Study of Threats, Risk and Challenges in Cloud Computing

Authors

  • Rajesh Piplode Department of Computer Science, Govt. Holkar Science College Indore, India
  • Pradeep Sharma Department of Computer Science, Govt. Holkar Science College Indore, India
  • Umesh Kumar Singh Institute of Computer Science, Vikram University, Ujjain, India

Keywords:

Cloud Computing, Security Risk, Service Models, Deployment Models

Abstract

Cloud computing security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. In this paper we present security issues that fetch by cloud computing technology and also analysis the threats, risk and challenges in cloud environment.

 

References

National Institute Of Standard and technology (2009). www.csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc,

Open Security Architecture http://www.opensecurityarchitecture.org/

Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud Security and Privacy : An Enterprise perspective of Risks

K.Mukherjee , G.Sahoo, “A Secure Cloud Computing”, Proc. 2010 International Conference on Recent Trends in Information, Telecommunication and Computing

Krešimir Popović, Željko Hocenski, “Cloud computing security issues and challenges” Proc. MIPRO 2010, May 24-28, 2010, Opatija, Croatia

Cloud computing security retrived from

http://en.wikipedia.org/wiki/Cloud_computing _security

Meiko Jensen, J¨org Schwenk, Nils Gruschka, Luigi Lo Iacono “ On Technical Security Issues in Cloud Computing” 2009 IEEE International Conference on Cloud Computing.

Rituik Dubey, Muhammad Asim Jamshed, Xiaohui Wang, Rama Krishna Batalla “Addressing Security Issues in Cloud Computing”.

Shilpashree Srinivasamurthy, David Q. Liu, “ Survey on Cloud Computing Security”.

Salesforce, Salesforce.com, 2010

Windows Azure, www.microsoft.com/azure, 2010

Security Guidance for Critical Areas of Focus in Cloud Computing, April 2009. www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina. Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control. CCSW `09: Proceedings of the 2009 ACM workshop on Cloud computing security, pages 85-90. November 2009.

Steve Hanna. A security analysis of Cloud Computing. Cloud Computing Journal.

www.cloudcomputing.sys-con.com/node/1203943 .

Matthew Glotzbach, Product Management Director, Google Enterprise, “What We Learned from 1 Million Businesses in the Cloud,” www.googleblog.blogspot.com/2008/10/whatwe-learned-from-1-illion.html, 30 Oct 2008.

KrÃgel, C., Toth, T., & Kirda, E. (2002). Service specific anomaly detection for network intrusion detection. In Proceedings of the 2002 ACM symposium on Applied computing (pp. 201-208). Madrid, Spain: ACM. Retrieved from www.portal.acm.org.library.capella.edu/citation.cfm?id=508835&dl=GUIDE&coll=GUIDE&CFID=80867670&CFTOKEN=24312614

Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma, “Security Based Model for Cloud Computing”, IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, pp(13-19), December 2011. http://www.iracst.org/ijcnwc/vol1no1.htm)

Downloads

Published

2013-02-28

How to Cite

[1]
R. Piplode, P. Sharma, and U. K. Singh, “Study of Threats, Risk and Challenges in Cloud Computing”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 1, no. 1, pp. 26–30, Feb. 2013.

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)