We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Cloud Computing – Understanding Risk, Threats, Vulnerability and Controls: A Survey

by Manish M. Potey, C A Dhote, Deepak H. Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 3
Year of Publication: 2013
Authors: Manish M. Potey, C A Dhote, Deepak H. Sharma
10.5120/11373-6641

Manish M. Potey, C A Dhote, Deepak H. Sharma . Cloud Computing – Understanding Risk, Threats, Vulnerability and Controls: A Survey. International Journal of Computer Applications. 67, 3 ( April 2013), 9-14. DOI=10.5120/11373-6641

@article{ 10.5120/11373-6641,
author = { Manish M. Potey, C A Dhote, Deepak H. Sharma },
title = { Cloud Computing – Understanding Risk, Threats, Vulnerability and Controls: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 3 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number3/11373-6641/ },
doi = { 10.5120/11373-6641 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:23:40.200400+05:30
%A Manish M. Potey
%A C A Dhote
%A Deepak H. Sharma
%T Cloud Computing – Understanding Risk, Threats, Vulnerability and Controls: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 3
%P 9-14
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As an embryonic technology, cloud computing has attracted more attention. More and more enterprises or government agencies started to explore cloud computing. However, with the extensive use of cloud computing, security issues came out on a growing scale. This paper highlights and categorizes many of security issues introduced by the "cloud"; surveys the risks, threats, vulnerabilities and controls. Besides, the paper summarizes some corresponding solutions that can help promote the benefits and mitigate the risks associated with Cloud Computing.

References
  1. Tim Mather, SubraKumarswamy, and ShahedLatif, Cloud Security and Privacy,s. l; O'Reilly, 2010
  2. T Grance, K Kent and B Kim. NIST SP800-61 computer security incident handling guide, 2008
  3. Gartner. "Seven cloud computing security risks". http://www. infoworld. com July 2,2008
  4. Charles P Pfleeger, Security in Computing. Pearson Education.
  5. Vaquero, Luis Rodero-Merino Juan Caceres et. al "A break in clouds : Towards a cloud definition. " ACM SIGOMM Computer Communication Review Archive, Volume 39, Issue 1 (January 2009).
  6. RichMaggini, Solari communication. "Cloud Computing is changing how we communicate",IEEE,2009.
  7. Jianfeng Yang, Zhibin Chen, "Cloud Computing Research and security issues", ProfessionalCommunication Conference, 2009. IECC 2009. IEEE International
  8. Adrian Seccombe, Alex Hutton, Alexander Meisel, et, al. Security Guidance for Critical Areas of focus in Cloud Computing V 2. 1, Cloud Security Alliance , 2009
  9. Meiko Jensen JorgSchwenk, Nils Gruschka,Luigi Lo Icono, "On Technical Security Issues in Cloud Computing", 2009 IEEE conference on Cloud Computing.
  10. Kaufman, L. M. " Data Security in the World of Cloud Computing". Security& Privacy, IEEE, vol. 7 , pp. 61 - 64 , July-Aug. 2009
  11. La'Quata Sumter, " Cloud Computing : Security Risk", ACM SE '10 Proceedings of the 48th Annual Southeast Regional Conference ACM New York, NY, USA ©2010
  12. ENISA, Cloud Computing: Benefits, risks and recommendation for information security,2010
  13. Dan Hubbard, Michael Sutton, AmerDeeba, Andy Dancer, et. al,Top Threats to cloud Computing v1. 0, 2010
  14. Bernd Grobaur,TobiasWalloschek and Elmer Stocker, "Understanding cloud computing vulnerabilities",IEEE security and privacy, 10 Jun 2010, IEEE computer society digital library, IEEE Computer Society
  15. Minqui Zhou, Rong Zhang, wieXie, WeiningQian, Aoying Zhou, Security and Privacy in Cloud Computing : A Survey, 2010 Sixth International Conference on Semantics Knowledge and Grid (SKG), IEEE Conferences.
  16. KresimirPopovic,ZeljkoHocenski, "Cloud Computing Security Issues and Challeges", MIPRO 2010 Proceedings of 33 International Convention ,IEEE,, May24-28, 2010,Opatija, Croatia
  17. Kamal Dahbur, Bassil Mohammad, Ahmed BisherTarakji, A Survey of risks, threats, and vulnerabilities in cloud computing, ACM 978-1-4503-0474-0/04/2011
  18. Jaeger, T. ; Schiffman, J. "Outlook: Cloudy with a Chance of Security Challenges and Improvements", Security & Privacy, IEEE, vol. 8, pp. 77-80, Jan- Feb 2010.
  19. Takabi, H. ; Joshi, J. B. D. ; Ahn, G. "Security and Privacy Challenges in Cloud Computing Environments", Security & Privacy, IEEE, vol. 6, pp. 24-31, Nov. -Dec. 2010
  20. NIST,"NIST. gov-Computer Security Division-Computer Security Resource Centre" Wayne Jansen, Timothy Grance,"Guidelines on Security and privacy in public cloud computing" , Draft NIST special publication, January 2011.
  21. Wang Jun-jui, Mu Sen ,2011, "Security Issues and Counter Measures in Cloud Computing", IEEE 2011.
  22. FarzadSabahi, "Cloud Computing Security Threats and Responses", IEEE 2011.
  23. Tharam Dillon, Chen Wu, "Cloud Computing: Issues and Challenges", 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
  24. Sean Carlin, Kevin Curran, "Cloud Computing Security", International Journal of Ambient Computing and Intelligence, 3(1), 14-19, January-March 2011
  25. Balachandra Reddy Kandukuri et al. , "Cloud Security Issues",IEEE International Conference on Services Computing, 2009
  26. IIangoSriram, Ali KhajehHosseni, "Research Agenda in Cloud Technology", 1st ACM Symposium on Cloud Computing, SOCC 2010
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Risk Threat Vulnerability Controls