Analysis of Cloud Computing Security Issues and Risks

Authors

  • Priyanka Singh Department of Computer Science and Engineering AIACTR, Geeta Colony New Delhi- 110031
  • Manju Khari AIACTR, Geeta Colony, Delhi, India

Keywords:

Cloud model, Security Issues, Security Risk, Secured methods

Abstract

In the world of computer networking, cloud computing makes a technical shift of computing services being provided locally to being provided remotely by third party service providers. The data which was previously kept under control of users now under the control of service providers cloud computing brings many financial and functional benefits as well as serious security concerns that may threaten business continuity and corporate reputation. The definition of cloud computing is still blurry in a large part, because of the magnitude of the security risks and the virtually unlimited amount of information being published over the unsecure platform.

The purpose of this paper is to assess how security risk factors are affecting the existing and prospective cloud users’ cloud usage strategies. Are they simply betting that financial benefits will surpass security risks, or are they confident that cloud providers are capable of assuring an equal or higher level of security than on-premise systems?

This survey, through the examination of published materials and studies, analyzes existing issues along with available countermeasures in order to evaluate the overall assurance level of cloud security. The primary goal of the survey is to assess how security concerns have affected or will affect the respondents’ decision on adopting cloud and its services. This study includes basics of cloud computing by adding its characteristics, models and their categories. Analysis also embraced the existing security concerns faced by researchers and their imposed methodologies.

References

ShrutiChabbra, V.S. Dixit “Cloud Computing: State Of The Art And Security Issues.” AcmSigsoft Software Engineering Notes, Volume 40, March 2015

Mell P.M. and Grance.T “The NIST Definition of Cloud Computing.” In Computer Security Publications from the National of Standards and Technology (NIST) , 2011.

Buyya, Rajkumar, James Broberg, and Andrzej M. Goscinski, eds. Cloud computing: Principles and paradigms. Volume 87, 2010.

SrijitaBasu, ArjunBardhan et. al. “Cloud Computing Security Challenges & Solutions-ASurvey.” Annual computing and communication workshop and conference (CCWC), February 2018 .

Manju Sharma , SadiaHussain and Shazia Ali “Cloud Computing Risks And Recommendations For Security”. International Journal of Latest Research in Science and Technology (IJLRT), Volume 6, January-February 2017.

Vishakha M. Shelke , John Kenny “Data Security in cloud computing using Hierarchical CP-ABE scheme with scalability and flexibility” International Conference on Smart City and Emerging Technology (ICSCET), November 2018.

Navia Jose, Clara Kanmani A " Data Security Model Enhancement In Cloud Environment." IOSR Journal of Computer Engineering (IOSR-JCE) Volume 10, Mar. - Apr. 2013

Vishwanath S Mahalle, Aniket K Shahade " Enhancing the Data Security in Cloud byImplementing Hybrid (Rsa&Aes) Encryption Algorithm." International Conference on power, Automation and Communication (INPAC) , October 2014

MahalakshmiJeyabalu_y, KuppusamyKrishnamoorthy " Hybridization of ICBC and Genetic Algorithm for Optimizing Encryption Process in Cloud Computing Application Service." FundamentaInformaticae, Vol. 157, January 2018

Purnima Gupta, Deepak kumarverma, Aswani Kumar Singh" Improving RSA algorithm using multi-threading model for outsourced data security in cloud storage" International Conference on Cloud Computing, Data Science & Engineering (Confluence) , August 2018

HimelDey, RifatAslam, HossainArif “An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure " International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST), February 2019

S. Bhute and S. K. Arjaria, “An efficient AES and RC6 based cloud-user data security with attack detection mechanism,” Volume 3, 2016.

K. H. Patel and S. S. Patel, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing” Volume 4, 2016

A. P. S and K. Subhashri, “Securing Outsourced Data On Cloud Using ElGamal Cry ptosystem”, 2017.

S. K. Majhi, “An Authentication Framework for Securing Virtual Machine Migration”. Intl. Conference on Advances in Computing, Communications and Informatics (ICACCI), September 21, 2016

FenghuaZhang, YamingChen, WeimingMeng, and Qingtao Wu “Hybrid Encryption Algorithms For Medical Data Storage Security In Cloud Database”. International Journal of Database Management Systems (IJDMS), Volume 11, February 2019.

SumanMadana, PuneetGoswamib“A novel technique for privacy preservation using K-anonymization and nature-inspired optimization algorithms”. International Conference on Sustainable Computing in Science, Technology & Management (SUSCOM), 2019

Downloads

Published

2020-05-12

How to Cite

Singh, P., & Khari, M. (2020). Analysis of Cloud Computing Security Issues and Risks. International Journal of Machine Learning and Networked Collaborative Engineering, 3(04), 182–192. Retrieved from https://mlnce.net/index.php/Home/article/view/118