We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Analysing Security Threats and Solutions during Transition to Cloud Environment

Published on July 2015 by Amit Wadhwa, Ruchi Kamra
Innovations in Computing and Information Technology (Cognition 2015)
Foundation of Computer Science USA
COGNITION2015 - Number 1
July 2015
Authors: Amit Wadhwa, Ruchi Kamra
19ca6509-30bc-4474-8077-7ef16b6b5baf

Amit Wadhwa, Ruchi Kamra . Analysing Security Threats and Solutions during Transition to Cloud Environment. Innovations in Computing and Information Technology (Cognition 2015). COGNITION2015, 1 (July 2015), 24-26.

@article{
author = { Amit Wadhwa, Ruchi Kamra },
title = { Analysing Security Threats and Solutions during Transition to Cloud Environment },
journal = { Innovations in Computing and Information Technology (Cognition 2015) },
issue_date = { July 2015 },
volume = { COGNITION2015 },
number = { 1 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 24-26 },
numpages = 3,
url = { /proceedings/cognition2015/number1/24966-2171/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Innovations in Computing and Information Technology (Cognition 2015)
%A Amit Wadhwa
%A Ruchi Kamra
%T Analysing Security Threats and Solutions during Transition to Cloud Environment
%J Innovations in Computing and Information Technology (Cognition 2015)
%@ 0975-8887
%V COGNITION2015
%N 1
%P 24-26
%D 2015
%I International Journal of Computer Applications
Abstract

Cloud computing as one and all know is a computing area which has evolved from grid, utility computing, virtualization and SOA. As per the knowledge a cloud based infrastructure is based on certain elements like extended elasticity, [3]metered service, on demand service availability[3], clustered resources and large network access. For providing these services or features it follows certain cloud service adoption models. All these models face some security concerns or the others. In the past many security models[1] are presented by many researchers for resolving them and giving out a better known solution to IT industry adopting cloud. This paper aims at analyzing issues involved with virtualized architecture incurred while cloud migration, figuring out various security measures from varying risk levels and present a refined or distinguished security model or solution based on all those issues discussed throughout the study. Main focus of the analysis carried here is on issues involved while adopting virtualization based infrastructure for moving in cloud, authentication based risks, risks incurred while data migration, attack on VM’s, issues while adopting virtualization, risk generated from malicious insiders are few to be discussed here.

References
  1. Amit Wadhwa and Dr. V. K. Gupta, “Framework for User Authenticity and Access Control Security over Cloud”. International Journal on Computer Science and Engineering (IJCSE), Vol 06, No. 04, April, 2014
  2. Mhammed Chraibi, Hamid Harroud and Abdel. Maach, “Classification of Security Issues and Solutions in Cloud Environments”, International conference based on Ad-hoc generalized Wireless Sensor and networks, by ACM, at Vienna, Austria, Dec, 2013
  3. Gnanasundaram, somasundaram, and Shrivastava, Alok. Information Storage and Management.. USA: Wiley, 2013. Print
  4. Mell, P. and Grance, T. “The NIST de?nition of cloud computing”. publishd inNIST Special Publication, 2011
  5. Pardeep Sharma, Sandeep K. Sood, and Sumeet Kaur : “Security Issues in Cloud Computing” (Book review): Springer-Verlag Berlin Heidelberg, pg. 36–45, 2011
  6. NIST, Guidelines on Security and Privacy in Public Cloud Computing, presented in 2011
  7. J. Ru and J. Keung. “An empirical investigation on the simulation of priority and shortest-job-?rst scheduling for cloud-based software systems” In Software Engineering Conference (ASWEC), 2013 22nd Australian, pages 78–87. IEEE, 2013.
  8. (2010). Security Management in the Cloud. Available http://mscerts.net/programming/Security%20Management%20in%20t he%20Cloud.aspx
  9. C. Almond, "A Practical Guide to Cloud Computing Security," 27 August 2009 2009
  10. S. Roschke, et aI., "Intrusion Detection in the Cloud," presented at the Eighth IEEE International Conference on Dependable, AutonomIc and Secure Computing, Chengdu, China, 2009
  11. Jinpeng Wei, Xiaolan Zhang, Glenn Ammons et.al., “Managing Security of Virtual Machine Images in a Cloud Environment”, ACM Cloud Computing Security Workshop (CCSW’09)
  12. Meiko Jensen, Jörg Schwenk and Nils Gruschka, “Technical Security Issues in Cloud Computing”, IEEE International Conference on Cloud Computing, Bangalore, India 9/2009.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Security Threats Virtualization VM (Virtual machine) CSP (Cloud service provider) Hypervisor Virtual machine manager (VMM) VDC (Virtualized data center)