You are on page 1of 7

International Journal of Engineering Research And Management (IJERM)

ISSN: 2349- 2058, Volume-1, Issue-4, July 2014

An analysis of security and privacy issues,


Challenges with possible solution in cloud
computing
Rakesh Kumar, Sunil Kumar Jangir, Bhanu Bhushan

 (PaaS) and Software as a Service (SaaS) [54]. Infrastructure


Abstract— Cloud computing is the delivery of computing as as a Service (IaaS) [53] provides the user with virtual
a service rather than a product, whereby IT resources, infrastructure. Platform as a Service (PaaS) provides the user
software, shared resources, and information are provided to with development environment services. Software as a
computers as well as other devices on demand, like
the electricity grid. Cloud computing is also an Internet-based Service (SaaS) provides the user with access to already
computing where a large pool of systems are connected in created applications which is operating in the cloud. Cloud
private or public networks, and provide dynamically scalable computing [3], [54] also has deployment models such as
infrastructure for application data as well as file storage. Private cloud, Public cloud, Community cloud and Hybrid
Security of Cloud computing is an evolving sub-domain of cloud [28], [57].
network security, computer security and information security.
In spite of its vitality, it exhibits many security flaws such as
loss of important data, data leakage and something related to
cloning, resource pooling etc. Security of Cloud Computing is
emerging area for study and this paper presents an overview,
characteristics, benefits, advantages and disadvantages of
cloud computing. Also include the several security and privacy
issues with challenges and includes solution of security issues of
cloud computing. The aim of this paper is to show important
aspect of security, privacy concerned challenges which the
authors and researchers are facing in the security of cloud
computing.

Index Terms— Cloud, Computing, Cloud computing,


Privacy issues, Security issues

I. INTRODUCTION
The word cloud is used as a metaphor for the
Internet. It also focuses on maximizing the effectiveness of
the shared resources [29]. Cloud computing [8] means
storing as well as accessing data and programs over the
Internet instead of your computer's hard drive. Cloud Fig 1: Cloud computing architecture
computing [2], [10] is a type of internet-based computing
that relies on sharing computing resources rather than II. CHARACTERISTICS OF CLOUD COMPUTING
having personal devices or local servers to The main characteristics of cloud computing [47] include
handle applications. Cloud computing [32], [62] allows you on-demand self-service, broad network access, resource
to set up what is essentially a virtual office to give you the pooling, rapid elasticity, measured service and multi tenacity
flexibility of connecting to your business anywhere, any time. [34], [36], [57]. On-demand self-service [52] characteristics
With the growing number of web-enabled devices used in means that customers or usually organizations can request as
today's business environment such as smartphones, tablets well as manage their own computing resources. Broad
access to your data is even easier way. Cloud computing [5], network access provides services to be offered over the
[6], [57] provides three levels of service models such as Internet. Resource pooling characteristics means that
Infrastructure as a Service (IaaS), Platform as a Service customers draw from a pool of computing resources, usually
in remote data centers. Services can be scaled larger and
smaller; as well as use of a service is measured and also
Manuscript received July 09, 2014.
Rakesh Kumar, Department of Information Technology, JECRC
customers are billed accordingly. Cloud computing [17]
Foundation, Jaipur, India, (e-mail: rakeshkumar.it14@jecrc.ac.in). resource usage can be measured and controlled providing
Sunil Kumar Jangir, Department of Information Technology, JECRC transparency for both the consumer and provider of the
Foundation, Jaipur, India, (e-mail: sunil.jangir07@gmail.com).
Bhanu Bhushan, Department of Computer Science, JECRC University, utilized service [44]. 6th characteristics of cloud computing
Jaipur, India, (e-mail: bhanu.bhushan@jecrcu.edu.in).

1
www.ijerm.com
An analysis of security and privacy issues, Challenges with possible solution in cloud computing

is multi tenacity which advocated by the Cloud Security D. Ease of Utilization


Alliance [64]. It refers to the need for policy-driven You may find that you do not require hardware as well as
enforcement, segmentation, service levels, as well as billing software licenses to implement your service, which is
models for different consumer constituencies. depending upon the type of service being offered.
E. Backup and Recovery
Some benefits [12], [30], [55] of cloud computing such as:
1) Flexibility and dynamic scalability All data is stored in the cloud, backing it up as well as
2) Competitiveness restoring the same is relatively much easier than storing the
3) Work from anywhere same on a physical device [65]. Mostly cloud service
4) Achieve economies of scale providers are usually competent enough to handle also
5) Disaster recovery recovery of information [65]. So, it makes the whole process
6) Automatic software updates of backup as well as recovery much easier than other
7) Increased collaboration traditional methods of data storage.
8) Minimize licensing new software
F. Continuous Availability
9) Well documented
10) Environmentally friendly In Clouds all public cloud services are available wherever
11) Reduce spending on technology infrastructure you are located [66].
12) Streamline processes G. Quality of Service
13) Reduced cost When you can obtain under contract from your vendor
14) Projects monitor more effectively then Quality of service is something.
15) Business continuity
16) Increased storage H. Automatic Software Integration
17) Minimized capital expenditure You can choose just those services as well as software
18) Location and device independence applications that you think will best suit for your particular
19) Utilization and efficiency improvement enterprise [65].
20) High computing power
I. Scalability
21) Optimized server utilization
22) Shortened development life cycle You need pay for the applications and data storage,
23) Reduced time for implementation which is used [66].

III. ADVANTAGES OF CLOUD COMPUTING J. Flexibility and Reliability


Cloud Computing [41] is a modern technology that uses The scale of cloud computing networks and also their
the internet as well as central remote servers to maintain data ability to provide load balancing and failover makes them
and applications. Cloud computing [22] is a computing highly reliable.
paradigm that allows consumers and businesses to use K. Easy Access to Information
applications without installation as well as access their One time you register yourself in the cloud, then you can
personal files at any computer with internet access. access the information from anywhere, anytime, where
A simple example of cloud computing is Yahoo email, there is an Internet connection [65].
Gmail, or Hotmail etc. and this delivery of computing as a L. Elasticity
service allows for much more efficient computing by
centralizing data storage, processing and bandwidth. Cloud Private clouds can be scaled to meet your modifying IT
computing includes some important advantages such as: system demands also [66].

M. Outsourced IT management
A. Simplicity and Lower Costs
Outsourced IT Management (IT Outsourcing) is a
We know that cloud networks manage at higher
bespoke service designed to meet the needs of your
efficiencies as well as with greater utilization, significant
business. It is primarily aimed at companies that do not
cost reductions are often encountered [38].
have a dedicated IT resource, or for those that need some
B. Almost Unlimited Storage extra assistance on a part-time basis and you achieve
Cloud gives you almost unlimited storage capacity for considerable reductions in IT staffing costs, in most
instances.
storing information [65]. So, you no more need to worry
about running out of storage space. N. Quick Deployment
C. Less Maintenance Cloud computing provides you the advantage of quick
In clouds applications, hardware and bandwidth are deployment [65]. The amount of time consume here will
managed by the provider [66]. depend on the exact kind of technology that you need for your
business [65].

2 www.ijerm.com
International Journal of Engineering Research And Management (IJERM)
ISSN: 2349- 2058, Volume-1, Issue-4, July 2014

O. Simplified maintenance and upgrade you will need a very good Internet connection to be logged
You can easily apply patches and upgrades because the onto the server at all times easily [65].
system is centralized, that means your users always have E. Not everything fits into the cloud
access to the latest software versions.
Depending on the cloud service provider, you may face
P. Expert Service restrictions on available applications, infrastructure options
as well as operating systems [66]. Complicating matters
Cloud computing services are continuously monitored as more is the simple fact that not all platforms can live in the
well as maintained by our onsite staff of expert data center cloud, then it is important to ensure that the cloud service
technicians [66]. provider you choose offers physical colocation services as
well as if your platform in the cloud needs to speak to
Q. Low barrier to Entry
applications on other platforms, this type of flexibility of
Anyone can be a giant at any time, in cloud computing, physical colocation will work to ensure successful
and in particular, upfront capital expenditures are interoperation [66].
dramatically reduced.
F. Prone to Attack
R. Easy Implementation
Sensitive information and important data in the cloud
Cloud hosting allows businesses to retain the same could make your company vulnerable to external hack
applications as well as business processes without having to attacks and threats [65]. As we know that, nothing on the
deal with the backend technicalities and provides lesser cost Internet is fully secure so, there is always the lurking
for in-house IT infrastructure maintenance [68]. possibility of stealth of sensitive information.

IV. DISADVANTAGES OF CLOUD COMPUTING G. Compatibility


Every existing tool, software and computer is compatible
In spite of cloud computing many benefits, as discussed
with the Web based service, platform or infrastructure [67].
above, it also has some disadvantages. Businesses, mainly
smaller ones, need to be aware of these cons before going in H. Bandwidth Issues
for this powerful technology [43]. As you choose your cloud Providing an ideal performance, clients have to plan
computing options, some disadvantages to be aware of accordingly as well as do not pack large amounts of servers
include such as: and storage devices into a small set of data centers [68].

A. Constant Internet Connection V. SECURITY ISSUES OF CLOUD COMPUTING


Cloud computing completely dependent on network The vendor [7], [9], [59] for Cloud must make sure that
connections, thus it makes your business dependent on the customer does not face any problem like loss of data, data
reliability of your Internet connection [70]. If you do not have theft or more [46]. Here I discussed, some of the problem
an Internet connection, you cannot access anything, even
which is faced by the Cloud computing:
your own sensitive data, and cloud computing does not work
properly for the slow connection [70]. A. Data Loss
B. Security in the Cloud If the vendor closes due to financial problems there will be
a loss of data for the customers, so it is a serious problem in
The main issue in the cloud is that of security issues [38].
Before using cloud computing, you should know that you will Cloud computing, as well as customers won’t be access those
be surrendering all your company’s sensitive or important data’s because data is no more available for the customer as
information to a third-party cloud service provider [65]. You the vendor shut down [33], [40].
need to make sure that you choose the most reliable service B. Data Location
provider, who will keep your sensitive information totally
Location of any data nothing is transparent even the
secure.
customer don’t know where his own data’s are located.
C. Less control Vendor does not reveal where all the data’s are stored and
Public clouds are easy for scaling up and down your data’s won’t even be in the same country of customer, it
resources, companies which require complete and total might be located anywhere in the world [33], [40].
control over their data as well as applications will need to
avoid the public cloud [66], [69]. Another solutions contains C. Data Theft
hybrid clouds, private clouds, and colocation. Many cloud Vendors instead of acquiring a server tries to
lease a server from another service providers because they are
D. Technical Issues
cost affective [63]. The customer doesn’t know any things, so
Sensitive information and data on the cloud can be there is a possibility that the sensitive data can be stolen from
accessed anytime as well as from anywhere at all, there are external server by a malicious user [33].
times when this system can have some serious dysfunction
[65]. So, you should be knowledge of the fact that cloud D. Data Integrity
computing is always prone to outages and technical issues. Data is store on a cloud, then anyone from any location can
Best cloud service providers run into this type of trouble, in access those data’s from the cloud and also Cloud does not
spite of keeping up high standards of maintenance, and also, differentiate between a sensitive data from a common data so

3
www.ijerm.com
An analysis of security and privacy issues, Challenges with possible solution in cloud computing

enabling anyone to access those sensitive data’s, Thus it is a cloud computing is that how it addresses the security and
lack of data integrity [14], [33], [39], [40]. privacy concerns of businesses thinking of adopting it [23],
[51]. Hacking as well as other attacks to cloud infrastructure
E. Privacy Issues
would affect multiple clients even if only one site is attacked
Most of the servers are external, so vendor should make [19]. All types of risks can be mitigated by using security
sure who is accessing the data as well as who is maintaining applications, encrypted file systems, data loss software, and
the server so enabling the vendor to protect the customer’s buying security hardware [15], [25].
information [14], [33].
B. Billing and Service Delivery
F. Security on User Level
The service-level agreements of the provider are not
Vendor has provided a very good security layer for the adequate to guarantee the scalability as well as availability,
customer, and customer should make sure that because of its and businesses will be reluctant to switch to cloud without a
own action, there shouldn’t be any loss of data for other users hard service quality guarantee [19], [49]. Some problem
who are using the same Cloud [33], [40]. arises to assess the costs involved due to the on-demand
G. Security on Vendor Level nature of the services. Existing federal guidance for using
A Cloud is good if when there is a very good security cloud services may be insufficient and incomplete [19].
provided by the vendor to the customers. Server is much C. Portability and Interoperability
secured from all the external threats, this all things vendor Some agencies may not have the necessary tools and
should make sure [33]. resources, like expertise among staff, to implement cloud
H. Infected Application solutions [11], [19], [49]. Services of cloud computing should
Vendor should have the full access to the server for have the capability to integrate smoothly with the on
monitoring as well as maintenance, so preventing any premise IT [51]. Corporate and Businesses should have the
malicious user from uploading any infected application onto leverage of migrating in as well as out of the cloud and
Cloud which will severely affect the customer [33]. switching providers whenever they want, and also there
should be no lock-in period [19]. To preserve ability to
VI. PRIVACY ISSUES OF CLOUD COMPUTING change vendors in the future, all agencies may attempt to
avoid platforms that lock customers into a particular product
Cloud service [9], [58] providers have already collected
[19].
petabytes of sensitive important information stored in data
centers around the whole world [50]. The acceptance of cloud D. Availability and Reliability
computing so will be determined by privacy issues addressed Cloud providers still lack round-the-clock service, and its
by these companies as well as countries where the data results in frequent outages as well as it is important to
centers are located [13], [26]. Privacy is also affected by monitor the service being provided using third-party tools
cultural differences, some cultures favor privacy, but others [19], [27]. This is vital to have plans to supervise usage,
emphasize community, thus leads to an ambivalent attitude service-level agreements, performance, and business
towards privacy in the Internet which is also a global system. dependency of these services [19], [49], [54].

