Advertisement

Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts

  • Polyxeni SpanakiEmail author
  • Nicolas Sklavos
Chapter

Abstract

Evolution in Information Technology has introduced Cloud Computing as a new technology that refers to resource virtualization. Cloud Computing involves storing and accessing data and developing and managing applications over the Internet. Despite the many advantages of the specific technology, such as the availability of stored data, cost and time saving and scalability, security and privacy are considered critical factors in Cloud Computing. This chapter’s main target is to present and discuss privacy and confidentiality issues in Cloud Computing. Some of the many challenges faced are security threats regarding managing sensitive data and vulnerabilities in the virtualized environment and network security. The methodology used, in order to demonstrate these issues, is by using a virtualized environment and software automation tools. The remote hosts are configured within the cloud in order to be secured.

Keywords

Cloud Cloud security Configuration management tools Automation tools Secure server 

Notes

Acknowledgment

This work is supported under the framework of EU COST IC 1306: CRYPTOACTION (Cryptography for Secure Digital Interaction) Project.

References

  1. 1.
    Mell, P., & Grance, T. (2011). The NIST definition of cloud computing, recommendations of the National Institute of Standards and Technology (NIST Special Publication 800-145. P 2,3).Google Scholar
  2. 2.
    Chauhan, M. A., Babar, M. A., & Benetallah, B. (2016). Architecting cloud-enabled systems: A systematic survey of challenges and solutions. p. 1. doi:  10.1002/spe.2409
  3. 3.
    Bulusu, S., & Sudia, K. (2012. A study on cloud computing security challenges (pp. 7–9). Dissertation, School of Computing Blekinge Institute of Technology, Sweden.Google Scholar
  4. 4.
    Popovic, K., & Hocenski, Z. (2010). Cloud computing security issues and challenges. In MIPRO, 2010 Proceedings of the 33rd International Convention.Google Scholar
  5. 5.
    Rastogi, N., Gloria, M. J. K., & Hendler, J. (2015). Security and privacy of performing data analytics in the cloud: A three-way handshake of technology, policy, and management. Journal of Information Policy, 5, 133–142.CrossRefGoogle Scholar
  6. 6.
    Shrivastava, N., & Yadav, R. (2013). A review of cloud computing security issues. International Journal of Engineering and Innovative Technology, 3(1), 551.Google Scholar
  7. 7.
    Albeshri, A., Ahmad, A., & Caelli, W. (2010, September, 1–3). Mutual protection in a cloud computing environment. In IEEE 12th international conference on high performance computing and communications (HPCC 2010) (p. 641), Melbourne.Google Scholar
  8. 8.
    Swanson, M., & Guttman, B. (1996). Computer security. generally accepted principles and practices for securing information technology systems (NIST Special Publication 800-14). p. 3.Google Scholar
  9. 9.
    Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. IEEE Security and Privacy Magazine, 9(2), 50–57. doi: 10.1109/MSP.2010.115. p. 3–6.CrossRefGoogle Scholar
  10. 10.
    Mahmood, Z. (Ed.). (2014). Cloud computing challenges, limitations and R&D solutions (p. 5, 8–18). Heidelberg: Springer.Google Scholar
  11. 11.
    Antonopoulos, N., & Gillam, L. (Eds.). (2010). Cloud computing principles, systems and applications (p. 31). Heidelberg: Springer.zbMATHGoogle Scholar
  12. 12.
    Song, D. X., Wanger, D., & Tian, X. (2001, August 13–17). Timing analysis of keystrokes and timing attacks on SSH. In Proceedings of the10th USENIX security symposium (p. 5). Washington, DC.Google Scholar
  13. 13.
    Sklavos, N. (2011, April 6–8). Cryptographic algorithms on a chip: Architectures, designs and implementation platforms. In Proceedings of the 6th Design and Technology of Integrated Systems in Nano Era (DTIS’11), Greece.Google Scholar
  14. 14.
    Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009, September 21–25). On technical security issues in cloud computing. In Proceedings of the 2009 IEEE international conference on cloud computing(CLOUD ’09) (pp. 109–116), Bangalore.Google Scholar
  15. 15.
    Gohel, H. (2015). Design and development of combined algorithm computing technique to enhance web security. International Journal of innovative and Emerging Research in Engineering, 2(1), 77.Google Scholar
  16. 16.
    Selvi, V., Sankar, R., & Umarani, R. (2014). The design and implementation of on-line examination using firewall security. IOSR Journal of Computer Engineering, 16(6), 21.CrossRefGoogle Scholar
  17. 17.
    Sklavos, N., & Souras, P. (2006). Economic models and approaches in information security for computer networks. International Journal of Network Security, 2(1), 14–20.Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Open University of CyprusNicosiaCyprus
  2. 2.SKYTALE Research Group, Computer Engineering and Informatics DepartmentUniversity of PatrasPatraGreece

Personalised recommendations