You are on page 1of 8

See

discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/268747616

An analysis of security and privacy issues,


challenges with possible solution in cloud
computing

Conference Paper · November 2014


DOI: 10.13140/2.1.1061.3448

CITATIONS READS

5 3,034

4 authors:

Rakesh Kumar Siddharth Jain


JECRC Foundation 2 PUBLICATIONS 12 CITATIONS
20 PUBLICATIONS 122 CITATIONS
SEE PROFILE

SEE PROFILE

Sourabh Kumawat Sunil Jangir


JECRC Foundation Jaipur Engineering college & Research centr…
2 PUBLICATIONS 9 CITATIONS 8 PUBLICATIONS 55 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Rakesh Kumar on 26 November 2014.

The user has requested enhancement of the downloaded file.


National Conference on Computational and Mathematical Sciences (COMPUTATIA-IV) - 2014

An analysis of security and privacy issues,


Challenges with possible solution in cloud computing
Siddharth Jain1 Rakesh Kumar 2
Assistant System Engineer, Department of Information Technology,
Tata Consultancy Services Ltd Jaipur Engineering College & Research Center, Jaipur
siddharthjain.jecrc@gmail.com1 rakeshkumar.it14@jecrc.ac.in2

Sourabh Kumawat3 Sunil Kumar Jangir4


Department of Information Technology, Department of Information Technology,
Jaipur Engineering College & Research Center, Jaipur Jaipur Engineering College & Research Center, Jaipur
Sourabhkumawat94@gmail.com3 sunil.jangir07@gmail.com4

 [54]. Infrastructure as a Service (IaaS) [53] provides the user


Abstract— Cloud computing is the delivery of computing as with virtual infrastructure. Platform as a Service
a service rather than a product, whereby IT resources, software, (PaaS) provides the user with development environment
shared resources, and information are provided to computers as services. Software as a Service (SaaS) provides the user with
well as other devices on demand, like the electricity grid. Cloud
computing is also an Internet-based computing where a large
access to already created applications which is operating in
pool of systems are connected in private or public networks, and the cloud. Cloud computing [3], [54] also has deployment
provide dynamically scalable infrastructure for application data models such as Private cloud, Public cloud, Community cloud
as well as file storage. Security of Cloud computing is an and Hybrid cloud [28], [57].
evolving sub-domain of network security, computer security and
information security. In spite of its vitality, it exhibits many
security flaws such as loss of important data, data leakage and
something related to cloning, resource pooling etc. Security of
Cloud Computing is emerging area for study and this paper
presents an overview, characteristics, benefits, advantages and
disadvantages of cloud computing. Also include the several
security and privacy issues with challenges and includes solution
of security issues of cloud computing. The aim of this paper is to
show important aspect of security, privacy concerned challenges
which the authors and researchers are facing in the security of
cloud computing.

Index Terms— Cloud, Computing, Cloud computing, Privacy


issues, Security issues

I. INTRODUCTION
The word cloud is used as a metaphor for the Internet.
It also focuses on maximizing the effectiveness of the shared
resources [29]. Cloud computing [8] means storing as well
as accessing data and programs over the Internet instead
of your computer's hard drive. Cloud computing [2], [10] is Fig 1: Cloud computing architecture
a type of internet-based computing that relies on sharing
computing resources rather than having personal devices or II. CHARACTERISTICS OF CLOUD COMPUTING
local servers to handle applications. Cloud computing [32], The main characteristics of cloud computing [47] include
[62] allows you to set up what is essentially a virtual office to on-demand self-service, broad network access, resource
give you the flexibility of connecting to your business pooling, rapid elasticity, measured service and multi tenacity
anywhere, any time. With the growing number of [34], [36], [57]. On-demand self-service [52] characteristics
web-enabled devices used in today's business environment means that customers or usually organizations can request as
such as smartphones, tablets access to your data is even easier well as manage their own computing resources. Broad
way. Cloud computing [5], [6], [57] provides three levels of network access provides services to be offered over the
service models such as Infrastructure as a Service (IaaS), Internet. Resource pooling characteristics means that
Platform as a Service (PaaS) and Software as a Service (SaaS) customers draw from a pool of computing resources, usually
in remote data centers. Services can be scaled larger and

