Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2539150.2539222acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

Classification of Security Issues and Solutions in Cloud Environments

Published: 02 December 2013 Publication History

Abstract

Cloud computing is, nowadays, one of the most interesting topics in computer science. Also, in research, a lot of effort is concentrated on cloud computing security issues. In this paper, we classify different security issues into the different levels that exist in cloud environments. We also present different solutions to the security issues in the cloud according to the type of security they provide with. Privacy, integrity, accountability, and integrity are major topics that are raised when companies start considering the cloud as an alternative to having their IT internally managed. Therefore, it is important to have a broad view of the different security problems present in the cloud and the different solutions that researchers are working on.

References

[1]
Agrawal, D., El Abbadi, A., Wang, S., Secure and Privacy-Preserving Data Services in the Cloud: A Data Centric View, Presented at the 38th International Conference on Very Large Data Bases, August 27th - 31st 2012, Istanbul, Turkey.
[2]
AlZain, M. A., Soh, B., Pardede, E., MCDB: Using Multi-Clouds to Ensure Security in Cloud Computing, proceedings of the 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp.784--791, Australia, 2011
[3]
AlZain, M. A., Pardede, E., Soh, B., Thom, J., A., Cloud Computing Security: From Single to Multi-Clouds, 45th Hawaii International Conference on System Sciences, 2012
[4]
Behl, A., Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation, World Congress on Information and Communication Technologies (WICT), 2011, pp. 217--222.
[5]
Behl, A., Behl, K., An analysis of cloud computing security issues, World Congress on Information and Communication Technologies(WICT), 2012, 109--114
[6]
Boampong, P. A., Wahsheh, L. A., Different facets of security in the cloud. Proceedings of the 15th Communications and Networking Simulation Symposium. Society for Computer Simulation International, 2012.
[7]
Bouayad, A., Blilat, A., Mejhed, N., El Ghazi, M., Cloud computing: security challenges, Colloquium on Information Science and Technilogy (CIST), 2012, Fez. IEEE
[8]
Chen, D., Zhao, H., Data Security and Privacy Protection Issues in Cloud Computing, International Conference on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, 23-25 March 2012, pp. 647--651.
[9]
Chow, R., et al., Controlling data in the cloud: Outsourcing computation without outsourcing control. In CCSW, 2009.
[10]
Christodorescu, M., Sailer, R., Schales, D.L., Sgandurra, D., Zamboni, D., Cloud Security is not (just) Virtualization Security, CCSW'09, Nov.13, 2009, Chicago, Illinois, USA.
[11]
Gonzalez, N., Miers, C., A quantitative analysis of current security concerns and solutions for cloud computing, Third IEEE International conference on Cloud Computing Technology and Science, pp 231--238, 2011.
[12]
Gul, I., Ur Rehman, A., Islam, M. H., Cloud computing security auditing, The 2nd International Conference on Next Generation Information Technology (ICNIT), Gyeongju, 2011.
[13]
Jansen, W. A., Cloud hooks: security and privacy issues in cloud computing, in Proceedings of the 44th Hawaii International Conference on System Sciences, 2010.
[14]
Ko, R., Kirchberg, M., Lee, B., From system-centric to data-centric logging-accountability, trust & security in cloud computing. In Defense Science Research Conference and Expo (DSR), 2011, 1--4. IEEE
[15]
Kulkarni, G., Gambhir, J., Patil, T., Dongare, A., A Security Aspects in Cloud Computing, 3rd International Conference on Software Engineering and Service Science (ICSESS), 2012, 547--550. IEEE
[16]
Liu, W., Research on cloud Computing Security Problem and Strategy, 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), 2012.
[17]
Mowbray, M., Pearson, S., A Client-Based Privacy Manager for Cloud Computing, COMSWARE' 09, Ireland.
[18]
Puttaswamy, K., Kruegel, C., Zhao, B., Silverline: toward data confidentiality in storage-intensive cloud applications, 2nd ACM Symposium on Cloud Computing, 2011.
[19]
Rahaman, S. M., Farhatullah, M., A Framework for Preserving Privacy in Cloud Computing with User Service Dependent Identity, ICACCI'12, August 3-5, 2012, India.
[20]
Ramgovind, S., Eloff, M. M., Smith, E., The Management of Security in Cloud computing, in Information Security for South Africa (ISSA), pp. 1--7, 2010.
[21]
Sabahi, F., Cloud Computing Security Threats and Responses, Faculty of Computer Engineering Azad University, 2011, Vol-2, IEEE.
[22]
Sengupta, S., Kaulgud, V., Sharma, V. S., Cloud Computing Security-Trends and Research Directions, IEEE World Congress on Services, pp 524--531, 2011
[23]
Shin, D., Wang, Y., Claycomb, W., A Policy-Based Decentralized Authorization Management Framework for Cloud Computing, SAC'12 March 26-30, 2012, Italy.
[24]
Srinivasan, M. K., et al., State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment. Proceedings of the International Conference on Advances in Computing, Communications and Informatics. ACM, 2012.
[25]
Tripathi, A., Mishra, A., Cloud Computing Security Considerations, IT Division DOEACC Society, India.
[26]
Wang, C., Chow, S. S. -M., Wang, Q., Ren, K., Lou, W. J., Privacy-Preserving Public Auditing for Secure Cloud Storage, IEEE Transactions on Computers, http://eprint.iacr.org/2009/579.pdf.
[27]
Yashpalsinh, J., Kirit, M., Cloud Computing - Concepts, Architecture and Challenges, International Conference on Computing, Electronics and Electrical Technologies, 2012.
[28]
Yau, S. S., An, H. G., Protection of users' data confidentiality in cloud computing. Second Asia-Pacific Symposium on Internetware, Internetware 2010, ACM, New York.

