[go: up one dir, main page]

Skip to main content

A Critical Review on Security Issues in Cloud Computing

  • Conference paper
  • First Online:
Information Management and Machine Intelligence (ICIMMI 2019)

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

Cloud computing has grown significantly in computing services. It is defined as a bunch of computing resources accessed by the Internet. Security in cloud computing, a vicinity filled with challenges and of overriding importance, is in its initial stage of growth currently, and lots of analysis issues are yet to be known. Cloud computing has become the boon of the IT industry. It is like the next step of Internet evolution with a managed and efficient platform for data storage with enormous capabilities and applications. It assists the authorities to access one’s file or data without installing the particulars on the user’s machine using Internet services. Cloud computing enables on-demand network access or shared access to configured computing resources. The use of multiple operating systems on a machine maximizes the use of that particular resource. In this context, it specifies the creation of a virtual version of resources such as storage devices, virtual operating system, deploying an application or software on cloud (SaaS). A system has both pros and cons; cloud computing is no exception. Some of its consequences are cloud security, manageability, integrity, theft, data loss, and so on. In the presented paperwork, we would be reviewing different challenges and issues faced in the data security over cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zissis, S., & Lekkas, D. (2012). Addressing cloud computing security issues. In Proceedings of Future Generation Computer Systems, March 2012.

    Google Scholar 

  2. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., et al. (2010). A view of cloud computing. Communications of the ACM Magazine, 53, 50–58.

    Google Scholar 

  3. Ashraf, I. (2014). An overview of service model of cloud computing Int. Journal of Multidisciplinary and Current Research, 2, 779–783.

    Google Scholar 

  4. Bala Narayada Reddy, G. (2013). Cloud computing-types of cloud. Retrieved from http://bigdatariding.blogspot.my/2013/10/cloud-computing-types-of-cloud.html.

  5. Christina, A. A. (2015). Proactive measures on account hijacking in cloud computing network Asian. Journal of Computer Science and Technology, 4, 31–34.

    Google Scholar 

  6. Choubey, R., Dubey, R., & Bhattacharjee, J. (2011). A survey on cloud computing security challenges and threats. International Journal on Computer Science and Engineering (IJCSE), 3, 1227–1231.

    Google Scholar 

  7. Cloud Security Alliance. (2013). The notorious nine: Cloud computing top threats in 2013. Retrieved from https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf.

  8. Dinesha, H. A., & Agrawal, V. K. (2012). Multi-level authentication technique for accessing cloud services. International Journal on Cloud Computing: Services and Architecture (IJCCSA), 2, 31–39.

    Google Scholar 

  9. Doelitzscher, F., Sulistio, A., Reich, C., Kuijs, H., & Wolf, D. (2011). Private cloud for collaboration and e-Learning services: from IaaS to SaaS. Journal of Computing-Cloud Computing, 91, 23–42.

    Google Scholar 

  10. Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2012). Security issues for cloud computing. Optimizing Information Security and Advancing Privacy Assurance: New Technologies, 8, 150–162.

    Google Scholar 

  11. Jain, S., Kumar, R., Kumawat, S., & Jangir, S.K. (2014). An analysis of security and privacy issues, challenges with possible solution in cloud computing. In Proceedings of the National Conference on Computational and Mathematical Sciences (COMPUTATIA-IV) (pp. 1–7).

    Google Scholar 

  12. Kandias, M., Virvilis, N., & Gritzalis, D. (2011). The insider threat in cloud computing. In Proceedings of 6th International Conference on Critical Infrastructure Security (pp. 95–106).

    Google Scholar 

  13. Khoshkholghi, M. A., Abdullah, A., Latip, R., Subramaniam, S., & Othman, M. (2014). Disaster recovery in cloud computing: A survey computer and information. Science, 7, 39–54.

    Google Scholar 

  14. Khurana, S., & Verma, A. G. (2013). Comparisons of cloud computing service model: SaaS. PaaS IaaS International Journal of Electronics & Communication Technology (IJECT), 4, 29–32.

    Google Scholar 

  15. Kiblin, T. (2011). How to use cloud computing for disaster recovery. Retrieved from http://www.crn.com/blogs-op-ed/channel-voices/230700011/how-to-use-cloud-computing-for-disaster-recovery.htm.

  16. Kill, A. (2013). Cloud computing risk: Due diligence and insurance. Retrieved from http://www.metrocorpcounsel.com/articles/17928/cloud-computing-risks-due-diligence-and-insurance.

  17. King, N. J., & Raja, V. T. (2012). Protecting the privacy and security of sensitive customer data in the cloud. Computer Law & Security Review, 28, 308–319.

    Google Scholar 

  18. Kuyoro, S. O., Ibikunie, F., & Awodele, O. (2011). Cloud computing security issues and challenges. International Journal of Computer Networks (IJCN), 3, 247–255.

    Google Scholar 

  19. Li, A., Yang, X., Kandula, S., & Zhang, M. (2010). CloudCmp: Comparing public cloud providers. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurements (pp. 1–14).

    Google Scholar 

  20. Malimi, N. (2014). Cloud computing. Retrieved from http://ngeleki.blogspot.my/2014/03/what-is-cloud-computing.html.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyanka Trikha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Trikha, P. (2021). A Critical Review on Security Issues in Cloud Computing. In: Goyal, D., Bălaş, V.E., Mukherjee, A., Hugo C. de Albuquerque, V., Gupta, A.K. (eds) Information Management and Machine Intelligence. ICIMMI 2019. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-4936-6_70

Download citation

Publish with us

Policies and ethics