Abstract
In the era of mobile computing, the number of mobile users has increased day by day. The computing capability, storage capability, processing speed of mobile, etc., required by a mobile user is higher, which may not be affordable by a mobile device. The advanced customers of e-Science require high performance, flexibility, and scalability (according to their demand, they can increase and decrease their use of resources), reduced cost, mobility, easy upgrades, etc. The cloud computing paradigm can fulfill the requirements of customers. The cloud computing is becoming the most profitable technology for service industries and can provide a new paradigm for business computation. Cloud provides the paradigm by which the users can access the resources from any geographical location at any time like using Google Doc, Microsoft SharePoint, GoGrid, etc. The different geographical locations and large number of users lead to different security issues for cloud. The main focus of this paper is to pinpoint the security threads for cloud computing. In this paper, we discuss design objectives, different models, challenges, and security of cloud with intrusion detection techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Juniper Research. Mobile Cloud: Smart Device Strategies for Enterprise & Consumer Markets 2011–2016 (2011). http://juniperresearch.com/
Hariprasath, L., et al.: The content distribution strategy enhancing cloud into mobile cloud. Int. J. Res. Eng. Adv. Technol. (2013)
Amazon Elastic Computing Cloud: www.aws.amazon.com/ec2
Oracle Cloud: www.cloud.oracle.com. Access Nov 2014
Google Cloud: www.googlecloud.com. Access Nov 2014
Nimbus: www.workspace.globus.org. Access Nov 2014
OpenNebula Project: http://www.opennebula.org. Access Nov 2014
Kangasharju, J., Ott, J., Karkulahti, O.: Floating content: information availability in urban environments. In: Proceedings of the 8th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom) (WiP), Mannheim, Germany (2010)
Huerta-Canepa, G., Lee, D.: A virtual cloud computing provider for mobile devices. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond. ACM (2010)
Hwang, K., et al.: Cloud platform architecture over virtualized data centers. In: Distributed and Cloud Computing: From Parallel Processing to the Internet of Things, 225 Wyman Street, Waltham, MA 02451, USA: Elsevier Inc., Chap. 4, pp. 193–205 (2012)
Dillon, T., Wu, C., Chang, E.: Cloud computing: issues and challenges. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA). IEEE (2010)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)
Durkee, D.: Why cloud computing will never be free. Queue 8(4), 20 (2010)
Kumar, K., Lu, Y.-H.: Cloud computing for mobile users: can offloading computation save energy? Computer 43(4), 51–56 (2010)
Dinh, H.T., et al.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2011)
Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Marinelli, E.E.: Hyrax: cloud computing on mobile devices using MapReduce (No. CMU-CS-09-164). Carnegie-Mellon Univ Pittsburgh Pa School of Computer Science
Satyanarayanan, M.: Fundamental challenges in mobile computing. In: Proceedings of the fifteenth annual ACM symposium on Principles of Distributed Computing. ACM (1996)
Cuervo, E., et al. MAUI: making smartphones last longer with code offload. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services. ACM (2010)
Ma, X., et al. Energy optimizations for mobile terminals via computation offloading. In: 2012 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC). IEEE, New York (2012)
Varadharajan, V., Tupakula, U.: Counter acting security attacks in virtual machines in the cloud using property based attestation. J. Netw. Comput. Appl. 40, 31–45 (2014)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
Takabi, H., Joshi, J.B.D., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 6, 24–31 (2010)
Cloud Computing Security: http://en.wikipedia.org/wiki/Cloud_computing_security. Access Nov 2014
International Telecommunication Union: X-509 | ISO/IEC 9594-8, The directory: Public-key and attribute certificate frameworks, ITU, X-Series (2001)
Nagarajan, A., Varadharajan, V.: Dynamic trust enhanced security model for trusted platform based. Future Gener. Comput. Syst. (2010). doi:10.1016/j.future.2010.10.008
Chaurasia, R.: Security in cloud computing. Int. J. Sci. Res. Educ. 2(06), 896–902 (2014)
Top Threats to Cloud Computing Security: http://www.infoworld.com/article/2613560/cloud-security/9-top-threats-to-cloud-computing-security.html
Tianeld, H. Security issues in cloud computing. In: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE (2012)
Modi, C., et al.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl 36(1), 42–57 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Suryambika, Abhishek Bajpai, Shruti Singh (2016). A Survey on Security Analysis in Cloud Computing. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_29
Download citation
DOI: https://doi.org/10.1007/978-81-322-2638-3_29
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2636-9
Online ISBN: 978-81-322-2638-3
eBook Packages: EngineeringEngineering (R0)