Cloud Computing Environment Security Issues
Abstract:
Cloud Computing is a
technology that provides on-demand computing services such as applications,
storage, and processing to consumers over the internet (cloud). It is centered
on the pay-per-use model meaning that a user has to pay only for the services utilized.
This technology is based on the virtualization perception. Such services allow
the companies/establishments to scale-up or scale-down their in-house grounds.
Cloud computing has numerous advantages such as flexibility, efficiency,
scalability, integration, and capital reduction (upfront fixed cost), and
shared resources. Moreover, it offers an advanced virtual space for companies to
deploy their applications or run their operations. However, companies which
consider embracing cloud based services must also appreciate that regardless of
its benefits, the transition to this computing paradigm raises security
concerns which are subject of several researchers. The goal of this article is
to identify the main security issues and to draw the attention of both decision
makers and users to the potential risks of moving data into “the cloud”.
Keywords: cloud computing, cloud
service, data security, infrastructure data confidentiality.
References:
[2].
Cisco 2017 Annual Cybersecurity Report: Chief
Security officers Reveal True Cost of Breaches and the Actions Organizations
are Taking. Cisco, the Network. Cisco
Technology News site. Retrieved December 17, 2018 from https://newsroom.cisco.com/press-release-content?articleId=1818259.
[3]. F. Gens,
“New IDC It Cloud Services Survey: Top Benefits and Challenges,” 2009. http://blogs.idc.com/ie/?p=730.
[4]. Chow, R.,
Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J.
(2009). Controlling Data in Cloud: Outsourcing Computation without Outsourcing
Control. ACM Workshop on Cloud Computing
Security.
[5]. Hogan, M.,
Liu, F., Sokol, A., & Tong, J. (2011, July). NIST Cloud Computing Standards
Roadmap. National Institute of Standards
& Technology. Retrieved December 18, 2018 from https://www.nist.gov/sites/default/files/documents/itl/cloud/NIST_SP-500-291_Jul5A.pdf .
[6]. Hurwitz,
J., Bloor, R., Kaufman, M., & Halper, F. (). Cloud Computing Standards
Organizations Dummies. Retrieved December 18, 2018 from https://www.dummies.com/programming/networking/cloud-computing-standards-organizations/.
[7]. Kumarand,
P., & Arri, H.S. (2013). Data Location in Cloud Computing. International Journal for Science &
Emerging Technologies with Latest Trends. Vol. 5, No. 1, pp. 24-27.
[8]. Malik, A., & Nazir, M.M. (2012, March). Security Framework for Cloud
Computing Environment: A Review. Journal
of Emerging Trends in Computing and Information Sciences.
[9]. Neela, K.L., Kavitha, V., & Ramesh, R.K. (2013, August). Cloud
Computing: Threats and Security Issues. International
Journal of Engineering Sciences & Research Technology.
[10]. Ogigau-Neamtiu,
F. (2012). Cloud Computing Security Issues. Journal
of Defense Resources Management, Vol.3, Issue 2(5).
[11]. Ramgovind,
S., Eloff, M.M., & Smith, E. (2010). The Management of Security in Cloud
Computing. Institute of Electrical and
Electronics Engineers.
[12]. Rawat, N., Srivastava, R., & Pandey, B.K. (2014, August 1). Data
Security Issues in Cloud Computing. Open
Journal of Mobile Computing and Cloud Computing.
[13]. Srivastava,
H., & Kumar, S.A. (2015, January). Control Framework for Secure Cloud
Computing. Journal of Information
Security. 6,12-23.
[14]. Srivastava,
H., & Kumar, S.A. (2015, January). Control Framework for Secure Cloud
Computing. Journal of Information
Security. 6,12-23.
[15]. Sharma, K., & Singh, K.R. (2012). Online
Data Backup and Disaster Recovery Techniques in Cloud Computing: A Review. International Journal of Engineering and
Innovative Technology (IJEIT). Vol. 2, No. 5, pp. 249 -254.
[16]. Ventrapragada,
V.S., Ravuri, D., & Jyothi, G. (2013). A study on Cloud Computing and its
Security Issues. International Journal of
Computer Science and Network. Vol 2, Issue 1, 2013
[17].
Waseem, M., Lakhan, A.,
& Jamali, I.A. (2016, April 26). Data Security of Mobile Cloud Computing on
Cloud Server. Open Access Library Journal,
3: e2377. Retrieved December 17, 2018 from http://dx.doi.org/10.4236/oalib.1102377.
[18]. Zissis, A., Lekkas, D. (2010, December 13). Addressing Cloud Computing
Security Issues. Future Generation
Computer Systems.