Cloud Computing Security and its Challenges

A. Yasar Arafath*
Department of Computer Applications, Anna University Regional Campus, Tirunelveli, Tamil Nadu, India.
Periodicity:July - December'2020
DOI : https://doi.org/10.26634/jcc.7.2.17965

Abstract

Cloud computing is an on-demand technology that offers shared services and solutions like software, platforms, storage, and information over the Internet. It is a computing environment for delivering services that include infrastructure, software, applications, and business functions. It is a virtual pool of computing services ensuring integrity, availability, authenticity, and confidentiality to cloud service providers and consumers. Many organizations face breach of privacy and confidentiality issues with cloud computing and therefore, researches in this area is active to solve those issues. This document provides a brief, comprehensive study of the data security and privacy protection issues associated with cloud computing. This paper discusses some of the current solutions and reports on future research on data security and privacy issues in the cloud.

Keywords

Cloud Services, Security, Integrity, Availability, Authenticity, Virtual Confidentiality.

How to Cite this Article?

Arafath, A. Y. (2020). Cloud Computing Security and its Challenges. i-manager's Journal on Cloud Computing, 7(2), 20-27. https://doi.org/10.26634/jcc.7.2.17965

References

[1]. Birje, M. N., Challagidad, P. S., Tapale, M. T., & Goudar, R. H. (2015). Security issues and countermeasures in cloud computing. International Journal of Applied Engineering Research, 10(86), 71-5.
[2]. Devi, B. T., Shitharth, S., & Jabbar, M. A. (2020, March). An appraisal over intrusion detection systems in cloud computing security attacks. In 2020, 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) (pp. 722-727). IEEE. https://doi.org/ 10.1109/ICIMIA48430.2020.9074924
[3]. Garg, N., Bawa, S., & Kumar, N. (2020). An efficient data integrity auditing protocol for cloud computing. Future Generation Computer Systems, 109, 306-316. https://doi.org/10.1016/j.future.2020.03.032
[4]. Haeberlen, A. (2010). A case for the accountable cloud. ACM SIGOPS Operating Systems Review, 44(2), 52- 57.
[5]. Kaur, R., & Ghumman, N. S. (2017). A review on resource allocation mechanism in cloud enviornment. International Journal of Computers & Technology, 16(1), 7562- 7566.
[6]. Kumar, I. P., Sambangi, S., Somukoa, R., Nalluri, S., & Govinda, K. (2020). Server security in cloud computing using block-chaining technique. In Data Engineering and Communication Technology (pp. 913-920). Springer, Singapore. https://doi.org/10.1007/978-981-15-1097-7_77
[7]. Li, F., Cui, C., Wang, D., Liu, Z., Elmrabit, N., Wang, Y., & Zhou, H. (2020). Privacy-aware secure anonymous communication protocol in CPSS cloud computing. IEEE Access, 8, 62660-62669. https://doi.org/10.1109/ACCESS. 2020.2982961
[8]. Litchfield, A., & Shahzad, A. (2015, December). Virtualization Technology: Cross-VM Side Channel Attacks Make it Vulnerable. In 2015, Australasian Conference on Information Systems (ACIS).
[9]. Maheswari, K. U., Bhanu, S. M. S., & Nickolas, S. (2020, March). A survey on data integrity checking and enhancing security for cloud to fog computing. In 2020, 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) (pp. 121-127). IEEE. https:// doi.org/10.1109/ICIMIA48430.2020.9074890
[10]. Mohiuddin, I., & Almogren, A. (2020, April). Security challenges and strategies for the IoT in cloud computing. In 2020, 11th International Conference on Information and Communication Systems (ICICS) (pp. 367-372). IEEE. https://doi.org/10.1109/ICICS49469.2020.239563
[11]. Mondal, A., & Goswami, R. T. (2021). Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security. Microprocessors and Microsystems, 81, 103719. https://doi.org/10.1016/j. micpro.2020.103719
[12]. Mouratidis, H., Shei, S., & Delaney, A. (2020). A security requirements modelling language for cloud computing environments. Software and Systems Modeling, 19(2), 271-295. https://doi.org/10.1007/s10270- 019-00747-8
[13]. Srivastava, P., & Khan, R. (2018). A review paper on cloud computing. International Journal of Advanced Research in Computer Science and Software Engineering, 8(6), 17-20. https://doi.org/10.23956/ijarcsse. v8i6.711
[14]. Sun, P. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160, 102642. https:// doi.org/10.1016/j.jnca.2020.102642
[15]. Tabrizchi, H., & Rafsanjani, M. K. (2020). A survey on security challenges in cloud computing: Issues, threats, and solutions. The Journal of Supercomputing, 76(12), 9493-9532. https://doi.org/10.1007/s11227-020-03213-1
[16]. Xiao, Z., & Xiao, Y. (2012). Security and privacy in cloud computing. IEEE communications surveys & tutorials, 15(2), 843-859. https://doi.org/10.1109/SURV.20 12.060912.00182
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.