skip to main content
10.1145/2345396.2345474acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacciciConference Proceedingsconference-collections
research-article

State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment

Published:03 August 2012Publication History

ABSTRACT

Cloud computing has taken center stage in the present business scenario due to its pay-as-you-use nature, where users need not bother about buying resources like hardware, software, infrastructure, etc. permanently. As much as the technological benefits, cloud computing also has risks involved. By looking at its financial benefits, customers who cannot afford initial investments, choose cloud by compromising on the security concerns. At the same time due to its risks, customers -- relatively majority in number, avoid migration towards cloud. This paper analyzes the current security challenges in cloud computing environment based on state-of-the-art cloud computing security taxonomies under technological and process-related aspects.

References

  1. Michael Gregg. 2010. 10 Security Concerns for Cloud Computing. Technical Report. Global Knowledge.Google ScholarGoogle Scholar
  2. Peter Mell, Timothy Grance. September 2011. The NIST Definition of Cloud Computing. NIST Special Publication 800--145. National Institute of Science and Technology.Google ScholarGoogle Scholar
  3. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. December 2009. Cloud Security Alliance.Google ScholarGoogle Scholar
  4. Hong Li, Jeff Sedayao, Jay Hahn-Steichen, Ed Jimison, Catherine Spence, and Sudip Chahal. January 2009. Developing an Enterprise Cloud Computing Strategy. Technical Report. Intel Corporation.Google ScholarGoogle Scholar
  5. Anu Gopalakrishnan. 2009. Cloud Computing Identity Management. SETLabs Briefings. Vol. 7, No. 7. Page no. 45--55.Google ScholarGoogle Scholar
  6. Madhan Kumar Srinivasan, Paul Rodrigues. 2010. A roadmap for the comparison of identity management solutions based on state-of-the-art IdM taxonomies. Springer Communications in Computer and Information Science. Page no. 349--358. Springer-Verlag Berlin Heidelberg, New York, USA.Google ScholarGoogle Scholar
  7. Madhan Kumar Srinivasan, Paul Rodrigues. 2010. Analysis on identity management systems with extended state-of-the-art IdM taxonomy factors, International Journal of Ad hoc, Sensor & Ubiquitous Computing. (December 2010), Vol.1, No.4. Page no. 62--70. DOI=10.5121/ijasuc.2010.1406.Google ScholarGoogle Scholar
  8. Top Threats to Cloud Computing V1.0. March 2010. Cloud Security Alliance.Google ScholarGoogle Scholar
  9. Maggie Shiels 2009. Malicious insider attacks to rise. Technical Report. BBC News, Silicon Valley.Google ScholarGoogle Scholar
  10. Wade Baker, Alexander Hutton. 2010. 2010 Data Breach Investigations Report, A study conducted by the Verizon RISK Team with cooperation from the U. S. Secret Service and the Dutch High Tech Crime Unit. Technical Report. Verizon, New Jersey.Google ScholarGoogle Scholar
  11. Bill Sunderland, Ajay Chandramouly. November 2011. Overcoming Security Challenges to Virtualize Internet-facing Applications. Technical Report. Intel Corporation.Google ScholarGoogle Scholar
  12. Sabahi, F. 2011. Virtualization-level security in cloud computing. Proceedings of IEEE International Conference on Communication Software and Networks. Page no. 250--254. DOI: 10.1109/ICCSN.2011.6014716.Google ScholarGoogle ScholarCross RefCross Ref
  13. Vaquero, L. M., Rodero-Merino, L., Caceres, J., Lindner, M. 2009. A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review. 39(1). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jansen, W. A. 2011. Cloud Hooks: Security and Privacy Issues in Cloud Computing. Proceedings of 44th Hawaii International Conference on System Sciences. Page No. 1--10.DOI: 10.1109/HICSS.2011.103 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Atanu Rakshit. 2009. Cloud Security Issues. IEEE Computer Society. Page no. 517--520. DOI 10.1109/SCC.2009.84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy. March 2012. SLAs in Cloud Systems: The Business Perspective. International Journal of Computer Science and Technology. Vol. 3, Issue 1. Page no. 481--488.Google ScholarGoogle Scholar

Index Terms

  1. State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader