SECURITY CONCERNS IN CLOUD COMPUTING

Main Article Content

Mir Abdul Samim Ansari
Shewtha S Patil,Pooja Mahaling Menakarani R and Gopal K.Shyam

Abstract

Cloud computing is a revolutionary way of storing and accessing data with five essential characteristics, three service models, and four deployment models. Businesses have realized the tremendous potentiality and benefits of cloud computing and have accepted the technology, but still a small amount of scepticism hovers around.  In defiance of its potential characteristics, the organizations risk their sensitive data by storing it in the cloud. In this paper, we have identified various privacy and security challenges associated with the novelty of cloud computing. The security and privacy challenges listed in this paper perceives demand for implementation of sophisticated technologies to deal with them.

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

http://csrc.nist.gov/groups/SNS/cloudcomputing/index.h tml. [2] Cisco White Paper, http://www.cisco.com/en/US/solutions/collateral/ns341/ ns525/n s537/white_paper_c11-532553.html, published 2009, pp. 1-6. [3] John Viega, McAffee, Cloud Computing and the Common Man,†published on the IEEE Journal ON Cloud Computing Security, pp. 106-108, August 2009. [4] George Reese, “Cloud Application Architecturesâ€, First edition, O’Reilly Media, April 2009, ISBN 9780596156367, pp. 2-4, 99-118. [5] http://en.wikipedia.org/wiki/Cloud_computing. [6] http://communication.howstuffworks.com/cloudcomputi ng1.htm. John Harauz, Lori M. Kaufman, Bruce Potter, “Data Security in the World of Cloud Computing,†published on the IEEE Journal on Cloud Computing Security, July/August 2009, Vol. 7, No.4, 61-64. [7] John W. Rittinghouse, James F. Ransome, “Cloud Computing Implementation, Management, and Securityâ€, CRC Press, August 17, 2009, ISBN 9781439806807, pp. 147-158, 183-212. [8] Amazon White Paper, http://aws.amazon.com/aboutaws/whats-new/2009/06/08/new-aws-security-centerand-security-whitepaper/ , published June 2009. [9] Marco Descher, Philip Masser, Thomas Feilhauer, A Min Tjoa, David Huemer, “ Retaining Data Control to the Client Infrastructure Cloudsâ€, published on the IEEE, 2009 International Conference on Availability, Reliability and Security, pp. 9-15. [10] David Bernstein, Erik Ludvigson, Krishna Sankar, Steve Diamond, Monique Morrow, “Blueprint for the Intercloud – Protocols and Formats for Cloud Computing Interoperability, submitted to IEEE, 2009 Fourth International Conference on Internet and Web Applications and Services, pp. 328-335. [11] Liang-Jie Zhang, Qun Zhou, “CCOA: Cloud Computing Open Architectureâ€, published on IEEE, 2009 IEEE International Conference on Web Services, pp. 607-615. [12] Amazon White Paper, “Introduction to Amazon Virtual Private Cloudâ€, Available: http://aws.amazon.com/about-aws/whatsnew/2009/08/26/introducing-amazon-virtual-privatecloud/ , published Aug 26, 2009, pp. 6-8. [13] Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, “Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilitiesâ€, grid Computing and Distributed Systems and Software Engineering, The University of Melbourne, Australia. [14] Jinesh Varia, Amazon Web Services, “Building GrepTheWeb in the Cloud, Part 1: Cloud Architecturesâ€, Available: http://developer.amazonwebservices.com/connect, July 2008, pp 1-7. [15] Jon Brodkin, “ Gartner: Seven Cloud-Computing Security Risksâ€, Available: http://www.infoworld.com, published July 2008, pp. 1-3. [16] IBM CIO White Paper, “ Staying aloft in tough timesâ€, April 2009, pp. 3-19. [17] Steve Hanna, Juniper Networks, “Cloud Computing: Finding the Silver Liningâ€, published 2009, pp. 2-30. [18] Manifesto, “Open Cloud Manifesto, Dedicated to the belief that the cloud should be openâ€, Available: www.opencloudmanifesto.org, published Spring 2009, pp-1-7. [19] Peter Fingar, “ Dot.Cloud: the 21st century business platform built on cloud computingâ€, First edition, Meghan-Kiffer Press, February 18, 2009, ISBN 9780929652498, pp. 81-99.