We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Security Related Risks and their Monitoring in Cloud Computing

by Sachin Achara, Rakesh Rathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 13
Year of Publication: 2014
Authors: Sachin Achara, Rakesh Rathi
10.5120/15049-3417

Sachin Achara, Rakesh Rathi . Security Related Risks and their Monitoring in Cloud Computing. International Journal of Computer Applications. 86, 13 ( January 2014), 42-47. DOI=10.5120/15049-3417

@article{ 10.5120/15049-3417,
author = { Sachin Achara, Rakesh Rathi },
title = { Security Related Risks and their Monitoring in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 13 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 42-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number13/15049-3417/ },
doi = { 10.5120/15049-3417 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:04:10.018991+05:30
%A Sachin Achara
%A Rakesh Rathi
%T Security Related Risks and their Monitoring in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 13
%P 42-47
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud services is one of the most rapidly growing services over internet, which at the same time also faces serious security challenges. Recently, several cloud-storage service providers started to provide encryption protection to client data in the cloud. However, encryption imposes significant limits on data us . In this paper, we report security related risks and their monitoring in cloud computing. Cloud services data can be accessed only by authorized users. The security of data will be in control of the data owner. This paper shows the security challenges and monitoring and management of these security risks involved in cloud computing services. And a methodology is proposed for performing security risk assessment for cloud computing architectures presenting some of the initial results.

References
  1. Yashpa lsinh Jadeja & Kirit Modi,(2012) "Cloud Computing-Concepts,ArchitectureandChallenges", International Conference on Computing, Electronics and Electrical Technologies[ICCEET].
  2. Wayne Jansen,Timothy Grance,(2012)IEEE,"Draft NIST SpecialPublicationGuidelinesonSecurity and Privacy in Public Cloud Computing", Computer Security.
  3. Folker den Braber, Gyrd Brændeland, Heidi E. I. Dahl, Iselin Engan, Ida Hogganvik, Mass S. Lund, Bjørnar Solhaug, Ketil Stølen, Fredrik The Coras Model-based method for security risk analysis, SINTEF Oslo September 2006.
  4. A. Juan Ferrer, F. Hernandez, J. Tordsson, E. Elmroth, C. Zsigri, R. Sirvent, J. Guitart, R. M. Badia,K. Djemame, W. Ziegler,T. Dimitrakos, S. K. Nair, G. Kousiouris, K. Konstanteli,T. VarvarigouB. Hudzia, Kipp, S. Wesner, M. Corrales, N. Forgo, T. Sharif, and C. Sheridan, OPTIMIS Holistic Approach to Cloud Service Provisioning, Proceedings of 1st International Conference on Utility Cloud Computing (UCC 2010), Chennai, India, December 2010
  5. Information risk analysis methodology (IRAM), Information Security Forum (ISF), Available at: https://www. securityforum. org/iram
  6. P. Mell and T. Grance, The NIST Definition of Cloud Computing, National Institute of Standards and Technology, October 2009.
  7. P. Saripalli and B. Walters, QUIRC: A Quantitative Impact and Risk assessment framework for Cloud security, pgs: 280-288, Proceedings of IEEE 3rd International Conference on Cloud Computing, 2010.
  8. SAS 70 Type 2 Audit, SAS 70, Website Available at http://sas70. com/sas70_overview. html
  9. ISO 27002 Standard, The ISO 27000 Directory, Website Available at http://www. 27000. org/iso-27002. htm
  10. Sales force Security Data sheet, Availableathttp://www. salesforce. com/assets/pdf/datasheets/security. pdf
  11. B. Krebs, Amazon: Hey Spammers, Get Off My Cloud! The Washington Post, Article Available at http://voices. washingtonpost. com/securityfix/2008/07/amazon_hey_s pammers_get_off_my. html Last Accessed November 2010.
  12. I. Thomson, Google Docs Leaks Private User Data Online, Article, March 2009, Available athttp://www. v3. co. uk/vnunet/news/2238122/google-docs-leaks-privateLast Accessed November 2010.
  13. Information risk analysis methodology IRAM, available at: https://www. securityforum. org/iram#iramtva
Index Terms

Computer Science
Information Sciences

Keywords

Risk Monitoring Threats Risk assessment Cloud computing.