Abstract
Since inception, the IT industry experienced a variety of natural evolution points, most marked with rapid change followed by years of internalization and consumption. According to most observers, the industry is rapidly evolving toward services as a core component of how consumers and business users interact with both software and one another The hype is deafening in places, and the key to success is recognizing that “cloud” adoption does not represent an all-or-nothing proposition. Organizations use cloud computing as a service infrastructure, critically like to examine the security and confidentiality issues for their business critical insensitive applications. Yet, guaranteeing the security of corporate data in the cloud is difficult, if not impossible, as they provide different services like SaaS, PaaS and IaaS. Each service has its own service issues. This paper discusses the security issues, requirements and challenges that cloud service providers face during the cloud engineering and the various deployment models for eliminating the security concerns.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cloud Computing, Wikipedia, http://en.wikipedia.org/wiki/CloudComputing
Lenk, A., Klems, M., Nimis, J., Tai, S., Snadholm, T.: What’s Inside the Cloud? An Architectural Map of the Cloud Landscape. In: IEEE Proceedings, ICSE 2009, May 23, pp. 23–31 (2009)
Harris, T.: Cloud Computing- An Overview., Whitepaper, Torry Harris Bussiness Solutins (January 2010)
Buyya, R., Pandey, S., Vecchiola, C.: Cloudbus Toolkit for Market-Oriented Cloud Computing. CloudCom, pp. 22-44 (2009)
Popovic, K., Hocenki, Z.: Cloud Computing security issues and challenges. In: MIPRO 2010, opatija, Croatia, May 24-28, pp. 344–349 (2010)
Jing, X., Zhang, J.-j.: A brief survey on the Security Model of Cloud Computing. In: Ninth International symposium on Distributed computing and Applications to Business, Engineering and Sciences, pp. 475–478. IEEE, Los Alamitos (2010)
Mukherjee, K., Sahoo, G.: A secure Cloud Computing. In: IEEE Proceedings of International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 369–371 (2010)
Zhao, G., Rong, C.: Deployment models- towards eliminating Security Concerne from Cloud Computing. In: IEEE Proceedings of International Conference on High Performance Computing and Simulation (HPCS), pp. 189–195 (2010)
Jing, Y., Zhang, J.-j.: A brief survey on the Security model of Cloud Computing. In: Ninth International Symposium on Distributed Computing and Applications to Bussiness, IEEE Proceedings Engineering and Science, pp. 475–478 (2010)
Brodkan, J.: Gartner: Seven Cloud Computing Security Risks, www.infoworld.com/.../security.../gartner-seven-cloud-computing-security-risks
Almulla, S.A., Yeun, C.Y.: Cloud Computing Security Management. In: IEEE Proceedings of Second International Conference on Engineering Systems management and its Applications (ICESMA), pp. 1–7 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kaur, P.J., Kaushal, S. (2011). Security Concerns in Cloud Computing. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds) High Performance Architecture and Grid Computing. HPAGC 2011. Communications in Computer and Information Science, vol 169. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22577-2_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-22577-2_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22576-5
Online ISBN: 978-3-642-22577-2
eBook Packages: Computer ScienceComputer Science (R0)