A Review of Emerging Security Issues In Cloud Computing

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-9
Year of Publication : 2019
Authors : Roselyne Akinyi Oluoch , Nelson Masese
DOI :  10.14445/22312803/IJCTT-V67I9P107

MLA

MLA Style:Roselyne Akinyi Oluoch , Nelson Masese  "A Review of Emerging Security Issues In Cloud Computing" International Journal of Computer Trends and Technology 67.9 (2019):39-44.

APA Style Roselyne Akinyi Oluoch , Nelson Masese. A Review of Emerging Security Issues In Cloud Computing International Journal of Computer Trends and Technology, 67(9),39-44.

Abstract
The rapid growth of technology adaptation has consequently led to the growth of new ways of delivering technology to business organizations; one of them is through cloud computing. It is a technology that enables instant, on-demand access to a shared pool of computing resources delivered with minimal customer management. Its key characteristics are on-demand self-service, rapid elasticity, measured service, resource pooling, and network access. Customers, therefore, spend less to access computing services at any time with any device. However, this is challenged by security issues present. This paper is a review of cloud computing service delivery models and some of the security challenges surrounding each model. Some potential countermeasures to the security challenges include: encryption, intrusion tolerant systems, authentication and authorization systems, disaster recovery systems, trusted third-party, virtual machine isolation and strong security policies. This study recommends that security be treated as a shared responsibility between the organization’s IT department and CSP.

