Challenges and Issues of Data Security in Cloud Computing

Anil Kumar Dudla, Ashok Kote, VijayaRaju Motru

Abstract


Cloud computing is still in its infancy in spite of gaining tremendous momentum recently, high security is one of the major obstacles for opening up the new era of the long dreamed vision of computing as a utility. As the sensitive applications and data are moved into the cloud data centers, run on virtual computing resources in the form of virtual machine. This unique attributes, however, poses many novel tangible and intangible security challenges. It might be difficult to track the security issue in cloud computing environments. So this paper primarily aims to highlight the major security, privacy and trust issues in current existing cloud computing environments and help users recognize the tangible and intangible threats associated with their uses, which includes: (a) surveying the most relevant security, privacy and trust issues that pose threats in current existing cloud computing environments; and (b) analyzing the way that may be addressed to eliminate these potential privacy, security and trust threats, and providing a high secure, trustworthy, and dependable cloud computing environment. In the near future, we will further analysis and evaluate privacy; security and trust issues in cloud computing environment by a quantifiable approach, further develop and deploy a complete security, privacy trust evaluation, management framework on really cloud computing environments.


References


Foster I, Zhao Y, Raicu I, Lu, S. Cloud Computing and Grid Computing 360-degree compared. Proceedings of the Grid Computing Environments Workshop, GCE 2008; IEEE Press, Nov. 2008, 1-10.

Buyya R, Chee Shin Y, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems; 2009;25(6):599–616.

Armbrust M, Fox A, Griffith R, Joseph A D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A View of Cloud Computing. Communications of the ACM; 2010;53(4):50–58.

Mell P, Grance T. The NIST Definition of Cloud Computing. Communications of the ACM; 2010;53(6):50.

Paquette S, Jaeger P T, Wilson S C. Identifying the privacy risks associated with governmental use of cloud computing. Government Information Quarterly; 2010;27(3):245–253. [6] Subashini S, Kavitha V. A survey on privacy issues in service delivery models of cloud computing. Journal of Network and Computer Applications; 2011;34(1):1–11.

Vaquero L M, Rodero-Merino L, Morán D. Locking the sky: A survey on IaaS cloud privacy. Computing; 2011;91(1):93– 118.

Pearson S, Benameur A. Privacy, privacy and trust issues arising from cloud computing. Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2010; IEEE Press, Nov. 2010, 693-702.

Ahamed S I, Haque M M, EndadulHoque M, Rahman F, Talukder N. Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments. Journal of Systems and Software; 2010;83(2):253– 270.

Karaoglanoglou K, Karatza H. Resource discovery in a Grid system: Directing requests to trustworthy virtual organizations based on global trust values. Journal of Systems and Software; 2011;84(3):465–478.

Takabi H, Joshi J B D, Ahn G. Privacy and privacy challenges in cloud computing environments. IEEE Privacy & Privacy; 2010;8(6):24–31.

Sangroya A, Kumar S, Dhok J, Varma V. Towards analyzing data privacy risks in cloud computing environments. Communications in Computer and Information Science; 2010;54:255–265.

Algirdas A, Jean-Claude L, Brian R, Carl L. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing; 2004;1(1):11–33.

Tchifilionova V. Privacy and privacy implications of cloud computing - Lost in the cloud. Proceedings of the IFIP WG 11.4 International Workshop on Open Research Problems in Network Privacy, iNetSec 2010; Springer Verlag Press, Mar. 2010, 149-158.

Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing; 2009;13(6):291–399.

Shekarpour S, Katebi S D. Modeling and evaluation of trust with an extension in semantic web. Journal of Web Semantics; 2010;8(1):26–36.

Iltaf N, Hussain M, Kamran F. A mathematical approach towards trust based privacy in pervasive computing environment. Proceedings of the Third International Conference and Workshops, ISA 2009; IEEE Press, Jun. 2009, 702-711.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.