Cloud Computing Environment Security Issues

Download Article

DOI: 10.21522/TIJAR.2014.SE.19.01.Art009

Authors : Khanyisile Patience Dlamini Shabangu

Abstract:

Cloud Computing is a technology that provides on-demand computing services such as applications, storage, and processing to consumers over the internet (cloud). It is centered on the pay-per-use model meaning that a user has to pay only for the services utilized. This technology is based on the virtualization perception. Such services allow the companies/establishments to scale-up or scale-down their in-house grounds. Cloud computing has numerous advantages such as flexibility, efficiency, scalability, integration, and capital reduction (upfront fixed cost), and shared resources. Moreover, it offers an advanced virtual space for companies to deploy their applications or run their operations. However, companies which consider embracing cloud based services must also appreciate that regardless of its benefits, the transition to this computing paradigm raises security concerns which are subject of several researchers. The goal of this article is to identify the main security issues and to draw the attention of both decision makers and users to the potential risks of moving data into “the cloud”.

Keywords: cloud computing, cloud service, data security, infrastructure data confidentiality.

References:

[1].     Cachin, C., Keidar, I., & Shraer,A. (2009). Trusting the Cloud. Amc Sigact New, Vol.40, No. 2, pp. 81-86.

[2].     Cisco 2017 Annual Cybersecurity Report: Chief Security officers Reveal True Cost of Breaches and the Actions Organizations are Taking. Cisco, the Network. Cisco Technology News site. Retrieved December 17, 2018 from https://newsroom.cisco.com/press-release-content?articleId=1818259.

[3].     F. Gens, “New IDC It Cloud Services Survey: Top Benefits and Challenges,” 2009. http://blogs.idc.com/ie/?p=730.

[4].     Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009). Controlling Data in Cloud: Outsourcing Computation without Outsourcing Control. ACM Workshop on Cloud Computing Security.

[5].     Hogan, M., Liu, F., Sokol, A., & Tong, J. (2011, July). NIST Cloud Computing Standards Roadmap. National Institute of Standards & Technology. Retrieved December 18, 2018 from https://www.nist.gov/sites/default/files/documents/itl/cloud/NIST_SP-500-291_Jul5A.pdf .

[6].     Hurwitz, J., Bloor, R., Kaufman, M., & Halper, F. (). Cloud Computing Standards Organizations Dummies. Retrieved December 18, 2018 from https://www.dummies.com/programming/networking/cloud-computing-standards-organizations/.

[7].     Kumarand, P., & Arri, H.S. (2013). Data Location in Cloud Computing. International Journal for Science & Emerging Technologies with Latest Trends. Vol. 5, No. 1, pp. 24-27.

[8].     Malik, A., & Nazir, M.M. (2012, March). Security Framework for Cloud Computing Environment: A Review. Journal of Emerging Trends in Computing and Information Sciences.

[9].     Neela, K.L., Kavitha, V., & Ramesh, R.K. (2013, August). Cloud Computing: Threats and Security Issues. International Journal of Engineering Sciences & Research Technology.

[10]. Ogigau-Neamtiu, F. (2012). Cloud Computing Security Issues. Journal of Defense Resources Management, Vol.3, Issue 2(5).

[11]. Ramgovind, S., Eloff, M.M., & Smith, E. (2010). The Management of Security in Cloud Computing. Institute of Electrical and Electronics Engineers.

[12]. Rawat, N., Srivastava, R., & Pandey, B.K. (2014, August 1). Data Security Issues in Cloud Computing. Open Journal of Mobile Computing and Cloud Computing.

[13]. Srivastava, H., & Kumar, S.A. (2015, January). Control Framework for Secure Cloud Computing. Journal of Information Security. 6,12-23.

[14]. Srivastava, H., & Kumar, S.A. (2015, January). Control Framework for Secure Cloud Computing. Journal of Information Security. 6,12-23.

[15].  Sharma, K., & Singh, K.R. (2012). Online Data Backup and Disaster Recovery Techniques in Cloud Computing: A Review. International Journal of Engineering and Innovative Technology (IJEIT). Vol. 2, No. 5, pp. 249 -254.

[16]. Ventrapragada, V.S., Ravuri, D., & Jyothi, G. (2013). A study on Cloud Computing and its Security Issues. International Journal of Computer Science and Network. Vol 2, Issue 1, 2013

[17]. Waseem, M., Lakhan, A., & Jamali, I.A. (2016, April 26). Data Security of Mobile Cloud Computing on Cloud Server. Open Access Library Journal, 3: e2377. Retrieved December 17, 2018 from http://dx.doi.org/10.4236/oalib.1102377.

[18]. Zissis, A., Lekkas, D. (2010, December 13). Addressing Cloud Computing Security Issues. Future Generation Computer Systems.