Skip to main content

A Study on Security Issues in Cloud Computing

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 398))

Abstract

Cloud computing focuses on maximizing the effectiveness of shared resources. It is also cost-effective, flexible, quick data storage, and is one of the most successful services in the internet. Cloud services are often outsourced to a third party, increasing the security threats. They are also delivered through the traditional network protocols and so a threat to the protocols is a threat to the cloud as well. In this paper, the major security issues are analyzed and sufficient countermeasures are provided, in order to minimize the security threats concerning cloud computing.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw CompuT Appl 34(1)

    Google Scholar 

  2. Mell P, Grance T (2011) The NIST definition of cloud computing. NIST Special Publication 800–145, Gaithersburg

    Book  Google Scholar 

  3. Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18

    Article  Google Scholar 

  4. Mather T, Kumaraswamy S, Latif S (2009) Cloud security and privacy. O’Reilly Media Inc, Sebastopol

    Google Scholar 

  5. Cloud Security Alliance “Security guidance for critical areas of focus in cloud computing V3.0.” https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf

  6. Ju J, Wang Y, Fu J, Wu J, Lin Z (2010) Research on key technology in SaaS. In: International conference on intelligent computing and cognitive informatics (ICICCI), Hangzhou, China. IEEE Comput Soc USA, pp 384–387

    Google Scholar 

  7. Zhang Y, Liu S, Meng X (2009) Towards high level SaaS maturity model: methods and case study. Services computing conference, APSCC, IEEE Asia-Pacific, pp 273–278, Dec 2009

    Google Scholar 

  8. Chong F, Carraro G, Wolter R Multi-tenant data architecture. http://msdn.microsoft.com/en- us/library/aa479086.aspx

  9. Rittinghouse JW, Ransome JF (2009) Security in the cloud. In: cloud computing: implementation, management, and security. CRC Press, USA, Aug 2009

    Google Scholar 

  10. Viega J (2009) Cloud computing and the common man. Computer 42(8):106–108

    Article  Google Scholar 

  11. Xu K, Zhang X, Song M, Song J (2009) Mobile mashup, architecture, challenges and suggestions, International Conference on Management and Service Science, MASS, IEEE Computer Society, Washington, DC, USA, pp 1–4, Sept 2009

    Google Scholar 

  12. Chandramouli R, Mell P (2010) State of security readiness, Crossroads—Plugging into the Cloud, vol 16(3), Mar 2010

    Google Scholar 

  13. Reuben JS (2007) A survey on virtual machine Security, Seminar on Network Security, Helsinki University of Technology. http://www.tml.tkk.fi/Publications/C/25/papers/Reuben_final.pdf

  14. Amies A, Sluiman H, Tong QC, Liu GN (2012) Infrastructure as a service cloud concepts. In: Developing and Hosting Applications on the Cloud, IBM Press, Indianapolis, Jun 2012

    Google Scholar 

  15. Dahbur K, Mohammad B, Tarakji AB (2011) A survey of risks, threats and vulnerabilities in cloud computing. In: Proceedings of the 2011 international conference on intelligent semantic web-services and applications

    Google Scholar 

  16. Hashizume K, Yoshioka N, Fernandez EB (2013) Three misuse patterns for cloud computing. In: Rosado DG, Mellado D, Fernandez-Medina E, Piattini M (eds) Security engineering for cloud computing: approaches and tools, IGI Global, Pennsylvania, pp 36–53

    Google Scholar 

  17. Ranjith P, Chandran P, Kaleeswaran S (2012) On covert channels between virtual machines. J Comput Virol Springer 8(3):85–97

    Article  Google Scholar 

  18. Carlin S, Curran K (2011) Cloud computing security. Int J Ambient Comput Intell 3(1):38–46

    Article  Google Scholar 

  19. Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomputing 63(2):561–592

    Article  Google Scholar 

  20. Garfinkel T, Rosenblum M (2005) When virtual is harder than real: Security challenges in virtual machine based computing environments. In: Proceedings of the 10th conference on hot topics in operating systems, pp 227–229

    Google Scholar 

  21. Cloud Security Alliance “Top threats to cloud computing V1.0.” https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

  22. Dawoud W, Takouna I, Meinel C (2010) Infrastructure as a service security: challenges and solutions. The 7th International Conference on Informatics and Systems (INFOS), pp 1–8, Mar 2010

    Google Scholar 

  23. Jasti A, Shah P, Nagaraj R, Pendse R (2010) Security in multi-tenancy cloud. IEEE International Carnahan Conference on Security Technology (ICCST), pp 35–41

    Google Scholar 

  24. Venkatesha S, Sadhu S, Kintali S “Survey of virtual machine migration techniques,” Technical report, Department of Computer Science, University of California, Santa Barbara. http://www.academia.edu/760613/Survey_of_Virtual_Machine_Migration_Techniques

  25. Popovic K, Hocenski Z (2010) Cloud computing security issues and challenges. In: Proceedings of the 33rd international convention MIPRO, pp 344–349, May 2010

    Google Scholar 

  26. Bhardwaj M, Singh GP (2011) Types of hacking attack and their counter measure. Int J Educ Plann Adm 1(1):43–53

    Google Scholar 

Download references

Acknowledgments

We thank our computer science faculty Mr. Prakash, for guiding us and supporting us in all possible ways. We also want to thank our University, Amrita University, which encourages us to do these things.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kaaviyan Kanagasabapathi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Kanagasabapathi, K., Deepak, S., Prakash, P. (2016). A Study on Security Issues in Cloud Computing. In: Suresh, L., Panigrahi, B. (eds) Proceedings of the International Conference on Soft Computing Systems. Advances in Intelligent Systems and Computing, vol 398. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2674-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2674-1_17

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2672-7

  • Online ISBN: 978-81-322-2674-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics