Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Auditing Method for Cloud Computing

S. Srinivasan, K. Raja

Abstract


Cloud computing provides vibrant enormous resources provisioned as computing service by means of on-demand services over the Internet. Current information technology increased their paces in emerging cloud computing systems and services. Though, despite the credible gains achieved from cloud computing, the security and privacy issues present a strong obstacle for users to acclimatize into cloud computing environment. However sharing of resources, cloud storage and its services are vulnerable to attacks, threats or failure it would bring irreparable losses to the users. This paper introduces an in-depth examination of vibrant audit control methods in cloud computing environment. It assesses the problem of security and privacy from the cloud architecture perspective, cloud delivery model and cloud deployment model viewpoint. The paper examined relatively a few of the key research confront of performing cloud-aware audit control mechanism and compliance exposition in terms of user management, service level agreement, access management, authentication management, authorization management, auditing and reporting services which can reasonably protected the dynamic cloud model. Based on this investigation it present a consequential widespread specification of cloud security and privacy crisis and major features that must be covered by proposed audit control method solution for the secure and exciting cloud computing.


Keywords


Cloud Computing; Security; Privacy; Vulnerabilities;

Full Text:

PDF

References


Guoman Lin, “Research on Electronic Data Security Strategy Based on Cloud Computing”, 2012 IEEE second International conference on Consumer Electronics, ISBN: 978-1-4577-1415-3, 2012, pp.1228-1231.

Akhil Behl, Kanika Behl, “An Analysis of Cloud Computing Security Issues”, 2012 IEEE proceedings World Congress on Information and Communication Technologies, ISBN: 978-1-4673-4805-8,2012,pp.109-114.

Uma Somani, Kanika Lakhani, Manish Mundra,”Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 2010 IEEE 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010),ISBN: 978-1-4244-7674-9,pp.211-216.

Guoman,” Research on Electronic data security strategy based on cloud computing”, 2012 IEEE,ISBN:978-1-4577-1415-3,pp.1228-1231

Sun Cloud Architecture Introduction White Paper (in Chinese),http://developers.sun.com.cn/blog/functionalca/resource/sun_353cloudcomputing_chinese.pdf

Deyan Chen, Hong Zhao “Data Security and Privacy Protection Issues in Cloud Computing”,2012 IEEE proceedings of International Conference on Computer Science and Electronics Engineering, ISBN: 978-0-7695-4647-6,2012,pp.647-651.

Akhil Behl,” Emerging Security Challenges in Cloud Computing”, 2011 IEEE, ISBN: 978-1-4673-0126-8, 2011, pp. 217-222.

C.Wang, Q.Wang, K.Ren and W.Lou,” Ensuring data storage security in cloud computing”,ARTCOM’10:Proc. Intl.Conf. on Advances in Recent inTechnologies in Communication and Computing,2010,pp.1-9.

M.Xie, H.Wang, Y.Yin, and X.Meng,”Integrity Auditing of Outsourced Data”,Proc. 33rd Int’l Conf. Very Large Databases (VLDB),pp.782-793,2007.

C.Wang, Q.Wang, K.Ren, and W.Lou,”Privacy-Preserving Public Auditing for Data Storage in Cloud Computing”,Proc.IEEE INFOCOM,pp.1-9,2010.

Jiu Xu and Ee-Chien, Chang National University of Singapore Department of Computer Science,”Towards Efficient Proofs of Retrievability in Cloud Storage”.

Gartner: Seven cloud computing security risks. Infoworld,2008-07-02, http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853

C.Wang,“Forrester: A Closer look at cloud computing securityissues,”http://www.forrester.com/securityforum2009,2009.

Bernd,Grobaur and Tobias, ”Understanding Cloud Computing Vulnerabilities” Co published by IEEE Computer and Reliabilities Societies” IEEE April 2011,pp.50-57.

Mariana Carroll, Alta van der Merwe, Paula Kotz,” Secure Cloud Computing Benefits, Risks and controls”, 2011 IEEE,2011.

(NIST),http://www.nist.gov/itl/cloud/

H.Ab-Libdeh, L.Princehouse and H.Weatherspoon, ”RACS: a case for cloud storage diversity”, SoCCC’10: Proc. !st ACM symposium on Cloud computing,2010,pp.229-240.

Farhan Bashir Shaikh, Sajjad Haider,” Security Threats in Cloud Computing”, 6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates, 978-1-908320-00-1/11,2011 IEEE, 2011.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.