Security and Privacy Issues in Cloud Computing

@article{Sen2013SecurityAP,
  title={Security and Privacy Issues in Cloud Computing},
  author={Jaydip Sen},
  journal={ArXiv},
  year={2013},
  volume={abs/1303.4814}
}
  • Jaydip Sen
  • Published 20 March 2013
  • Computer Science
  • ArXiv
Cloud computing transforms the way information technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of the… 

Figures and Tables from this paper

Privacy and Security of Cloud Computing: A Comprehensive Review of Techniques and Challenges

TLDR
This review presents and summarize major articles in cloud computing and its multiple layers with a focus on security and privacy challenges (such as integrity, confidentiality and data privacy), and intends to review the latest approaches regarding identity management inside the cloud, cryptography and steganography techniques that have been usedinside the cloud platforms.

Exploration of Security Challenges in Cloud Computing: Issues, Threats, and Attacks with their Alleviating Techniques

TLDR
Cloud data security risks, cloud attacks, and identified vulnerabilities for different variables impacting cloud computing were presented in this study analysis.

A Survey on Security and Privacy Issues in Cloud Computing

TLDR
The cloud services, risk associated with it and security measures in cloud computing are discussed.

A survey of security issues for cloud computing

  • M. Khan
  • Computer Science
    J. Netw. Comput. Appl.
  • 2016

Cloud Computing—Security, Issues, and Solutions

TLDR
An overview of security issues, challenges, and proposed solutions for cloud security is given and some of the vital solutions with respect to privacy and security are proposed.

Cloud computing in e-commerce in palestine: legal issues and challenges

TLDR
It is found that the current laws in Palestine are inadequate to regulate the cloud computing issues and some recommendations are proposed to develop the Palestinian laws in order to address the issues of cloud computing which will contribute in the development of e-commerce in Palestine.

Cloud Computing Security Issues, Challenges and Solutions

TLDR
This study presents the literature work for the security issues and challenges and the solutions with their solutions for cloud security and privacy.

Short and sweet: Cloud computing and its security

TLDR
The intention is to provide an insight into the basics of the field from the beginner's point of view, including cloud computing security challenges and benefits, as well as current security situation in major cloud players.

Data Privacy and Security in the Cloud

TLDR
The aim of this paper is to improve security in the cloud because the uses of cloud services has been more increasing and in the next few years would be likely the cloud services will be a big driving force, better to be prepare and develop majors to encounter and security loophole that may arise in the near future.
...

References

SHOWING 1-10 OF 144 REFERENCES

Controlling data in the cloud: outsourcing computation without outsourcing control

TLDR
It is argued that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today.

What's New About Cloud Computing Security?

TLDR
This work strives to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions, and argues that two facets are to some degree new and fundamental to cloud computing: the complexities of multi-party trust considerations, and the ensuing need for mutual auditability.

Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures

  • W. ItaniA. KayssiA. Chehab
  • Computer Science
    2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
  • 2009
TLDR
PasS (Privacy as a Service) is the first practical cloud computing privacy solution that utilizes previous research on cryptographic coprocessors to solve the problem of securely processing sensitive data in cloud computing infrastructures.

Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud

TLDR
This work strives to present a more balanced treatment of the potential security impacts of transitioning to cloud-hosted infrastructure, surveying both the security costs and security benefits of doing so.

Above the Clouds: A Berkeley View of Cloud Computing

TLDR
This work focuses on SaaS Providers (Cloud Users) and Cloud Providers, which have received less attention than SAAS Users, and uses the term Private Cloud to refer to internal datacenters of a business or other organization, not made available to the general public.

The Reservoir model and architecture for open federated cloud computing

TLDR
The Reservoir project is motivated by the vision of implementing an architecture that would enable providers of cloud infrastructure to dynamically partner with each other to create a seemingly infinite pool of IT resources while fully preserving their individual autonomy in making technological and business management decisions.

Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds

TLDR
It is shown that it is possible to map the internal cloud infrastructure, identify where a particular target VM is likely to reside, and then instantiate new VMs until one is placed co-resident with the target, and how such placement can then be used to mount cross-VM side-channel attacks to extract information from a target VM on the same machine.

Security and Privacy Challenges in Cloud Computing Environments

TLDR
This article explores the roadblocks and solutions to providing a trustworthy cloud computing environment and suggests a number of approaches that could be considered.

Taking account of privacy when designing cloud computing services

  • Siani Pearson
  • Computer Science
    2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
  • 2009
TLDR
The privacy challenges that software engineers face when targeting the cloud as their production environment to offer services are assessed, and key design principles to address these are suggested.
...