SECURITY ISSUES AND THEIR SOLUTIONS IN CLOUD TECHNOLOGY: A SURVEY

Main Article Content

Mohd Amir Siddiqui
M. Akheela Khanum

Abstract

The cloud computing technology unveils unprecedented potential to serve the users from a totally virtual interface and with almost no infrastructure. Cloud computing increases the utilization of the physical resources, by optimal and shared usage, thereby allowing the user to leverage the maximum takings out of its investments. The benefits offered by cloud technology, motivate organizations to shift to clouds in order to serve their clientele with the best service while engaging the least resources and hence making the best profits. Talking about the flip side of coin, the cloud is not only vulnerable to various existing network and data attacks, but also opens up avenues for many new ones. In cloud, services provided by third parties, make ways for additional security threats. Movement of user’s data in Multi-tenant and shared architecture makes security a bigger concern. Objective of this paper is to enlist various aspects, sensitive to security concerns and also the latest resolutions present. Finally, the paper provides concluding remarks and further research scopes.

 

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

A. Abbas, K. Bilal, L. Zhang, S.U. Khan, A cloud based health insurance plan recommendation system: a user centered approach, Future Gener. Comput. Syst. (2014), http://dx.doi.org/10.1016/j.future.2014.08.010.

M. Aslam, C. Gehrmann, M. Bjorkman, Security and trust preserving VM migrations in public clouds, in: IEEE 11th Intl. Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 869–876.

K. Alhamazani, R. Ranjan, K. Mitra, F. Rabhi, S.U. Khan, A. Guabtni, V. Bhatnagar, An Overview of the Commercial Cloud Monitoring Tools: Research Dimensions, Design Issues, and State-of-the-Art, arXiv preprint arXiv:1312.6170, 2013.

M. Menzel, R. Ranjan, L. Wang, S.U. Khan, J. Chen, CloudGenius: a hybrid decision support method for automating the migration of web application clusters to public clouds, IEEE Trans. Comput. (2014),

B. Guan, J. Wu, Y. Wang, S.U. Khan, CIVSched: a communication-aware inter-VM scheduling technique for decreased network latency between co-located VMs, IEEE Trans. Cloud Comput. 2 (3) (2014) 320–332.

R. Latif, H. Abbas, S. Assar, Q. Ali, Cloud computing risk assessment: a systematic literature review, in: Future Information Technology, Springer, Berlin, Heidelberg, 2014, pp. 285–295

D. AB. Fernandes, L. FB. Soares, J.V. Gomes, M.M. Freire, P. RM Inácio, Security issues in cloud environments: a survey, Int. J. Inform. Sec. 13 (2) (2014) 113–170.

A.N. Khan, M.L.M. Kiah, M. Ali, S.A. Madani, S. Shamshirband, BSS: block-based sharing scheme for secure data storage services in mobile cloud environment, J. Supercomput. 70 (2) (2014) 946–976.

C. Rong, S.T. Nguyen, M.G. Jaatun, Beyond lightning: a survey on security challenges in cloud computing, Comput. Electr. Eng. 39 (1) (2013) 47–54.

A. Abbas, S.U. Khan, A review on the state-of-the-art privacy preserving approaches in e-health clouds, IEEE J. Biomed. Health Inform. (2014).

Z. Xiao, Y. Xiao, Security and privacy in cloud computing, IEEE Commun. Surveys Tutorials 15 (2) (2013) 843–859.

Y. Neng-Hai, Z. Hao, J. Xu, W. Zhang, C. Zhang, Review of cloud computing security,. Sinica 41 (2) (2013) 371–381.

K. Hashizume, D.G. Rosado, E. Fernndez-Medina, E.B. Fernandez, An analysis of security issues for cloud computing, J. Internet Services Appl. 4 (1) (2013) 1–13.

J. Che, Y. Duan, T. Zhang, J. Fan, Study on the security models and strategies of cloud computing, Proc. Eng. 23 (2011) 586–593.

Z. Tari, Security and privacy in cloud computing, IEEE Cloud Comput. 1 (1) (2014) 54–57.

Cloud security alliance, security guidelines for critical areas of focus in cloud computing v3.0, 2011.

L. FB Soares, D. AB Fernandes, J.V. Gomes, M.M. Freire, P. RM Inácio, Cloud security: state of the art, in: Security, Privacy and Trust in Cloud Systems, Springer, Berlin, Heidelberg, 2014, pp. 3–44.

Y.A. Younis, M. Merabti, K. Kifayat, Secure cloud computing for critical infrastructure: a survey, Technical Report, Liverpool John Moores University, United Kingdom, Tech. Rep. ISBN: 978-1-902560-27-4, 2013.

H.T. Dinh, C. Lee, D. Niyato, P. Wang, A survey of mobile cloud computing: architecture, applications, and approaches, Wireless Comm. Mobile Comput. 13 (18) (2013) 1587–1611.

A. Eghtesadi, Y. Jarraya, M. Debbabi, M. Pourzandi, Preservation of security conï¬gurations in the cloud, in: IEEE Intl. Conf. on Cloud Engineering (IC2E), 2014, pp. 17–26.

M.H. Song, Analysis of risks for virtualization technology, in: Applied Mechanics and Materials, vol. 539, 2014, pp. 374–377.

A. Corradi, M. Fanelli, L. Foschini, VM consolidation: a real case based on openstack cloud, Future Gener. Comput. Syst. 32 (2014) 118–127.

V. Varadharajan, U. Tupakula, Counteracting security attacks in virtual machines in the cloud using property based attestation, J. Network Comput. Appl. 40 (2014) 31–45.

