CFP last date
20 January 2025
Reseach Article

Data Outsourcing Security Issues and Introduction of DOSaaS in Cloud Computing

by Mohammad Asadullah, R. K. Choudhary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 85 - Number 18
Year of Publication: 2014
Authors: Mohammad Asadullah, R. K. Choudhary
10.5120/14945-3501

Mohammad Asadullah, R. K. Choudhary . Data Outsourcing Security Issues and Introduction of DOSaaS in Cloud Computing. International Journal of Computer Applications. 85, 18 ( January 2014), 40-45. DOI=10.5120/14945-3501

@article{ 10.5120/14945-3501,
author = { Mohammad Asadullah, R. K. Choudhary },
title = { Data Outsourcing Security Issues and Introduction of DOSaaS in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 85 },
number = { 18 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 40-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume85/number18/14945-3501/ },
doi = { 10.5120/14945-3501 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:02:57.658866+05:30
%A Mohammad Asadullah
%A R. K. Choudhary
%T Data Outsourcing Security Issues and Introduction of DOSaaS in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 85
%N 18
%P 40-45
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the last couple of years, Cloud computing has evolved as an important paradigm for IT industry with reduced costs, pay-as-you-use, scalability, easy accessibility and improved flexibility. More and more small and large scale companies are moving towards cloud computing as it eliminates setting up of high-investment on IT infrastructure and other services like SaaS, Paas and NaaS. In cloud environment, the client data can reside in any corner of the world and maintained and controlled outside their reach. So, there can be security and privacy issues with the client data. The cloud provider needs to satisfy their client by ensuring and providing data security. This survey paper presents and analyze different security and privacy issues involved in cloud computing service. We also highlight different security models of few of the top cloud service providers. This research paper introduces new service model called Data Outsourcing Security as a Service (DOSaaS).

