Abstract
Computing remotely also brings with it the most sensitive and significant aspect of data security. Data being resident on server and infrastructure that are opaque to users bring with it the huge advantage of ridding users of all the infrastructure operational liabilities. But this also means the data owned by users navigates through routes either unknown or no control territory. This glaringly brings security of data on cloud with high vulnerability. This paper explores dimensionally various such vulnerabilities, and related strategies to circumvent them does involve a sensitive disection of modern technology in today’s world of computing. An insights through various levels of infrastructure, application, data and network architecture gives this research enough evidence that complexities involved in solutioning the security problems of cloud computing is nevertheless a path most discussed and debated. Further much attention is needed to all the vulnerabilities discussed and solutioning them comprehensively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Han S, Xing J (2011) Ensuring data storage security through a novel third party auditor scheme in cloud computing. In: IEEE international conference on cloud computing and intelligence systems
Thamizhselvan M, Raghuraman R, Gershon Manoj S, Victer Paul P (2015) A novel security model for cloud using trusted third party encryption. In: International conference on innovations in information, embedded and communication systems (ICIIECS)
Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing
Kaura WCN, Lal A (2017) Survey paper on cloud computing security. In: International conference on innovations in information, embedded and communication systems (ICIIECS)
Baek J, Vu QH, Liu JK, Huang X, Xiang Y (2015) A secure cloud computing based framework for big data information management of smart grid. IEEE Trans Cloud Comput 3(2)
Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115
Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592
Zuo P, Hua Y, Wang C, Xia W, Cao S, Zhou Y, Sun Y (2018) Mitigating traffic-based side channel attacks in bandwidth-efficient cloud storage. In: IEEE international parallel and distributed processing symposium (IPDPS)
Mollah MB, Azad MAK, Vasilakos A (2017) Security and privacy challenges in mobile cloud computing: survey and way ahead. J Netw Comput Appl 84:38–54
Rao RV, Selvamani K (2015) Data security challenges and its solutions in cloud computing. Procedia Comput Sci 48:204–209
Jensen M, Schwenk J, Gruschka N, Iacono LL (2009) On technical security issues in cloud computing. In: IEEE international conference on cloud computing
Horvath III AS, Agrawal R (2015) Trust in cloud computing
Opara-Martins J, Sahandi R, Tian F (2016) Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective. J Cloud Comput
Yimam D, Fernandez EB (2016) A survey of compliance issues in cloud computing. J Internet Serv Appl
Mei J, Li K, Ouyang A, Li K (2015) A profit maximization scheme with guaranteed quality of service in cloud computing. IEEE Trans Comput 64(11)
AlJahdali H, Albatli A, Garraghan P, Townend P, Lau L, Xu J (2014) Multi-tenancy in cloud computing. In: IEEE 8th international symposium on service oriented system engineering
Pant VK, Prakash J, Asthana A (2015) Three step data security model for cloud computing based on RSA and steganography techniques. In: International conference on green computing and internet of things (ICGCIoT)
Zafar F, Khan A, Malik SUR, Ahmed M, Anjum A, Iqbal M, Javed N, Alam M, Jamil F (2017) A survey of cloud computing data integrity schemes: design challenges, taxonomy and future trends. Comput Secur 65:29–49
Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4)
Xu H, Qiu X, Sheng Y, Luo L, Xiang Y (2018) A Qos-driven approach to the cloud service addressing attributes of security. IEEE Access 6
Luna J, Taha A, Trapero R, Suri N (2017) Quantitative reasoning about cloud security using service level agreements. IEEE Trans Cloud Comput 5(3)
Al Hamid HA, Rahman SMM, Hossain MS, Almogren A, Alamri A (2017) A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5
Feng B, Ma X, Guo C, Shi H, Fu Z, Qiu T (2016) An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access 4
Ali M, Bilal K, Khan SU, Veeravalli B, Li K, Zomaya AY (2018) DROPS: division and replication of data in cloud for optimal performance and security. IEEE Trans Cloud Comput 6(2)
Modi KJ, Kapadia N (2018) Securing healthcare information over cloud using hybrid approach. In: Progress in advanced computing and intelligent engineering, pp 63–74
Paladi N, Gehrmann C, Michalas A (2017) Providing user security guarantees in public infrastructure clouds. IEEE Trans Cloud Comput 5(3)
Chang V, Ramachandran M (2016) Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput 9(1)
Grzonka D, Jakobik A, Kołodziej J, Pllana S (2018) Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security. Future Gener Comput Syst 86:1106–1117
Ali M, Malik SUR, Khan SU (2017) DaSCE: data security for cloud environment with semi-trusted third party. IEEE Trans Cloud Comput 5(4)
Verginadis Y, Michalas A, Gouvas P, Schiefer G, Hubsch G, Paraskakis I (2017) PaaSword: a holistic data privacy and security by design framework for cloud services. J Grid Comput 15(2):219–234
Zhang Y, Chen X, Li J, Wonge DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61
Li J, Zhangb Y, Chene X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12
Chang V, Kuo Y-H, Ramachandran M (2016) Cloud computing adoption framework a security framework for business clouds. Future Gener Comput Syst 57:24–41
Zhou S, Wu L, Jin C (2017) A privacy-based SLA violation detection model for the security of cloud computing. China Commun. 14(9)
Sanghi A, Chaudhary S, Dave M (2017) Enhance the data security in cloud computing by text steganography. In: Smart trends in systems, security and sustainability, pp 241–248
Tyagi M, Manoria M, Mishra B (2018) A framework for data storage security in cloud. In: Advances in data and information sciences, pp 263–272
Hussain SA, Fatima M, Saeed A, Raza I, Shahzad RK (2017) Multilevel classification of security concerns in cloud computing. Appl Comput Inform 13(1):57–65
Sookhak M, Gani A, Khan MK, Buyya R (2017) Dynamic remote data auditing for securing big data storage in cloud computing. Inf Sci 380(20):101–116
He D, Kumar N, Khan MK, Wang L, Shen J (2018) Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst J 12(2)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Manjushree, C.V., Nandakumar, A.N. (2020). Dimensional Insight to Innovations in Security Aspects of Cloud Computing. In: Kumar, A., Paprzycki, M., Gunjan, V. (eds) ICDSMLA 2019. Lecture Notes in Electrical Engineering, vol 601. Springer, Singapore. https://doi.org/10.1007/978-981-15-1420-3_18
Download citation
DOI: https://doi.org/10.1007/978-981-15-1420-3_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1419-7
Online ISBN: 978-981-15-1420-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)