K.S. Rao, P.S. Thilagam, Heuristics based server consolidation with residual resource defragmentation in cloud data centers, Future Gener. Comput. Syst. (2014),

L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, A.V. Vasilakos, Security and privacy for storage and computation in cloud computing, Inform. Sci. 258 (2014) 371–386.

K. Salah, J.M.A. Calero, S. Zeadally, S. Al-Mulla, M. Alzaabi, Using cloud computing to implement a security overlay network, IEEE Sec. Privacy 11 (1) (2013) 44–53.

V. Vladimir, Cloud adoption issues: interoperability and security, in: Cloud Computing and Big Data, 2013, pp. 53–65.

Open Web Application Security Project Top 10-2015, The ten most critical Web application security risks, <https://www.owasp.org/index.php/Top10]OWASP> Top 10 for 2015 (accessed 08.04.16).

B. Liu, E. Blasch, Y. Chen, A.J. Aved, A. Hadiks, D. Shen, G. Chen, Information fusion in a cloud computing era: a systems-level perspective, IEEE Aerospace Electron. Syst. Mag. 29 (10) (2014) 16–24.

T. Jung, X. Li, Z. Wan, M. Wan, Control cloud data access privilege and anonymity with fully anonymous attribute based encryption, IEEE Trans. Inform. Forensics Sec. 10 (1) (2014) 190–199.

X. He, T. Chomsiri, P. Nanda, Z. Tan, Improving cloud network security using the tree-rule ï¬rewall, Future Gener. Comput. Syst. 30 (2014) 116–126.

H. Moraes, R. Nunes, D. Guedes, DCPortalsNg: efï¬cient isolation of tenant networks in virtualized datacenters, in: Thirteenth Intl. Conference on Networks, 2014, pp. 230–235.

T. Xing, D. Huang, L. Xu, C. Chung, P. Khatkar, Snortflow: a openflow-based intrusion prevention system in cloud environment, in: IEEE Research and Educational Experiment Workshop, 2013, pp. 89–92

M. Kazim, R. Masood, M.A. Shibli, Securing the virtual machine images in cloud computing, in: Proceedings of the ACM 6th International Conference on Security of Info and Networks, 2013, pp. 425–428.

D. Jeswani, A. Verma, P. Jayachandran, K. Bhattacharya, ImageElves: rapid and reliable system updates in the cloud, in: IEEE 33rd International Conference on Distributed Computing Systems (ICDCS), 2013, pp. 390–399.

K. Fan, D. Mao, Z. Lu, J. Wu, OPS: ofï¬ne patching scheme for the images management in a secure cloud environment, in: IEEE International Conference on Services Computing (SCC), 2013, pp. 587–594.

Y. Xia, Y. Liu, H. Chen, Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks, in: IEEE 19th International Symposium on High Performance Computer Architecture, 2013, pp. 246–257.

Y. Fu, Z. Lin, Exterior: using a dual-vm based external shell for guest-os introspection, conï¬guration, and recovery, in: Proceedings of the 9th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2013, pp. 97–110.

M.R. Anala, J. Shetty, G. Shobha, A framework for secure live migration of virtual machines, in: IEEE International Conference on Advances in Computing, Communications and Informatics, 2013, pp. 243–248.

F. Zhang, J. Wang, K. Sun, A. Stavrou, HyperCheck: a hardware-assisted integrity monitor, IEEE Trans. Dependable Sec. Comput. (2013), http://dx.doi.org/10.1109/TDSC.2013.53

C. Wu, Z. Wang, X. Jiang, Taming hosted hypervisors with (mostly) deprivileged execution, in: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2013.

Pancholi, Vishal R., and Bhadresh P. Patel. "Enhancement of Cloud Computing Security with Secure Data Storage using AES." International Journal for Innovative Research in Science and Technology 2.9 (2016): 18-21.

Syam Kumar Pasupuleti, Subramanian Ramalingam, RajkumarBuyya, An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing, Journal of Network and Comp. Appl., Volume 64, April 2016, Pages 12-22, ISSN 1084-8045

V. Chang and M. Ramachandran, "Towards Achieving Data Security with the Cloud Computing Adoption Framework," in IEEE Transactions on Services Computing, vol. 9, no. 1, pp. 138-151, Jan.-Feb. 1 2016. doi: 10.1109/TSC.2015.2491281.

Q. Liu, G. Wang, J. Wu, Time-based proxy re-encryption scheme for secure data sharing in a cloud environment, Inform. Sci. 258 (2014) 355–370.

S.K. Sah, S. Shakya, H. Dhungana, A security management for cloud based applications and services with diameter-AAA, in: IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014, pp. 6–11.

O.D. Alowolodu, B.K. Alese, A.O. Adetunmbi, O.S. Adewale, O.S. Ogundele, Elliptic curve cryptography for securing cloud computing applications, Int. J. Comput. Appl. 66 (2013).

M.Y. Wu, T.H. Lee, Design and implementation of cloud API access control based on OAuth, in: IEEE TENCON Spring Conference, 2013, pp. 485–489.

S. Ruj, M. Stojmenovic, A. Nayak, Decentralized access control with anonymous authentication of data stored in clouds, IEEE Trans. Parallel Distrib. Syst. 25 (2) (2014) 384–394.

S. Yang, P. Lai, J. Lin, Design role-based multi-tenancy access control scheme for cloud services, in: IEEE Intl. Symp. on Biometrics and Sec. Tech. (ISBAST), 2013, pp. 273–279.

R.D. Dhungana, A. Mohammad, A. Sharma, I. Schoen, Identity management framework for cloud networking infrastructure, in: IEEE International Conference on Innovations in Information Technology (IIT), 2013, pp. 13–17