1
An analysis of security and privacy issues, Challenges with possible solution in cloud computing

smaller; as well as use of a service is measured and also C. Less Maintenance


customers are billed accordingly. Cloud computing [17] In clouds applications, hardware and bandwidth are
resource usage can be measured and controlled providing managed by the provider [66].
transparency for both the consumer and provider of the
D. Ease of Utilization
utilized service [44]. 6th characteristics of cloud computing is
multi tenacity which advocated by the Cloud Security You may find that you do not require hardware as well as
Alliance [64]. It refers to the need for policy-driven software licenses to implement your service, which is
enforcement, segmentation, service levels, as well as billing depending upon the type of service being offered.
models for different consumer constituencies. E. Backup and Recovery
All data is stored in the cloud, backing it up as well as
Some benefits [12], [30], [55] of cloud computing such as:
restoring the same is relatively much easier than storing the
1) Flexibility and dynamic scalability same on a physical device [65]. Mostly cloud service
2) Competitiveness providers are usually competent enough to handle also
3) Work from anywhere recovery of information [65]. So, it makes the whole process
4) Achieve economies of scale of backup as well as recovery much easier than other
5) Disaster recovery traditional methods of data storage.
6) Automatic software updates
F. Continuous Availability
7) Increased collaboration
8) Minimize licensing new software In Clouds all public cloud services are available wherever
9) Well documented you are located [66].
10) Environmentally friendly G. Quality of Service
11) Reduce spending on technology infrastructure When you can obtain under contract from your vendor then
12) Streamline processes Quality of service is something.
13) Reduced cost
14) Projects monitor more effectively H. Automatic Software Integration
15) Business continuity You can choose just those services as well as software
16) Increased storage applications that you think will best suit for your particular
17) Minimized capital expenditure enterprise [65].
18) Location and device independence
19) Utilization and efficiency improvement I. Scalability
20) High computing power You need pay for the applications and data storage, which
21) Optimized server utilization is used [66].
22) Shortened development life cycle
23) Reduced time for implementation J. Flexibility and Reliability
The scale of cloud computing networks and also their
III. ADVANTAGES OF CLOUD COMPUTING ability to provide load balancing and failover makes them
Cloud Computing [41] is a modern technology that uses the highly reliable.
internet as well as central remote servers to maintain data and K. Easy Access to Information
applications. Cloud computing [22] is a computing paradigm
One time you register yourself in the cloud, then you can
that allows consumers and businesses to use applications
without installation as well as access their personal files at any access the information from anywhere, anytime, where there
computer with internet access. is an Internet connection [65].

A simple example of cloud computing is Yahoo email, L. Elasticity


Gmail, or Hotmail etc. and this delivery of computing as a Private clouds can be scaled to meet your modifying IT
service allows for much more efficient computing by system demands also [66].
centralizing data storage, processing and bandwidth. Cloud
M. Outsourced IT management
computing includes some important advantages such as:
Outsourced IT Management (IT Outsourcing) is a
A. Simplicity and Lower Costs bespoke service designed to meet the needs of your
business. It is primarily aimed at companies that do not have
We know that cloud networks manage at higher efficiencies
a dedicated IT resource, or for those that need some extra
as well as with greater utilization, significant cost reductions
assistance on a part-time basis and you achieve considerable
are often encountered [38].
reductions in IT staffing costs, in most instances.
B. Almost Unlimited Storage
N. Quick Deployment
Cloud gives you almost unlimited storage capacity for
storing information [65]. So, you no more need to worry about Cloud computing provides you the advantage of quick
running out of storage space. deployment [65]. The amount of time consume here will

2
National Conference on Computational and Mathematical Sciences (COMPUTATIA-IV) - 2014
depend on the exact kind of technology that you need for your Best cloud service providers run into this type of trouble, in
business [65]. spite of keeping up high standards of maintenance, and also,
you will need a very good Internet connection to be logged
O. Simplified maintenance and upgrade onto the server at all times easily [65].
You can easily apply patches and upgrades because the
E. Not everything fits into the cloud
system is centralized, that means your users always have
access to the latest software versions. Depending on the cloud service provider, you may face
restrictions on available applications, infrastructure options
P. Expert Service as well as operating systems [66]. Complicating matters more
is the simple fact that not all platforms can live in the cloud,
Cloud computing services are continuously monitored as then it is important to ensure that the cloud service provider
well as maintained by our onsite staff of expert data center you choose offers physical colocation services as well as if
technicians [66]. your platform in the cloud needs to speak to applications on
Q. Low barrier to Entry other platforms, this type of flexibility of physical colocation
will work to ensure successful interoperation [66].
Anyone can be a giant at any time, in cloud computing, and
in particular, upfront capital expenditures are dramatically F. Prone to Attack
reduced. Sensitive information and important data in the cloud could
R. Easy Implementation make your company vulnerable to external hack attacks and
threats [65]. As we know that, nothing on the Internet is fully
Cloud hosting allows businesses to retain the same secure so, there is always the lurking possibility of stealth of
applications as well as business processes without having to sensitive information.
deal with the backend technicalities and provides lesser cost
for in-house IT infrastructure maintenance [68]. G. Compatibility
Every existing tool, software and computer is compatible
IV. DISADVANTAGES OF CLOUD COMPUTING with the Web based service, platform or infrastructure [67].
In spite of cloud computing many benefits, as discussed H. Bandwidth Issues
above, it also has some disadvantages. Businesses, mainly Providing an ideal performance, clients have to plan
smaller ones, need to be aware of these cons before going in accordingly as well as do not pack large amounts of servers
for this powerful technology [43]. As you choose your cloud and storage devices into a small set of data centers [68].
computing options, some disadvantages to be aware of
include such as: V. SECURITY ISSUES OF CLOUD COMPUTING
The vendor [7], [9], [59] for Cloud must make sure that
A. Constant Internet Connection
customer does not face any problem like loss of data, data
Cloud computing completely dependent on network theft or more [46]. Here I discussed, some of the problem
connections, thus it makes your business dependent on the which is faced by the Cloud computing:
reliability of your Internet connection [70]. If you do not have
an Internet connection, you cannot access anything, even your A. Data Loss
own sensitive data, and cloud computing does not work If the vendor closes due to financial problems there will be
properly for the slow connection [70]. a loss of data for the customers, so it is a serious problem in
B. Security in the Cloud Cloud computing, as well as customers won’t be access those
The main issue in the cloud is that of security issues [38]. data’s because data is no more available for the customer as
Before using cloud computing, you should know that you will the vendor shut down [33], [40].
be surrendering all your company’s sensitive or important B. Data Location
information to a third-party cloud service provider [65]. You
Location of any data nothing is transparent even the
need to make sure that you choose the most reliable service
customer don’t know where his own data’s are located.
provider, who will keep your sensitive information totally
Vendor does not reveal where all the data’s are stored and
secure.
data’s won’t even be in the same country of customer, it might
C. Less control be located anywhere in the world [33], [40].
Public clouds are easy for scaling up and down your
C. Data Theft
resources, companies which require complete and total
control over their data as well as applications will need to Many cloud Vendors instead of acquiring a server tries to
avoid the public cloud [66], [69]. Another solutions contains lease a server from another service providers because they are
hybrid clouds, private clouds, and colocation. cost affective [63]. The customer doesn’t know any things, so
there is a possibility that the sensitive data can be stolen from
D. Technical Issues external server by a malicious user [33].
Sensitive information and data on the cloud can be
accessed anytime as well as from anywhere at all, there are D. Data Integrity
times when this system can have some serious dysfunction Data is store on a cloud, then anyone from any location can
[65]. So, you should be knowledge of the fact that cloud access those data’s from the cloud and also Cloud does not
computing is always prone to outages and technical issues. differentiate between a sensitive data from a common data so

