International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Security Concerns at Various Levels of Cloud Computing Paradigm: A Review

Author NameAuthor Details

Aarti Singh, Manisha Malhotra

Aarti Singh[1]

Manisha Malhotra[2]

[1]Associate Professor, Maharishi Markandeshwar University, Mullana, India.

[2]Research Scholar, Maharishi Markandeshwar University, Mullana , India.

Abstract

Cloud computing has become a buzzword in IT industry these days and organization are getting attracted towards this magnet for expanding their infrastructure at cheaper rates. However, with all flexibility offered by cloud there are concerns about security, integrity and availability of precious information of cloud users. Conventional protection mechanisms need to be reconsidered for their effectiveness, since cloud service model is distinctly different from other internet based service models. Recently, much research efforts are being done in cloud security but still more efforts are desired. Since cloud security is a sensitive dimension affecting its wide commercial acceptance. This work explores various levels of security concerns in cloud environment and lists available mechanism for addressing them.

Index Terms

Cloud Computing

Security issues

Levels

Review

Reference

  1. 1.
    Singh, A., & Malhotra, M.,“Agent Based Framework for Scalability in Cloud Computing” In International Journal of Computer Science & Engineering Technology 3(4), 2012, pp 41-45.
  2. 2.
    Malhotra, M., Singh, A., & Juneja, D., “Security Issues in Cloud Computing: An Approach” In National Seminar "The Futuristic Approach to Ethical Hacking & Network Security, Feb, 2014, pp 1-5.
  3. 3.
    Mather, T., & Kumarswamy, “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliances" In 1st Edition 2009 of CSA Forum.
  4. 4.
    Atallah, M., Frikken, K., & Blanton, M. , “Dynamic and Efficient Key Management for Access Hierarchies” In Proceedings of ACM Conference Computer Communication Security, 2005, pp. 190–202.
  5. 5.
    Mladen, A., & Vouk. Cloud Computing – Issues, Research and Implementations. In Journal of Computing and Information Technology - CIT 16, pp 235–246.
  6. 6.
    Jungwoo, R., Syed, R., William, A., & John, K., “Cloud Security Auditing: Challenges and Emerging Approaches”. Published in IEEE Security and Privacy, 2013, pp 1-13.
  7. 7.
    Arfeen, M. A., Pawlikowski, K. & Willing, A, “A Framework for Resource Allocation Strategies in Cloud Computing Environment”. Published in Proceedings of 35th IEEE Conference on Computer Software and Application, 2011, pp. 261-266.
  8. 8.
    Safiriyu, E., Olatunde, A., Ayodeji, O,Adeniran, O., Clement, O., & Lawrence, K. “A User Identity Management Protocol for Cloud Computing Paradigm” In nternational Journal Communications, Network and System Sciences, 4(1), 2011, pp 152- 163.
  9. 9.
    Zhen, C., Wenyu, D., Hang, Li., Peng, Z., Xinming, C., & Junwei, C., “Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing”. Tsinghua Science and Technology,19(1),February 2014, pp82-94.
  10. 10.
    Philipp, H., Rolf, W., Joachim, S., & Thomas, B., “Virtual Fort Knox: Federative, Secure and Cloud Based Platform for Manufacturing” In Proceedings of 46th Conference on Manufacturing System, indexed in Science Direct, 2013, pp 527-532.
  11. 11.
    Roland, S., Matthias, S., Christian, S., Simon, M., & Bernd, F., “Increasing Virtual Machine Security in Cloud Environments” In Journal of Cloud Computing, 1(12), 2012, pp 1-12.
  12. 12.
    Pointcheval, D., & Stern, J., “Security Proofs for Signature Schemes” In Proceedings of Eurocrypt, volume 1070 of LNCS. Springer-Verlag, 1996, pp 387–398.
  13. 13.
    Qian, W., Cong, W., Kui, R., Wenjing, L., & Jin, L. “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing” In IEEE Transactions on Parallel and Distributed Systems, 22(5), 2011, pp 847-859.
  14. 14.
    Funmilade, F.,, Rami, B., & Georgios, T ,“A Dynamic Data Driven Simulation Approach for Preventing Service Level Agreement Violations in Cloud Federation”. In Proceedings of International Conference on Computational Science, Procedia of Computer Science 2012, pp 1167-1176.
