An Analysis of Cloud Computing Security Issues

Authors

  • Baldev Singh  Lyallpur Khalsa College, Jalandhar, India

DOI:

https://doi.org//10.32628/IJSRST207239

Keywords:

Cloud Computing, Privacy, DOS Attacks, Cloud Security Requirements.

Abstract

Cloud computing is one of the emerged technologies in the past decade. Tremendous growth is noticed in the usage and implementation of Cloud computing. Although cloud spectrum is widely popular still there are lot of challenges and issues to be addressed for its optimal usage. Vulnerabilities and threats to the cloud services leads to attacks and exploitation of resources as well as data breaches and privacy violations that need to be addressed at the cloud customer satisfaction level. This paper highlights different cloud security issues and their security requirements. The review aspects and findings of the paper can be used as a reference for further appropriate and effective implementation from the suggested practically viable cloud security solution in an independent manner or using as a hybrid technique.

References

  1. L. Jun-Ho et.al. “Multi-level intrusion detection system and log management in cloud computing,” Proceedings of the13th International Conf. pp. 552–555, Feb. 2011
  2. P. Mell and T. Grance, “The NIST definition of cloud computing,” NIST special publication 800-145, September 2011.
  3. Monowar H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya and J. K. Kalita. Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions . The Computer Journal, 2013.
  4. Mohd Faizal Abdollah, Mohd Zaki Masud, Shahrin S., Robiah Y. , Siti Rahayu S. “Threshold verification using Statistical Approach for Fast Attack Detection” Intl. Journal of Computer Science and Information Security, Vol.2, No 1, 2009.
  5. B. B. Gupta, R. C. Joshi and M. Misra, “Defending against Distributed Denial of Service Attacks: Issues and Challenges,” Information Security Journal: A Global Perspective, Vol. 18, No. 5, 2009, pp. 224-247.
  6. Cloud Security Alliance, March 2010 ?Top Threats to Cloud Computing at (http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf)
  7. Ahmed Patel et. al., “An intrusion detection and prevention system in cloud computing: A systematic review”, Journal of Network and Computer Applications (2012)
  8. “CERT Advisory: SYN Flooding and IP Spoofing Attacks,” CERT® Coordination Center Software Engineering Institute, Carnegie Mellon, 2010. http://www.cert.org/advisories/CA-1996-21.html
  9. Vincenzo Gulisano, Zhang Fu, Mar Callau-Zori, Ricardo Jimenes-Peris, Marina Papatraintafilou, Marta Patino-Martinez “STONE: A Stream-based DDoS Defense Framework Technical Report” no. 2012-07, ISSN 1652-926X, Chalmers University of Technology, Sweden, 2012
  10. Felix Lau Simon , Stuart H. Rubin , H. Smith, Trajkovic , “Distributed Denial of Service Attacks”; http://www2.ensc.sfu.ca/~ljilja/papers/smc00_edited.pdf, 2000.
  11. Faizal M.A., and Zaki M.M., and Shahrin S., and Robiah Y., and Rahayu S.S., (2010) Statistical Approach for Validating Static Threshold in Fast Attack Detection. Journal of Advanced Manufacturing.
  12. Subashini, S., & Kavitha, V. (2011). Review: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1-11.
  13. Kaufman, L. M. (2009). Data security in the world of cloud computing. Security & Privacy, IEEE, 7(4), 61-64.
  14. Jensen, M., Gruschka, N., Schwenk, J., & Iacono, L. L. (2009). On Technical Security Issues in cloud computing. 2009 IEEE International Conference on Cloud Computing, 0, 109-116.
  15. Prachi Deshpande, Aditi Aggarwal, S.C. Sharma, P.Sateesh Kumar, Ajith Abraham, 'Distributed port-scan attack in cloud environment', Computational Aspects of Social Networks (CASoN) 2013 Fifth International Conference on, pp. 27-31, 2013.
  16. S Meena, Esther Daniel, N.A. Vasanthi, 'Survey on various data integrity attacks in cloud environment and the solutions', Circuits Power and Computing Technologies (ICCPCT) 2013 International Conference on, pp. 1076-1081, 2013.
  17. Kelly Beardmore, “The Truth about DDoS Attacks: Part1, TheCarbon60Blog. http://www.carbon60.com/the-truth-about-DDOS-attacks-part-1/Nov.21, 2013.\
  18. Zhifeng Xiao, Yang Xiao, 'Security and Privacy in Cloud Computing', Communications Surveys & Tutorials IEEE, vol. 15, no. 2, pp. 843-859, 2013.

Downloads

Published

2016-01-30

Issue

Section

Research Articles

How to Cite

[1]
Baldev Singh, " An Analysis of Cloud Computing Security Issues, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 2, Issue 1, pp.212-217, January-February-2016. Available at doi : https://doi.org/10.32628/IJSRST207239