A Review of Challenges and Security Risks of Cloud Computing

Authors

  • Algubelly Yashwanth Reddy Head of the Department, Computer Science and Engineering, Sree Dattha Group of Institutions, Hyderabad
  • P. Hasitha Reddy Assistant Professor, Computer Science and Engineering, Sree Dattha Group of Institutions, Hyderabad

Keywords:

Cloud, security, solutions, challenges, risks

Abstract

Because of its capacity to cut processing expenses, cloud computing is now one of the most hotly debated topics in the field today. The most intriguing and alluring technology of the present day is that which provides its customers with the ability to request services online. Because cloud computing stores as well as disseminates data in an environment, security has emerged as the primary impediment to the widespread use of the cloud computing settings. Many people utilise cloud to store our personal data, which necessitates a high level of the data storage security over media. When data is being uploaded to a cloud server, security is a key issue. The security dangers and problems of cloud computing are examined in just this review article, which also examines the security standards for cloud computing. Accordingly, the main purpose of this analysis is to categorise cloud computing security threats and issues.

References

[1] Kim, W., et al. Adoption issues for cloud computing. in Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia. (2009). ACM.

[2] Mell, P. and T. Grance, Draft nist working definition of cloud computing. (2009)

[3] Subbiah, M., D.S.S. Muthukumaran, And D. Ramkumar, Enhanced Survey And Proposal To Secure The Data In Cloud Computing Environment. International Journal Of Engineering Science, (2013) .

[4] Ali, Alwesabi, Almutewekel Abdullah, and Okba Kazar. "Implementation of cloud computing approach based On mobile agents." International Journal of Computer and Information Technology 2.06 (2013): 2279-0764.

[5] S. Hajra et al., "DRECON: DPA Resistant Encryption by Construction," Springer, 2014, pp. 420-439. https://doi.org/10.1007/978-3-319-06734-6_25

[6] A. Tripathi and A. Mishra, "Cloud computing security considerations," IEEE Intl. Conference on 90Signal Processing, Communications and Computing (ICSPCC), 2011, pp. 1-5

[7] "SANS Institute: Network Security Resources.

[8] M. Al Morsy, J. Grundy, and I. Müller, "An Analysis of the Cloud Computing Security Problem,"APSEC Cloud W., Nov.2010.

[9] K. M. Khan and Q. Malluhi, "Establishing Trust in Cloud Computing," IT Prof., vol. 12 (5), Sept. 2010, pp. 20-27. https://doi.org/10.1109/MITP.2010.128

[10] N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. de Panafieu, and C. Ràfols, "Attributebased encryption schemes with constant-size ciphertexts," Theor. Comput. Sci., vol. 422, Mar.2012, pp. 15-38.

[11] Younis, M. and K. Kifayat, Secure cloud computing for critical infrastructure: A survey. Liverpool John Moores University, United Kingdom, Tech. Rep, (2013).

[12] Modi, C., et al., A survey of intrusion detection techniques in cloud. Journal of Network and Computer Applications, 36(1) (2013). 42-57. https://doi.org/10.1016/j.jnca.2012.05.003

[13] SUBBIAH, M., D.S.S. MUTHUKUMARAN, and D. RAMKUMAR, Enhanced Survey and Proposal to secure the data in Cloud Computing Environment. International Journal of Engineering Science, (2013) 5.

[14] Chou, T.-S., Security threats on cloud computing vulnerabilities. International Journal of Computer Science & Information Technology, 5(3) (2013) 79. https://doi.org/10.5121/ijcsit.2013.5306

[15] Zissis, D. and D. Lekkas, Addressing cloud computing security issues. Future Generation computer systems, 28(3) (2012) 583-592. https://doi.org/10.1016/j.future.2010.12.006

[16] Moreno-Vozmediano, R., R.S. Montero, and I.M. Llorente, Key challenges in cloud computing: Enabling the future internet of services. Internet Computing, IEEE, 17(4) (2013) 18-25. https://doi.org/10.1109/MIC.2012.69

[17] Khalil, I.M., A. Khreishah, and M. Azeem, Cloud computing security: a survey. Computers, 3(1) (2014) 1-35. https://doi.org/10.22233/20412495.0114.35

[18] Zhang, L., et al., Cloud manufacturing: a new manufacturing paradigm. Enterprise Information Systems, 8(2) (2014) 167-187. https://doi.org/10.1680/feng.13.00031

Downloads

Published

2022-01-06

How to Cite

[1]
Algubelly Yashwanth Reddy and P. Hasitha Reddy 2022. A Review of Challenges and Security Risks of Cloud Computing. AG Volumes. (Jan. 2022), 27–33.