A Comprehensive Review of Security Issues in Cloud Computing

Haider Ali*, Abul Hassan **, Komal Shahzadi***, Maryam Fatima****
*, ***, **** Student, BS Computer Science, The Superior College, Lahore, Pakistan.
** Faculty of Computing, The Superior College, Lahore, Pakistan.
Periodicity:January - June'2018
DOI : https://doi.org/10.26634/jcc.5.1.15448

Abstract

The cloud computing in the world of IT industry has a huge value. It made things reliable and comfortable. As the number of consumers or customers are increasing on cloud computing they are dispatchers of their workload on it. Some different qualities make it unique from others like providing high resources in performance, providing huge space for data storage, etc. In this article, the authors briefly discuss about privacy and security in cloud computing, examining different techniques and methods for securing information and also their drawbacks. The purpose of this article is to understand the security issues and to defeat these events in parliamentary procedure to secure users' assets. In the result of this study, they were able to understand the issues and provide some new methods or algorithm to resolve these issues.

Keywords

Cloud Computing, Security, Software as a Service, Platform as a Service, Infrastructure as a Service.

How to Cite this Article?

Ali, H., Shahzadi, K., Fatima, M., Hassan, A. (2018). A Comprehensive Review of Security Issues in Cloud Computing, i-manager's Journal on Cloud Computing, 5(1), 12-19. https://doi.org/10.26634/jcc.5.1.15448

References

[1]. Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handling in the cloud. Computers & Security, 49, 45-69.
[2]. Ahmed, E., Gani, A., Sookhak, M., Ab Hamid, S. H., & Xia, F. (2015). Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges. Journal of Network and Computer Applications, 52, 52-68.
[3]. Akherfi, K., Gerndt, M., & Harroud, H. (2018). Mobile cloud computing for computation offloading: Issues and challenges. Applied Computing and Informatics, 14(1), 1-16.
[4]. Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S., & Sakurai, K. (2016). Authentication in mobile cloud computing: A survey. Journal of Network and Computer Applications, 61, 59-80.
[5]. Aljoumah, E., Al-Mousawi, F., Ahmad, I., Al-Shammri, M., & Al-Jady, Z. (2015). SLA in cloud computing architectures: A comprehensive study. International Journal of Grid and Distributed Computing, 8(5), 7-32.
[6]. Arunarani, A. R., Manjula, D., & Sugumaran, V. (2019). Task scheduling techniques in cloud computing: A literature survey. Future Generation Computer Systems, 91, 407-415.
[7]. Chiregi, M., & Navimipour, N. J. (2017). Cloud computing and trust evaluation: A systematic literature review of the state-of-the-art mechanisms. Journal of Electrical Systems and Information Technology, 5(3), 608- 622.
[8]. Derbeko, P., Dolev, S., Gudes, E., & Sharma, S. (2016). Security and privacy aspects in MapReduce on clouds: A survey. Computer Science Review, 20, 1-28.
[9]. Díaz, M., Martín, C., & Rubio, B. (2016). State-of-the-art, challenges, and open issues in the integration of Internet of Things and cloud computing. Journal of Network and Computer Applications, 67, 99-117.
[10]. Ghazouani, S., & Slimani, Y. (2017). A survey on cloud service description. Journal of Network and Computer Applications, 91(c), 61 - 74.
[11]. Ghomi, E. J., Rahmani, A. M., & Qader, N. N. (2017). Load-balancing algorithms in cloud computing: A survey. Journal of Network and Computer Applications, 88, 50- 71.
[12]. Gumaei, A., Sammouda, R., Al-Salman, A. M. S., & Alsanad, A. (2019). Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation. Journal of Parallel and Distributed Computing, 124, 27-40.
[13]. Hasan, M., & Goraya, M. S. (2018). Fault tolerance in cloud computing environment: A systematic survey. Computers in Industry, 99, 156-172.
[14]. Hussain, S. A., Fatima, M., Saeed, A., Raza, I., & Shahzad, R. K. (2017). Multilevel classification of security concerns in cloud computing. Applied Computing and Informatics, 13(1), 57-65.
[15]. Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K. K. R. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98-120.
[16]. Kaaniche, N., & Laurent, M. (2017). Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 111, 120-141.
[17]. Kandel, C, S. (2017). Cloud-based services users and trust issues: a comparative study of gender and national culture perspectives (Master's Thesis, University of Tampere).
[18]. Kandukuri, B. R., & Rakshit, A. (2009, September). Cloud Security Issues. In Services Computing, 2009. SCC'09. IEEE International Conference on (pp. 517-520). IEEE.
[19]. Khan, M. A. (2016). A survey of security issues for cloud computing. Journal of Network and Computer Applications, 71, 11-29.
[20]. Kumari, P., & Kaur, P. (2018). A survey of fault tolerance in cloud computing. Journal of King Saud University - Computer and Information Sciences.
[21]. Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, 38-54.
[22]. Moura, J., & Hutchison, D. (2016). Review and analysis of networking challenges in cloud computing. Journal of Network and Computer Applications, 60, 113- 129.
[23]. Nacer, A. A., Godart, C., Rosinosky, G., Tari, A., & Youcef, S. (2019). Business process outsourcing to the cloud: Balancing costs with security risks. Computers in Industry, 104, 59-74.
[24]. Ramachandra, G., Iftikhar, M., & Khan, F. A. (2017). A comprehensive survey on security in cloud computing. Procedia Computer Science, 110, 465-472.
[25]. Sajjan, R. S., Ghorpade, V., & Dalimbkar, V. (2016). A survey paper on data security in cloud computing. International Journal of Computer Sciences and Engineering (IJCSE), 4(4), 9-13.
[26]. Sharma, S., Gupta, G., & Laxmi, P. R. (2014). A survey on cloud security issues and techniques. arXiv preprint arXiv:1403.5627.
[27]. Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115.
[28]. Singh, S., Jeong, Y. S., & Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200- 222.
[29]. Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Buyya, R. (2017). DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications, 107, 30-48.
[30]. Subramanian, N., & Jeyaraj, A. (2018). Recent security challenges in cloud computing. Computers & Electrical Engineering, 71, 28-42.
[31]. Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Surveying and analyzing security, privacy and trust issues incloud computing environments. Procedia Engineering, 15, 2852-2856.
[32]. Vaezpour, S. Y., Zhang, R., Wu, K., Wang, J., & Shoja, G. C. (2016). A new approach to mitigating security risks of phone clone co-location over mobile clouds. Journal of Network and Computer Applications, 62, 171-184.
[33]. Wadhwa, A. V., & Gupta, S. (2015). Study of Security Issues in Cloud Computing. International Journal of Computer Science and Mobile Computing IJCSMC, 4(6), 230-234.
[34]. Zhou, L., Fu, A., Yu, S., Su, M., & Kuang, B. (2018). Data integrity verification of the outsourced big data in the cloud environment: A survey. Journal of Network and Computer Applications.

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

If you have access to this article please login to view the article or kindly login to purchase the article
Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.