Cloud computing [28] has significant implications for the E. Bandwidth Cost and Performance
privacy of important information and for the confidentiality Businesses and Corporate can save money on hardware
of business and governmental information. Cloud provider’s therefore they have to spend more for the bandwidth. It can
terms of service, privacy policy, and location may be a small cost for smaller applications but can be high for
significantly affect a user’s privacy as well as confidentiality the data-intensive applications [19], [49]. Complex data as
interests [35]. well as delivering intensive over the network requires
sufficient bandwidth, so many businesses are waiting for
VII. CHALLENGES OF CLOUD COMPUTING a reduced cost before switching to the cloud [19].
Despite its growing influence, concerns regarding cloud F. Data Protection and Recovery
computing still remain and all Companies are increasingly Data Security [16], [20] is a crucial element and Service
aware of the business value which cloud computing brings as providers are responsible for maintaining data security in the
well as are taking steps towards transition to the cloud [31]. cloud model [30], [51]. All business applications have
Like any new technology, the adoption of cloud computing is Service level agreements and Operational teams play a key
not free from issues, so here we discussed some common role in management of service level agreements as well as
challenges are: runtime governance of applications [49].
A. Privacy and Security G. Service Quality
Cloud vendors may not be familiar with security Service quality [21], [45] is one of the important factors
requirements which are unique to government agencies, like that the enterprises cite as a reason for not moving his
continuous monitoring as well as maintaining an inventory business applications to cloud. Service level agreements [14],
of systems [19], [21], [49]. The most important challenge to [60] provided by the cloud providers today are not sufficient

4 www.ijerm.com
International Journal of Engineering Research And Management (IJERM)
ISSN: 2349- 2058, Volume-1, Issue-4, July 2014

to guarantee the requirements for running a production different cloud data management [42].
applications on cloud especially related to the performance,
C. Use the Cloud Wisely
availability, and scalability [21], [49]. So, without proper or
sufficient service quality guarantee enterprises are not going If a government entity wants access to sensitive data, at
to host their business critical infrastructure in the cloud [21]. least they need to come to me and tell me that they want it,
once that is moved to the cloud, all visibility to that is now
H. Management Capabilities lost and they go directly to the cloud provider [18]. Your
Management of platform and infrastructure is still in its cloud provider have access to data by your encryption keys, if
infancy as well as some Features such as Auto-scaling, are a it is possible.
crucial requirement for many enterprises [30].
D. Contract Clear With Cloud Vendor
I. Integration If any cloud vendor closes before contract, enterprise can
Some application has complex integration needs to claim, so contract should be clear with cloud vendor [42].
connect to another cloud applications and other on premise
E. Data Storage Regulations
applications and also need to connect the cloud application
with the rest of the enterprise in a simple, quick, easy and The architecture of cloud environment is key and you must
cost effective way [21]. understand concept of the respective data storage regulations
in the countries you operate in. You must look for cloud
J. Compliance Restrictions and Regulatory security solutions which are compliant with regulations such
In some of countries, Government regulations do not allow as HIPAA, PCI DSS, and EU data protection laws and EU’s
customer’s information or other sensitive information to be very restrictive regulations, accept that this is a very good
physically located outside country, so it is a big challenge for solution [18].
cloud providers [30].
F. Facilities for Recovery
K. Costing and Charging Model Cloud vendors should be responsible for recovery the date.
When migrating to the Cloud can significantly reduce the If any data is lost due to certain issues, they can be recovered
infrastructure cost, and it does raise the cost of data as well as continuity of data can be managed [42].
communication, such as the cost of transferring an
G. Enterprise Infrastructure
organization's data to and from the public as well as
community Cloud and the cost per unit of computing Amazon Web Service’s has their own security
resource to be higher [1], [37]. Strategic and viable charging center explains that so cloud provider has secured the
model for Software as a Service (SaaS) provider is crucial for underlying infrastructure and you, also the client, must
the profitability as well as sustainability of Software as a secure anything you put on the infrastructure [18]. Enterprise
Service (SaaS) cloud providers also [1]. must have infrastructure which give you facilitates for
installation as well as configuration of hardware components
VIII. SOLUTION OF SECURITY ISSUES OF CLOUD COMPUTING like firewalls, routers, servers, proxy servers, and software
etc. [42], [48].
Small and large Businesses are realizing the benefits that
come with cloud computing technology [24]. The scalability H. Use Split-key Encryption Technologies
which allows you to easily shrink your operation, agility that You should use split-key encryption technologies [18] to
enables you to make quick changes, cost-effectiveness so can ensure that only you control your sensitive data and also your
save you money, cloud seems such as a no-brainer [28], cloud provider shares responsibility for the infrastructure,
[56]. When increased cloud adoption rates come increased therefore you are still responsible for your apps and data [42].
cloud computing security issues also. Here we discussed At least not in a readable form you also Use a cloud
about some solution of security issues in cloud computing: encryption solution to show that your data never left home.
A. Vulnerability shielding I. Access Control
When water hole attacks occurs, then solution is Access control [4], [47] is a key concern, and Cloud
Vulnerability shielding [18] that update and patch all requires also a user centric access control where user request
software regularly to limit possible access points. The water to any service provider is bundled with the user identity as
hole attack contains 3-step process, first, the attacker does well as entitlement information. User identity [4] will have
some reconnaissance and research on its target, in which they identifiers which identity and define the user. This approach
find trusted websites often visited by employees of the target leaves the user with the ultimate control of their digital
company. Then, attackers insert an exploit into the trusted identities and implies that the system maintains a context of
sites, and finally, when your employees visit the trusted site, information for every user.
the exploit takes advantage of their system vulnerabilities.
J. Investigation Support
B. Find Right Cloud Provider When use the facility of cloud, Audit tools also provided to
Second solution of security issues in cloud computing is the users to determine how their data is stored, protected,
find right cloud provider (well established, experience, used, as well as verify policy enforcement, and this audit
standards and regulation), because different vendors have tools must be contractually committed along with the

5
www.ijerm.com
An analysis of security and privacy issues, Challenges with possible solution in cloud computing