3
An analysis of security and privacy issues, Challenges with possible solution in cloud computing

enabling anyone to access those sensitive data’s, Thus it is a [51]. Hacking as well as other attacks to cloud infrastructure
lack of data integrity [14], [33], [39], [40]. would affect multiple clients even if only one site is attacked
[19]. All types of risks can be mitigated by using security
E. Privacy Issues
applications, encrypted file systems, data loss software, and
Most of the servers are external, so vendor should make buying security hardware [15], [25].
sure who is accessing the data as well as who is maintaining
the server so enabling the vendor to protect the customer’s B. Billing and Service Delivery
information [14], [33]. The service-level agreements of the provider are not
adequate to guarantee the scalability as well as availability,
F. Security on User Level
and businesses will be reluctant to switch to cloud without a
Vendor has provided a very good security layer for the hard service quality guarantee [19], [49]. Some problem
customer, and customer should make sure that because of its arises to assess the costs involved due to the on-demand
own action, there shouldn’t be any loss of data for other users nature of the services. Existing federal guidance for using
who are using the same Cloud [33], [40]. cloud services may be insufficient and incomplete [19].
G. Security on Vendor Level C. Portability and Interoperability
A Cloud is good if when there is a very good security Some agencies may not have the necessary tools and
provided by the vendor to the customers. Server is much resources, like expertise among staff, to implement cloud
secured from all the external threats, this all things vendor solutions [11], [19], [49]. Services of cloud computing should
should make sure [33]. have the capability to integrate smoothly with the on
H. Infected Application premise IT [51]. Corporate and Businesses should have the
Vendor should have the full access to the server for leverage of migrating in as well as out of the cloud and
monitoring as well as maintenance, so preventing any switching providers whenever they want, and also there
malicious user from uploading any infected application onto should be no lock-in period [19]. To preserve ability to
Cloud which will severely affect the customer [33]. change vendors in the future, all agencies may attempt to
avoid platforms that lock customers into a particular product
VI. PRIVACY ISSUES OF CLOUD COMPUTING [19].
Cloud service [9], [58] providers have already collected D. Availability and Reliability
petabytes of sensitive important information stored in data Cloud providers still lack round-the-clock service, and its
centers around the whole world [50]. The acceptance of cloud results in frequent outages as well as it is important to monitor
computing so will be determined by privacy issues addressed the service being provided using third-party tools [19], [27].
by these companies as well as countries where the data centers This is vital to have plans to supervise usage, service-level
are located [13], [26]. Privacy is also affected by cultural agreements, performance, and business dependency of these
differences, some cultures favor privacy, but others services [19], [49], [54].
emphasize community, thus leads to an ambivalent attitude
E. Bandwidth Cost and Performance
towards privacy in the Internet which is also a global system.
Businesses and Corporate can save money on hardware
Cloud computing [28] has significant implications for the therefore they have to spend more for the bandwidth. It can
privacy of important information and for the confidentiality of be a small cost for smaller applications but can be high for
business and governmental information. Cloud provider’s the data-intensive applications [19], [49]. Complex data as
terms of service, privacy policy, and location may well as delivering intensive over the network requires
significantly affect a user’s privacy as well as confidentiality sufficient bandwidth, so many businesses are waiting for
interests [35]. a reduced cost before switching to the cloud [19].
F. Data Protection and Recovery
VII. CHALLENGES OF CLOUD COMPUTING
Data Security [16], [20] is a crucial element and Service
Despite its growing influence, concerns regarding cloud providers are responsible for maintaining data security in the
computing still remain and all Companies are increasingly cloud model [30], [51]. All business applications have
aware of the business value which cloud computing brings as Service level agreements and Operational teams play a key
well as are taking steps towards transition to the cloud [31]. role in management of service level agreements as well as
Like any new technology, the adoption of cloud computing is runtime governance of applications [49].
not free from issues, so here we discussed some common
challenges are: G. Service Quality
Service quality [21], [45] is one of the important factors
A. Privacy and Security that the enterprises cite as a reason for not moving his
Cloud vendors may not be familiar with security business applications to cloud. Service level agreements [14],
requirements which are unique to government agencies, like [60] provided by the cloud providers today are not sufficient
continuous monitoring as well as maintaining an inventory of to guarantee the requirements for running a production
systems [19], [21], [49]. The most important challenge to applications on cloud especially related to the performance,
cloud computing is that how it addresses the security and availability, and scalability [21], [49]. So, without proper or
privacy concerns of businesses thinking of adopting it [23],

4
National Conference on Computational and Mathematical Sciences (COMPUTATIA-IV) - 2014
sufficient service quality guarantee enterprises are not going least they need to come to me and tell me that they want it,
to host their business critical infrastructure in the cloud [21]. once that is moved to the cloud, all visibility to that is now lost
and they go directly to the cloud provider [18]. Your cloud
H. Management Capabilities
provider have access to data by your encryption keys, if it is
Management of platform and infrastructure is still in its possible.
infancy as well as some Features such as Auto-scaling, are a
crucial requirement for many enterprises [30]. D. Contract Clear With Cloud Vendor
If any cloud vendor closes before contract, enterprise can
I. Integration
claim, so contract should be clear with cloud vendor [42].
Some application has complex integration needs to connect
to another cloud applications and other on premise E. Data Storage Regulations
applications and also need to connect the cloud application The architecture of cloud environment is key and you must
with the rest of the enterprise in a simple, quick, easy and cost understand concept of the respective data storage regulations
effective way [21]. in the countries you operate in. You must look for cloud
security solutions which are compliant with regulations such
J. Compliance Restrictions and Regulatory
as HIPAA, PCI DSS, and EU data protection laws and EU’s
In some of countries, Government regulations do not allow very restrictive regulations, accept that this is a very good
customer’s information or other sensitive information to be solution [18].
physically located outside country, so it is a big challenge for
cloud providers [30]. F. Facilities for Recovery
Cloud vendors should be responsible for recovery the date.
K. Costing and Charging Model
If any data is lost due to certain issues, they can be recovered
When migrating to the Cloud can significantly reduce the as well as continuity of data can be managed [42].
infrastructure cost, and it does raise the cost of data
communication, such as the cost of transferring an G. Enterprise Infrastructure
organization's data to and from the public as well as Amazon Web Service’s has their own security
community Cloud and the cost per unit of computing resource center explains that so cloud provider has secured the
to be higher [1], [37]. Strategic and viable charging model for underlying infrastructure and you, also the client, must secure
Software as a Service (SaaS) provider is crucial for the anything you put on the infrastructure [18]. Enterprise must
profitability as well as sustainability of Software as a Service have infrastructure which give you facilitates for installation
(SaaS) cloud providers also [1]. as well as configuration of hardware components like
firewalls, routers, servers, proxy servers, and software etc.
VIII. SOLUTION OF SECURITY ISSUES OF CLOUD [42], [48].
COMPUTING
H. Use Split-key Encryption Technologies
Small and large Businesses are realizing the benefits that
You should use split-key encryption technologies [18] to
come with cloud computing technology [24]. The scalability
ensure that only you control your sensitive data and also your
which allows you to easily shrink your operation, agility that
cloud provider shares responsibility for the infrastructure,
enables you to make quick changes, cost-effectiveness so can
therefore you are still responsible for your apps and data [42].
save you money, cloud seems such as a no-brainer [28],
At least not in a readable form you also Use a cloud
[56]. When increased cloud adoption rates come increased
encryption solution to show that your data never left home.
cloud computing security issues also. Here we discussed
about some solution of security issues in cloud computing: I. Access Control
A. Vulnerability shielding Access control [4], [47] is a key concern, and Cloud
requires also a user centric access control where user request
When water hole attacks occurs, then solution is
to any service provider is bundled with the user identity as
Vulnerability shielding [18] that update and patch all software
well as entitlement information. User identity [4] will have
regularly to limit possible access points. The water hole attack
identifiers which identity and define the user. This approach
contains 3-step process, first, the attacker does some
leaves the user with the ultimate control of their digital
reconnaissance and research on its target, in which they find
identities and implies that the system maintains a context of
trusted websites often visited by employees of the target
information for every user.
company. Then, attackers insert an exploit into the trusted
sites, and finally, when your employees visit the trusted site, J. Investigation Support
the exploit takes advantage of their system vulnerabilities. When use the facility of cloud, Audit tools also provided to
B. Find Right Cloud Provider the users to determine how their data is stored, protected,
used, as well as verify policy enforcement, and this audit tools
Second solution of security issues in cloud computing is
must be contractually committed along with the evidence
find right cloud provider (well established, experience,
[61].
standards and regulation), because different vendors have
different cloud data management [42]. K. ID Management and Authentications
C. Use the Cloud Wisely When access monitoring is to implement of Key
Management for both cloud service provider and client and
If a government entity wants access to sensitive data, at

