scholarly journals In Retrospect of Cloud Security Issues

Popular computing technologies like Distributed ,Parallel ,Grid etc., have already reached their peaks in providing services and now a hybrid aspect is capturing the focus which is a combination of traditional computing technology and network technology and termed to be “Cloud Computing ”.A desperate demand for data sharing and handling enterprise applications have called upon for cloud computing .A blocking wind for leveraging cloud computing technology is the aspect of security .But the passion towards adopting cloud have overridden the security threats. This paper glances over various security threats, risks, challenges along with their resistance capabilities to overcome the vulnerabilities in the cloud and also some of the encryption techniques that are used in the cloud.

2019 ◽  
Vol 8 (4) ◽  
pp. 424
Author(s):  
Dr. K.SAI MANOJ

Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust.In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy, elasticity, reliability, availability etc in various sectors, the paper also discuss existing security techniques and approaches for a secure cloud environment. This paper will enable researchers and professionals to know about different security threats and models and tools proposed.  


Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.


2018 ◽  
pp. 268-285 ◽  
Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 253
Author(s):  
N. Srinivasu ◽  
O. Sree Priyanka ◽  
M. Prudhvi ◽  
G. Meghana

Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6.


2021 ◽  
Vol 2083 (4) ◽  
pp. 042084
Author(s):  
Xi Wang ◽  
Lei Shi

Abstract Nowadays, computer networks are widely used. Besides the convenience, people also feel the pressure of network viruses and hackers. At present, in the process of fighting against network security threats, traditional defense measures have been difficult to meet. Therefore, in order to meet the needs of computer network security under cloud computing technology, and for the future of cloud computing high-quality network storage system can be gradually optimized. In this paper, from the cloud computing and network security storage system two aspects of the computer network security storage performance analysis and design; Then from the design framework, through careful design, to ensure the reliability and security of data upload, storage.


2021 ◽  
Author(s):  
Ramla Humayun

Review on Cloud-Computing and the security and privacy issues related with it.


2019 ◽  
pp. 1777-1799
Author(s):  
Emre Erturk

This chapter sets out to explore new trends in cyber and cloud security, and their implications for businesses. First, the terminology and assumptions related to cloud computing are stated. Next, the chapter reports on contemporary research around the awareness of security issues, and the security processes within the cloud computing realm. Cyber security poses a different challenge to local small and medium sized organizations, which may seem to have less at stake financially. However, they are more vulnerable, due to fewer resources dedicated toward prevention. A series of serious security incidents may even keep them out of business. Furthermore, security needs to be understood and handled differently in a cloud based environment. Therefore, the chapter identifies unique security practices and recommendations for these businesses to run their IT resources safely in the cloud.


2018 ◽  
pp. 1027-1043
Author(s):  
Basudeo Singh ◽  
Jasmine K.S.

Mobile cloud computing is a technique or model in which mobile applications are built, powered and hosted using cloud computing technology. In Mobile Cloud computing we can store information regarding sender, data and receiver on cloud through mobile application. As we store more and more information on cloud by client, security issue will arise. This chapter presents a review on the mobile cloud computing concepts as well as security issues and vulnerabilities affecting Cloud Systems and the possible solutions available to such issues within the context of cloud computing. It also describes the pros and cons of the existing security strategy and also introduces the existing issues in cloud computing such as data integrity, data segregation, and security.


Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.


Author(s):  
Wanbil William Lee

The advancement in computing technologies raises more complex moral and security issues, thus intensifying the urgency for resolving cyberethical dilemmas. At the same time, we spend a lot on cybersecurity, yet still get hacked whereby, it is argued, a hidden cause transpires - we don't take ethics seriously due to a poor understanding of ethics. Society in general and the computing technology community in particular recognize that ethics is important. However, corporate managers and information security operatives still fall for the fallacious ‘what's legal is ethical' or accept the relativistic ‘if Tom can do it then Dick can do it'. This is no surprise because the concepts of ethics seem plain and simple yet their implications abstruse. A guide for improving our knowledge of ethics and in the same vein discovering and identifying ethical issues and linking the issues to the relevant theories and technologies, and resolving the dilemmas will be desirable.


Sign in / Sign up

Export Citation Format

Share Document