Skip to main content

2018 | OriginalPaper | Buchkapitel

31. Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts

verfasst von : Polyxeni Spanaki, Nicolas Sklavos

Erschienen in: Computer and Network Security Essentials

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Evolution in Information Technology has introduced Cloud Computing as a new technology that refers to resource virtualization. Cloud Computing involves storing and accessing data and developing and managing applications over the Internet. Despite the many advantages of the specific technology, such as the availability of stored data, cost and time saving and scalability, security and privacy are considered critical factors in Cloud Computing. This chapter’s main target is to present and discuss privacy and confidentiality issues in Cloud Computing. Some of the many challenges faced are security threats regarding managing sensitive data and vulnerabilities in the virtualized environment and network security. The methodology used, in order to demonstrate these issues, is by using a virtualized environment and software automation tools. The remote hosts are configured within the cloud in order to be secured.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mell, P., & Grance, T. (2011). The NIST definition of cloud computing, recommendations of the National Institute of Standards and Technology (NIST Special Publication 800-145. P 2,3). Mell, P., & Grance, T. (2011). The NIST definition of cloud computing, recommendations of the National Institute of Standards and Technology (NIST Special Publication 800-145. P 2,3).
2.
Zurück zum Zitat Chauhan, M. A., Babar, M. A., & Benetallah, B. (2016). Architecting cloud-enabled systems: A systematic survey of challenges and solutions. p. 1. doi: 10.1002/spe.2409 Chauhan, M. A., Babar, M. A., & Benetallah, B. (2016). Architecting cloud-enabled systems: A systematic survey of challenges and solutions. p. 1. doi: 10.​1002/​spe.​2409
3.
Zurück zum Zitat Bulusu, S., & Sudia, K. (2012. A study on cloud computing security challenges (pp. 7–9). Dissertation, School of Computing Blekinge Institute of Technology, Sweden. Bulusu, S., & Sudia, K. (2012. A study on cloud computing security challenges (pp. 7–9). Dissertation, School of Computing Blekinge Institute of Technology, Sweden.
4.
Zurück zum Zitat Popovic, K., & Hocenski, Z. (2010). Cloud computing security issues and challenges. In MIPRO, 2010 Proceedings of the 33rd International Convention. Popovic, K., & Hocenski, Z. (2010). Cloud computing security issues and challenges. In MIPRO, 2010 Proceedings of the 33rd International Convention.
5.
Zurück zum Zitat Rastogi, N., Gloria, M. J. K., & Hendler, J. (2015). Security and privacy of performing data analytics in the cloud: A three-way handshake of technology, policy, and management. Journal of Information Policy, 5, 133–142.CrossRef Rastogi, N., Gloria, M. J. K., & Hendler, J. (2015). Security and privacy of performing data analytics in the cloud: A three-way handshake of technology, policy, and management. Journal of Information Policy, 5, 133–142.CrossRef
6.
Zurück zum Zitat Shrivastava, N., & Yadav, R. (2013). A review of cloud computing security issues. International Journal of Engineering and Innovative Technology, 3(1), 551. Shrivastava, N., & Yadav, R. (2013). A review of cloud computing security issues. International Journal of Engineering and Innovative Technology, 3(1), 551.
7.
Zurück zum Zitat Albeshri, A., Ahmad, A., & Caelli, W. (2010, September, 1–3). Mutual protection in a cloud computing environment. In IEEE 12th international conference on high performance computing and communications (HPCC 2010) (p. 641), Melbourne. Albeshri, A., Ahmad, A., & Caelli, W. (2010, September, 1–3). Mutual protection in a cloud computing environment. In IEEE 12th international conference on high performance computing and communications (HPCC 2010) (p. 641), Melbourne.
8.
Zurück zum Zitat Swanson, M., & Guttman, B. (1996). Computer security. generally accepted principles and practices for securing information technology systems (NIST Special Publication 800-14). p. 3. Swanson, M., & Guttman, B. (1996). Computer security. generally accepted principles and practices for securing information technology systems (NIST Special Publication 800-14). p. 3.
9.
10.
Zurück zum Zitat Mahmood, Z. (Ed.). (2014). Cloud computing challenges, limitations and R&D solutions (p. 5, 8–18). Heidelberg: Springer. Mahmood, Z. (Ed.). (2014). Cloud computing challenges, limitations and R&D solutions (p. 5, 8–18). Heidelberg: Springer.
11.
Zurück zum Zitat Antonopoulos, N., & Gillam, L. (Eds.). (2010). Cloud computing principles, systems and applications (p. 31). Heidelberg: Springer.MATH Antonopoulos, N., & Gillam, L. (Eds.). (2010). Cloud computing principles, systems and applications (p. 31). Heidelberg: Springer.MATH
12.
Zurück zum Zitat Song, D. X., Wanger, D., & Tian, X. (2001, August 13–17). Timing analysis of keystrokes and timing attacks on SSH. In Proceedings of the10th USENIX security symposium (p. 5). Washington, DC. Song, D. X., Wanger, D., & Tian, X. (2001, August 13–17). Timing analysis of keystrokes and timing attacks on SSH. In Proceedings of the10th USENIX security symposium (p. 5). Washington, DC.
13.
Zurück zum Zitat Sklavos, N. (2011, April 6–8). Cryptographic algorithms on a chip: Architectures, designs and implementation platforms. In Proceedings of the 6th Design and Technology of Integrated Systems in Nano Era (DTIS’11), Greece. Sklavos, N. (2011, April 6–8). Cryptographic algorithms on a chip: Architectures, designs and implementation platforms. In Proceedings of the 6th Design and Technology of Integrated Systems in Nano Era (DTIS’11), Greece.
14.
Zurück zum Zitat Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009, September 21–25). On technical security issues in cloud computing. In Proceedings of the 2009 IEEE international conference on cloud computing(CLOUD ’09) (pp. 109–116), Bangalore. Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009, September 21–25). On technical security issues in cloud computing. In Proceedings of the 2009 IEEE international conference on cloud computing(CLOUD ’09) (pp. 109–116), Bangalore.
15.
Zurück zum Zitat Gohel, H. (2015). Design and development of combined algorithm computing technique to enhance web security. International Journal of innovative and Emerging Research in Engineering, 2(1), 77. Gohel, H. (2015). Design and development of combined algorithm computing technique to enhance web security. International Journal of innovative and Emerging Research in Engineering, 2(1), 77.
16.
Zurück zum Zitat Selvi, V., Sankar, R., & Umarani, R. (2014). The design and implementation of on-line examination using firewall security. IOSR Journal of Computer Engineering, 16(6), 21.CrossRef Selvi, V., Sankar, R., & Umarani, R. (2014). The design and implementation of on-line examination using firewall security. IOSR Journal of Computer Engineering, 16(6), 21.CrossRef
17.
Zurück zum Zitat Sklavos, N., & Souras, P. (2006). Economic models and approaches in information security for computer networks. International Journal of Network Security, 2(1), 14–20. Sklavos, N., & Souras, P. (2006). Economic models and approaches in information security for computer networks. International Journal of Network Security, 2(1), 14–20.
Metadaten
Titel
Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts
verfasst von
Polyxeni Spanaki
Nicolas Sklavos
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-58424-9_31

Neuer Inhalt