Reference
[1] R. M. U. Ullah, K. A. Buckley, M. Garvey, and J. Li, “The Challenges of Cloud Computing in Forensic Science,” International Journal of Computer Trends and Technology (IJCTT), vol. 67, no. 7, pp. 40–48, 2019.
[2] S. Iqbal, M. L. M. Kiah, N. B. Anuar, B. Daghighi, A. W. A. Wahab, and S. Khan, “Service delivery models of cloud computing: security issues and open challenges,” Security and Communication Networks, vol. 9, no. 17, pp. 4726–4750, 2016.
[3] R. Mahajan1 and D. Singh, “Step by step securing cloud environment,” International Journal of General Engineering and Technology (IJGET), vol. 6, no. 4, pp. 47–54, 2017.
[4] K. Wakunuma and R. Masika, “Cloud computing, capabilities and intercultural ethics: Implications for Africa,” Telecommunications Policy, vol. 41, pp. 695–707, 2017.
[5] M. Kumar, S. C. Sharma, A. Goel, and S. P. Singh, “A comprehensive survey for scheduling techniques in cloud computing,” Journal of Network and Computer Applications, vol. 143, pp. 1–33, Oct. 2019.
[6] V. O. Safonov, Trustworthy Cloud Computing. Hoboken, UNITED STATES: John Wiley & Sons, Incorporated, 2016.
[7] F. De la Prieta, S. Rodríguez-González, P. Chamoso, J. M. Corchado, and J. Bajo, “Survey of agent-based cloud computing applications,” Future Generation Computer Systems, vol. 100, pp. 223–236, Nov. 2019.
[8] T. Almarabeh, Y. K. Majdalawi, and H. Mohammad, “Cloud Computing of E-Government,” Communications and Network, vol. 8, no. 1, pp. 1–8, Feb. 2016.
[9] T. H. Noora, S. Zeadally, A. Alfazi, and Q. Z. Sheng, “Mobile cloud computing: Challenges and future research directions,” Journal of Network and Computer Applications, vol. 115, pp. 70–85, 2018.
[10] N. Subramanian and A. Jeyaraj, “Recent security challenges in cloud computing,” Computers and Electrical Engineering, vol. 71, pp. 28–42, 2018.
[11] C. Stergiou, K. E. Psannis, B.-G. Kim, and B. Gupta, “Secure integration of IoT and Cloud Computing,” Future Generation Computer Systems, vol. 78, pp. 964–975, 2018.
[12] P. Hu, S. Dhelim, H. Ning, and T. Qiu, “Survey on fog computing: architecture, key technologies, applications and open issues,” Journal of Network and Computer Applications, vol. 98, pp. 27–42, Nov. 2017.
[13] G. Ramachandra, M. Iftikhar, and F. A. Khan, “A Comprehensive Survey on Security in Cloud Computing,” in Procedia Computer Science 110 (2017), 2017, pp. 465–472.
[14] C. Stergiou, K. E. Psannis, B. B. Gupta, and Y. Ishibashi, “Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT,” Sustainable Computing: Informatics and Systems, vol. 19, pp. 174–184, 2018.
[15] Kh. E. Ali, Sh. A. Mazen, and E. E. Hassanein, “A proposed hybrid model for adopting cloud computing in e-government,” Future computing and informatics journal, vol. 3, pp. 286–295, 2018.
[16] P. Kumari and P. Kaur, “A survey of fault tolerance in cloud computing,” Journal of King Saud University – Computer and Information Sciences, pp. 1–18, 2018.
[17] B. Varghese and R. Buyya, “Next generation cloud computing: New trends and research directions,” Future Generation Computer Systems, vol. 79, pp. 849–861, 2018.
[18] V. Winkler, G. Speake, and P. Foxhoven, Securing the Cloud: Cloud Computer Security Techniques and Tactics. Saint Louis, UNITED STATES: Elsevier Science & Technology Books, 2011.
[19] S. Iqbal, M. L. M. Kiah, N. B. Anuar, B. Daghighi, A. W. A. Wahab, and S. Khan, “Service delivery models of cloud computing: security issues and open challenges,” Security and Communication Networks, vol. 9, no. 17, pp. 4726–4750, 2016.
[20] L. Novaisa, J. M. Maqueirab, and Á. Ortiz-Basa, “A systematic literature review of cloud computing use in supply chain integration,” Computers & Industrial Engineering, vol. 129, pp. 296–314, 2019.
[21] E. Huey, “Cloud Computing - Challenges and Benefits,” International Journal of Computer Trends and Technology (IJCTT), vol. 67, no. 9, pp. 21–24, 2019.
[22] BCS The Chartered Institute for IT, “What is Cloud Computing?,” in Cloud Computing: Moving IT out of the office, BCS Learning & Development Limited, 2012, pp. 1–6.
[23] R. P. Padhy, “Cloud Computing: Security Issues and Research Challenges,” International Journal of Computer Science and Information Technology, vol. 1, no. 2, p. 11, 2011.
[24] A. Agarwal and A. Agarwal, “The Security Risks Associated with Cloud Computing,” International Journal of Computer Applications in Engineering Sciences, vol. 1, no. Special Issue on CNS, p. 3, 2011.
[25] P. R. Kumar, P. H. Raj, and P. Jelciana, “Exploring Data Security Issues and Solutions in Cloud Computing,” 6th International Conference on Smart Computing and Communications, ICSCC 2017, vol. Procedia Computer Science, no. 125, pp. 691–697, 2018.
[26] R. Patil, H. Dudeja, and C. Modi, “Designing an efficient security framework for detecting intrusions in virtual network of cloud computing,” Computers & Security, vol. 85, pp. 402–422, 2019.
[27] K. Popovi? and Ž. Hocenski, “Cloud computing security issues and challenges,” in The 33rd International Convention MIPRO, 2010, pp. 344–349.
[28] A. S. Al-Saleh and S. A. Al-Shaya, “Enhancing Cloud Computing Environment: Improving Cloud Computing Applications Performance Using Cloudlet-Based Architecture,” International Journal of Wireless Communications, Networking and Mobile Computing, vol. 4, no. 5, pp. 38–43, 2017.
[29] R. Velumadhava R., “Data security challenges and its solutions,” presented at the International Conference on Intelligent Computing, Communication & Convergence, 2015, pp. 204–209.
[30] M. Zhao and Y. Geng, “Homomorphic encryption technology for cloud computing,” in 8th International congress of information and communication technology, ICICT 2019, 2019, vol. 154, pp. 73–83.
[31] D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Future Generation Computer Systems, vol. 28, no. 3, pp. 583–592, Mar. 2012.
[32] M. Okuhara, T. Shiozaki, and T. Suzuki, “Security Architectures for Cloud Computing,” FUJITSU Science & Technology Journal, vol. 46, no. 4, pp. 397–402, 2010.
[33] S. Gupta, P. Kumar, and A. Abraham, “A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment,” International Journal of Distributed Sensor Networks, vol. 9, no. 3, p. 364575, Mar. 2013.

Keywords
Cloud computing, Security issues, Service delivery models, Deployment models, Countermeasures.