Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Opportunities and Challenges in Cloud Computing


Affiliations
1 Department of Computer Science, Rathinam College of Arts and Science, Coimbatore, India
     

   Subscribe/Renew Journal


Cloud computing is introducing many huge changes to people’s lifestyle and working pattern recently for its multitudinous benefits. However, the security of cloud computing is always the focus of numerous potential cloud customers, and a big barrier for its widespread applications. In this paper, to facilitate customers to understand the security status quo of cloud computing and contribute some efforts to improving the security level of cloud computing, we surveyed the existing popular security models of cloud computing, e.g. multiple-tenancy model, risk accumulation model, cube model of cloud computing, and summarized the main security risks of cloud computing deriving from different organizations. Finally, we gave some security strategies from the perspective of construction, operation and security incident response to relieve degree of scalability and flexibility combined with a minimum of administration. Common security issues of cloud computing.


User
Subscription Login to verify subscription
Notifications
Font Size

  • Al-Anzi, F. S., Salman, A. A., Jacob, N. K., & Soni, J. (2014). Towards robust, scalable and secure network storage in Cloud Computing. In 2014 Fourth International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP) (pp. 51–55). http://doi.org/10.1109/DICTAP.2014.6821656
  • Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg, “Side Channels in Cloud Services: Deduplication in Cloud Storage”, 540-7993/10, IEEE, 2010, pp: 40 – 47.
  • Identity in the Age of cloud computing: The Next-generation Internet's Impact on Business, Governance and Social Interaction, The Aspen Institute, 2009.
  • ISO/IEC. ISO/IEC TR 13335-1:2004 information technology security techniques management of information and communications technology security part 1: concepts and models for information and communications technology security management. ISO/IEC, JTC 1, SC27, WG 1 2004.
  • Nimsoft. (2009). Ensuring High Service Levels in Cloud Computing, Keys to Effective Service Management. Retrieved from
  • http://www.techrepublic.com/whitepapers/ensuring-high-service-levels-in-cloud-computing-keys-to-effective-service-management/1188477
  • Oberheide, E. Cooke, and F. Jahanian. CloudAV(2008): NVersion Antivirus in the Network Cloud. In the Proc. of the 17th USENIX Security Symposium,Managed Services: An Industry Built on Trust, IDC, 2008.
  • Rackspace. (2010). Architecting High Availability Linux Environments within the Rackspace Cloud, A detailed exploration into the technical requirements and business implications of Cloud High Availability, White Paper by The Rackspace Cloud Engineering Team. Retrieved from
  • http://c0179631.cdn.cloudfiles.rackspacecloud.com/High_Availibilty_Cloud_Feb_16.pdf
  • Rafael Moreno-Vozmediano, Rubén S. Montero, and Ignacio M. Llorente, “Key Challenges in Cloud Computing to Enable the Future Internet of Services”, IEEE, Digital Object Indentifier 10.1109/MIC.2012.69.
  • Security and privacy challenges in cloud computing Environments, 1540-7993/10 , NOVEMBER/DECEMBER 2010
  • Von Solms R. Information security management (3): the code of practice for information security management (BS 7799). Information Management & Computer Security 1998;6(5):224e5.
  • Whitman ME, Mattord HJ. Principles of information security. 3rd ed. Thompson Course Technology; 2009.
  • Xiao Z, Xiao Y (2013) security and Privacy in cloud computing. IEEE Commun Surv Tutor (2):843-859
  • Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592. http://doi.org/10.1016/j.future.2010.12.006

Abstract Views: 199

PDF Views: 4




  • Opportunities and Challenges in Cloud Computing

Abstract Views: 199  |  PDF Views: 4

Authors

R. K. Meenakshi
Department of Computer Science, Rathinam College of Arts and Science, Coimbatore, India

Abstract


Cloud computing is introducing many huge changes to people’s lifestyle and working pattern recently for its multitudinous benefits. However, the security of cloud computing is always the focus of numerous potential cloud customers, and a big barrier for its widespread applications. In this paper, to facilitate customers to understand the security status quo of cloud computing and contribute some efforts to improving the security level of cloud computing, we surveyed the existing popular security models of cloud computing, e.g. multiple-tenancy model, risk accumulation model, cube model of cloud computing, and summarized the main security risks of cloud computing deriving from different organizations. Finally, we gave some security strategies from the perspective of construction, operation and security incident response to relieve degree of scalability and flexibility combined with a minimum of administration. Common security issues of cloud computing.


References