Research Article

Cloud Computing – Understanding Risk, Threats, Vulnerability and Controls: A Survey

by  Manish M. Potey, C A Dhote, Deepak H. Sharma
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Issue 3
Published: April 2013
Authors: Manish M. Potey, C A Dhote, Deepak H. Sharma
10.5120/11373-6641
PDF

Manish M. Potey, C A Dhote, Deepak H. Sharma . Cloud Computing – Understanding Risk, Threats, Vulnerability and Controls: A Survey. International Journal of Computer Applications. 67, 3 (April 2013), 9-14. DOI=10.5120/11373-6641

                        @article{ 10.5120/11373-6641,
                        author  = { Manish M. Potey,C A Dhote,Deepak H. Sharma },
                        title   = { Cloud Computing – Understanding Risk, Threats, Vulnerability and Controls: A Survey },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 67 },
                        number  = { 3 },
                        pages   = { 9-14 },
                        doi     = { 10.5120/11373-6641 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Manish M. Potey
                        %A C A Dhote
                        %A Deepak H. Sharma
                        %T Cloud Computing – Understanding Risk, Threats, Vulnerability and Controls: A Survey%T 
                        %J International Journal of Computer Applications
                        %V 67
                        %N 3
                        %P 9-14
                        %R 10.5120/11373-6641
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

As an embryonic technology, cloud computing has attracted more attention. More and more enterprises or government agencies started to explore cloud computing. However, with the extensive use of cloud computing, security issues came out on a growing scale. This paper highlights and categorizes many of security issues introduced by the "cloud"; surveys the risks, threats, vulnerabilities and controls. Besides, the paper summarizes some corresponding solutions that can help promote the benefits and mitigate the risks associated with Cloud Computing.

References
  • Tim Mather, SubraKumarswamy, and ShahedLatif, Cloud Security and Privacy,s. l; O'Reilly, 2010
  • T Grance, K Kent and B Kim. NIST SP800-61 computer security incident handling guide, 2008
  • Gartner. "Seven cloud computing security risks". http://www. infoworld. com July 2,2008
  • Charles P Pfleeger, Security in Computing. Pearson Education.
  • Vaquero, Luis Rodero-Merino Juan Caceres et. al "A break in clouds : Towards a cloud definition. " ACM SIGOMM Computer Communication Review Archive, Volume 39, Issue 1 (January 2009).
  • RichMaggini, Solari communication. "Cloud Computing is changing how we communicate",IEEE,2009.
  • Jianfeng Yang, Zhibin Chen, "Cloud Computing Research and security issues", ProfessionalCommunication Conference, 2009. IECC 2009. IEEE International
  • Adrian Seccombe, Alex Hutton, Alexander Meisel, et, al. Security Guidance for Critical Areas of focus in Cloud Computing V 2. 1, Cloud Security Alliance , 2009
  • Meiko Jensen JorgSchwenk, Nils Gruschka,Luigi Lo Icono, "On Technical Security Issues in Cloud Computing", 2009 IEEE conference on Cloud Computing.
  • Kaufman, L. M. " Data Security in the World of Cloud Computing". Security& Privacy, IEEE, vol. 7 , pp. 61 - 64 , July-Aug. 2009
  • La'Quata Sumter, " Cloud Computing : Security Risk", ACM SE '10 Proceedings of the 48th Annual Southeast Regional Conference ACM New York, NY, USA ©2010
  • ENISA, Cloud Computing: Benefits, risks and recommendation for information security,2010
  • Dan Hubbard, Michael Sutton, AmerDeeba, Andy Dancer, et. al,Top Threats to cloud Computing v1. 0, 2010
  • Bernd Grobaur,TobiasWalloschek and Elmer Stocker, "Understanding cloud computing vulnerabilities",IEEE security and privacy, 10 Jun 2010, IEEE computer society digital library, IEEE Computer Society
  • Minqui Zhou, Rong Zhang, wieXie, WeiningQian, Aoying Zhou, Security and Privacy in Cloud Computing : A Survey, 2010 Sixth International Conference on Semantics Knowledge and Grid (SKG), IEEE Conferences.
  • KresimirPopovic,ZeljkoHocenski, "Cloud Computing Security Issues and Challeges", MIPRO 2010 Proceedings of 33 International Convention ,IEEE,, May24-28, 2010,Opatija, Croatia
  • Kamal Dahbur, Bassil Mohammad, Ahmed BisherTarakji, A Survey of risks, threats, and vulnerabilities in cloud computing, ACM 978-1-4503-0474-0/04/2011
  • Jaeger, T. ; Schiffman, J. "Outlook: Cloudy with a Chance of Security Challenges and Improvements", Security & Privacy, IEEE, vol. 8, pp. 77-80, Jan- Feb 2010.
  • Takabi, H. ; Joshi, J. B. D. ; Ahn, G. "Security and Privacy Challenges in Cloud Computing Environments", Security & Privacy, IEEE, vol. 6, pp. 24-31, Nov. -Dec. 2010
  • NIST,"NIST. gov-Computer Security Division-Computer Security Resource Centre" Wayne Jansen, Timothy Grance,"Guidelines on Security and privacy in public cloud computing" , Draft NIST special publication, January 2011.
  • Wang Jun-jui, Mu Sen ,2011, "Security Issues and Counter Measures in Cloud Computing", IEEE 2011.
  • FarzadSabahi, "Cloud Computing Security Threats and Responses", IEEE 2011.
  • Tharam Dillon, Chen Wu, "Cloud Computing: Issues and Challenges", 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
  • Sean Carlin, Kevin Curran, "Cloud Computing Security", International Journal of Ambient Computing and Intelligence, 3(1), 14-19, January-March 2011
  • Balachandra Reddy Kandukuri et al. , "Cloud Security Issues",IEEE International Conference on Services Computing, 2009
  • IIangoSriram, Ali KhajehHosseni, "Research Agenda in Cloud Technology", 1st ACM Symposium on Cloud Computing, SOCC 2010
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cloud Computing Risk Threat Vulnerability Controls

Powered by PhDFocusTM