Security and privacy issues for cloud computing and its challenges

Security and privacy issues for cloud computing and its challenges

Moumita Sen Sasmita S. Choudhury 

Department of Computer Science & Engineering, MCKV Institute of Engineering, Liluah 711204, India

Corresponding Author Email: 
moumita02314@gmail.com
Page: 
62-66
|
DOI: 
10.18280/rces.040204
Received: 
| |
Accepted: 
| | Citation

OPEN ACCESS

Abstract: 

In Today’s world with the engineering development, Internet connectivity has become a commodity product. With the rapid adoption of Web technologies such as blogging, online media sharing, social networking, it generates enormous quantities of data onto Internet servers. Like traditional infrastructure utilities, such as gas and electricity, “cloud” computing provide computing services via the internet on demand and pay per use access to a pool of shared resources namely networks, storage, servers, services and applications, without physically acquiring them. It saves managing cost and time for organizations and due to its flexible infrastructure, net centric approach and ease of access, the cloud computing has become prevalent. Today, security issue is the biggest hazards to moving services to external clouds. With cloud computing, data is stored and delivered over the Internet. The owner of the data does not have the control over the data even, does not know the location of the data and limited control over the data may incur various security issues and threats. Hence  we discusses different security issues, its privacy and risk in a cloud and  also suggests how to reduce  the risk in cloud.

Keywords: 

Cloud Security, Risk Handling, Security Framework, CIA

1. Introduction
2. Cloud Computing Security Fundamentals
3. About Cloud Security
4. Security Framework in Cloud
5. Security Issue in Cloud Computing
6. How to Handle Cloud Security Challenges
7. Existing Algorithms for Cloud Security
8. Steps to Ensure Our Cloud is Secured
9. Conclusions
  References

[1] Buyya R., Broberg J., Goscinski A. (2010). Cloud Computing: Principles and Paradigms, John Wiley & Sons, Vol. 87.

[2] Mohammed M. (2014). Alani: securing the cloud: threats, attacks and mitigation techniques, Journal of Advanced Computer Science and Technology, Vol. 3, No. 2, pp. 202-213. 

[3] Buecker A., Lodewijkx K., Moss H., Skapinetz K., Waidne M. (2009). Cloud security guidance, IBM Red Paper 2009, p. 12. 

[4] Padhy R.P., Patra M.R., Satapathy S.C. (2011). Cloud computing: security issues and research challenges, IRACST- International Journal of Computer Science and Information Technology & Security(IJCSITS), Vol. 11.

[5] Tiwari P.K., Mishra B. Cloud computing security issues, challenges and solution, International Journal of Emerging Technology and Advanced Engineering. Vol. 2. 

[6] Prince Jain: security issues and their solution in cloud computing, International Journal of Computing & Business Research.

[7] Anantwar R.G., Chatur P.N., Anantwar S.G. (2012). Cloud computing and security model: a survey, International Journal of Engineering Science and Innovative Technology (IJESIT), Vol. 1.

[8] Tim M., Subra K., Shahed L. (2009). Cloud security and privacy: an enterprise perspective on risks and compliance, O’ Reilly Media, USA.

[9] Barrie S. (2011). Cloud Computing Bible, Wiley Publishing Inc.

[10] Pearson S., Azzedine B. (2010). Privacy, security and trust issues arising from cloud computing, 2010 IEEE Second International Conference Cloud Computing Technology and Science (CloudCom), pp. 693-702.

[11] Hamouda S.K., Glauert J. Security, Privacy and Trust Management Issues for Cloud Computing, Taylor & Francis Group.

[12] Shakeeba S.K., Tuteja R.R. (year). Security in cloud computin using cryptographic algorithms, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3.