Security Issues and Research Challenges in Cloud Computing
Cloud Computing is a type of internet based computing which provides services via the internet and accesses the resources within the user enterprise either in a private-own-cloud or on a third-party server On Demand. The model is characterized by three attributes: scalability, pay-per-use, self-services. Many industries such as banking, healthcare, Retail, Education, Manufacturing and business are adopting this cloud technique due to efficiency of services provided by pay-per-use pattern which helps in accessing the networks, storage, servers, services and applications, without physically acquiring them [3]. The circumscribed control over the data may cause various security issues in cloud computing like Data crash, Misuse and reprehensible use of cloud computing, Insecure API, Wicked Insiders, Shared technology issues/multi-tendency nature, Account services and Traffic Hijacking. There are many new technologies, improvements and research proceedings happening every day in order to develop the security and to provide assurance for users [2]. This research paper brings a framework on what cloud computing is, main security risks and issues that are currently present in the field of cloud computing, research challenges, importance in key industries and also the personal hypothesis on future advances in the field of cloud security.
G. O Rabi Prasad, Manas Ranjan, Suresh Chandras Cloud “Computing: security issues and Research Challenges” published in IRACST- International Journal of Computer Science and Information Technology and Security (IJCSITS), Vol. 1, No. 2, December 2011.
Armbrust M, Fox A, Griffith R, Joseph A D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I and Zaharia M, “A view of cloud computing, Communications” of the ACM Magazine , 2010, 53 50-58.
Ashraf I, “An over view of service model of cloud computing” published in Int. J. of Multidisciplinary and Current Research, vol.2, 2014, 779-783.
Bala Narayada Reddy G,” Cloud computing-types of cloud,” 2013, Retrieved from http://bigdatariding.blogspot.my/2013/10/cloud- computingtypes-of-cloud.html.
Christina A A, “Proactive measures on account hijacking in cloud computing network” published in Asian Journal of Computer Science and Technology, vol.4, 2015, 31-34.
Choubey R, Dubey R and Bhattacharjee J, “A survey on cloud computing security challenges and threats” published in International Journal on Computer Science and Engineering (IJCSE), vol.3, 2011, 1227-1231.
Leonard Kleinrock, “An internet vision: the invisible global infrastructure” published in Ad Hoc Networks, 11, 2003, 1(1):3.
Dinesha H A and Agrawal V K, “Multi-level authentication technique for accessing cloud services” published in International Journal on Cloud Computing: Services and Architecture (IJCCSA), vol.2, 2012, 31-39.
Doelitzscher F, Sulistio A, Reich C, Kuijs H and Wolf D, “Private cloud for collaboration and e-Learning services: from I-a-a-S to S-a-a-S” published in J. Computing-Cloud Computing, 2011, 91 23-42.
Hamlen K, Kantarcioglu M, Khan L and Thurai singham B, “Security issues for cloud computing Optimizing Information Security and Advancing Privacy Assurance: New Technologies” published in International Engineering Research and Innovation
Symposium (IRIS), IOP Publishing, IOP Conf. Series: Materials Science and Engineering ,160, 012106, vol.8, 2016, 150-162. doi:10.1088/1757- 899X/160/1/012106
Jain S, Kumar R, Kumawat S and Jangir S K, “An analysis of security and privacy issues, Challenges with possible solution in cloud computing”, Proc. of the National Conf. on Computational and Mathematical Sciences (COMPUTATIAIV), 2014, 1-7.
Kandias M, Virvilis N and Gritzalis D, “The insider threat in cloud computing” Proc. of 6th International Conf. on Critical Infrastructure Security, 2011, 95-106.
Khoshkholghi M A, Abdullah A, Latip R, Subramaniam S and Othman M, “Disaster Recovery in Cloud Computing: A Survey Computer and Information Science,” vol.7, 2014, 39-54.
Khurana Sand Verma A G, “Comparisons of cloud computing service model: S-a-a-S, P-a-a-S, I-a-a-S,” published in International Journal of Electronics and Communication Technology (IJECT), vol.4, 2013, 2932.
Kiblin T, “How to use cloud computing for disaster recovery,” 2011, Retrieved from http://www.crn.com/blogs-oped/channel- voices/230700011/how-to-use-cloud-computingfor-disaster- recovery.htm.
Navale, Mr Rajendra S., Mr Adilshah N. Jalgeri, and Mr Balkrushna B. Jagadale. "Survey on various substitution techniques for Cryptography." King N J and Raja V T, “Protecting the privacy and security of sensitive customer data in the cloud Computer law and Security Review,” vol.28, 2012, 308-319.
Kuyoro S O, Ibikunie Fand Awodele O, “Cloud computing security issues and challenges” published in International Journal of Computer Networks (IJCN), vol.3, 2011, 247-255.
LiA, Yang X, Kandula Sand Zhang M, “Cloud Cmp: Comparing public cloud providers” Proc. of the 10th ACM SIGCOMM Conf. on Internet measurements, 2010, 1-14.
Ramanathan S, Goel S and Alagumalai S, “Comparison of cloud database: Amazon’s Simple DB and Google’s Big table” published in International Journal of Computer Science, Issues 8, vol.2, 2011, 243- 246.
N. M. Sawant, V. V. Pottigar and N. S. Mane, "A survey on auditing techniques used for preserving privacy of data stored on cloud," 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, 2016, pp. 1320-1323, doi: 10.1109/ICEEOT.2016.7754897.
N. Sawant and D. Kulkarni, "Performance Evaluation of Feature Extraction Algorithm on GPGPU," 2011 International Conference on Communication Systems and Network Technologies, Katra, India, 2011, pp. 536-540, doi: 10.1109/CSNT.2011.114
Jagadale, B. B., R. S. Navale, and A. N. Jalgeri. "Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage."
Cyber Security: Threats, reports and challenges.
Copyright (c) 2024 International Journal of Engineering and Computer Science

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.