Cited By

View all
  • (2019)Cloud computing security taxonomy: From an atomistic to a holistic viewFuture Generation Computer Systems10.1016/j.future.2019.11.013Online publication date: Dec-2019
  • (2018)Accounting in CloudEuropean Financial and Accounting Journal10.18267/j.efaj.20613:1(61-76)Online publication date: 30-Jul-2018
  • (2017)Cloud computing threats classification model based on the detection feasibility of machine learning algorithms2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)10.23919/MIPRO.2017.7973626(1314-1318)Online publication date: May-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
IIWAS '13: Proceedings of International Conference on Information Integration and Web-based Applications & Services
December 2013
753 pages
ISBN:9781450321136
DOI:10.1145/2539150
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • @WAS: International Organization of Information Integration and Web-based Applications and Services

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 December 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cloud computing
  2. accountability
  3. availability
  4. classification
  5. integrity
  6. privacy
  7. security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

IIWAS '13

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Cloud computing security taxonomy: From an atomistic to a holistic viewFuture Generation Computer Systems10.1016/j.future.2019.11.013Online publication date: Dec-2019
  • (2018)Accounting in CloudEuropean Financial and Accounting Journal10.18267/j.efaj.20613:1(61-76)Online publication date: 30-Jul-2018
  • (2017)Cloud computing threats classification model based on the detection feasibility of machine learning algorithms2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)10.23919/MIPRO.2017.7973626(1314-1318)Online publication date: May-2017
  • (2017)Outsourced data modification algorithm with assistance of multi-assistants in cloud computingInternational Journal of Sensor Networks10.1504/IJSNET.2017.08423024:1(62-73)Online publication date: 1-Jan-2017
  • (2017)Performance Impact of DDoS Attacks on Three Virtual Machine Hypervisors2017 IEEE International Conference on Cloud Engineering (IC2E)10.1109/IC2E.2017.18(204-214)Online publication date: Apr-2017
  • (2017)Study and Analysis of Cloud-Based Robotics Framework2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC)10.1109/CTCEEC.2017.8455104(800-8111)Online publication date: Sep-2017
  • (2016)Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud ComputingCloud Computing and Security10.1007/978-3-319-48671-0_35(389-408)Online publication date: 1-Nov-2016
  • (2015)Privacy Risks in Cloud ComputingIntelligent Agents in Data-intensive Computing10.1007/978-3-319-23742-8_8(163-192)Online publication date: 22-Sep-2015
  • (2014)Policy Based Security Middleware as a ServiceProceedings of the 2014 International Conference on Future Internet of Things and Cloud10.1109/FiCloud.2014.57(322-327)Online publication date: 27-Aug-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media