ABSTRACT
Cloud computing has taken center stage in the present business scenario due to its pay-as-you-use nature, where users need not bother about buying resources like hardware, software, infrastructure, etc. permanently. As much as the technological benefits, cloud computing also has risks involved. By looking at its financial benefits, customers who cannot afford initial investments, choose cloud by compromising on the security concerns. At the same time due to its risks, customers -- relatively majority in number, avoid migration towards cloud. This paper analyzes the current security challenges in cloud computing environment based on state-of-the-art cloud computing security taxonomies under technological and process-related aspects.
- Michael Gregg. 2010. 10 Security Concerns for Cloud Computing. Technical Report. Global Knowledge.Google Scholar
- Peter Mell, Timothy Grance. September 2011. The NIST Definition of Cloud Computing. NIST Special Publication 800--145. National Institute of Science and Technology.Google Scholar
- Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. December 2009. Cloud Security Alliance.Google Scholar
- Hong Li, Jeff Sedayao, Jay Hahn-Steichen, Ed Jimison, Catherine Spence, and Sudip Chahal. January 2009. Developing an Enterprise Cloud Computing Strategy. Technical Report. Intel Corporation.Google Scholar
- Anu Gopalakrishnan. 2009. Cloud Computing Identity Management. SETLabs Briefings. Vol. 7, No. 7. Page no. 45--55.Google Scholar
- Madhan Kumar Srinivasan, Paul Rodrigues. 2010. A roadmap for the comparison of identity management solutions based on state-of-the-art IdM taxonomies. Springer Communications in Computer and Information Science. Page no. 349--358. Springer-Verlag Berlin Heidelberg, New York, USA.Google Scholar
- Madhan Kumar Srinivasan, Paul Rodrigues. 2010. Analysis on identity management systems with extended state-of-the-art IdM taxonomy factors, International Journal of Ad hoc, Sensor & Ubiquitous Computing. (December 2010), Vol.1, No.4. Page no. 62--70. DOI=10.5121/ijasuc.2010.1406.Google Scholar
- Top Threats to Cloud Computing V1.0. March 2010. Cloud Security Alliance.Google Scholar
- Maggie Shiels 2009. Malicious insider attacks to rise. Technical Report. BBC News, Silicon Valley.Google Scholar
- Wade Baker, Alexander Hutton. 2010. 2010 Data Breach Investigations Report, A study conducted by the Verizon RISK Team with cooperation from the U. S. Secret Service and the Dutch High Tech Crime Unit. Technical Report. Verizon, New Jersey.Google Scholar
- Bill Sunderland, Ajay Chandramouly. November 2011. Overcoming Security Challenges to Virtualize Internet-facing Applications. Technical Report. Intel Corporation.Google Scholar
- Sabahi, F. 2011. Virtualization-level security in cloud computing. Proceedings of IEEE International Conference on Communication Software and Networks. Page no. 250--254. DOI: 10.1109/ICCSN.2011.6014716.Google ScholarCross Ref
- Vaquero, L. M., Rodero-Merino, L., Caceres, J., Lindner, M. 2009. A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review. 39(1). Google ScholarDigital Library
- Jansen, W. A. 2011. Cloud Hooks: Security and Privacy Issues in Cloud Computing. Proceedings of 44th Hawaii International Conference on System Sciences. Page No. 1--10.DOI: 10.1109/HICSS.2011.103 Google ScholarDigital Library
- Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Atanu Rakshit. 2009. Cloud Security Issues. IEEE Computer Society. Page no. 517--520. DOI 10.1109/SCC.2009.84. Google ScholarDigital Library
- Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy. March 2012. SLAs in Cloud Systems: The Business Perspective. International Journal of Computer Science and Technology. Vol. 3, Issue 1. Page no. 481--488.Google Scholar
Index Terms
- State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment
Recommendations
Pragmatic assessment of research intensive areas in cloud: a systematic review
Cloud computing is a name given to a set of systems for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly ...
Cloud Multi-Tenancy: Issues and Developments
UCC '17 Companion: Companion Proceedings of the10th International Conference on Utility and Cloud ComputingCloud Computing (CC) is a computational paradigm that provides pay-per use services to customers from a pool of networked computing resources that are provided on demand. Customers therefore does not need to worry about infrastructure or storage. Cloud ...
State-of-the-art research study for green cloud computing
Although cloud computing has rapidly emerged as a widely accepted computing paradigm, the research on cloud computing is still at an early stage. Cloud computing suffers from different challenging issues related to security, software frameworks, quality ...
Comments