Advertisement

Security Issues in Cloud Computing

  • Shivani GoyalEmail author
  • Rejo Mathew
Conference paper
  • 35 Downloads
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 49)

Abstract

Cloud Computing is the resource provided over the Internet for the use of data storage by the user. It is an environment used to enable a cost-effective storage of a large amount of shared pool of resources over the Internet. It has a rapid expansion over the few years for large companies and private sectors. Cloud computing with its numerous benefits also faces data privacy and security issues that causes threats in the clouds. This paper, hence, lists the various security issues in the clouds based on their confidentiality, integrity and availability and the corresponding solutions to those threats and issues in the cloud environment. It also lists a comparative study of all the solutions to the security issues so that the best-fit solutions can be identified based on the CIA triad. This paper analyses the solutions of security issues faced by the cloud users and providers.

Keywords

Access Administration Assaults Attack Authentication Availability Client Cloud confidentiality Data security Hackers Information Integrity User 

References

  1. 1.
    Tabassam, S.: Security and privacy issues in cloud computing environment. J. Inf. Technol. Softw. Eng. (2017)Google Scholar
  2. 2.
    Kaur, R., Kaur, J.: Cloud computing security issues and its solution. In: 2nd International Conference on Computing for Sustainable Global Development INDIACom. Punjabi University, Patiala (2015)Google Scholar
  3. 3.
    Sinjilawi, Y.K., AL-Nabhan, M.Q., Shanab, E.A.A.: Addressing security and privacy issues in cloud computing. J. Emerg. Technol. Web Intell. 6(2) (2014)Google Scholar
  4. 4.
    Bokhari, M.U., Shallal, Q.M., Tamandani, Y.K.: Security and privacy issues in cloud computing. In: International Conference on Computing for Sustainable Global Development INDIACom. Aligarh Muslim University, India (2016)Google Scholar
  5. 5.
    Gayathri, M., Srinivasan, M.K.: A survey on mobile cloud computing architecture, applications and challenges. Int. J. Sci. Res. Eng. Technol. IJSRET 3(6) (2014)Google Scholar
  6. 6.
    Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Future Gener. Comput. Syst. 29, 84–106 (2013)CrossRefGoogle Scholar
  7. 7.
    Mehta, R.: Distributed denial of service attacks on cloud environment. Int. J. Adv. Res. Comput. Sci. 8(5), 2204–2206 (2017)Google Scholar
  8. 8.
    Chandrahasan, R.K., Priya, S.S., Arockiam, L.: Research challenges and security issues in cloud computing. Int. J. Comput. Intell. Inf. Secur. 3(3), 42–48 (2012)Google Scholar
  9. 9.
    Gentry, C.: Fully homomorphic encryption using ideal lattices. In: ACM Symposium on Theory of Computing, STOC, pp. 169–178. Stanford University and IBM Watson (2009)Google Scholar
  10. 10.
    Kumar, P.: Cloud computing: threats, attacks and solutions. Int. J. Emerg. Technol. Eng. Res. IJETER 4(8) (2016)Google Scholar
  11. 11.
    Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., Basu, K.: Cloud computing security challenges & solutions-a survey. In: PIEEE 8th Annual Computing and Communication Workshop and Conference. Institute of Engineering & Management, Kolkata (2018Google Scholar
  12. 12.
    Sheeta, N., Alam, M., Singh, M.: Web based XSS and SQL attacks on cloud and mitigation. J. Comput. Sci. Eng. Softw. Test. (2015)Google Scholar
  13. 13.
    Vance, A.: Flow based analysis of advanced persistent threats: detecting targeted attacks in cloud computing. In: IEEE International Scientific Practical Conference, Problems of Infocommunications, Science and Technology, Kharkiv, Ukraine, pp. 173–176 (2014)Google Scholar
  14. 14.
    Kumar, D.: Review on task scheduling in ubiquitous clouds. J. ISMAC 1(01), 72–80 (2019)Google Scholar
  15. 15.
    Praveena, A., Smys, S.: Ensuring data security in cloud based social networks. In: 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2, pp. 289–295. IEEE (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Mukesh Patel School of Technology Management and EducationNMIMSMumbaiIndia

Personalised recommendations