5
An analysis of security and privacy issues, Challenges with possible solution in cloud computing

Key must be known for both entities as well as will be [14] Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy;
“Cloud Computing: Security Issues and Research Challenges”;
remotely monitored [4]. When clients access the cloud IRACST - International Journal of Computer Science and Information
computing services, it must be first authenticated, not only Technology & Security (IJCSITS); Vol. 1, No. 2, December 2011;
using username and password but a digital ID’s also [4]. ISSN: 2249-9555.
[15] J.SRINIVAS, K.VENKATA SUBBA REDDY, Dr.A.MOIZ QYSER,”
CLOUD COMPUTING BASICS”; International Journal of Advanced
Find solutions which require no hardware that is the best fit Research in Computer and Communication Engineering Vol. 1, Issue
for cloud environments. In short, a solution should give all the 5, July 2012; ISSN: 2278 – 1021.
benefits as well as up in minutes too, so, make sure you limit [16] Kangchan Lee, “Security Threats in Cloud Computing Environments”;
International Journal of Security and Its Applications Vol. 6, No. 4,
your vulnerabilities, do not let anyone have access to your October, 2012.
own encryption keys, comply with all required laws as well as [17] www.priv.gc.ca 02_05_d_51_cc_e.pdf
regulations, use encryption technology to make your life [18] http://www.cloudave.com/34670/top-cloud-computing-security-issue
s-solutions/
easier, and understand that you share responsibility for [19] http://cloudtweaks.com/2012/08/top-five-challenges-of-cloud-comput
liability. ing/
[20] http://www.networkworld.com/article/2189909/cloud-computing/the-
IX. CONCLUSION 7-most-common-challenges-to-cloud-computing.html
[21] https://www.ibm.com/developerworks/community/blogs/c2028fdc-41
Cloud computing contains a potential for cost savings to fe-4493-8257-33a59069fa04/entry/top_5_challenges_to_cloud_comp
the enterprises but enormous is security risk. We must be uting4?lang=en
[22] PROF: ASHA MATHEW, “SECURITY AND PRIVACY ISSUES OF
careful to understand the security risks and challenges posed CLOUD COMPUTING; SOLUTIONS AND SECURE
in utilizing cloud computing. This technology has also the FRAMEWORK”; ZENITH International Journal of Multidisciplinary
potential to become a frontrunner in promoting a secure, Research Vol.2 Issue 4, April 2012, ISSN 2231 5780.
[23] “Security and Privacy in Cloud Computing”; Ragib Hasan Johns
virtual as well as economically viable IT solution in the Hopkins Universityen.600.412 Spring 2010; 600.412.lecture01.pdf
future. In our future work, we will try to include improving the [24] Allan A. Friedman and Darrell M. West “Privacy and Security in Cloud
current cloud security model, developing of testing of data Computing”; 1026_cloud_computing_friedman_west.pdf
[25] “Security Issues in Cloud Computing”; Anya Kim; Naval Research
flow, investigating in cloud security management problem Lab,anya.kim@nrl.navy.mil;Anya-Kim-Bhargava-MCCWorkshop.pp
and security in cloud computing. t
[26] “Cloud Computing Security and Privacy Issues”; LSI SIN (10)02,
REFERENCES CEPIS; CEPIS_Cloud_Computing_Security_v17.11.pdf
[27] Cloud Computing: Outsourcing Computation without Outsourcing
[1] Kuyoro S. O., Ibikunle F. & Awodele O. “Cloud Computing Security Control; FUJITSU; cgjmmss.pdf
Issues and Challenges” International Journal of Computer Networks [28] “CLOUD COMPUTING TUTORIAL”; Simply Easy Learning by
(IJCN), Volume (3): Issue (5): 2011. tutorialspoint.com; cloud_computing_tutorial.pdf
[2] www.btpsonline.com/wysk.html “what you should know”. [29] Alexa Huth and James Cebula; “The Basics of Cloud Computing”;
[3] Ashalatha R “A SURVEY ON SECURITY AS A CHALLENGE IN US-CERT; CloudComputingHuthCebula.pdf
CLOUD COMPUTING”; International Journal of Advanced [30] Torry Harris; “CLOUD COMPUTING – An Overview”;
Technology & Engineering Research (IJATER), National Conference Cloud-Computing-Overview.pdf
