[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/SCC.2009.84guideproceedingsArticle/Chapter ViewAbstractPublication PagessccConference Proceedingsconference-collections
Article

Cloud Security Issues

Published: 21 September 2009 Publication History

Abstract

In past three decades, the world of computation has changed from centralized (client-server not web-based) to distributed systems and now we are getting back to the virtual centralization (Cloud Computing). Location of data and processes makes the difference in the realm of computation. On one hand, an individual has full control on data and processes in his/her computer. On the other hand, we have the cloud computing wherein, the service and data maintenance is provided by some vendor which leaves the client/customer unaware of where the processes are running or where the data is stored. So, logically speaking, the client has no control over it. The cloud computing uses the internet as the communication media. When we look at the security of data in the cloud computing, the vendor has to provide some assurance in service level agreements (SLA) to convince the customer on security issues. Organizations use cloud computing as a service infrastructure, critically like to examine the security and confidentiality issues for their business critical insensitive applications. Yet, guaranteeing the security of corporate data in the "cloud" is difficult, if not impossible, as they provide different services like Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). Each service has their own security issues. So the SLA has to describe different levels of security and their complexity based on the services to make the customer understand the security policies that are being implemented. There has to be a standardized way to prepare the SLA irrespective to the providers. This can help some of the enterprises to look forward in using the cloud services. In this paper, we put forward some security issues that have to be included in SLA.

Cited By

View all
  • (2024)A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud servicesComputer Science Review10.1016/j.cosrev.2024.10066153:COnline publication date: 1-Aug-2024
  • (2023)Automated Security Assessments of Amazon Web Services EnvironmentsACM Transactions on Privacy and Security10.1145/357090326:2(1-31)Online publication date: 13-Mar-2023
  • (2022)Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the CloudInternational Journal of Web Services Research10.4018/IJWSR.29902119:1(1-32)Online publication date: 5-Aug-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SCC '09: Proceedings of the 2009 IEEE International Conference on Services Computing
September 2009
547 pages
ISBN:9780769538112

Publisher

IEEE Computer Society

United States

Publication History

Published: 21 September 2009

Author Tags

  1. Cloud Computing
  2. Cloud computing Security
  3. Service Level Agreement (SLA)
  4. Software as a Service (SaaS)

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 64 of 159 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud servicesComputer Science Review10.1016/j.cosrev.2024.10066153:COnline publication date: 1-Aug-2024
  • (2023)Automated Security Assessments of Amazon Web Services EnvironmentsACM Transactions on Privacy and Security10.1145/357090326:2(1-31)Online publication date: 13-Mar-2023
  • (2022)Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the CloudInternational Journal of Web Services Research10.4018/IJWSR.29902119:1(1-32)Online publication date: 5-Aug-2022
  • (2022)Critical Retrospection of Security Implication in Cloud Computing and Its Forensic ApplicationsSecurity and Communication Networks10.1155/2022/17914912022Online publication date: 1-Jan-2022
  • (2022)Enabling efficient privacy-preserving subgraph isomorphic query over graphsFuture Generation Computer Systems10.1016/j.future.2022.01.027132:C(1-10)Online publication date: 18-May-2022
  • (2021)Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and ChallengesACM Computing Surveys10.1145/345662854:8(1-36)Online publication date: 4-Oct-2021
  • (2019)Determinants for adoption of cloud in government sector in IndiaInternational Journal of Business Information Systems10.1504/ijbis.2019.10307332:2(170-198)Online publication date: 1-Jan-2019
  • (2019)A Combined Decision for Secure Cloud Computing Based on Machine Learning and Past Information2019 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC.2019.8885566(1-6)Online publication date: 15-Apr-2019
  • (2019)On cloud security requirements, threats, vulnerabilities and countermeasuresComputer Science Review10.1016/j.cosrev.2019.05.00233:C(1-48)Online publication date: 1-Aug-2019
  • (2019)CrowdcloudCluster Computing10.1007/s10586-018-2843-222:2(455-470)Online publication date: 1-Jun-2019
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media