Skip to main content

2016 | OriginalPaper | Buchkapitel

A Study on Security Issues in Cloud Computing

verfasst von : Kaaviyan Kanagasabapathi, S. Deepak, P. Prakash

Erschienen in: Proceedings of the International Conference on Soft Computing Systems

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing focuses on maximizing the effectiveness of shared resources. It is also cost-effective, flexible, quick data storage, and is one of the most successful services in the internet. Cloud services are often outsourced to a third party, increasing the security threats. They are also delivered through the traditional network protocols and so a threat to the protocols is a threat to the cloud as well. In this paper, the major security issues are analyzed and sufficient countermeasures are provided, in order to minimize the security threats concerning cloud computing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw CompuT Appl 34(1) Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw CompuT Appl 34(1)
2.
Zurück zum Zitat Mell P, Grance T (2011) The NIST definition of cloud computing. NIST Special Publication 800–145, GaithersburgCrossRef Mell P, Grance T (2011) The NIST definition of cloud computing. NIST Special Publication 800–145, GaithersburgCrossRef
3.
Zurück zum Zitat Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18CrossRef Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18CrossRef
4.
Zurück zum Zitat Mather T, Kumaraswamy S, Latif S (2009) Cloud security and privacy. O’Reilly Media Inc, Sebastopol Mather T, Kumaraswamy S, Latif S (2009) Cloud security and privacy. O’Reilly Media Inc, Sebastopol
6.
Zurück zum Zitat Ju J, Wang Y, Fu J, Wu J, Lin Z (2010) Research on key technology in SaaS. In: International conference on intelligent computing and cognitive informatics (ICICCI), Hangzhou, China. IEEE Comput Soc USA, pp 384–387 Ju J, Wang Y, Fu J, Wu J, Lin Z (2010) Research on key technology in SaaS. In: International conference on intelligent computing and cognitive informatics (ICICCI), Hangzhou, China. IEEE Comput Soc USA, pp 384–387
7.
Zurück zum Zitat Zhang Y, Liu S, Meng X (2009) Towards high level SaaS maturity model: methods and case study. Services computing conference, APSCC, IEEE Asia-Pacific, pp 273–278, Dec 2009 Zhang Y, Liu S, Meng X (2009) Towards high level SaaS maturity model: methods and case study. Services computing conference, APSCC, IEEE Asia-Pacific, pp 273–278, Dec 2009
9.
Zurück zum Zitat Rittinghouse JW, Ransome JF (2009) Security in the cloud. In: cloud computing: implementation, management, and security. CRC Press, USA, Aug 2009 Rittinghouse JW, Ransome JF (2009) Security in the cloud. In: cloud computing: implementation, management, and security. CRC Press, USA, Aug 2009
10.
Zurück zum Zitat Viega J (2009) Cloud computing and the common man. Computer 42(8):106–108CrossRef Viega J (2009) Cloud computing and the common man. Computer 42(8):106–108CrossRef
11.
Zurück zum Zitat Xu K, Zhang X, Song M, Song J (2009) Mobile mashup, architecture, challenges and suggestions, International Conference on Management and Service Science, MASS, IEEE Computer Society, Washington, DC, USA, pp 1–4, Sept 2009 Xu K, Zhang X, Song M, Song J (2009) Mobile mashup, architecture, challenges and suggestions, International Conference on Management and Service Science, MASS, IEEE Computer Society, Washington, DC, USA, pp 1–4, Sept 2009
12.
Zurück zum Zitat Chandramouli R, Mell P (2010) State of security readiness, Crossroads—Plugging into the Cloud, vol 16(3), Mar 2010 Chandramouli R, Mell P (2010) State of security readiness, Crossroads—Plugging into the Cloud, vol 16(3), Mar 2010
14.
