Study of Threats, Risk and Challenges in Cloud Computing
Keywords:
Cloud Computing, Security Risk, Service Models, Deployment ModelsAbstract
Cloud computing security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. In this paper we present security issues that fetch by cloud computing technology and also analysis the threats, risk and challenges in cloud environment.
References
National Institute Of Standard and technology (2009). www.csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc,
Open Security Architecture http://www.opensecurityarchitecture.org/
Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud Security and Privacy : An Enterprise perspective of Risks
K.Mukherjee , G.Sahoo, “A Secure Cloud Computing”, Proc. 2010 International Conference on Recent Trends in Information, Telecommunication and Computing
Krešimir Popović, Željko Hocenski, “Cloud computing security issues and challenges” Proc. MIPRO 2010, May 24-28, 2010, Opatija, Croatia
Cloud computing security retrived from
http://en.wikipedia.org/wiki/Cloud_computing _security
Meiko Jensen, J¨org Schwenk, Nils Gruschka, Luigi Lo Iacono “ On Technical Security Issues in Cloud Computing” 2009 IEEE International Conference on Cloud Computing.
Rituik Dubey, Muhammad Asim Jamshed, Xiaohui Wang, Rama Krishna Batalla “Addressing Security Issues in Cloud Computing”.
Shilpashree Srinivasamurthy, David Q. Liu, “ Survey on Cloud Computing Security”.
Salesforce, Salesforce.com, 2010
Windows Azure, www.microsoft.com/azure, 2010
Security Guidance for Critical Areas of Focus in Cloud Computing, April 2009. www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina. Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control. CCSW `09: Proceedings of the 2009 ACM workshop on Cloud computing security, pages 85-90. November 2009.
Steve Hanna. A security analysis of Cloud Computing. Cloud Computing Journal.
www.cloudcomputing.sys-con.com/node/1203943 .
Matthew Glotzbach, Product Management Director, Google Enterprise, “What We Learned from 1 Million Businesses in the Cloud,” www.googleblog.blogspot.com/2008/10/whatwe-learned-from-1-illion.html, 30 Oct 2008.
KrÃgel, C., Toth, T., & Kirda, E. (2002). Service specific anomaly detection for network intrusion detection. In Proceedings of the 2002 ACM symposium on Applied computing (pp. 201-208). Madrid, Spain: ACM. Retrieved from www.portal.acm.org.library.capella.edu/citation.cfm?id=508835&dl=GUIDE&coll=GUIDE&CFID=80867670&CFTOKEN=24312614
Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma, “Security Based Model for Cloud Computing”, IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, pp(13-19), December 2011. http://www.iracst.org/ijcnwc/vol1no1.htm)
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.