Security, Privacy and Trust Challenges in Cloud Computing and Solutions

Full Text (PDF, 236KB), PP.34-40

Views: 0 Downloads: 0

Author(s)

Seyyed Yasser hashemi 1,* Parisa Sheykhi Hesarlo 1

1. Department of Computer Engineering, miyandoab Branch, Islamic Azad University, miyandoab, Iran

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2014.08.05

Received: 11 Jan. 2014 / Revised: 2 Apr. 2014 / Accepted: 26 May 2014 / Published: 8 Jul. 2014

Index Terms

Cloud Computing, Security Challenges, Security, Privacy, Trust

Abstract

Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing recently emerged as a promising solution to information technology (IT) management. IT managers look to cloud computing as a means to maintain a flexible and scalable IT infrastructure that enables business agility. As much as the technological benefits, cloud computing also has risks involved. In this paper Cloud Computing security challenges will be discussed and proposed many new recommendations to increase security and trust also maintaining privacy.

Cite This Paper

Seyyed Yasser hashemi, Parisa Sheykhi Hesarlo, "Security, Privacy and Trust Challenges in Cloud Computing and Solutions", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.8, pp.34-40, 2014. DOI:10.5815/ijcnis.2014.08.05

Reference

[1]Robinson, Neil and Valeri, Lorenzo and Cave, Jonathan and Starkey, Tony and Graux, Hans and Creese, Sadie and Hopkins, Paul P., The Cloud: Understanding the Security, Privacy and Trust Challenges 2011.
[2]Madhan Kumar Srinivasan, K. Sarukesi, Paul Rodrigues, M. Sai Manoj, P. Revathy, “State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment”, Proceedings of the International Conference on Advances in Computing, Communications and Informatics, March, 2012, pp. 470-476.
[3]K, Sachdeva, Cloud Computing: Security Risk Analysis and Recommendations, Master Thesis, University of Texas, Austin, 2011.
[4]J.R. Winkler, Securing the Cloud: Cloud Computer Security Techniques and Tactics, Technical EditorBill Meine, Elsevier Publishing, 2011.
[5]Q. Wang, C. Wang, J. Li, K. Ren and W. Lou, ―Enabling public verifiability and data dynamics for storage security in cloud computing,‖ In: Computer Security–ESORICS (pp. 355-370). Springer Berlin Heidelberg, 2009.
[6]Sumit Goyal, Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review, I.J. Computer Network and Information Security, 2014, 3, 20-29.
[7]Chiang Ku Fan, Chen-Mei Fan Chiang, Tong Liang Kao,
Risk Management Strategies for the Use of Cloud Computing, I. J. Computer Network and Information Security, 2012, 12, 50-58.
[8]W. Tsai, Z. Jin, and X. Bai, Internetware computing: issues and perspective, Proceedings of the first Asia-Pacific symposium on Internetware. Beijing, China: ACM, p.1-10., 2009.
[9]H. Raj,R. Nathuji, A. Singh, and P. England ,Resource management for isolation enhanced cloud services., Proceedings of the 2009 ACM workshop on cloud computing security, Chicago, Illinois, USA,2009, p.77–84.
[10]S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Elsevier, Network and Computer Applications, Vol. 34, p.1-11, 2010.
[11]J. Milne, Private cloud projects dwarf public initiatives, 2010,http://www.cbronline.com/news/private_cloud_projects_dwarf_public_initiatives_281009 [accessed: 30 April 2012].
[12]D. Nurmi,R. Wolski,C. Grzegorczyk, G. Obertelli, S. Soman, L. Yousef, The Eucalyptus Open-Source Cloud-Computing System. 2009 9th IEEEACM International Symposium on Cluster Computing and the Grid, 2009, p.124–131.
[13]Z.A. Khalifehlou, F.S. Gharehchopogh, Security Directions in cloud Computing Environments, 5th International Conference on Information Security and Cryptology (ISCTURKEY2012), Ankara, Turkey, 17-19 May 2012, p.327-330.
[14]K, Sachdeva, Cloud Computing: Security Risk Analysis and Recommendations, Master Thesis, University of Texas, Austin, 2011.
[15]D. Jamil, H. Zaki, Security Issues in Cloud Computing and Countermeasures, International Journal of Engineering Science and Technology, Vol. 3 No. 4, 2011, p. 2672-2676.
[16]J. Che, Y. Duan, T. Zhang, J. Fan, Study on the security models and strategies of cloud computing, Procedia Engineering, Vol. 23, p.586-593, Elsevier, 2011.
[17]D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems, Volume 28, Issue 3, March 2012, P. 583–592.
[18]M. Monsef, N. Gidado, Trust and privacy concern in the Cloud, 2011 European Cup, IT Security for the Next Generation, 2011, p.1-15.
[19]M. Firdhous, O. Ghazali, and S. Hassan, Trust and Trust Management in Cloud Computing – A Survey, Inter Networks Research Group, University Utara Malaysia, Technical Report UUM/CAS/InterNetWorks/TR2011-01, 2011.
[20]H. Takabi, J.B.D. Joshi, G.Ahn., Security and Privacy Challenges in Cloud Computing Environments, IEEE Security Privacy Magazine, Vol 8, IEEE Computer Society, 2010, p.24-31.