Advertisement

Security Requirements for Cloud Environments: The Public Cloud Case

  • Ahmed ZianiEmail author
  • Abdellatif Medouri
Conference paper
Part of the Lecture Notes in Intelligent Transportation and Infrastructure book series (LNITI)

Abstract

A company planning to implement a public cloud solution should be aware of the risks associated with cloud computing. This is due to the rapidly evolving threats to cloud security that are emerging at an increasing rate in recent years, also to multi-tenant and open nature of the public cloud. Cloud computing is a powerful technology in IT environment and to take advantage of all the benefits of cloud computing, it is necessary to have security and privacy requirements for the implementation and use of the cloud. A risk analysis must be done initially with a cloud provider in order to identify the existing vulnerabilities and to implement the measures to counter those threats. This paper explores the key issues surrounding cloud security, and passes on valuable guidance about not only information security and broadly risk. Also, it will help providers to make informed security decisions about their diverse cloud set-ups and better understand how to reap all the benefits of cloud without compromising their organizations’ security. As well, it discusses the security requirements, and various risks related to the public cloud.

Keywords

Cloud computing Cloud security Security challenges Risks issues Security requirements Public cloud 

References

  1. 1.
    Murugesan, S., Bojanova, I.: Encyclopedia of Cloud Computing. Wiley, Hoboken, NJ (2016)Google Scholar
  2. 2.
    Le-Khac, N.-A.: Security, Privacy and Digital Forensics in the Cloud. Wiley (2018)Google Scholar
  3. 3.
    Rafaels, R.: Cloud Computing: From Beginning to End. CreateSpace Independent Publishing Platform (2015)Google Scholar
  4. 4.
    Information Resources Management Association: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Application. IGI Global (2018)Google Scholar
  5. 5.
    O’Hara, B.T., Malisow, B.: CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide. Wiley (2017)Google Scholar
  6. 6.
    Vance, T.C., Merati, N., Yang, C., Yuan, M.: Cloud Computing in Ocean and Atmospheric Sciences. Elsevier Google Scholar
  7. 7.
    Yeluri, R., Castro-Leon, E.: Building the Infrastructure for Cloud Security: A Solutions View. Apress (2014)Google Scholar
  8. 8.
    Mell, P., Grance, T.: The NIST Definition of Cloud Computing. NIST, USA (2011)CrossRefGoogle Scholar
  9. 9.
    Yang, C., Huang, Q.: Spatial Cloud Computing: A Practical Approach. CRC Press, Boca Raton (2013)CrossRefGoogle Scholar
  10. 10.
    Ivan, I., Singleton, A., Horák, J., Inspektor, T.: The Rise of Big Spatial Data. Springer, Cham (2016)Google Scholar
  11. 11.
    Bhat, M.A., Shah, R.M., Ahmad, B., Bhat, I.R.: Cloud computing: a solution to information support systems (ISS). Int. J. Comput. Appl. 11(5), (2010). (0975–8887)CrossRefGoogle Scholar
  12. 12.
    Sehgal, N.K., Bhatt, P.C.P.: Cloud Computing: Concepts and Practices. Springer International Publishing (2018)Google Scholar
  13. 13.
    Turuk, A.K., Sahoo, B., Kanti, A.S.: Resource Management and Efficiency in Cloud Computing Environments. IGI Global (2016)Google Scholar
  14. 14.
    Gupta, P.K., Vipin Tyagi, S.K. Singh, Predictive Computing and Information Security. Springer, Singapore (2017)CrossRefGoogle Scholar
  15. 15.
    Kumar, V., Chaisiri, S., Ko, R.: Data Security in Cloud Computing. Institution of Engineering and Technology (2017)Google Scholar
  16. 16.
    Peng, S., Wang, S., V. E. Balas; M. Zhao, “Security with Intelligent Computing and Big-data Services”, Springer International Publishing. 2018Google Scholar
  17. 17.
    Krutz, R., Vines, R.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing, p. 384. Wiley (2010)Google Scholar
  18. 18.
    Mishra, B.S.P., Das, H., Dehuri, S., Jagadev, A.K.: Cloud Computing for Optimization: Foundations, Applications, and Challenges. Springer (2018)Google Scholar
  19. 19.
    Le, D., Kumar, R., Nguyen, G., Chatterjee, J.M.: Cloud Computing and Virtualization Wiley (2018)Google Scholar
  20. 20.
    Ziani, A., Medouri, A.: Use of cloud computing technologies for geographic information systems. In: Ezziyyani, M., Bahaj, M., Khoukhi F. (eds.) Advanced Information Technology, Services and Systems. AIT2S 2017. Lecture Notes in Networks and Systems, vol 25, pp. 315–323. Springer, Cham.  https://doi.org/10.1007/978-3-319-69137-4_28. 978-3-319-69136-7 Google Scholar
  21. 21.
    Peng, S., Wang, S., Balas, V.E., Zhao, M.: Security With Intelligent Computing and Big-Data Services. Springer International Publishing (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Information Systems and Telecommunications LaboratoryFSTTetuanMorocco
  2. 2.Modeling and Information Theory GroupPFTTetuanMorocco
  3. 3.Abdelmalek Essaadi UniversityTétouanMorocco

Personalised recommendations