Skip to main content

Overview on Security Concerns Associated in Cloud Computing

  • Conference paper
  • First Online:
Smart Intelligent Computing and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 159))

  • 836 Accesses

Abstract

Cloud computing is a state of the art in computational paradigm, adapting the way for offering software, hardware design, and procurements. Counter-measures vulnerabilities and threats in the cloud are well documented, yet incapable of addressing security problems which may exacerbate the service quality and customer’s data privacy. In this study, the basic topographies of the cloud computing, security problems, threats, and their solutions are discussed. Moreover, this paper has compared various interference detection and prevention computations that are based upon recent researches on end-to-end encrypting for accessing data that are utilized to address the security issues. Furthermore, this paper highlights symmetric key encryption that is considered as extremely secure, along with asymmetric key encryption, relatively a new method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Srivastava, S., Sudhish, P.S.: Security in cloud computing systems: a review of challenges and solutions for security in distributed computing environments. In 2015 39th National Systems Conference (NSC), pp. 1–5. IEEE (2015)

    Google Scholar 

  2. Odelu, V., Das, A.K., Kumari, S., Huang, X., Wazid, M.: Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener. Comput. Syst. 68, 74–88 (2017)

    Article  Google Scholar 

  3. Yang, C., Huang, Q., Li, Z., Liu, K., Hu, F.: Big Data and cloud computing: innovation opportunities and challenges. Int. J. Digital Earth 10(1), 13–53 (2017)

    Article  Google Scholar 

  4. Apolónia, N., Freitag, F., Navarro, L.: Leveraging deployment models on low-resource devices for cloud services in community networks. Simul. Model. Pract. Theory 77, 390–406 (2017)

    Article  Google Scholar 

  5. Persico, V., Pescapé, A., Picariello, A., Sperlí, G.: Benchmarking big data architectures for social networks data processing using public cloud platforms. Future Gener. Comput. Syst. 89, 98–109 (2018)

    Article  Google Scholar 

  6. Baig, R., Freitag, F., & Navarro, L.: Cloudy in guifi.net: establishing and sustaining a community cloud as open commons. Future Gener. Comput. Syst. (2018)

    Google Scholar 

  7. Lewis, K. (2017). Virtual private cloud security. In: Computer and Information Security Handbook, 3rd edn, pp. 937–942 (2018)

    Chapter  Google Scholar 

  8. Garcia, R.: Federated identity hybrid cloud security considerations supporting first responders. In: 2017 IEEE Conference on Dependable and Secure Computing, pp. 326–333. IEEE (2017)

    Google Scholar 

  9. Li, J., Zhang, Y., Chen, X., Xiang, Y.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1–12 (2018)

    Article  Google Scholar 

  10. Chase, J., Niyato, D., Wang, P., Chaisiri, S., Ko, R.: A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Trans. Dependable and Secure Comput. (2017)

    Google Scholar 

  11. Mushtaq, M.O., Shahzad, F., Tariq, M.O., Riaz, M., Majeed, B.: An efficient framework for information security in cloud computing using auditing algorithm shell (AAS). arXiv preprint arXiv:1702.07140 (2017)

  12. Hoang, D.T., Niyato, D., Wang, P., Wang, S.S., Nguyen, D., Dutkiewicz, E.: A stochastic programming approach for risk management in mobile cloud computing. In 2018 IEEE Wireless Communications and Networking Conference (WCNC), pp 1–6. IEEE (2018)

    Google Scholar 

  13. Devi, C.R., Krishna, K.J.A.: Novel Approach for Data Sharing Securely in Cloud Computing (2018)

    Google Scholar 

  14. Tchernykh, A., Babenko, M., Chervyakov, N., Cortés-Mendoza, J.M., Kucherov, N., Miranda-López, V., … Radchenko, G.: Towards mitigating the uncertainty of data security breaches and collusion in cloud computing. In: 2017 28th International Workshop on Database and Expert Systems Applications (DEXA), pp. 137–141. IEEE (2017)

    Google Scholar 

  15. Hussain, S.A., Fatima, M., Saeed, A., Raza, I., Shahzad, R.K.: Multilevel classification of security concerns in cloud computing. Appl. Comput. Informatics 13(1), 57–65 (2017)

    Article  Google Scholar 

  16. Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387, 103–115 (2017)

    Article  Google Scholar 

  17. Fu, Z., Xia, L., Sun, X., Liu, A.X., Xie, G.: Semantic-aware searching over encrypted data for cloud computing. IEEE Trans. Inf. Forensics Secur. 13(9), 2359–2371 (2018)

    Article  Google Scholar 

  18. Suganya, S., Vincent, P.D.R.: Improving cloud security by enhancing remote data integrity checking algorithm. In: 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), pp. 1–6. IEEE (2017)

    Google Scholar 

  19. Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(4), 912–925 (2018)

    Article  Google Scholar 

  20. Cook, A., Robinson, M., Ferrag, M.A., Maglaras, L.A., He, Y., Jones, K., Janicke, H.: Internet of cloud: security and privacy issues. Cloud Computing for Optimization: Foundations, Applications, and Challenges, pp. 271–301. Springer, Cham (2018)

    Chapter  Google Scholar 

  21. Alhawari, S., Jarrah, M.A.A., Hadi, W.E.: Implementing risk management processes into a cloud computing environment. In: Global Business Expansion: Concepts, Methodologies, Tools, and Applications, pp. 951–963. IGI Global (2018)

    Google Scholar 

  22. Sethi, S., Sruti, S.: Cloud security issues and challenges. In: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, pp. 77–92. IGI Global (2018)

    Google Scholar 

  23. Vani Monika Pritee Parwekar. Survey on cloud data storage security techniques. Indian J. Res. Pharm. Biotechnol. ISSN: 2320-3471 (Online), 2321–5674 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. M. Jaisakthi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gagged, G., Jaisakthi, S.M. (2020). Overview on Security Concerns Associated in Cloud Computing. In: Satapathy, S., Bhateja, V., Mohanty, J., Udgata, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 159. Springer, Singapore. https://doi.org/10.1007/978-981-13-9282-5_9

Download citation

Publish with us

Policies and ethics