Abstract
Cloud computing has grown significantly in computing services. It is defined as a bunch of computing resources accessed by the Internet. Security in cloud computing, a vicinity filled with challenges and of overriding importance, is in its initial stage of growth currently, and lots of analysis issues are yet to be known. Cloud computing has become the boon of the IT industry. It is like the next step of Internet evolution with a managed and efficient platform for data storage with enormous capabilities and applications. It assists the authorities to access one’s file or data without installing the particulars on the user’s machine using Internet services. Cloud computing enables on-demand network access or shared access to configured computing resources. The use of multiple operating systems on a machine maximizes the use of that particular resource. In this context, it specifies the creation of a virtual version of resources such as storage devices, virtual operating system, deploying an application or software on cloud (SaaS). A system has both pros and cons; cloud computing is no exception. Some of its consequences are cloud security, manageability, integrity, theft, data loss, and so on. In the presented paperwork, we would be reviewing different challenges and issues faced in the data security over cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zissis, S., & Lekkas, D. (2012). Addressing cloud computing security issues. In Proceedings of Future Generation Computer Systems, March 2012.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., et al. (2010). A view of cloud computing. Communications of the ACM Magazine, 53, 50–58.
Ashraf, I. (2014). An overview of service model of cloud computing Int. Journal of Multidisciplinary and Current Research, 2, 779–783.
Bala Narayada Reddy, G. (2013). Cloud computing-types of cloud. Retrieved from http://bigdatariding.blogspot.my/2013/10/cloud-computing-types-of-cloud.html.
Christina, A. A. (2015). Proactive measures on account hijacking in cloud computing network Asian. Journal of Computer Science and Technology, 4, 31–34.
Choubey, R., Dubey, R., & Bhattacharjee, J. (2011). A survey on cloud computing security challenges and threats. International Journal on Computer Science and Engineering (IJCSE), 3, 1227–1231.
Cloud Security Alliance. (2013). The notorious nine: Cloud computing top threats in 2013. Retrieved from https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf.
Dinesha, H. A., & Agrawal, V. K. (2012). Multi-level authentication technique for accessing cloud services. International Journal on Cloud Computing: Services and Architecture (IJCCSA), 2, 31–39.
Doelitzscher, F., Sulistio, A., Reich, C., Kuijs, H., & Wolf, D. (2011). Private cloud for collaboration and e-Learning services: from IaaS to SaaS. Journal of Computing-Cloud Computing, 91, 23–42.
Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2012). Security issues for cloud computing. Optimizing Information Security and Advancing Privacy Assurance: New Technologies, 8, 150–162.
Jain, S., Kumar, R., Kumawat, S., & Jangir, S.K. (2014). An analysis of security and privacy issues, challenges with possible solution in cloud computing. In Proceedings of the National Conference on Computational and Mathematical Sciences (COMPUTATIA-IV) (pp. 1–7).
Kandias, M., Virvilis, N., & Gritzalis, D. (2011). The insider threat in cloud computing. In Proceedings of 6th International Conference on Critical Infrastructure Security (pp. 95–106).
Khoshkholghi, M. A., Abdullah, A., Latip, R., Subramaniam, S., & Othman, M. (2014). Disaster recovery in cloud computing: A survey computer and information. Science, 7, 39–54.
Khurana, S., & Verma, A. G. (2013). Comparisons of cloud computing service model: SaaS. PaaS IaaS International Journal of Electronics & Communication Technology (IJECT), 4, 29–32.
Kiblin, T. (2011). How to use cloud computing for disaster recovery. Retrieved from http://www.crn.com/blogs-op-ed/channel-voices/230700011/how-to-use-cloud-computing-for-disaster-recovery.htm.
Kill, A. (2013). Cloud computing risk: Due diligence and insurance. Retrieved from http://www.metrocorpcounsel.com/articles/17928/cloud-computing-risks-due-diligence-and-insurance.
King, N. J., & Raja, V. T. (2012). Protecting the privacy and security of sensitive customer data in the cloud. Computer Law & Security Review, 28, 308–319.
Kuyoro, S. O., Ibikunie, F., & Awodele, O. (2011). Cloud computing security issues and challenges. International Journal of Computer Networks (IJCN), 3, 247–255.
Li, A., Yang, X., Kandula, S., & Zhang, M. (2010). CloudCmp: Comparing public cloud providers. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurements (pp. 1–14).
Malimi, N. (2014). Cloud computing. Retrieved from http://ngeleki.blogspot.my/2014/03/what-is-cloud-computing.html.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Trikha, P. (2021). A Critical Review on Security Issues in Cloud Computing. In: Goyal, D., Bălaş, V.E., Mukherjee, A., Hugo C. de Albuquerque, V., Gupta, A.K. (eds) Information Management and Machine Intelligence. ICIMMI 2019. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-4936-6_70
Download citation
DOI: https://doi.org/10.1007/978-981-15-4936-6_70
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4935-9
Online ISBN: 978-981-15-4936-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)