CFP last date
20 January 2025
Reseach Article

Survey on Security Openness and Heedfulness in Cloud Computing Environment

by Vivekanandhan M.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 41
Year of Publication: 2018
Authors: Vivekanandhan M.
10.5120/ijca2018916975

Vivekanandhan M. . Survey on Security Openness and Heedfulness in Cloud Computing Environment. International Journal of Computer Applications. 179, 41 ( May 2018), 10-13. DOI=10.5120/ijca2018916975

@article{ 10.5120/ijca2018916975,
author = { Vivekanandhan M. },
title = { Survey on Security Openness and Heedfulness in Cloud Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { May 2018 },
volume = { 179 },
number = { 41 },
month = { May },
year = { 2018 },
issn = { 0975-8887 },
pages = { 10-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number41/29353-2018916975/ },
doi = { 10.5120/ijca2018916975 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:58:02.423380+05:30
%A Vivekanandhan M.
%T Survey on Security Openness and Heedfulness in Cloud Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 41
%P 10-13
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a fastest growing technology in recent years. Cloud computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. Cloud services are becoming an essential part of many organizations. It promises to provide a flexible IT architecture, accessible through internet from lightweight portable devices. In a cloud computing environment, the entire data resides over a set of networked resources, enabling the data to be accessed through virtual machines. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish- mash of security and privacy controls. This extensive survey paper aims to elaborate and analyze the populous vacillating issues threatening the cloud computing environment.

References
  1. W. A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing,” 44th Hawaii International Conference on System Sciences, pp. 1–10, Koloa, Hawaii, January 2011.
  2. K. Zunnurhain and S. Vrbsky, “Security Attacks and Solutions in Clouds,” 2nd IEEE International Conference on Cloud Computing Technology and Science, Indianapolis, December 2010.
  3. M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On Technical Security Issues in Cloud Computing,” IEEE International Conference in Cloud Computing, pp. 109-116, Bangalore, 2009.
  4. DataLossDB Open Security Foundation. http://datalossdb.org/statistics
  5. A. Tripathi and A. Mishra, “Cloud Computing Security Considerations Interface,” 2011 IEEE International Conference on Signal Processing, Communications and Computing, Xi'an, China, September 2011.
  6. D. Catteddu and G. Hogben, “Cloud Computing Benefits, Risks and Recommendations for Information Security,” The European Network and Information Security Agency (ENISA), November 2009.
  7. Sophos Security Threat Report 2012. http://www.sophos.com/
  8. Symantec Internet Security Threat Report, 2011 Trends, Vol. 17, April 2012.
  9. M. McIntosh and P. Austel, “XML Signature Element Wrapping Attacks and Countermeasures,” 2005 workshop on Secure web services, ACM Press, New York, NY, pp. 20–27, 2005.
  10. Web Based Attacks, Symantec White Paper, February 2009.
  11. W. Jansen and T. Grance, “Guidelines on Security and Privacy in Public Cloud Computing,” Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Special Publication 800-144, December 2011.
  12. Justin LeJeune, Cara Tunstall, Kuo-pao Yang and Ihssan Alkadi, CSIT Department at SLU “An Algorithmic Approach to Improving Cloud Security: The MIST and Malachi Algorithms”, 978-1-4673-7676 ,2016 IEEE
  13. Victor Chang, Muthu Ramachandran, Member, IEEE “Towards achieving Data Security with the Cloud Computing Adoption Framework”, 2015,IEEE
  14. Amit Hendre and Karuna Pande Joshi CSEE Department, University of Maryland Baltimore County Baltimore, MD, USA “A Semantic Approach to Cloud Security and Compliance” 2015 IEEE
  15. H. C. Li, P. H. Liang, J. M. Yang, and S. J. Chen, “Analysis on Cloud-Based Security Vulnerability Assessment,” IEEE International Conference on E-Business Engineering, pp.490-494, November 2010.
  16. Vahid Ashktorab , Seyed Reza Taghizadeh “Security Threats and Countermeasures in Cloud Computing Volume 1, Issue 2, October 2012
  17. Cloud Security Risks and Solutions,” White Paper, BalaBit IT Security, July 2010.
  18. S. J. Stolfo, M. B. Salem, and A. D. Keromytis, “Fog computing: Mitigating Insider Data Theft Attacks in the Cloud,” IEEE Symposium on Security and Privacy Workshops, pp. 125-128, San Francisco, CA, 2012.
  19. M. Jensen, C. Meyer, J. Somorovsky, and J. Schwenk, “On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks,” First International Workshop on Securing Services on the Cloud, Milan, Italy, September 2011
  20. N. Provos, M. A. Rajab, and P. Mavrommatis, “Cybercrime 2.0: When the Cloud Turns Dark,” ACM Communications, Vol. 52, No. 4, pp. 42–47, 2009.
  21. Insider Threats Related to Cloud Computing, CERT, July 2012. http://www.cert.org/
  22. D. Jamil and H. Zaki, “Security Issues in Cloud Computing and Countermeasures,” International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp. 2672-2676, April 2011.
  23. S. S. Rajan, Cloud Security Series | SQL Injection and SaaS, Cloud Computing Journal, November 2010.
  24. P. P. Ramgonda and R. R. Mudholkar, “Cloud Market Cogitation and Techniques to Averting SQL Injection for University Cloud,” International Journal of Computer Technology and Applications, Vol. 3, No. 3, pp. 1217-1224, January, 2012.
  25. T. Roth, “Breaking Encryptions Using GPU Accelerated Cloud Instances,” Black Hat Technical Security Conference, 2011.
  26. Prince Jain Malwa Polytechnic College Faridkot, Punjab-151203, India “Security Issues and their Solution in Cloud Computing” International Journal of Computing & Business Research ISSN (Online): 2229-6166
  27. Krishna Prakash and Balachandra “security issues and challenges in mobile computing and m-commerce” International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015
  28. Abdullah , Imran, Fida Hussain “The Secure Data Storage in Mobile Cloud Computing”
  29. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.6, No.5,2015
  30. A. S. Choudhary and M. L. Dhore, “CIDT: Detection of Malicious Code Injection Attacks on Web Application,” International Journal of Computer Applications, Vol. 52, No. 2, pp. 19-26, August 2012.
  31. Web Application Attack Report For The Second Quarter of 2012 http://www.firehost.com/company/newsroom/web-application-attack-report-second-quarter-2012
  32. Visitors to Sony PlayStation Website at Risk of Malware Infection, July 2008. http://www.sophos.com/en-us/press-office/press-releases/2008/07/playstation.aspx
  33. 2012 Has Delivered Her First Giant Data Breach, January 2012. http://www.infosecisland.com/blogview/19432-2012-Has-Delivered-Her-First-Giant-Data-Breach.html
  34. N. Gruschka and L. L. Iacono, “Vulnerable Cloud: SOAP Message Security Validation Revisited,” IEEE International Conference on Web Services, Los Angeles, 2009.
  35. Tackling the Insider Threat http://www.bankinfosecurity.com/blogs.php?postID=140
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security Authentication Saas Paas Iaas