evidence [61]. [12] Anthony Bisong and Syed (Shawon) M. Rahman “AN OVERVIEW OF
THE SECURITY CONCERNS IN ENTERPRISE CLOUD
K. ID Management and Authentications COMPUTING”; International Journal of Network Security & Its
Applications (IJNSA), Vol.3, No.1, January 2011; DOI:
When access monitoring is to implement of Key 10.5121/ijnsa.2011.3103.
Management for both cloud service provider and client and [13] Ragib Hasan; Johns Hopkins Universityen.600.412 Spring 2010”
Security and Privacyin Cloud Computing”.
Key must be known for both entities as well as will be , ,
[14] Rabi Prasad Padhy Manas Ranjan Patra Suresh Chandra Satapathy;
remotely monitored [4]. When clients access the cloud “Cloud Computing: Security Issues and Research Challenges”; IRACST
- International Journal of Computer Science and Information Technology
computing services, it must be first authenticated, not only & Security (IJCSITS); Vol. 1, No. 2, December 2011; ISSN: 2249-9555.
using username and password but a digital ID’s also [4]. [15] J.SRINIVAS, K.VENKATA SUBBA REDDY, Dr.A.MOIZ QYSER,”
CLOUD COMPUTING BASICS”; International Journal of Advanced
Research in Computer and Communication Engineering Vol. 1, Issue 5,
Find solutions which require no hardware that is the best July 2012; ISSN: 2278 – 1021.
fit for cloud environments. In short, a solution should give all [16] Kangchan Lee, “Security Threats in Cloud Computing Environments”;
International Journal of Security and Its Applications Vol. 6, No. 4,
the benefits as well as up in minutes too, so, make sure you October, 2012.
limit your vulnerabilities, do not let anyone have access to [17] www.priv.gc.ca 02_05_d_51_cc_e.pdf
your own encryption keys, comply with all required laws as [18] http://www.cloudave.com/34670/top-cloud-computing-security-issues-s
olutions/
well as regulations, use encryption technology to make your [19] http://cloudtweaks.com/2012/08/top-five-challenges-of-cloud-computin
life easier, and understand that you share responsibility for g/
[20] http://www.networkworld.com/article/2189909/cloud-computing/the-7-
liability. most-common-challenges-to-cloud-computing.html
[21] https://www.ibm.com/developerworks/community/blogs/c2028fdc-41fe-
IX. CONCLUSION 4493-8257-33a59069fa04/entry/top_5_challenges_to_cloud_computin
g4?lang=en
Cloud computing contains a potential for cost savings to [22] PROF: ASHA MATHEW, “SECURITY AND PRIVACY ISSUES OF
the enterprises but enormous is security risk. We must be CLOUD COMPUTING; SOLUTIONS AND SECURE
FRAMEWORK”; ZENITH International Journal of Multidisciplinary
careful to understand the security risks and challenges posed Research Vol.2 Issue 4, April 2012, ISSN 2231 5780.
in utilizing cloud computing. This technology has also the [23] “Security and Privacy in Cloud Computing”; Ragib Hasan Johns
Hopkins Universityen.600.412 Spring 2010; 600.412.lecture01.pdf
potential to become a frontrunner in promoting a secure, [24] Allan A. Friedman and Darrell M. West “Privacy and Security in Cloud
virtual as well as economically viable IT solution in the Computing”; 1026_cloud_computing_friedman_west.pdf
future. In our future work, we will try to include improving [25] “Security Issues in Cloud Computing”; Anya Kim; Naval Research
Lab,anya.kim@nrl.navy.mil;Anya-Kim-Bhargava-MCCWorkshop.ppt
the current cloud security model, developing of testing of [26] “Cloud Computing Security and Privacy Issues”; LSI SIN (10)02,
data flow, investigating in cloud security management CEPIS; CEPIS_Cloud_Computing_Security_v17.11.pdf
[27] Cloud Computing: Outsourcing Computation without Outsourcing
problem and security in cloud computing. Control; FUJITSU; cgjmmss.pdf
[28] “CLOUD COMPUTING TUTORIAL”; Simply Easy Learning by
REFERENCES tutorialspoint.com; cloud_computing_tutorial.pdf
[29] Alexa Huth and James Cebula; “The Basics of Cloud Computing”;
[1] Kuyoro S. O., Ibikunle F. & Awodele O. “Cloud Computing Security US-CERT; CloudComputingHuthCebula.pdf