Zurück zum Zitat Amies A, Sluiman H, Tong QC, Liu GN (2012) Infrastructure as a service cloud concepts. In: Developing and Hosting Applications on the Cloud, IBM Press, Indianapolis, Jun 2012 Amies A, Sluiman H, Tong QC, Liu GN (2012) Infrastructure as a service cloud concepts. In: Developing and Hosting Applications on the Cloud, IBM Press, Indianapolis, Jun 2012
15.
Zurück zum Zitat Dahbur K, Mohammad B, Tarakji AB (2011) A survey of risks, threats and vulnerabilities in cloud computing. In: Proceedings of the 2011 international conference on intelligent semantic web-services and applications Dahbur K, Mohammad B, Tarakji AB (2011) A survey of risks, threats and vulnerabilities in cloud computing. In: Proceedings of the 2011 international conference on intelligent semantic web-services and applications
16.
Zurück zum Zitat Hashizume K, Yoshioka N, Fernandez EB (2013) Three misuse patterns for cloud computing. In: Rosado DG, Mellado D, Fernandez-Medina E, Piattini M (eds) Security engineering for cloud computing: approaches and tools, IGI Global, Pennsylvania, pp 36–53 Hashizume K, Yoshioka N, Fernandez EB (2013) Three misuse patterns for cloud computing. In: Rosado DG, Mellado D, Fernandez-Medina E, Piattini M (eds) Security engineering for cloud computing: approaches and tools, IGI Global, Pennsylvania, pp 36–53
17.
Zurück zum Zitat Ranjith P, Chandran P, Kaleeswaran S (2012) On covert channels between virtual machines. J Comput Virol Springer 8(3):85–97CrossRef Ranjith P, Chandran P, Kaleeswaran S (2012) On covert channels between virtual machines. J Comput Virol Springer 8(3):85–97CrossRef
18.
Zurück zum Zitat Carlin S, Curran K (2011) Cloud computing security. Int J Ambient Comput Intell 3(1):38–46CrossRef Carlin S, Curran K (2011) Cloud computing security. Int J Ambient Comput Intell 3(1):38–46CrossRef
19.
Zurück zum Zitat Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomputing 63(2):561–592CrossRef Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomputing 63(2):561–592CrossRef
20.
Zurück zum Zitat Garfinkel T, Rosenblum M (2005) When virtual is harder than real: Security challenges in virtual machine based computing environments. In: Proceedings of the 10th conference on hot topics in operating systems, pp 227–229 Garfinkel T, Rosenblum M (2005) When virtual is harder than real: Security challenges in virtual machine based computing environments. In: Proceedings of the 10th conference on hot topics in operating systems, pp 227–229
22.
Zurück zum Zitat Dawoud W, Takouna I, Meinel C (2010) Infrastructure as a service security: challenges and solutions. The 7th International Conference on Informatics and Systems (INFOS), pp 1–8, Mar 2010 Dawoud W, Takouna I, Meinel C (2010) Infrastructure as a service security: challenges and solutions. The 7th International Conference on Informatics and Systems (INFOS), pp 1–8, Mar 2010
23.
Zurück zum Zitat Jasti A, Shah P, Nagaraj R, Pendse R (2010) Security in multi-tenancy cloud. IEEE International Carnahan Conference on Security Technology (ICCST), pp 35–41 Jasti A, Shah P, Nagaraj R, Pendse R (2010) Security in multi-tenancy cloud. IEEE International Carnahan Conference on Security Technology (ICCST), pp 35–41
25.
Zurück zum Zitat Popovic K, Hocenski Z (2010) Cloud computing security issues and challenges. In: Proceedings of the 33rd international convention MIPRO, pp 344–349, May 2010 Popovic K, Hocenski Z (2010) Cloud computing security issues and challenges. In: Proceedings of the 33rd international convention MIPRO, pp 344–349, May 2010
26.
Zurück zum Zitat Bhardwaj M, Singh GP (2011) Types of hacking attack and their counter measure. Int J Educ Plann Adm 1(1):43–53 Bhardwaj M, Singh GP (2011) Types of hacking attack and their counter measure. Int J Educ Plann Adm 1(1):43–53
Metadaten
Titel
A Study on Security Issues in Cloud Computing
verfasst von
Kaaviyan Kanagasabapathi
S. Deepak
P. Prakash
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2674-1_17