Abstract
Evolution in Information Technology has introduced Cloud Computing as a new technology that refers to resource virtualization. Cloud Computing involves storing and accessing data and developing and managing applications over the Internet. Despite the many advantages of the specific technology, such as the availability of stored data, cost and time saving and scalability, security and privacy are considered critical factors in Cloud Computing. This chapter’s main target is to present and discuss privacy and confidentiality issues in Cloud Computing. Some of the many challenges faced are security threats regarding managing sensitive data and vulnerabilities in the virtualized environment and network security. The methodology used, in order to demonstrate these issues, is by using a virtualized environment and software automation tools. The remote hosts are configured within the cloud in order to be secured.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing, recommendations of the National Institute of Standards and Technology (NIST Special Publication 800-145. P 2,3).
Chauhan, M. A., Babar, M. A., & Benetallah, B. (2016). Architecting cloud-enabled systems: A systematic survey of challenges and solutions. p. 1. doi: 10.1002/spe.2409
Bulusu, S., & Sudia, K. (2012. A study on cloud computing security challenges (pp. 7–9). Dissertation, School of Computing Blekinge Institute of Technology, Sweden.
Popovic, K., & Hocenski, Z. (2010). Cloud computing security issues and challenges. In MIPRO, 2010 Proceedings of the 33rd International Convention.
Rastogi, N., Gloria, M. J. K., & Hendler, J. (2015). Security and privacy of performing data analytics in the cloud: A three-way handshake of technology, policy, and management. Journal of Information Policy, 5, 133–142.
Shrivastava, N., & Yadav, R. (2013). A review of cloud computing security issues. International Journal of Engineering and Innovative Technology, 3(1), 551.
Albeshri, A., Ahmad, A., & Caelli, W. (2010, September, 1–3). Mutual protection in a cloud computing environment. In IEEE 12th international conference on high performance computing and communications (HPCC 2010) (p. 641), Melbourne.
Swanson, M., & Guttman, B. (1996). Computer security. generally accepted principles and practices for securing information technology systems (NIST Special Publication 800-14). p. 3.
Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. IEEE Security and Privacy Magazine, 9(2), 50–57. doi:10.1109/MSP.2010.115. p. 3–6.
Mahmood, Z. (Ed.). (2014). Cloud computing challenges, limitations and R&D solutions (p. 5, 8–18). Heidelberg: Springer.
Antonopoulos, N., & Gillam, L. (Eds.). (2010). Cloud computing principles, systems and applications (p. 31). Heidelberg: Springer.
Song, D. X., Wanger, D., & Tian, X. (2001, August 13–17). Timing analysis of keystrokes and timing attacks on SSH. In Proceedings of the10th USENIX security symposium (p. 5). Washington, DC.
Sklavos, N. (2011, April 6–8). Cryptographic algorithms on a chip: Architectures, designs and implementation platforms. In Proceedings of the 6th Design and Technology of Integrated Systems in Nano Era (DTIS’11), Greece.
Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009, September 21–25). On technical security issues in cloud computing. In Proceedings of the 2009 IEEE international conference on cloud computing(CLOUD ’09) (pp. 109–116), Bangalore.
Gohel, H. (2015). Design and development of combined algorithm computing technique to enhance web security. International Journal of innovative and Emerging Research in Engineering, 2(1), 77.
Selvi, V., Sankar, R., & Umarani, R. (2014). The design and implementation of on-line examination using firewall security. IOSR Journal of Computer Engineering, 16(6), 21.
Sklavos, N., & Souras, P. (2006). Economic models and approaches in information security for computer networks. International Journal of Network Security, 2(1), 14–20.
Acknowledgment
This work is supported under the framework of EU COST IC 1306: CRYPTOACTION (Cryptography for Secure Digital Interaction) Project.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Spanaki, P., Sklavos, N. (2018). Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts. In: Daimi, K. (eds) Computer and Network Security Essentials. Springer, Cham. https://doi.org/10.1007/978-3-319-58424-9_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-58424-9_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-58423-2
Online ISBN: 978-3-319-58424-9
eBook Packages: EngineeringEngineering (R0)