Open Access Open Access  Restricted Access Subscription or Fee Access

Cloud Security Issues and Privacy

G. Jayanthiaathirai, G.  Sannathi

Abstract


Cloud computing is largely used in IT industries in which large amount of information is stored then there is ultimate need to ensure the safety of the cloud environment. The main requirements to ensure security in cloud are authorizing and authenticating users, data confidentiality and non-repudiation.This paper is begin with cloud service (SaaS, PaaS, and IaaS) and deployment patterns.  There are several cloud security issues such as privacy, reliability, legal issues, and long term viability is available in cloud computing. But here we discussed only the major three common issues such as hijacking and its risks, malware injection and data loss and benefits of data loss prevention. Generally, the system over internet is vulnerable to performance and security risks.


Full Text:

PDF

References


Ohlman, B., Eriksson, A., Rembarz, R. (2009) What Networking of Information Can Do for Cloud Computing. The 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, Groningen, The Netherlands, June 29 - July 1, 2009

L.J. Zhang and Qun Zhou, “CCOA: Cloud Computing Open Architecture,” ICWS 2009: IEEE International Conference on Web Services, pp. 607-616. July 2009.

Tim Mather, Subra Kumaraswamy, Shahed Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, O’ Reilly Media, USA, 2009.

Ronald L. Krutz, Russell Dean Vines “Cloud SecurityA Comprehensive Guide to Secure Cloud Computing”, Wiley Publishing, Inc., 2010

K. Vieira, A. Schulter, C. B. Westphall, and C. M. Westphall, “Intrusion detection techniques for Grid and Cloud Computing Environment,” IT Professional, IEEE Computer Society, vol. 12, issue 4, pp. 38-43, 2010.

Marios D. Dikaiakos, Dimitrios Katsaros, Pankaj Mehra, George Pallis, Athena Vakali, “Cloud Computing: Distributed Internet Computing for IT and Scientific Research,” IEEE Internet Computing Journal, vol. 13, issue. 5, pp. 10-13, September 2009. DOI: 10.1109/MIC.2009.103.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.