A survey on security issues in service delivery models of cloud computing

@article{Subashini2011ASO,
  title={A survey on security issues in service delivery models of cloud computing},
  author={S. Subashini and Vasantha Kavitha},
  journal={J. Netw. Comput. Appl.},
  year={2011},
  volume={34},
  pages={1-11}
}
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. It extends Information Technology's (IT) existing capabilities. In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to… Expand
Security and Privacy Concerns in Cloud Computing
Nowadays cloud computing can be viewed as a Buzzword. Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training newExpand
Analysis of Privacy Challenges and Security Concerns in Cloud Computing
Cloud computing is a method to enhance the capacity dynamically without investing in new infrastructure, training new personnel, or licensing new software. It can be viewed as a cost effectiveExpand
Cloud Computing A review paper on security issues in SAAS
TLDR
This paper is a review paper on more specific to the different security issues that has spread from various service delivery model i.e. SAAS(software as a service) on cloud. Expand
Security Problems in Service Delivery Models of Cloud Computing - A Survey
TLDR
This document provides a detailed overview of the security issues of various aspects that affect cloud computing, including a comprehensive and brief discussion of various key components related to applications, embedded system, storage system, clustering and other related topics. Expand
Security Issues’ in Cloud Computing and its Solutions
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computingExpand
Cloud Computing and Security Issues
TLDR
Issues related to cloud computing, including complications with data privacy and data protection continues to affect the market, are highlighted. Expand
Cloud Computing Security: An Investigation into the Security Issues and Challenges Associated with Cloud Computing, for both Data Storage and Virtual Applications
In recent years, cloud computing has developed from the promising business concept that it used to be, to one of Information Technology (IT) industry’s most developing section. Now that the worldExpand
Cloud Computing Environment and Security Challenges: A Review
TLDR
The detailed design of cloud computing architecture is examined in which deployment models, service models, cloud components, and cloud security are explored and a viable solution to address the potential threats is provided. Expand
Cloud Computing Security Issues and Challenges
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computingExpand
Security Threats with Associated Mitigation Techniques in Cloud Computing
TLDR
This extensive research aims to elaborate the possible security attacks and the security issues that arise in a cloud computing frame work and provides an overview of key security issues related to cloud computing with the view of a secure cloud architecture environment. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 128 REFERENCES
Towards best practices in designing for the cloud
TLDR
Due to the speed of network development due to cloud architectures, an increasing level of importance must be placed on the design to regulate issues such as: instance access control, regulatory issues, development practices, security and practical operational issues. Expand
Cloud Security Issues
TLDR
Some security issues that have to be included in service level agreements (SLA) are put forward to help some of the enterprises to look forward in using the cloud services. Expand
Cloud computing
TLDR
The time is right for the members of the emerging cloud computing community to come together around the notion of an open cloud, and these core principles are rooted in the belief that cloud computing should be as open as all other IT technologies. Expand
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
TLDR
The task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud is considered, and an elegant verification scheme is constructed for seamless integration of these two salient features in the protocol design. Expand
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
TLDR
To achieve efficient data dynamics, the existing proof of storage models are improved by manipulating the classic Merkle Hash Tree construction for block tag authentication, and an elegant verification scheme is constructed for the seamless integration of these two salient features in the protocol design. Expand
Retaining Data Control to the Client in Infrastructure Clouds
TLDR
This paper investigates the application of Nimbus as a cloud resource and shows an example implementation for retaining data control to the user based on virtual machine images encrypted on the client side and form the basis for subsequent research on single point of access grid resp. Expand
The Role of Trust Management in Distributed Systems Security
TLDR
The concept of trust management is introduced, its basic principles are explained, and some existing trust-management engines are described, including PoHcyMaker and KeyNote, which allow for increased flexibility and expressibility, as well as standardization of modern, scalable security mechanisms. Expand
Network and information security: A computational intelligence approach: Special Issue of Journal of Network and Computer Applications
The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of GovernmentExpand
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
TLDR
It is shown that it is possible to map the internal cloud infrastructure, identify where a particular target VM is likely to reside, and then instantiate new VMs until one is placed co-resident with the target, and how such placement can then be used to mount cross-VM side-channel attacks to extract information from a target VM on the same machine. Expand
Ensuring Data Storage Security in Cloud Computing
TLDR
A new data encoding scheme called layered interleaving is proposed, designed for time-sensitive packet recovery in the presence of bursty loss, which is highly efficient in recovering the singleton losses almost immediately and from bursty data losses. Expand
...
1
2
3
4
5
...