Open Access Open Access  Restricted Access Subscription or Fee Access

Data Security Risks and Solutions in Cloud Computing

K. Vasantha Kokilam, S. Samson Dinakaran

Abstract


Cloud computing plays major role in all IT organizations and has become one of the fastest booming areas in IT industry due to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. Though Cloud Computing is accepted by large organizations for the significant advantages it has, the areas of concern cause reluctance and hesitancy to adopt the same. This paper discusses about Cloud Computing, its characteristics, what are the risks faced by the organizations in adopting cloud computing and also aims to provide solutions for some of the security risks faced.

Keywords


Cloud Computing, Encryption, Privacy, Security

Full Text:

PDF

References


Cisco Cloud Computing -Data Center Strategy, Architecture, and Solutions Point of View White Paper for U.S. Public Sector.

“IBM Point of View: Security and Cloud Computing”, Cloud computing White paper November 2009.IBM.

“Gartner: Seven cloud-computing security risks” http://www.infoworld.com/d/security-central/gartner-sevencloud-computing-security-risks-853.

Shucheng Yu∗, Cong Wang†, KuiRen† , and Wenjing Lou,” Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing”.

Cong Wang, Qian Wang, and KuiRen, Wenjing Lou” Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.”

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” Cryptology ePrint Archive, Report 2007/202, 2007, http://eprint.iacr.org/.

SameeraAbdulrahmanAlmulla, Chan YeobYeun,” Cloud Computing Security Management”

G.Ateniese et al., “Provable Data Possession at Untrusted Stores,” Proc. ACMCCS „07, Oct. 2007, pp. 598–609.

Weili Huang, Jian Yang” New Network Security Based On CloudComputing”.

H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90–107.

JunaidArshad, Paul Townend “Quantification of Security for Compute Intensive Workloads in Clouds”.

“Cloud Computing and Disaster Recovery Plans” http://www.brighthub.com/environment/greencomputing/articles/ 71273.aspx.

Meiko Jensen, JorgSchwenk, Nils Gruschka, Luigi Lo Iacono.” On Technical Security Issues in Cloud Computing”

Smart Key Selection Model for Secured Communication over Cloud Computing Environment: Challenges & Opportunities http://iem.edu.in/conference/IEMCON5 Sensor%20and%20Adhoc%20Networks%20S-2B/spsitm2011_submission_47.pdf

National institute of standard and technologyhttp://csrc.nist.gov/publications/drafts/80145/Draft-SP-800-145_cloud-definition.pdf


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.