  15. 15.
    CSA Security Guidance for Critical Areas of Focus in Cloud computing 2009, Cloud Security Alliance, Published on Forum of CSA. 5
  16. 16.
    Yuefa, D., Bo, W., Yaqiang, G., Quan, Z., & Chaojing, T., “Data Security Model for Cloud Computing” In Journal of International Security and Applications, 2009, pp 141-144.
  17. 17.
    Huiqi, X., Shumin, G., & Keke, C.,“Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation” In IEEE Transactions on Knowledge and Data Engineering, 26(2), 2014, pp 322-335.
  18. 18.
    Hossein, R., Elankovan, S., Zulkarnain, M., A., & Abdullah, M., Z., “Encryption as a Service as a Solution for Cryptography in Cloud” In Proceedings of 4th International Conference on Electrical Engineering and Informatics, indexed in Science Direct, 2013, pp 1202-1210.
  19. 19.
    Xu. X., Bessis, N., Cao, J., “An Autonomic Agent Trust Model for IoT System” In Proceedings of 4th International Conference on Emerging Ubiquitous System,2013, pp 107-113.
  20. 20.
    Wang, B., Li, B., & Li, H., “Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud”. In IEEE Transaction, 2013, pp 1-14.
  21. 21.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., & Konwinski, A. “A View of Cloud Computing”. In ACM Communication, 53(4), 2010, pp. 50–58.
  22. 22.
    Bellare, M., Garay, J., & Rabin, T., “Fast Batch Verification for Modular Exponentiation and Digital Signatures”. In Proceedings of Eurocrypt volume 1403 of LNCS. Springer-Verlag, 1998, pp. 236–250.
  23. 23.
    Ferrara, A. L., Greeny, M., Hohenberger, S., & Pedersen, M. “Practical Short Signature Batch Verification” In Proceedings of CT-RSA, volume 5473 of LNCS. Springer- Verlag, 2009, pp. 309–324.
  24. 24.
    Goyal, O., Pandey, A., Sahai, & B. Waters , “Attribute-Based Encryption for Fine- Grained Access Control of Encrypted Data” In Proceedings of ACM Conference Computer Communication Security, 2006, pp. 89–98.
  25. 25.
    Malhotra, M., & Malhotra, R., “Cloud Adaptive Resource Allocation Mechanism for Efficient Parallel Processing”. Published in IGI Global, International Journal of Cloud Applications and Computing, 4(4), 2014, pp 1-6.
  26. 26.
    Messmer, & Ellen,“Cloud Security Alliance Formed to Promote Best Practices” Computerworld, Published on Forum 2009 of CSA.
  27. 27.
    Sapuntzakis, C., Brumley, D., Chandra, R., Zeldovich, N., Chow, J., Lam, M., & Rosenblum, M., "Virtual Appliances for Deploying and Maintaining Software” In Proceedings of the 17th USENIX Conference on System Administration. USENIX Association, Berkeley, 2008, pp 181–194.
  28. 28.
    Singh, A., & Malhotra, M.m, “Analysis for Exploring Scope of Mobile Agents in Cloud Computing” In International Journal of Advancements in Technology, 3(3), 2012 pp 172- 183.
  29. 29.
    Xiaonian W., Runlian Z., Bing, Z &Shengyuan, Z., “A Trust Evaluation Model for Cloud Computing” In Elsevier Proceedings of Information Technology and Quantitative Management, 2013, pp 1170-1177.
  30. 30.
    Yang, H., & Tate, M., “Where are we at with Cloud Computing?: A Descriptive Literarure Review” In Proceedings of 20th Australasian Conference on Information Systems, 2009, pp 807-819.
  31. 31.
    Zhang, Q., & Cheng, L., “Cloud computing: State-of-the-art and Research Challenges”. Journal of Internet Serv Appl, 2010, pp 7–18 DOI 10.1007/s13174-010-0007-6.
  32. 32.
    Zhou, L., Varadharajan, V., & Hitchens, M., “Enforcing Role-Based Access Control for Secure Data Storage in the Cloud” In Journal of Computing 54(13), 2011, pp. 1675–1687.
  33. 33.
    Zhu, Y., Hu, H., Ahn, G., Wang, H., & Wang, S., “Provably Secure Role-Based Encryption with Revocation Mechanism”. In Journal of Computer Science and Technology, 26(4), 2011 pp. 697–710.
  34. 34.
    Zhu, Y., Ma, D., Hu, C., & Huang, D., “How to Use Attribute-Based Encryption to Implement Role-Based Access Control in the Cloud”. In Proceedings of International Workshop Security Cloud Computing, 2013 pp. 33– 40.
IJCNA NPC