CFP last date
20 January 2025
Reseach Article

A Survey on Cloud Computing Risks and Remedies

by Amit Garg, Rakesh Rathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 29
Year of Publication: 2019
Authors: Amit Garg, Rakesh Rathi
10.5120/ijca2019919139

Amit Garg, Rakesh Rathi . A Survey on Cloud Computing Risks and Remedies. International Journal of Computer Applications. 178, 29 ( Jul 2019), 35-37. DOI=10.5120/ijca2019919139

@article{ 10.5120/ijca2019919139,
author = { Amit Garg, Rakesh Rathi },
title = { A Survey on Cloud Computing Risks and Remedies },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2019 },
volume = { 178 },
number = { 29 },
month = { Jul },
year = { 2019 },
issn = { 0975-8887 },
pages = { 35-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number29/30722-2019919139/ },
doi = { 10.5120/ijca2019919139 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:51:47.087231+05:30
%A Amit Garg
%A Rakesh Rathi
%T A Survey on Cloud Computing Risks and Remedies
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 29
%P 35-37
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is sharing of enormous resource with a billing plan creating ease and providing solution for IT needs to a business of any size. Growth of public cloud has contributed widely in making cloud a household name in the field of software use ,creation, deployment or even management but at the same time securing the cloud is most important responsibility of cloud provider to build trust in the customers. This paper talks about most common threats and the strategies to deal with the risks.

References
  1. Cloud Security Alliance, "Top threats to Cloud Computing" version 1 (2010), http://www.cloudsecurityalliance.org/topthreats, Mar 2010.
  2. N. V. Juliadotter and K. R. Choo, "Cloud Attack and Risk Assessment Taxonomy," in IEEE Cloud Computing, vol. 2, no. 1, pp. 14-20, Jan.-Feb. 2015.
  3. X. Chen, C. Chen, Y. Tao and J. Hu, "A Cloud Security Assessment System Based on Classifying and Grading," in IEEE Cloud Computing, vol. 2, no. 2, pp. 58-67, Mar.-Apr. 2015.
  4. Z. Tari, X. Yi, U. S. Premarathne, P. Bertok and I.Khalil, "Security and Privacy in Cloud Computing: Vision, Trends, and Challenges," in IEEE Cloud Computing, vol. 2, no. 2, pp. 30-38, Mar.-Apr. 2015.
  5. V. Varadharajan and U. Tupakula, "Security as a Service Model for Cloud Environment," in IEEE Transactions on Network and Service Management, vol. 11, no. 1, pp. 60-75, March 2014.
  6. S. Yu, C. Wang, K. Ren and W. Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing," 2010 Proceedings IEEE INFOCOM, San Diego, CA, 2010, pp. 1-9.
  7. Y. Tang, P. P. C. Lee, J. C. S. Lui and R. Perlman, "Secure Overlay Cloud Storage with Access Control and Assured Deletion," in IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903-916, Nov.-Dec. 2012.
  8. S. Xu, G. Yang, Y. Mu and R. H. Deng, "Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud," in IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2101-2113, Aug. 2018.
  9. J. Aikat et al., "Rethinking Security in the Era of Cloud Computing," in IEEE Security & Privacy, vol. 15, no. 3, pp. 60-69, 2017.
  10. N. Paladi, C. Gehrmann and A. Michalas, "Providing User Security Guarantees in Public Infrastructure Clouds," in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 405-419, 1 July-Sept. 2017.
  11. C. Esposito, A. Castiglione, B. Martini and K. R. Choo, "Cloud Manufacturing: Security, Privacy, and Forensic Concerns," in IEEE Cloud Computing, vol. 3, no. 4, pp. 16-22, July-Aug. 2016.
  12. B. Albelooshi, K. Salah, T. Martin and E. Damiani, "Experimental Proof: Data Remanence in Cloud VMs," 2015 IEEE 8th International Conference on Cloud Computing, New York, NY, 2015, pp. 1017-1020.
  13. Tirumala, S. S., Sathu, H., & Naidu, V. (2015, December). Analysis and prevention of account hijacking based incidents in cloud environment. In 2015 international Conference on Information Technology (ICIT) (pp. 124-129). IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Risk Cloud Security