscon.com/node/1330353