on Emerging Trends in Technology (NCET-Tech); Volume 2, Issue 4, [31] Ilyas Iyoob, Emrah Zarifoglu, A. B. Dieker; “Cloud Computing
July 2012; ISSN No: 2250-3536. Operations Research”; cloudOR.pdf
[4] Young-Gi Min, Hyo-Jin Shin, Young-Hwan Bang “Cloud Computing [32] Issa M. Khalil, Abdallah Khreishah and Muhammad Azeem; “Cloud
Security Issues and Access Control Solutions”; Journal of Security Computing Security: A Survey”; Computers 2014, 3, 1-35; doi:
Engineering. 10.3390/computers3010001; ISSN 2073-431X;
[5] Research in Cloud Security and Privacy; Modified from Bharat www.mdpi.com/journal/computers
Bhargava, Anya Kim, YounSun Cho; 12-cloud-security.ppt [33] LOrd CrusAD3r;“Problems Faced by Cloud Computing”
[6] Hosam AlHakami, Hamza Aldabbas, and Tariq Alwada’n [34] essential characteristics of cloud computing.pdf
“COMPARISON BETWEEN CLOUD AND GRID COMPUTING: [35] “THE FUTURE OF CLOUD COMPUTING”; OPPORTUNITIES
REVIEW PAPER”; International Journal on Cloud Computing: FOR EUROPEAN CLOUD COMPUTING BEYOND 2010; Expert
Services and Architecture (IJCCSA), Vol.2, No.4, August 2012; DOI: Group Report, Public Version 1.0; Rapporteur for this Report: Lutz
10.5121/ijccsa.2012.2401. Schubert [USTUTT-HLRS], Editors: Keith Jeffery [ERCIM],
[7] Nelson Gonzalez, Charles Miers, Fernando Red´ıgolo, Marcos Burkhard Neidecker-Lutz [SAP Research]
Simpl´ıcio, Tereza Carvalho, Mats N¨aslund and Makan Pourzandi”; A [36] Christopher Olive, “Cloud Computing Characteristics Are Key”,
quantitative analysis of current security concerns and solutions for White Paper, www.gpworldwide.com
cloud computing”, Gonzalez et al. Journal of Cloud Computing: [37] Siani Pearson, “Privacy, Security and Trust in Cloud Computing”, HP
Advances, Systems and Applications 2012, 1:11; Laboratories, HPL-2012-80R1
http://www.journalofcloudcomputing.com/content/1/1/11. [38] Krešimir Popović, Željko Hocenski, “Cloud computing security issues
[8] Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and and challenges”, MIPRO 2010, May 24-28, 2010, Opatija, Croatia
Eduardo B Fernandez “An analysis of security issues for cloud [39] Vahid Ashktorab, Seyed Reza Taghizadeh, “Security Threats and
computing”; Hashizume et al. Journal of Internet Services and Countermeasures in Cloud Computing”, International Journal of
Applications 2013, 4:5; http://www.jisajournal.com/content/4/1/5. Application or Innovation in Engineering & Management (IJAIEM),
[9] Jaydip Sen; Innovation Labs, Tata Consultancy Services Ltd., Kolkata, Volume 1, Issue 2, October 2012, ISSN 2319 – 4847, www.ijaiem.org
INDIA “Security and Privacy Issues in Cloud Computing”. [40] Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull, “Security
[10] Han Qi, Abdullah Gani “Research on Mobile Cloud Computing: Issues with Possible Solutions in Cloud Computing-A Survey”,
Review, Trend and Perspectives”. International Journal of Advanced Research in Computer Engineering
[11] Rohit Bhadauria, Sugata Sanyal “Survey on Security Issues in Cloud & Technology (IJARCET), Volume 2, Issue 2, February 2013, ISSN:
Computing and Associated Mitigation Techniques”. 2278 – 1323
[12] Anthony Bisong and Syed (Shawon) M. Rahman “AN OVERVIEW [41] Mr. D. Kishore Kumar, Dr.G.Venkatewara Rao, Dr.G.Srinivasa Rao,
OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD “Cloud Computing: An Analysis of Its Challenges & Security Issues”,
COMPUTING”; International Journal of Network Security & Its International Journal of Computer Science and Network (IJCSN),
Applications (IJNSA), Vol.3, No.1, January 2011; DOI: Volume 1, Issue 5, October 2012 www.ijcsn.org ISSN 2277-5420
10.5121/ijnsa.2011.3103. [42] Pradeep Kumar Tiwari, Dr. Bharat Mishra, “Cloud Computing
[13] Ragib Hasan; Johns Hopkins Universityen.600.412 Spring 2010” Security Issues, Challenges and Solution”, International Journal of
Security and Privacyin Cloud Computing”.

