Skip to main content

Abstract

In the era of mobile computing, the number of mobile users has increased day by day. The computing capability, storage capability, processing speed of mobile, etc., required by a mobile user is higher, which may not be affordable by a mobile device. The advanced customers of e-Science require high performance, flexibility, and scalability (according to their demand, they can increase and decrease their use of resources), reduced cost, mobility, easy upgrades, etc. The cloud computing paradigm can fulfill the requirements of customers. The cloud computing is becoming the most profitable technology for service industries and can provide a new paradigm for business computation. Cloud provides the paradigm by which the users can access the resources from any geographical location at any time like using Google Doc, Microsoft SharePoint, GoGrid, etc. The different geographical locations and large number of users lead to different security issues for cloud. The main focus of this paper is to pinpoint the security threads for cloud computing. In this paper, we discuss design objectives, different models, challenges, and security of cloud with intrusion detection techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Juniper Research. Mobile Cloud: Smart Device Strategies for Enterprise & Consumer Markets 2011–2016 (2011). http://juniperresearch.com/

  2. Hariprasath, L., et al.: The content distribution strategy enhancing cloud into mobile cloud. Int. J. Res. Eng. Adv. Technol. (2013)

    Google Scholar 

  3. Amazon Elastic Computing Cloud: www.aws.amazon.com/ec2

  4. Oracle Cloud: www.cloud.oracle.com. Access Nov 2014

  5. Google Cloud: www.googlecloud.com. Access Nov 2014

  6. Nimbus: www.workspace.globus.org. Access Nov 2014

  7. OpenNebula Project: http://www.opennebula.org. Access Nov 2014

  8. Kangasharju, J., Ott, J., Karkulahti, O.: Floating content: information availability in urban environments. In: Proceedings of the 8th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom) (WiP), Mannheim, Germany (2010)

    Google Scholar 

  9. Huerta-Canepa, G., Lee, D.: A virtual cloud computing provider for mobile devices. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond. ACM (2010)

    Google Scholar 

  10. Hwang, K., et al.: Cloud platform architecture over virtualized data centers. In: Distributed and Cloud Computing: From Parallel Processing to the Internet of Things, 225 Wyman Street, Waltham, MA 02451, USA: Elsevier Inc., Chap. 4, pp. 193–205 (2012)

    Google Scholar 

  11. Dillon, T., Wu, C., Chang, E.: Cloud computing: issues and challenges. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA). IEEE (2010)

    Google Scholar 

  12. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

  13. Durkee, D.: Why cloud computing will never be free. Queue 8(4), 20 (2010)

    Google Scholar 

  14. Kumar, K., Lu, Y.-H.: Cloud computing for mobile users: can offloading computation save energy? Computer 43(4), 51–56 (2010)

    Article  Google Scholar 

  15. Dinh, H.T., et al.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2011)

    Article  Google Scholar 

  16. Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  17. Marinelli, E.E.: Hyrax: cloud computing on mobile devices using MapReduce (No. CMU-CS-09-164). Carnegie-Mellon Univ Pittsburgh Pa School of Computer Science

    Google Scholar 

  18. Satyanarayanan, M.: Fundamental challenges in mobile computing. In: Proceedings of the fifteenth annual ACM symposium on Principles of Distributed Computing. ACM (1996)

    Google Scholar 

  19. Cuervo, E., et al. MAUI: making smartphones last longer with code offload. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services. ACM (2010)

    Google Scholar 

  20. Ma, X., et al. Energy optimizations for mobile terminals via computation offloading. In: 2012 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC). IEEE, New York (2012)

    Google Scholar 

  21. Varadharajan, V., Tupakula, U.: Counter acting security attacks in virtual machines in the cloud using property based attestation. J. Netw. Comput. Appl. 40, 31–45 (2014)

    Article  Google Scholar 

  22. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  23. Takabi, H., Joshi, J.B.D., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 6, 24–31 (2010)

    Article  Google Scholar 

  24. Cloud Computing Security: http://en.wikipedia.org/wiki/Cloud_computing_security. Access Nov 2014

  25. International Telecommunication Union: X-509 | ISO/IEC 9594-8, The directory: Public-key and attribute certificate frameworks, ITU, X-Series (2001)

    Google Scholar 

  26. Nagarajan, A., Varadharajan, V.: Dynamic trust enhanced security model for trusted platform based. Future Gener. Comput. Syst. (2010). doi:10.1016/j.future.2010.10.008

    Google Scholar 

  27. Chaurasia, R.: Security in cloud computing. Int. J. Sci. Res. Educ. 2(06), 896–902 (2014)

    Google Scholar 

  28. Top Threats to Cloud Computing Security: http://www.infoworld.com/article/2613560/cloud-security/9-top-threats-to-cloud-computing-security.html

  29. Tianeld, H. Security issues in cloud computing. In: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE (2012)

    Google Scholar 

  30. Modi, C., et al.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl 36(1), 42–57 (2013)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suryambika .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Suryambika, Abhishek Bajpai, Shruti Singh (2016). A Survey on Security Analysis in Cloud Computing. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_29

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2638-3_29

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2636-9

  • Online ISBN: 978-81-322-2638-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics