A Survey about Green Credential Cloud and its Security

T.Jenitha Arun Rejus*
PG Graduate, Department of Computer Science, Archana Institute of Technology, Krishnagiri, India.
Periodicity:August - October'2014
DOI : https://doi.org/10.26634/jcc.1.4.3189

Abstract

In this paper, the green credentials and the security in cloud computing is elaborated in a way that covers security issues, concerns and challenges for Data Security in cloud. Cloud computing plays an important role in bringing the users closer to applications. Cloud computing is said to be a main form of modern computing due to its tremendous advantages. But the main cause is about trust. Cloud computing offers the potential to reduce the environmental impact of Information and Communication Technology (ICT), mostly due to its flexibility and scalability. The users trust the cloud and decide to store sensitive data in the cloud, but the cloud does not provide that much security to the users' data. The key security issue with clouds is that the user of the data may not have control over their data and never have any idea about where the data is placed. This paper deals with cloud computing security issues and threats, especially with data confidentiality and privacy issues. The interests of different groups on users' private data, the legal aspects which enable governments and service providers itself to access their users' data and also the technical background on how they can do so, is covered. Finally some feasible remedies are also presented.

Keywords

Cloud Computing, Key Security, Third Party Storage, Hackers, Security Issues.

How to Cite this Article?

Rejus, T. J. A. R. (2014). A Survey about Green Credential Cloud and its Security. i-manager’s Journal on Cloud Computing, 1(4), 1-10. https://doi.org/10.26634/jcc.1.4.3189

References

[1]. Moritz Borgmann, Tobias Hahn, Michael Herfert, Thomas Kunz, Marcel Richter, Ursula Viebeg, and Sven Vowé. (2012). “On the security of cloud storage services”, Fraunhofer Institute for Secure Information Technology- SIT, Tech. Rep. SIT-TR-001.
[2]. Armando Fox, Rean Gri_th, A Joseph, R Katz, A Konwinski, G Lee, D Patterson, A Rabkin, and I Stoica. (2009). “Above the clouds: A berkeley view of cloud computing”, Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley, Rep. UCB/EECS, 28.
[3]. Iulia Ion, Niharika Sachdeva, Ponnurangam Kumaraguru, and Srdjan .apkun. (2011). “Home is safer than the cloud!: privacy concerns for consumer cloud storage”, In Proceedings of the Seventh Symposium on Usable Privacy and Security, page 13. ACM.
[4]. Harry Katzan Jr et al. (2011). “On the privacy of cloud computing”, International Journal of Management & Information Systems (IJMIS), Vol. 14, No. 2.
[5]. William Jeremy Robison. (2009). “Free at what cost: Cloud computing privacy under the stored communications act” The George town Law Journals, Vol. 98, pp. 1196-1232.
[6]. Christopher Soghoian (2010). “Caught in the cloud: Privacy, encryption, and government back doors in the web 2.0 era”, J. on Telecomm. & High Tech. L., Vol. 8, pp. 359.
[7]. Christopher Soghoian (2012). “The Spies We Trust: Third Party Service Providers And Law Enforcement Surveillance”. Ph.D thesis, Indiana University.
[8]. Christopher Soghoian and Sid Stamm. (2012). “Certi_ed lies: Detecting and defeating government interception attacks against ssl (short paper)”. In Financial Cryptography and Data Security, Vol. 7035, pp. 250-259, Springer,19
[9]. Stephen S. Yau and Ho G. An (2010). “Confidentiality Protection in Cloud Computing Systems”, Int J Software Informatics, Vol.4, No.4, pp. 35-1365.
[10]. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, (2009). “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” Proc. 1 6 t h ACM Conference on Computer and Communications Security, pp. 199-212.
[11]. B. D. Payne, M. Carbone, and W. Lee, (2007). “Secure and Flexible Monitoring of Virtual Machines,” In Proc. ACSAC'07, pp. 385-397.
[12]. Venkatesh, V. (2000). “Determinants of percieved ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model”, Information Systems Research, Vol. 11, No. 4, pp. 342- 365.
[13]. Igbaria, M., & Iivari, J. (1995). “The effects of selfefficacy on computer usage”, Omega, Vol. 23, No. 6, pp. 587-605.
[14]. Garbarino, E., & Johnson, M. S. (1999). “The different roles of satisfaction, trust and commitment in customer relationships”, Journal of Marketing, Vol. 63, No. 1, pp. 70- 87
[15]. Brodkin, J. (2008). “Gartner: Seven cloud- computing security risks”, Retrieved September 23, 2009, from Network World, from http://www.networkworld.com/news /2008/070208-cloud.html
[16]. Gartner (2008). “Assessing the Security Risks of Cloud Computing ” , Retrieved December 5 , 2009 , http://www.networkworld.com/news /2008/070208-cloud.html http://www.gartner.com/DisplayDocument?id=685308
[17]. Spiekermann, S. and Cranor, L. F. (2009). “Engineering Privacy”, IEEE Transactions on Software Engineering, Vol. 35, No. 1, pp. 67-82.
[18]. Bardin, J., Callas, J., Chaput, S., Fusco, P., Gilbert, F. et al. (2009). “Security Guidance for Critical Areas of Focus in Cloud Computing v2.1”, Retrieved January 28, 2010, from Cloud Security Alliance, from http://www. cloudsecurityalliance.org/guidance/
[19]. Karat, C. and Blom, J. (2004). “Designing personalized user experiences in e-Commerce”, Kluwer Academic Publishers
[20]. Price, M. and Partners, A. (2008). “The Paradox of Security in Virtual Environments”, Computer, Vol. 41, No. 11, pp. 22-28.
[21]. Vaughan-Nichols, S. (2008). “Virtualization sparks security concerns”, Computer, Vol. 41, No. 8, pp. 13-15.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.