6
National Conference on Computational and Mathematical Sciences (COMPUTATIA-IV) - 2014
Emerging Technology and Advanced Engineering Website: [69] http://sn.com.au/what-is-cloud-computing-its-advantages-disadvanta
www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 8, August 2012) ges/
[43] Awada Uchechukwu, keqiu Li, Yanming Shen, “Improving Cloud [70] http://www.techinmind.com/what-is-cloud-computing-what-are-its-ad
Computing Energy Efficiency”. vantages-and-disadvantages/
[44] Viswa prakash babu, Banda Sreenivas, Thota Praveen Kumar,
R.Jawahar Lal, “Cracking Bluetooth security” Int. Journal of Applied
Sciences and Engineering Research, Vol. 3, No. 2, 2014,
www.ijaser.com, ISSN 2277 – 8442
[45] Yaser Ghanam, Jennifer Ferreira, Frank Maurer, “Emerging Issues &
Challenges in Cloud Computing— A Hybrid Approach”, Journal of
Software Engineering and Applications, 2012, 5, 923-937,
http://dx.doi.org/10.4236/jsea.2012.531107 Published Online
November 2012 (http://www.SciRP.org/journal/jsea)
[46] Nir Kshetri, Associate Professor, The University of North
Carolina-Greensboro, USA “PRIVACY AND SECURITY ISSUES IN
CLOUD COMPUTING”, PTC’11 Proceedings
[47] Wayne Jansen, Timothy Grance, “Guidelines on Security and Privacy
in Public Cloud Computing”, Draft Special Publication 800-144,
Computer Security Division, Information Technology Laboratory,
National Institute of Standards and Technology, Gaithersburg, MD
20899-8930
[48] Mladen A. Vouk, “Cloud Computing – Issues, Research and
Implementations”, Journal of Computing and Information Technology
- CIT 16, 2008, 4, 235–246, doi:10.2498/cit.1001391
[49] Ms. Disha H. Parekh, Dr. R. Sridaran, “An Analysis of Security
Challenges in Cloud Computing”, (IJACSA) International Journal of
Advanced Computer Science and Applications, Vol. 4, No.1, 2013
[50] Nelson Gonzalez, Charles Miers, Fernando Redígolo, Tereza Carvalho,
Marcos Simplicio, Mats Näslund and Makan Pourzandi, “An
quantitative analysis of current security concerns and solutions for
cloud computing”
[51] “Cloud Computing RCIS tutorial”, Dan C. Marinescu , Computer
Science Division, EECS Department, UCF
[52] Gordon Haff, “INTRODUCTION TO CLOUD COMPUTING” White
Paper
[53] Ahmed Mohamed Gamaleldin,“An Introduction to Cloud Computing
Concepts” Practical Steps for Using Amazon EC2 IaaS Technology
[54] Dr. David Turahi, “Security and Privacy: Can we trust the cloud?”,
East African Information Conference 13-14thAugust, 2013, Kampala,
Uganda
[55] “Security in Cloud Computing”, Mrs P.R.Lakshmi Eswari e-Security
Team, C-DAC, Hyderabad
[56] Anitha Y, “Security Issues in Cloud Computing - A Review”,
International Journal of Thesis Projects and Dissertations (IJTPD),
Vol. 1, Issue 1, PP: (1-6), Month: October-December 2013, Research
Publish Journals
[57] Peter Mell, Timothy Grance, “The NIST Definition of Cloud
Computing”, Recommendations of the National Institute of Standards
and Technology, Special Publication 800-145
[58] “Privacy in Cloud Computing”, ITU-T Technology Watch Report
March 2012
[59] Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani
Thuraisingham, "Security Issues for Cloud Computing"
[60] Pankaj Arora, Rubal Chaudhry Wadhawan, Er. Satinder Pal Ahuja,
“Cloud Computing Security Issues in Infrastructure as a Service”,
International Journal of Advanced Research in Computer Science and
Software Engineering, Volume 2, Issue 1, January 2012 ISSN: 2277
128X
[61] Rajesh Piplode, Umesh Kumar Singh “An Overview and Study of
Security Issues & Challenges in Cloud Computing”, International
Journal of Advanced Research in Computer Science and Software
Engineering, Volume 2, Issue 9, September 2012 ISSN: 2277 128X
[62] Seyyed Mohsen Hashemi, Amid Khatibi Bardsiri, “Cloud Computing
Vs. Grid Computing”, ARPN Journal of Systems and Software, VOL.
2, NO.5, MAY 2012, ISSN 2222-9833
[63] Yanpei Chen, Vern Paxson, Randy H. Katz, “What’s New About
Cloud Computing Security?”,Electrical Engineering and Computer
Sciences University of California at Berkeley
[64] Robert Gellman, “Privacy in the Clouds: Risks to Privacy and
Confidentiality from Cloud Computing”, February 23, 2009
[65] http://mobiledevices.about.com/od/additionalresources/a/Cloud-Com
puting-Is-It-Really-All-That-Beneficial.htm
[66] http://www.expedient.com/products/cloud-computing/advantages.php
[67] http://www.cloudcomputinginsights.com/management/cloud-computi
ng-advantages-and-disadvantages/?mode=featured
[68] http://www.stratospherenetworks.com/advantages-and-disadvantages-
of-cloud.html

7
View publication stats

You might also like