On Technical Security Issues in Cloud Computing

@article{Jensen2009OnTS,
  title={On Technical Security Issues in Cloud Computing},
  author={Meiko Jensen and J{\"o}rg Schwenk and Nils Gruschka and Luigi Lo Iacono},
  journal={2009 IEEE International Conference on Cloud Computing},
  year={2009},
  pages={109-116}
}
The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure (CapEx) and operational expenditure (OpEx). In order for this to become reality, however, there are still some challenges to be solved. Amongst these are security and trust issues, since the user's data has to be released to the Cloud and thus leaves the protection-sphere of the… Expand
Security Issues on Cloud Computing
TLDR
This paper focuses on various security issues arising from the usage of Cloud services and especially by the rapid development of Cloud computing arena, and discusses basic security model followed by various High Level Security threats in the industry. Expand
Security Issues in Cloud Computing
TLDR
This paper is a survey more specific to the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system. Expand
Security issues in cloud computing
  • M. Z. Meetei, A. Goel
  • Computer Science
  • 2012 5th International Conference on BioMedical Engineering and Informatics
  • 2012
TLDR
This paper focuses on security issues arising from the usage of cloud services, and the fundamental security challenges are data storage security, data transmission security, application security and security related to third-part resources. Expand
CLOUD COMPUTING: ISSUES AND SOLUTIONS
TLDR
In this paper security privacy & trust issues of cloud computing are reviewed and the issues and the solution to overcome these problems are identified. Expand
Analytical Solutions For Security Issues In Cloud Environment
TLDR
This paper tries to direct and establish the important security matters and provide some kind of solutions in this computing methodology and gives a view on the ongoing trends for security in this technological outbreak. Expand
Security issues in cloud computing and its counter measures
Cloud computing is a technology of delivering resources such as hardware, software (virtual too) and bandwidth over the network to the consumers worldwide. All the services are requested and accessedExpand
A survey on cloud computing security: Issues, threats, and solutions
TLDR
This survey presents a comprehensive overview of the security issues for different factors affecting cloud computing, and encompasses the requirements for better security management and suggests 3-tier security architecture. Expand
EMPOWERING CLOUD SECURITY THROUGH SLA
TLDR
The proposed research paper tries to evaluate the challenges in enforcing security for cloud computing services and describe the necessity of a regularization of SLA. Expand
Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review
TLDR
Security is one of the main challenges that hinder the growth of cloud computing and service providers strive to reduce the risks over the clouds and increase their reliability in order to build mutual trust between them and the cloud customers. Expand
A Study of the Issues and Security of Cloud Computing
-The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. ThisExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 27 REFERENCES
Vulnerable Cloud: SOAP Message Security Validation Revisited
TLDR
The verification steps required to effectively validate an incoming SOAP request are discussed and a practical guideline for achieving a robust and effective SOAP message security validation mechanism is provided. Expand
A survey of attacks on web services
TLDR
A survey of vulnerabilities in the context of Web Services is given, showing that Web Services are exposed to attacks well-known from common Internet protocols and additionally to new kinds of attacks targeting Web Services in particular. Expand
The Accountability Problem of Flooding Attacks in Service-Oriented Architectures
TLDR
The problem of accountability is presented, referring to the issue of resolving the attacker in a highly distributed service-oriented application, using a general flooding attack model, to illustrate the problem's parameters and to discuss some general solution approaches. Expand
TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management
TLDR
A different approach based on Transport Layer Security (TLS) is proposed, which is implemented in any web browser and web server, and which is immune against all currently known attacks. Expand
The Impact of Flooding Attacks on Network-based Services
TLDR
This paper focuses on a special type of Denial of Service attacks that relies on message flooding techniques, overloading the victim's service with invalid requests, and relates the experimental results to the well-known attack impact of the TCP SYN Flooding attack. Expand
Risks of the CardSpace Protocol
TLDR
The security of CardSpace against today's Internet threats and risks and attacks is examined and several areas of improvement are suggested. Expand
Towards secure SOAP message exchange in a SOA
TLDR
The integrity feature of a SOAP Account is discussed within a more general context of the current web service security state of the art. Expand
The Transport Layer Security (TLS) Protocol Version 1.2
TLDR
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements of the Transport Layer Security (TLS) protocol. Expand
A Browser-Based Kerberos Authentication Scheme
TLDR
This work proposes a browser-based Kerberos protocol based on client certificates and proves its security in the extended formal model for browser- based mutual authentication introduced at ACM ASIACCS'08. Expand
Drive-By Pharming
TLDR
This paper describes an attack concept termed Drive-by Pharming where an attacker sets up a web page that, when simply viewed by the victim, attempts to change the DNS server settings on the victim's home broadband router. Expand
...
1
2
3
...