References
  1. Cloud Computing, http://www. cisco. com/web/solutions/trends/cloud/index. html
  2. Charlie Williams, Advantages of Cloud Computing, "http://www. 2x. com/blog/2013/02/news/advantages-of-cloud-computing/"
  3. Priya Viswanathan, Cloud Computing – Is it really all that beneficial? , "http://mobiledevices. about. com/od/additionalresources/a/Cloud-Computing-Is-It-Really-All-That-Beneficial. htm"
  4. Ms. Disha H. Parekh, Dr. R. Sridaran," An Analysis of Security Challenges in Cloud Computing", (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 4, No. 1, 2013
  5. S. Subashini, V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications (2010), doi:10. 1016/j. jnca. 2010. 07. 006
  6. . Zhifeng Xiao, Yang Xiao, "Security and Privacy in Cloud Computing", IEEE COMMUNICATIONS SURVEYS & TUTORIALS
  7. . Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki, Sugata Sanyal, "A Survey on Security Issues in Cloud Computing"
  8. . Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Dr. Atanu Rakshit, "Cloud Security Issues", 2009 IEEE International Conference on Services Computing (2009), DOI 10. 1109/SCC. 2009. 84
  9. . Qi Zhang, Lu Cheng, Raouf Boutaba, "Cloud computing: state-of-the-art and research challenges", J Internet Serv Appl (2010), vol. 1: pp. 7–18.
  10. . R. L Grossman, "The Case for Cloud Computing," IT Professional, vol. 11(2), pp. 23-27, 2009, ISSN: 1520-9202.
  11. . Ristenpart T, Tromer E, Shacham H, Savage S. Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, US (2009). Hey, you, get off of my cloud: exploring information leakage in third- party compute clouds. In: Proceedings of the CCS 2009, ACM Press, 2009, p. 270–4.
  12. . Jasti A, Shah P, Nagaraj R, Pendse R (2010) Security in multi-tenancy cloud. In: IEEE International Carnahan Conference on Security Technology (ICCST), KS, USA. IEEE Computer Society, Washington, DC, USA, pp 35–41.
  13. . Garfinkel T, Rosenblum M (2005) When virtual is harder than real: Security challenges in virtual machine based computing environments. In: Proceedings of the 10th conference on Hot Topics in Operating Systems, Santa.
  14. . Reuben JS (2007) A survey on virtual machine Security Seminar on Network Security http://www. tml. tkk. fi/Publications/C/25/papers/Reuben_final. . pdf. Technical report, Helsinki University of Technology October 2007.
  15. . An analysis of security issues for cloud computing, Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and Eduardo B Fernandez, Journal of Internet Services and Applications 2013, 4:5.
  16. . Ertaul L, Singhal S, Gökay S (2010) Security challenges in Cloud Computing. In: Proceedings of the 2010 International conference on Security and Management SAM'10. CSREA Press, Las Vegas, US, pp 36–42.
  17. . Chandramouli R, Mell P (2010) State of Security readiness. Crossroads 16 (3):23–25.
  18. . Keene C (2009) The Keene View on Cloud Computing. Online available: http://www. keeneview. com/2009/03/what-is-platform-as-service-paas. html. Accessed: 16-Jul-2011.
  19. . Sanjay P. Ahuja and Deepa Komathukattil, A Survey of the State of Cloud Security, Network and Communication Technologies; Vol. 1, No. 2; 2012, ISSN 1927-064X.
  20. . Thibodeau, P. (2011). Amazon outage sparks frustration, doubts about cloud. Retrieved from http://www. computerworld. com/s/article/9216098.
  21. . Hacigumus, H. , Iyer, B. , & Mehrotra, S. (2002). Providing database as a service. Data Engineering, 2002. Proceedings. 18th International Conference on, pp. 29-38, 07.
  22. . Tsai W, Jin Z, Bai X. Internetware computing: issues and perspective. In: Proceedings of the first Asia-Pacific symposium on Internetware. Beijing, China: ACM; 2009. p. 1–10.
  23. . Ristenpart T, Tromer E, Shacham H, Savage S. Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, US (2009). Hey, you, get off of my cloud: exploring information leakage in third- party compute clouds. In: Proceedings of the CCS 2009, ACM Press, 2009, p. 270–4.
  24. . Krugel C, Toth T, Kirda E. Service specific anomaly detection for network intrusion detection. In: Proceedings of the 2002 ACM symposium on applied computing, 2002, p. 201–8.
  25. . Kong J, O. Aciicmez, J. P. Siefert and H. Zhou, Deconstructing new cache designs for thwarting software cache-based side channel attacks, Proceedings of the 2nd ACM workshop on Computer security architectures, ACM, New York, USA, 2008, pp 25-34.
  26. . Raj H, Nathuji R, Singh A, England P. Resource management for isolation enhanced cloud services. In: Proceedings of the 2009 ACM workshop on cloud computing security, Chicago, Illinois, USA, 2009, p. 77–84.
  27. . Santos N. , K. P. Gummadi and R. Rodrigues, Towards trusted cloud computing. Proceeding of the conference on hot topics in cloud computing, (Hot Cloud'09), Berkeley, CA, USA.
  28. . Zissis D. and D. Lekkas, Addressing cloud computing security issues, Future Gener. Comput. Syst. ,2012, 28:583-592.
  29. . Milne J. Privatecloudprojectsdwarfpublicinitiatives,2010, http://www. cbronline. com/news/private_cloud_projects_dwarf_public_initiatives_281009S [accessed:19June2010].
  30. . Jyoti S. , S. manish and G. Rupali, Virtualization as an engine to drive cloud computing security. Proceeding of the High Performance Architecture and Grid Computing, July 19-20, 2011, Chandigarh, India, pp: 62-66
  31. Dr. Arockiam L, Parthasarathy G and Monikandan S, Privacy in Cloud Computing: A Survey, CS & IT-CSCP 2012, pp. 321–330.
  32. Protect Data Privacy, http://www-01. ibm. com/software/data/optim/protect-data-privacy/.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing IaaS PaaS SaaS Virtual Machines Multi-tenancy