Open Access   Article Go Back

A Survey on Security Threats in Cloud Computing

P. Anusha1 , R. Maruthi2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-04 , Page no. 173-176, Feb-2019

Online published on Feb 28, 2019

Copyright © P. Anusha, R. Maruthi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Anusha, R. Maruthi, “A Survey on Security Threats in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.173-176, 2019.

MLA Style Citation: P. Anusha, R. Maruthi "A Survey on Security Threats in Cloud Computing." International Journal of Computer Sciences and Engineering 07.04 (2019): 173-176.

APA Style Citation: P. Anusha, R. Maruthi, (2019). A Survey on Security Threats in Cloud Computing. International Journal of Computer Sciences and Engineering, 07(04), 173-176.

BibTex Style Citation:
@article{Anusha_2019,
author = {P. Anusha, R. Maruthi},
title = {A Survey on Security Threats in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {173-176},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=745},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=745
TI - A Survey on Security Threats in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - P. Anusha, R. Maruthi
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 173-176
IS - 04
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud computing, also referred to as ‘on demand computing’, is a recent concept making waves in the IT industry. When compared to other specific, dedicated infrastructures in computing, cloud concept gives the advantage of reliability, quantifiability, cost- effectiveness and improved performance. It is easy and convenient to have network access to other shared configurable computing resources using this concept. Another advantage of the concept is that the resources can be utilized with increasing efficiency and minimum overhead efforts. Clouds can be used for services, solutions, and applications and also for storing large amount of data in different locations. Data is stored over a set of resources which are networked so that the data can be accessed through any other virtual system. The security and privacy issues associated with data management is reduced considerably using the cloud computing facility as the data centers are literally beyond the reach and control of users. Further, server breakdowns which normally affect data storage and use does not seem to affect the user in cloud computing. But this system has its own set of disadvantages. This work is an attempt discuss in detail cloud computing, its types and Network/security issues related to it. Networks structure faces some attacks that are denial off service attack, man in the middle attack, network sniffing, port scanning, SQL injection attack, cross site scripting. Security Issues that occur in Cloud Computing are XML signature element wrapping, Browser security, cloud malware injection attack, flooding attacks, data protection, insecure or incomplete data deletion, locks in.

Key-Words / Index Term

Cloud Computing, Data Integrity, Data storage, Security, Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Interoperability, Denial of Service (DoS).

