A Survey on User Awareness of Cloud Security

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The cloud computing technology provides cost effective, powerful computation resources on the fly. It minimizes the need to procure and maintain expensive hardware, software and reserve space for IT infrastructure. These features for cloud computing encourages organizations and individuals to migrate their resources needs and services to the cloud. However, cloud computing services provided by third-party vendors possesses various security threats. The cloud services store sensitive data (such as credentials, personal information, etc.) of various users on the shared environment that escalates security concerns. The  aim of this research survey paper are three-fold: i) provides guideline for researchers who are new to the cloud computing security area, ii) provides the state-of-the-art survey of cloud computing security issues and challenges, and iii) provides the further research directions required into security assurance of the cloud computing.

     

     


  • Keywords


    cloud; security; characteristics; attacks; counter measures; , challenges in cloud security, cloud computing, security

  • References


      [1] E. Naone, “Technology overview, conjuring clouds”, MIT Technology Review,July–August, 2009.

      [2] National Institute of Standards and Technology, The NIST Definition of Cloud Computing, Information Technology Laboratory, 2009.

      [3] G. Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, in: Theory in Practice”, O’Reilly Media, 2009.

      [4] B. Rajkumar, C. Yeo, S. Venugopal, S. Malpani, “Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing” as the 5th utility, Future Generation Computer Systems (2009).

      [5] L. M. Kaufman, “Data security in the world of cloud computing”, IEEE Security & Privacy, vol. 7, no. 4, 2009, pp. 61-64.

      [6] R. Chow, “Controlling data in the cloud: Outsourcing computation without outsourcing control”. In ACM Workshop on Cloud Computing Security, 2009.

      [7] J. Brodkin, “Gartner: Seven cloud-computing security risks”. In: Infoworld 2008 http://www.infoworld.com/d/securitycentral/gartnersevencloudcomputing- security-risks-53?page=0, 1

      [8] Vishal Meshram, Vidula Meshram and Kailas Patil, “A Survey on Ubiquitous Computing”, ICTACT Journal on Soft Computing, Vol. 6, No. 2, pp. 1130-1135, 2016.

      [9] Chow, R.; Golle, P.; Jakobsson, M.; Shi, E.; Staddon, J.; Masuoka, R.; Molina, J. Controlling data in the cloud: Outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, IL, USA, 13 November 2009; ACM Press: New York, NY, USA, 2009; pp. 85–90.

      [10] Samarati, P.; di Vimercati, S.D.C. Data protection in outsourcing scenarios: Issues and directions. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS ’10), Chicago, IL, USA, 4–8 October 2010; ACM: New York, NY, USA, 2010; pp. 1–14.

      [11] Hashizume, K.; Rosado, D.G.; Fernández-Medina, E.; Fernandez, E.B. An analysis of security issues for cloud computing. J. Internet Serv. Appl. 2013, 4, 5.

      [12] ] S. Lins, P. Grochol, S. Schneider, et al.,“Dynamic certification of cloud servic⁃ es: trust, but verify,”IEEE Security & Privacy Magazine, vol. 14, no. 2, pp. 66- 71, 2016. doi: 10.1109/MSP.2016, 2016.

      [13] J. Tang,“Ensuring security and privacy preservation for cloud data servic⁃ es,”ACM Computing Surveys (CSUR), vol. 49, no. 1, article 13, Jul. 2016.

      [14] Symantec. (2017). Internet security threat report [Online]. Available: https://www. symantec.com/security_response/publications/monthlythreatreport.js

      [15] W. Lin and D. Lee ,“Traceback attacks in cloud—pebbletrace botnet,”in IEEE International Conference on Distributed Computing Systems Workshops, 2014, pp. 417-426

      [16] A. Web, S. Overview, and S. P. May. (2009, Jun.). Amazon web services: over⁃ view of security processes [Online]. Available: https://fenix.tecnico.ulisboa.pt/ downloadFile/3779573805259/AWS_Security_Whitepaper.pdf

      [17] K. Patil, Q. Jawadwala and F. C. Shu, "Design and Construction of Electronic Aid for Visually Impaired People," in IEEE Transactions on Human-Machine Systems, vol. 48, no. 2, pp. 172-182, April 2018. doi: 10.1109/THMS.2018.2799588


 

View

Download

Article ID: 15386
 
DOI: 10.14419/ijet.v7i2.32.15386




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.