Skip to main content

Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts

  • Chapter
  • First Online:
Computer and Network Security Essentials

Abstract

Evolution in Information Technology has introduced Cloud Computing as a new technology that refers to resource virtualization. Cloud Computing involves storing and accessing data and developing and managing applications over the Internet. Despite the many advantages of the specific technology, such as the availability of stored data, cost and time saving and scalability, security and privacy are considered critical factors in Cloud Computing. This chapter’s main target is to present and discuss privacy and confidentiality issues in Cloud Computing. Some of the many challenges faced are security threats regarding managing sensitive data and vulnerabilities in the virtualized environment and network security. The methodology used, in order to demonstrate these issues, is by using a virtualized environment and software automation tools. The remote hosts are configured within the cloud in order to be secured.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing, recommendations of the National Institute of Standards and Technology (NIST Special Publication 800-145. P 2,3).

    Google Scholar 

  2. Chauhan, M. A., Babar, M. A., & Benetallah, B. (2016). Architecting cloud-enabled systems: A systematic survey of challenges and solutions. p. 1. doi: 10.1002/spe.2409

  3. Bulusu, S., & Sudia, K. (2012. A study on cloud computing security challenges (pp. 7–9). Dissertation, School of Computing Blekinge Institute of Technology, Sweden.

    Google Scholar 

  4. Popovic, K., & Hocenski, Z. (2010). Cloud computing security issues and challenges. In MIPRO, 2010 Proceedings of the 33rd International Convention.

    Google Scholar 

  5. Rastogi, N., Gloria, M. J. K., & Hendler, J. (2015). Security and privacy of performing data analytics in the cloud: A three-way handshake of technology, policy, and management. Journal of Information Policy, 5, 133–142.

    Article  Google Scholar 

  6. Shrivastava, N., & Yadav, R. (2013). A review of cloud computing security issues. International Journal of Engineering and Innovative Technology, 3(1), 551.

    Google Scholar 

  7. Albeshri, A., Ahmad, A., & Caelli, W. (2010, September, 1–3). Mutual protection in a cloud computing environment. In IEEE 12th international conference on high performance computing and communications (HPCC 2010) (p. 641), Melbourne.

    Google Scholar 

  8. Swanson, M., & Guttman, B. (1996). Computer security. generally accepted principles and practices for securing information technology systems (NIST Special Publication 800-14). p. 3.

    Google Scholar 

  9. Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. IEEE Security and Privacy Magazine, 9(2), 50–57. doi:10.1109/MSP.2010.115. p. 3–6.

    Article  Google Scholar 

  10. Mahmood, Z. (Ed.). (2014). Cloud computing challenges, limitations and R&D solutions (p. 5, 8–18). Heidelberg: Springer.

    Google Scholar 

  11. Antonopoulos, N., & Gillam, L. (Eds.). (2010). Cloud computing principles, systems and applications (p. 31). Heidelberg: Springer.

    MATH  Google Scholar 

  12. Song, D. X., Wanger, D., & Tian, X. (2001, August 13–17). Timing analysis of keystrokes and timing attacks on SSH. In Proceedings of the10th USENIX security symposium (p. 5). Washington, DC.

    Google Scholar 

  13. Sklavos, N. (2011, April 6–8). Cryptographic algorithms on a chip: Architectures, designs and implementation platforms. In Proceedings of the 6th Design and Technology of Integrated Systems in Nano Era (DTIS’11), Greece.

    Google Scholar 

  14. Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009, September 21–25). On technical security issues in cloud computing. In Proceedings of the 2009 IEEE international conference on cloud computing(CLOUD ’09) (pp. 109–116), Bangalore.

    Google Scholar 

  15. Gohel, H. (2015). Design and development of combined algorithm computing technique to enhance web security. International Journal of innovative and Emerging Research in Engineering, 2(1), 77.

    Google Scholar 

  16. Selvi, V., Sankar, R., & Umarani, R. (2014). The design and implementation of on-line examination using firewall security. IOSR Journal of Computer Engineering, 16(6), 21.

    Article  Google Scholar 

  17. Sklavos, N., & Souras, P. (2006). Economic models and approaches in information security for computer networks. International Journal of Network Security, 2(1), 14–20.

    Google Scholar 

Download references

Acknowledgment

This work is supported under the framework of EU COST IC 1306: CRYPTOACTION (Cryptography for Secure Digital Interaction) Project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Polyxeni Spanaki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Spanaki, P., Sklavos, N. (2018). Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts. In: Daimi, K. (eds) Computer and Network Security Essentials. Springer, Cham. https://doi.org/10.1007/978-3-319-58424-9_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-58424-9_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-58423-2

  • Online ISBN: 978-3-319-58424-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics