Abstract
Cloud computing is gaining momentum due to its features like scalability, pay-per-use model, dynamic resource allocation etc. Since many applications and platforms of different organizations or departments are running on the same infrastructure, security is of utmost importance in the cloud. Cloud computing faces common security issues like data loss, malware attacks, phishing attacks, man in the middle attack etc., if proper care is not taken in hosting of applications and services. The technologies that make cloud computing possible like multi-tenancy, virtualization etc. itself can be exploited. Organizations often move to private cloud infrastructure in order to have better control over the data, infrastructure and security policies compared to the public cloud. Moving to a private cloud will not make the cloud more secured in nature. Security measures must be taken to make sure that the private cloud is secured. This paper discusses the security issues that can occur in a private cloud and its possible solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mell, P., Grance, T.: The NIST definition of cloud computing, September 2011
Simmon, E.: DRAFT - evaluation of cloud computing services based on NIST 800-145. NIST
Ramesh Babu, G., Venkataramana, K.: Client centric model for secure session management for SaaS in cloud environment. Int. J. Comput. Commun. Data Eng. 01(04) (2018)
Chavan, P., Patil, P., Kulkarni, G., Sutar, R., Belsare, S.: IaaS cloud security. In: 2013 International Conference on Machine Intelligence Research and Advancement (2013)
Walden, J.: Cloud Computing Security. Cincinnati Chapter Meeting, Northern Kentucky University, OWASP, 22 February 2011 (2011)
Ravi Kumar, P., Herbert Raj, P., Jelciana, P.: Exploring data security issues and solutions in cloud computing. In: 6th International Conference on Smart Computing and Communications (2017)
A guide to understanding data remanence in automated information systems, September 1991
Chowdhury, R.R.: Security in cloud computing. Int. J. Comput. Appl. 96(15) (2014)
Aldossary, S., Allen, W.: Data security, privacy, availability and integrity in cloud computing: issues and current solutions. Int. J. Adv. Comput. Sci. Appl. 7(4), 485–498 (2016)
Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)
Alves, P.G.M.R., Aranha, D.F.: A framework for searching encrypted databases. J. Internet Serv. Appl. 9, 1 (2018)
Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 5 (2013)
Al Morsy, M., Grundy, J., Müller, I.: An analysis of the cloud computing security problem (2016)
Christina, A.: Proactive measures on account hijacking in cloud computing network. Asian J. Comput. Sci. Technol. 4(2), 31–34 (2015)
Rao, R.K., Vasudha, Bhat, S.: A review on malware injection in cloud computing. Int. J. Innov. Res. Comput. Commun. Eng. 6(4) (2018)
Sun, Y., Zhang, J., Xiong, Y., Zhu, G.: Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw. 10, 190903 (2014)
Punithasurya, K., Jeba Priya, S.: Analysis of different access control mechanism in cloud. Int. J. Appl. Inf. 4(2), 34–39 (2012)
Mulimani, M., Rachh, R.: Analysis of access control methods in cloud computing. Int. J. Educ. Manag. Eng. 3, 15–24 (2017). https://doi.org/10.5815/ijeme.2017.03.02. Published online May 2017 in MECS
Schoo, P., Fusenig, V., Souza, V., Melo, M., Murray, P., Debar, H., Medhioub, H., Zeghlache, D.: Challenges for cloud networking security (2010)
Bryk, A.: Cloud computing: a new vector for cyber attacks. Dev Blog, 26 February 2018. https://www.apriorit.com/dev-blog/523-cloud-computing-cyber-attacks
Cloud computing: attack vectors and counter measures posted in cloud computing, 30 December 2015. https://resources.infosecinstitute.com/cloud-computing-attacks-vectors-and-counter-measures/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Manakattu, S.S., Murugesh, S., Hirekurabar, R.N. (2020). Security Landscape for Private Cloud. In: Smys, S., Bestak, R., Rocha, Á. (eds) Inventive Computation Technologies. ICICIT 2019. Lecture Notes in Networks and Systems, vol 98. Springer, Cham. https://doi.org/10.1007/978-3-030-33846-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-33846-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33845-9
Online ISBN: 978-3-030-33846-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)