[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2331762.2331767acmotherconferencesArticle/Chapter ViewAbstractPublication PagesspringsimConference Proceedingsconference-collections
research-article

Different facets of security in the cloud

Published: 26 March 2012 Publication History

Abstract

Cloud computing is a long fantasized visualization of computing as a utility, where data owners can remotely store and access their data in the cloud anytime and from anywhere. Using a shared pool of configurable resources, users can be relieved from the burden of local data storage and upkeep. The security of cloud computing has always been an important aspect of quality of service from cloud service providers. However, cloud computing poses many new security challenges which have not been well investigated. This paper provides an analysis of cloud computing, cloud data storage security, the security risks that involve using the cloud, security policies, physical security, and software security pertaining to the cloud. Our research work indicates that cloud computing combined with a trusted computing platform can provide some important security services, including authentication, confidentiality, and integrity.

References

[1]
Kaufman, L. M., 2009, "Data Security in the World of Cloud Computing", Security & Privacy, 7(4):61--64.
[2]
Kandukuri, B. R., V. R. Paturi, and A. Rakshit, 2009, "Cloud Security Issues", In Proceedings of the IEEE International Conference on Services Computing, pp. 517--520.
[3]
Carroll, M., A. van de Merwe, and P. Kotzé, 2011, "Secure Cloud Computing: Benefits, Risks and Controls", In Proceedings of the Information Security South Africa, pp. 1--9.
[4]
Gowrigolla, B., S. Sivaji, and M. R. Masillamani, 2010, "Design and Auditing of Cloud Computing Security", In Proceedings of the International Conference on Information and Automation for Sustainability, pp. 292--297.
[5]
Lv, H. and Y. Hu, 2011, "Analysis and Research about Cloud Computing Security Protect Policy", In Proceedings of the International Conference on Intelligence Science and Information Engineering, pp. 214--216.
[6]
Mathisen, E., 2011, "Security Challenges and Solutions in Cloud Computing", In Proceedings of the IEEE International Conference on Digital Ecosystems and Technologies, pp. 208--212.
[7]
Wang, C., Q. Wang, K. Ren, and W. Lou, 2010, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing", In Proceedings of the IEEE INFOCOM, pp. 1--9.
[8]
Shen, Z. and Q. Tong, 2010, "The Security of Cloud Computing System Enabled by Trusted Computing Technology", In Proceedings of the International Conference on Signal Processing Systems, pp. V2-11--V2-15.
[9]
Begum, S. and M. K. Khan, 2011, "Potential of Cloud Computing Architecture", In Proceedings of the International Conference on Information and Communication Technologies, pp. 1--5.
[10]
McGraw, G., 2004, "Software Security", Security & Privacy, 2(2):80--83.
[11]
Li, H.-C., P.-H. Liang, J.-M. Yang, and S.-J. Chen, 2010, "Analysis on Cloud-Based Security Vulnerability Assessment", In Proceedings of the IEEE International Conference on E-Business Engineering, pp. 490--494.

Cited By

View all
  1. Different facets of security in the cloud

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CNS '12: Proceedings of the 15th Communications and Networking Simulation Symposium
    March 2012
    114 pages
    ISBN:9781618397850

    Sponsors

    • SCS: Society for Modeling and Simulation International

    In-Cooperation

    Publisher

    Society for Computer Simulation International

    San Diego, CA, United States

    Publication History

    Published: 26 March 2012

    Check for updates

    Author Tags

    1. cloud security
    2. security policy

    Qualifiers

    • Research-article

    Conference

    SpringSim '12
    Sponsor:
    • SCS

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)Cloud security issues and challengesJournal of Network and Computer Applications10.1016/j.jnca.2016.11.02779:C(88-115)Online publication date: 1-Feb-2017
    • (2015)From Security to Assurance in the CloudACM Computing Surveys10.1145/276700548:1(1-50)Online publication date: 22-Jul-2015
    • (2015)A Petri net-based decision-making framework for assessing cloud services adoptionJournal of Network and Computer Applications10.1016/j.jnca.2015.07.00257:C(102-118)Online publication date: 1-Nov-2015
    • (2014)Security issues in cloud environmentsInternational Journal of Information Security10.1007/s10207-013-0208-713:2(113-170)Online publication date: 1-Apr-2014
    • (2013)Classification of Security Issues and Solutions in Cloud EnvironmentsProceedings of International Conference on Information Integration and Web-based Applications & Services10.1145/2539150.2539222(560-564)Online publication date: 2-Dec-2013

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media