A Survey on Security Threats in Cloud Computing
Keywords:
Cloud Computing, Data Integrity, Data storage, Security, Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), InteroperabilityAbstract
Abstract— Cloud computing, also referred to as ‘on demand computing’, is a recent concept making waves in the IT industry. When compared to other specific, dedicated infrastructures in computing, cloud concept gives the advantage of reliability, quantifiability, cost- effectiveness and improved performance. It is easy and convenient to have network access to other shared configurable computing resources using this concept. Another advantage of the concept is that the resources can be utilized with increasing efficiency and minimum overhead efforts. Clouds can be used for services, solutions, and applications and also for storing large amount of data in different locations. Data is stored over a set of resources which are networked so that the data can be accessed through any other virtual system. The security and privacy issues associated with data management is reduced considerably using the cloud computing facility as the data centers are literally beyond the reach and control of users. Further, server breakdowns which normally affect data storage and use does not seem to affect the user in cloud computing. But this system has its own set of disadvantages. This work is an attempt discuss in detail cloud computing, its types and Network/security issues related to it. Networks structure faces some attacks that are denial off service attack, man in the middle attack, network sniffing, port scanning, SQL injection attack, cross site scripting. Security Issues that occur in Cloud Computing are XML signature element wrapping, Browser security, cloud malware injection attack, flooding attacks, data protection, insecure or incomplete data deletion, locks in.
References
[1] R. Maggiani, Communication Consultant, Solari Communication, “Cloud Computing is Changing How we Communicate,” 2009 IEEE International Professional Conference, IPCC, pp. 1-4, Waikiki, HI, USA, July 19- 22,2009. ISBN: 978-1-4244-4357-4.
[2] Harold C. Lin, Shivnath Babu, Jeffrey S. Chase, Sujay S. Parekh, “Automated Control in Cloud Computing: Opportunities and Challenges”, Proc. of the 1st Workshop on Automated control for data centers and clouds, New York, NY, USA, pp. 13-18, 2009, ISBN: 978-1-60558-585-7.
[3] Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacon, “On technical Security Issues in Cloud Computing,” Proc. of IEEE International Conference on Cloud Computing (CLOUD-II, 2009), pp. 109-116, India, 2009.
[4] R. L Grossman, “The Case for Cloud Computing,” IT Professional, vol. 11(2), pp. 23-27, 2009, ISSN: 1520-9202.
[5]Foster, I., & Kesselman, C. (1998). The Grid: Blueprint for a New Computing Infrastructure (The Elsevier Series in Grid Computing). Morgan Kaufmann
[6] Han Y (2010). On the clouds: a new way of computing. Inf Technol Libr, Vol. 29 No. 2, pp: 87- 92.
[7] Iyer B, Henderson JC (2010). Preparing for the future: understanding the seven capabilities of cloud computing. MIS Q Exec; Vol. 9 No. 2, pp: 117-131.
[8] Jamil, D, & Zaki, H. (2011a). cloud computing security. International Journal of Engineering Science and Technology (IJEST) , Vol.3 No.4, 3478-3483.
[9] Jamil, D., & Zaki, H. (2011b). SECURITY ISSUES IN CLOUD COMPUTING AND COUNTER MEASURES. International Journal of Engineering Science and Technology (IJEST) , Vol. 3 No. 4, 2672-2676.
[10] Jensen, M. (2009, September). On Technical Security Issues in Cloud Computing. IEEE International Conference in Cloud Conouting , 109- 116.
[11] Lohr, S. (2007, October 8). Google and I.B.M. Join in „Cloud Computing‟ Research. Retrieved 1 28, 2012, from The Newyork Times: http://www.nytimes.com/2007/10/08/technology/08cl oud.html
[12] Mell P, Grance T (2010). The NIST definition of cloud computing. Commun ACM; Vol. 53 No. 6, pp:50.
[13] NAONE, E ( 2007, September 18). Computer in the Cloud. Retirived 1 24, 2012, from Technology Review, MIT:
http://www.technologyreview.com/printerfriendlyar ticle.aspx?id=19397
[14] Peter Mell and Tim Grance, (2009)The NIST Definition of Cloud Computing, version 15, National Institute of Standards and Technology (NIST), Information Technology Laboratory
(www.csrc.nist.gov)
[15] RALEIGH, NC & ARMONK, NY (2007, May 7). North Carolina State University and IBM help bridge digital Divide in North Carolina and beyond. Retrived 1 27, 2012,from IBM:ttp://www 03.ibm.com/press/us/en/ press release /21506.wss
[16] REIMER, J (2007, April 8). Dreaming in the “Cloud” with the XIOS web operating system. Retrived 1 24,2012, from are technical: http://arstechnica.com/news.ars/post/20070408 d reaming in the cloud with thexios web oper ating system.html
[17] Ren, K., & Lou, W. (2009). Ensuring Data Storage Security in Cloud Computing. Retrieved from http://www.ece.iit.edu/~ubisec/IWQoS09.pdf
[18] Scarfone K, S. A. (2007). Guide to Secure Web Services. Retrievedfrom http://csrc.nist.gov/publications/nistpubs/800-95/ SP800- 95 .pdf
[19] Services, A. W. (2009, April). Amazon Virtual private Cloud. Retrieved from http://aws.amazon.com/vpc/
[20] Vaquero LM, Rodero-Merino L, Caceres J, Lindner M (2009). A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput Commun, Vol. 39 No. 1, pp:50-55.
[21]View, M. Calif & Armonk. (2007, October 8). Google and IBM Announced University Initiative to Address Internet-Scale Computing Challenges. Retrieved 1 28, 2012, from IBM: http://www- 03.ibm.com/press/us/en/pressrelease/22414.wss
[22]View, M. Calif & Armonk. (2007, October 8). Google and IBM Announced University Initiative to Address Internet-Scale Computing Challenges. Retrieved 1 28, 2012, from IBM: http://www- 03.ibm.com/press/us/en/pressrelease/22414.wss
[23]Vouk, M. (2008). Cloud Computing-Issues, Research and Implication. "Journal of Computing and Information Technology -
CIT" , Vol. 16 No.4, pp. 235–246. [24]Wikipedia (2012a, January 26). Amazon Elastic Compute Cloud Retrived 1 27, 2012, from Wikimedia Foundation Inc. http://en.wikipedia.org/wiki/Amazon_Elastic_Compute Cloud.
[25]Wikipedia (2012b, January 27). Cloud Computing Retrieved 1 28, 2012, from Wikimedia Foundation Inc.
http://en.wikipedia.org/wiki/Cloud_computing [26]Yang, A. (2003). Guide to XML Web Services Security. Retrieved from http://www.cgisecurity.com/ws/WestbridgeGuideTo WebServicesSecurity.pdf[27] Zurich.Catteddu, D. (2010). Cloud Computing. Retrieved from http://www.enisa.europa.eu/act/rm/files/ deliverables/ cloud computingrisk assessment
[27] Zurich.Catteddu, D. (2010). Cloud Computing. Retrieved fromhttp://www.enisa.europa.eu/act/rm/files/ deliverables/ cloud computingrisk assessment
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