Issues and Challenges” International Journal of Computer Networks [30] Torry Harris; “CLOUD COMPUTING – An Overview”;
(IJCN), Volume (3): Issue (5): 2011. Cloud-Computing-Overview.pdf
[2] www.btpsonline.com/wysk.html “what you should know”. [31] Ilyas Iyoob, Emrah Zarifoglu, A. B. Dieker; “Cloud Computing
[3] Ashalatha R “A SURVEY ON SECURITY AS A CHALLENGE IN Operations Research”; cloudOR.pdf
CLOUD COMPUTING”; International Journal of Advanced [32] Issa M. Khalil, Abdallah Khreishah and Muhammad Azeem; “Cloud
Technology & Engineering Research (IJATER), National Conference on Computing Security: A Survey”; Computers 2014, 3, 1-35; doi:
Emerging Trends in Technology (NCET-Tech); Volume 2, Issue 4, July 10.3390/computers3010001; ISSN 2073-431X;
2012; ISSN No: 2250-3536. www.mdpi.com/journal/computers
[4] Young-Gi Min, Hyo-Jin Shin, Young-Hwan Bang “Cloud Computing [33] LOrd CrusAD3r;“Problems Faced by Cloud Computing”
Security Issues and Access Control Solutions”; Journal of Security [34] essential characteristics of cloud computing.pdf
Engineering. [35] “THE FUTURE OF CLOUD COMPUTING”; OPPORTUNITIES FOR
[5] Research in Cloud Security and Privacy; Modified from Bharat EUROPEAN CLOUD COMPUTING BEYOND 2010; Expert Group
Bhargava, Anya Kim, YounSun Cho; 12-cloud-security.ppt Report, Public Version 1.0; Rapporteur for this Report: Lutz Schubert
[6] Hosam AlHakami, Hamza Aldabbas, and Tariq Alwada’n [USTUTT-HLRS], Editors: Keith Jeffery [ERCIM], Burkhard
“COMPARISON BETWEEN CLOUD AND GRID COMPUTING: Neidecker-Lutz [SAP Research]
REVIEW PAPER”; International Journal on Cloud Computing: Services [36] Christopher Olive, “Cloud Computing Characteristics Are Key”, White
and Architecture (IJCCSA), Vol.2, No.4, August 2012; DOI: Paper, www.gpworldwide.com
10.5121/ijccsa.2012.2401. [37] Siani Pearson, “Privacy, Security and Trust in Cloud Computing”, HP
[7] Nelson Gonzalez, Charles Miers, Fernando Red´ıgolo, Marcos Laboratories, HPL-2012-80R1
Simpl´ıcio, Tereza Carvalho, Mats N¨aslund and Makan Pourzandi”; A [38] Krešimir Popović, Željko Hocenski, “Cloud computing security issues
quantitative analysis of current security concerns and solutions for cloud and challenges”, MIPRO 2010, May 24-28, 2010, Opatija, Croatia
computing”, Gonzalez et al. Journal of Cloud Computing: Advances, [39] Vahid Ashktorab, Seyed Reza Taghizadeh, “Security Threats and
Systems and Applications 2012, 1:11; Countermeasures in Cloud Computing”, International Journal of
http://www.journalofcloudcomputing.com/content/1/1/11. Application or Innovation in Engineering & Management (IJAIEM),
[8] Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and Volume 1, Issue 2, October 2012, ISSN 2319 – 4847, www.ijaiem.org
Eduardo B Fernandez “An analysis of security issues for cloud [40] Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull, “Security Issues
computing”; Hashizume et al. Journal of Internet Services and with Possible Solutions in Cloud Computing-A Survey”, International
Applications 2013, 4:5; http://www.jisajournal.com/content/4/1/5. Journal of Advanced Research in Computer Engineering & Technology
[9] Jaydip Sen; Innovation Labs, Tata Consultancy Services Ltd., Kolkata, (IJARCET), Volume 2, Issue 2, February 2013, ISSN: 2278 – 1323
INDIA “Security and Privacy Issues in Cloud Computing”. [41] Mr. D. Kishore Kumar, Dr.G.Venkatewara Rao, Dr.G.Srinivasa Rao,
[10] Han Qi, Abdullah Gani “Research on Mobile Cloud Computing: Review, “Cloud Computing: An Analysis of Its Challenges & Security Issues”,
Trend and Perspectives”. International Journal of Computer Science and Network (IJCSN),
[11] Rohit Bhadauria, Sugata Sanyal “Survey on Security Issues in Cloud Volume 1, Issue 5, October 2012 www.ijcsn.org ISSN 2277-5420
Computing and Associated Mitigation Techniques”. [42] Pradeep Kumar Tiwari, Dr. Bharat Mishra, “Cloud Computing Security
Issues, Challenges and Solution”, International Journal of Emerging

