A Survey on User Awareness of Cloud Security

  • Authors

    • Dr Gudapati Syam Prasad
    • Vidya S. Gaikwad
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15386
  • cloud, security, characteristics, attacks, counter measures, , challenges in cloud security, cloud computing
  • The cloud computing technology provides cost effective, powerful computation resources on the fly. It minimizes the need to procure and maintain expensive hardware, software and reserve space for IT infrastructure. These features for cloud computing encourages organizations and individuals to migrate their resources needs and services to the cloud. However, cloud computing services provided by third-party vendors possesses various security threats. The cloud services store sensitive data (such as credentials, personal information, etc.) of various users on the shared environment that escalates security concerns. The  aim of this research survey paper are three-fold: i) provides guideline for researchers who are new to the cloud computing security area, ii) provides the state-of-the-art survey of cloud computing security issues and challenges, and iii) provides the further research directions required into security assurance of the cloud computing.

     

     

  • References

    1. [1] E. Naone, “Technology overview, conjuring cloudsâ€, MIT Technology Review,July–August, 2009.

      [2] National Institute of Standards and Technology, The NIST Definition of Cloud Computing, Information Technology Laboratory, 2009.

      [3] G. Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, in: Theory in Practiceâ€, O’Reilly Media, 2009.

      [4] B. Rajkumar, C. Yeo, S. Venugopal, S. Malpani, “Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing†as the 5th utility, Future Generation Computer Systems (2009).

      [5] L. M. Kaufman, “Data security in the world of cloud computingâ€, IEEE Security & Privacy, vol. 7, no. 4, 2009, pp. 61-64.

      [6] R. Chow, “Controlling data in the cloud: Outsourcing computation without outsourcing controlâ€. In ACM Workshop on Cloud Computing Security, 2009.

      [7] J. Brodkin, “Gartner: Seven cloud-computing security risksâ€. In: Infoworld 2008 http://www.infoworld.com/d/securitycentral/gartnersevencloudcomputing- security-risks-53?page=0, 1

      [8] Vishal Meshram, Vidula Meshram and Kailas Patil, “A Survey on Ubiquitous Computingâ€, ICTACT Journal on Soft Computing, Vol. 6, No. 2, pp. 1130-1135, 2016.

      [9] Chow, R.; Golle, P.; Jakobsson, M.; Shi, E.; Staddon, J.; Masuoka, R.; Molina, J. Controlling data in the cloud: Outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, IL, USA, 13 November 2009; ACM Press: New York, NY, USA, 2009; pp. 85–90.

      [10] Samarati, P.; di Vimercati, S.D.C. Data protection in outsourcing scenarios: Issues and directions. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS ’10), Chicago, IL, USA, 4–8 October 2010; ACM: New York, NY, USA, 2010; pp. 1–14.

      [11] Hashizume, K.; Rosado, D.G.; Fernández-Medina, E.; Fernandez, E.B. An analysis of security issues for cloud computing. J. Internet Serv. Appl. 2013, 4, 5.

      [12] ] S. Lins, P. Grochol, S. Schneider, et al.,“Dynamic certification of cloud servic⃠es: trust, but verify,â€IEEE Security & Privacy Magazine, vol. 14, no. 2, pp. 66- 71, 2016. doi: 10.1109/MSP.2016, 2016.

      [13] J. Tang,“Ensuring security and privacy preservation for cloud data servic⃠es,â€ACM Computing Surveys (CSUR), vol. 49, no. 1, article 13, Jul. 2016.

      [14] Symantec. (2017). Internet security threat report [Online]. Available: https://www. symantec.com/security_response/publications/monthlythreatreport.js

      [15] W. Lin and D. Lee ,“Traceback attacks in cloud—pebbletrace botnet,â€in IEEE International Conference on Distributed Computing Systems Workshops, 2014, pp. 417-426

      [16] A. Web, S. Overview, and S. P. May. (2009, Jun.). Amazon web services: over⃠view of security processes [Online]. Available: https://fenix.tecnico.ulisboa.pt/ downloadFile/3779573805259/AWS_Security_Whitepaper.pdf

      [17] K. Patil, Q. Jawadwala and F. C. Shu, "Design and Construction of Electronic Aid for Visually Impaired People," in IEEE Transactions on Human-Machine Systems, vol. 48, no. 2, pp. 172-182, April 2018. doi: 10.1109/THMS.2018.2799588

  • Downloads

  • How to Cite

    Gudapati Syam Prasad, D., & S. Gaikwad, V. (2018). A Survey on User Awareness of Cloud Security. International Journal of Engineering & Technology, 7(2.32), 131-135. https://doi.org/10.14419/ijet.v7i2.32.15386