References

[1]. R. Maggiani, Communication Consultant, Solari Communication, “Cloud Computing is Changing How we Communicate,” 2009 IEEE International Professional Conference, IPCC, pp. 1-4, Waikiki, HI, USA, July 19- 22,2009. ISBN: 978-1-4244-4357-4.
[2]. Harold C. Lin, Shivnath Babu, Jeffrey S. Chase, Sujay S. Parekh, “Automated Control in Cloud Computing: Opportunities and Challenges”, Proc. of the 1st Workshop on Automated control for data centers and clouds, New York, NY, USA, pp. 13-18, 2009, ISBN: 978-1-60558-585-7.
[3]. Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacon, “On technical Security Issues in Cloud Computing,” Proc. of IEEE International Conference on Cloud Computing (CLOUD-II, 2009), pp. 109-116, India, 2009.
[4] R. L Grossman, “The Case for Cloud Computing,” IT Professional, vol. 11(2), pp. 23-27, 2009, ISSN: 1520-9202.
[5].Foster, I., & Kesselman, C. (1998). The Grid: Blueprint for a New Computing Infrastructure (The Elsevier Series in Grid Computing). Morgan Kaufmann
[6] Han Y (2010). On the clouds: a new way of computing. Inf Technol Libr, Vol. 29 No. 2, pp: 87- 92.
[7]. Iyer B, Henderson JC (2010). Preparing for the future: understanding the seven capabilities of cloud computing. MIS Q Exec; Vol. 9 No. 2, pp: 117-131.
[8]. Jamil, D, & Zaki, H. (2011a). cloud computing security. International Journal of Engineering Science and Technology (IJEST) , Vol.3 No.4, 3478-3483.
[9]. Jamil, D., & Zaki, H. (2011b). SECURITY ISSUES IN CLOUD COMPUTING AND
COUNTER MEASURES. International Journal of Engineering Science and Technology (IJEST) , Vol. 3 No. 4, 2672-2676.
[10]. Jensen, M. (2009, September). On Technical Security Issues in Cloud Computing. IEEE International Conference in Cloud Conouting , 109- 116.
[11]. Lohr, S. (2007, October 8). Google and I.B.M. Join in „Cloud Computing‟ Research. Retrieved 1 28, 2012, from The Newyork Times: http://www.nytimes.com/2007/10/08/technology/08cl oud.html
[12]. Mell P, Grance T (2010). The NIST definition of cloud computing. Commun ACM; Vol. 53 No. 6, pp:50.
[13]. NAONE, E ( 2007, September 18). Computer in the Cloud. Retirived 1 24, 2012, from Technology Review, MIT: http://www.technologyreview.com/printerfriendlyar ticle.aspx?id=19397
[14]. Peter Mell and Tim Grance, (2009)The NIST Definition of Cloud Computing, version 15, National Institute of Standards and Technology (NIST), Information Technology Laboratory (www.csrc.nist.gov)
[15]. RALEIGH, NC & ARMONK, NY (2007, May 7). North Carolina State University and IBM help bridge digital Divide in North Carolina and beyond. Retrived 1 27, 2012,from IBM:ttp://www‐ 03.ibm.com/press/us/en/ press release /21506.wss
[16]. REIMER, J (2007, April 8). Dreaming in the “Cloud” with the XIOS web operating system. Retrived 1 24,2012, from are technical: http://arstechnica.com/news.ars/post/20070408‐ d reaming‐ in‐ the‐ cloud‐ with‐ thexios‐ web‐ oper ating ‐ system.html
[17]. Ren, K., & Lou, W. (2009). Ensuring Data Storage Security in Cloud Computing. Retrieved from http://www.ece.iit.edu/~ubisec/IWQoS09.pdf
[18]. Scarfone K, S. A. (2007). Guide to Secure Web Services. Retrievedfrom http://csrc.nist.gov/publications/nistpubs/800-95/ SP800- 95 .pdf
[19] Services, A. W. (2009, April). Amazon Virtual private Cloud. Retrieved from http://aws.amazon.com/vpc/
[20] Vaquero LM, Rodero-Merino L, Caceres J, Lindner M (2009). A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput Commun, Vol. 39 No. 1, pp:50-55.
[21].View, M. Calif & Armonk. (2007, October 8). Google and IBM Announced University Initiative to Address Internet-Scale Computing Challenges. Retrieved 1 28, 2012, from IBM: http://www- 03.ibm.com/press/us/en/pressrelease/22414.wss
[22].View, M. Calif & Armonk. (2007, October 8). Google and IBM Announced University Initiative to Address Internet-Scale Computing Challenges. Retrieved 1 28, 2012, from IBM: http://www- 03.ibm.com/press/us/en/pressrelease/22414.wss
[23]Vouk, M. (2008). Cloud Computing-Issues, Research and Implication. "Journal of Computing and Information Technology - CIT" , Vol. 16 No.4, pp. 235–246. [24]Wikipedia (2012a, January 26). Amazon Elastic Compute Cloud Retrived 1 27, 2012, from Wikimedia Foundation Inc. http://en.wikipedia.org/wiki/Amazon_Elastic_Compute Cloud.
[25].Wikipedia (2012b, January 27). Cloud Computing Retrieved 1 28, 2012, from Wikimedia Foundation Inc. http://en.wikipedia.org/wiki/Cloud_computing
[26].Yang, A. (2003). Guide to XML Web Services Security. Retrieved from http://www.cgisecurity.com/ws/WestbridgeGuideTo WebServicesSecurity.pdf[27]. Zurich.Catteddu, D. (2010). Cloud Computing. Retrieved from http://www.enisa.europa.eu/act/rm/files/ deliverables/ cloud‐ computingrisk‐ assessment
[27]. Zurich.Catteddu, D. (2010). Cloud Computing. Retrieved fromhttp://www.enisa.europa.eu/act/rm/files/ deliverables/ cloud‐ computingrisk‐ assessment