6 www.ijerm.com
International Journal of Engineering Research And Management (IJERM)
ISSN: 2349- 2058, Volume-1, Issue-4, July 2014

Technology and Advanced Engineering Website: www.ijetae.com (ISSN Rakesh Kumar


2250-2459, Volume 2, Issue 8, August 2012)
[43] Awada Uchechukwu, keqiu Li, Yanming Shen, “Improving Cloud First Author personal profile which contains
Computing Energy Efficiency”. their education details, their publications,
[44] Viswa prakash babu, Banda Sreenivas, Thota Praveen Kumar, R.Jawahar research work, membership, achievements, with
Lal, “Cracking Bluetooth security” Int. Journal of Applied Sciences and photo that will be maximum 200-400 words.
Engineering Research, Vol. 3, No. 2, 2014, www.ijaser.com, ISSN 2277
– 8442
[45] Yaser Ghanam, Jennifer Ferreira, Frank Maurer, “Emerging Issues &
Challenges in Cloud Computing— A Hybrid Approach”, Journal of
Software Engineering and Applications, 2012, 5, 923-937, Sunil Kumar Jangir
http://dx.doi.org/10.4236/jsea.2012.531107 Published Online
November 2012 (http://www.SciRP.org/journal/jsea) Second Author personal profile which contains
[46] Nir Kshetri, Associate Professor, The University of North their education details, their publications,
Carolina-Greensboro, USA “PRIVACY AND SECURITY ISSUES IN research work, membership, achievements, with
CLOUD COMPUTING”, PTC’11 Proceedings photo that will be maximum 200-400 words.
[47] Wayne Jansen, Timothy Grance, “Guidelines on Security and Privacy in
Public Cloud Computing”, Draft Special Publication 800-144, Computer
Security Division, Information Technology Laboratory, National
Institute of Standards and Technology, Gaithersburg, MD 20899-8930
[48] Mladen A. Vouk, “Cloud Computing – Issues, Research and
Implementations”, Journal of Computing and Information Technology -
CIT 16, 2008, 4, 235–246, doi:10.2498/cit.1001391 Bhanu Bhushan
[49] Ms. Disha H. Parekh, Dr. R. Sridaran, “An Analysis of Security
Challenges in Cloud Computing”, (IJACSA) International Journal of Third Author personal profile which contains
Advanced Computer Science and Applications, Vol. 4, No.1, 2013 their education details, their publications,
[50] Nelson Gonzalez, Charles Miers, Fernando Redígolo, Tereza Carvalho, research work, membership, achievements, with
Marcos Simplicio, Mats Näslund and Makan Pourzandi, “An quantitative photo that will be maximum 200-400 words.
analysis of current security concerns and solutions for cloud computing”
[51] “Cloud Computing RCIS tutorial”, Dan C. Marinescu , Computer
Science Division, EECS Department, UCF
[52] Gordon Haff, “INTRODUCTION TO CLOUD COMPUTING” White
Paper
[53] Ahmed Mohamed Gamaleldin,“An Introduction to Cloud Computing
Concepts” Practical Steps for Using Amazon EC2 IaaS Technology
[54] Dr. David Turahi, “Security and Privacy: Can we trust the cloud?”, East
African Information Conference 13-14thAugust, 2013, Kampala,
Uganda
[55] “Security in Cloud Computing”, Mrs P.R.Lakshmi Eswari e-Security
Team, C-DAC, Hyderabad
[56] Anitha Y, “Security Issues in Cloud Computing - A Review”,
International Journal of Thesis Projects and Dissertations (IJTPD), Vol.
1, Issue 1, PP: (1-6), Month: October-December 2013, Research Publish
Journals
[57] Peter Mell, Timothy Grance, “The NIST Definition of Cloud
Computing”, Recommendations of the National Institute of Standards
and Technology, Special Publication 800-145
[58] “Privacy in Cloud Computing”, ITU-T Technology Watch Report March
2012
[59] Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani
Thuraisingham, "Security Issues for Cloud Computing"
[60] Pankaj Arora, Rubal Chaudhry Wadhawan, Er. Satinder Pal Ahuja,
“Cloud Computing Security Issues in Infrastructure as a Service”,
International Journal of Advanced Research in Computer Science and
Software Engineering, Volume 2, Issue 1, January 2012 ISSN: 2277
128X
[61] Rajesh Piplode, Umesh Kumar Singh “An Overview and Study of
Security Issues & Challenges in Cloud Computing”, International Journal
of Advanced Research in Computer Science and Software Engineering,
Volume 2, Issue 9, September 2012 ISSN: 2277 128X
[62] Seyyed Mohsen Hashemi, Amid Khatibi Bardsiri, “Cloud Computing Vs.
Grid Computing”, ARPN Journal of Systems and Software, VOL. 2,
NO.5, MAY 2012, ISSN 2222-9833
[63] Yanpei Chen, Vern Paxson, Randy H. Katz, “What’s New About Cloud
Computing Security?”,Electrical Engineering and Computer Sciences
University of California at Berkeley
[64] Robert Gellman, “Privacy in the Clouds: Risks to Privacy and
Confidentiality from Cloud Computing”, February 23, 2009
[65] http://mobiledevices.about.com/od/additionalresources/a/Cloud-Comput
ing-Is-It-Really-All-That-Beneficial.htm
[66] http://www.expedient.com/products/cloud-computing/advantages.php
[67] http://www.cloudcomputinginsights.com/management/cloud-computing-
advantages-and-disadvantages/?mode=featured
[68] http://www.stratospherenetworks.com/advantages-and-disadvantages-of-
cloud.html
[69] http://sn.com.au/what-is-cloud-computing-its-advantages-disadvantages/
[70] http://www.techinmind.com/what-is-cloud-computing-what-are-its-adva
ntages-and-disadvantages/

AUTHORS

7
www.ijerm.com

You might also like