Abstract
Cloud computing is a state of the art in computational paradigm, adapting the way for offering software, hardware design, and procurements. Counter-measures vulnerabilities and threats in the cloud are well documented, yet incapable of addressing security problems which may exacerbate the service quality and customer’s data privacy. In this study, the basic topographies of the cloud computing, security problems, threats, and their solutions are discussed. Moreover, this paper has compared various interference detection and prevention computations that are based upon recent researches on end-to-end encrypting for accessing data that are utilized to address the security issues. Furthermore, this paper highlights symmetric key encryption that is considered as extremely secure, along with asymmetric key encryption, relatively a new method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Srivastava, S., Sudhish, P.S.: Security in cloud computing systems: a review of challenges and solutions for security in distributed computing environments. In 2015 39th National Systems Conference (NSC), pp. 1–5. IEEE (2015)
Odelu, V., Das, A.K., Kumari, S., Huang, X., Wazid, M.: Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener. Comput. Syst. 68, 74–88 (2017)
Yang, C., Huang, Q., Li, Z., Liu, K., Hu, F.: Big Data and cloud computing: innovation opportunities and challenges. Int. J. Digital Earth 10(1), 13–53 (2017)
Apolónia, N., Freitag, F., Navarro, L.: Leveraging deployment models on low-resource devices for cloud services in community networks. Simul. Model. Pract. Theory 77, 390–406 (2017)
Persico, V., Pescapé, A., Picariello, A., Sperlí, G.: Benchmarking big data architectures for social networks data processing using public cloud platforms. Future Gener. Comput. Syst. 89, 98–109 (2018)
Baig, R., Freitag, F., & Navarro, L.: Cloudy in guifi.net: establishing and sustaining a community cloud as open commons. Future Gener. Comput. Syst. (2018)
Lewis, K. (2017). Virtual private cloud security. In: Computer and Information Security Handbook, 3rd edn, pp. 937–942 (2018)
Garcia, R.: Federated identity hybrid cloud security considerations supporting first responders. In: 2017 IEEE Conference on Dependable and Secure Computing, pp. 326–333. IEEE (2017)
Li, J., Zhang, Y., Chen, X., Xiang, Y.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1–12 (2018)
Chase, J., Niyato, D., Wang, P., Chaisiri, S., Ko, R.: A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Trans. Dependable and Secure Comput. (2017)
Mushtaq, M.O., Shahzad, F., Tariq, M.O., Riaz, M., Majeed, B.: An efficient framework for information security in cloud computing using auditing algorithm shell (AAS). arXiv preprint arXiv:1702.07140 (2017)
Hoang, D.T., Niyato, D., Wang, P., Wang, S.S., Nguyen, D., Dutkiewicz, E.: A stochastic programming approach for risk management in mobile cloud computing. In 2018 IEEE Wireless Communications and Networking Conference (WCNC), pp 1–6. IEEE (2018)
Devi, C.R., Krishna, K.J.A.: Novel Approach for Data Sharing Securely in Cloud Computing (2018)
Tchernykh, A., Babenko, M., Chervyakov, N., Cortés-Mendoza, J.M., Kucherov, N., Miranda-López, V., … Radchenko, G.: Towards mitigating the uncertainty of data security breaches and collusion in cloud computing. In: 2017 28th International Workshop on Database and Expert Systems Applications (DEXA), pp. 137–141. IEEE (2017)
Hussain, S.A., Fatima, M., Saeed, A., Raza, I., Shahzad, R.K.: Multilevel classification of security concerns in cloud computing. Appl. Comput. Informatics 13(1), 57–65 (2017)
Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387, 103–115 (2017)
Fu, Z., Xia, L., Sun, X., Liu, A.X., Xie, G.: Semantic-aware searching over encrypted data for cloud computing. IEEE Trans. Inf. Forensics Secur. 13(9), 2359–2371 (2018)
Suganya, S., Vincent, P.D.R.: Improving cloud security by enhancing remote data integrity checking algorithm. In: 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), pp. 1–6. IEEE (2017)
Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(4), 912–925 (2018)
Cook, A., Robinson, M., Ferrag, M.A., Maglaras, L.A., He, Y., Jones, K., Janicke, H.: Internet of cloud: security and privacy issues. Cloud Computing for Optimization: Foundations, Applications, and Challenges, pp. 271–301. Springer, Cham (2018)
Alhawari, S., Jarrah, M.A.A., Hadi, W.E.: Implementing risk management processes into a cloud computing environment. In: Global Business Expansion: Concepts, Methodologies, Tools, and Applications, pp. 951–963. IGI Global (2018)
Sethi, S., Sruti, S.: Cloud security issues and challenges. In: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, pp. 77–92. IGI Global (2018)
Vani Monika Pritee Parwekar. Survey on cloud data storage security techniques. Indian J. Res. Pharm. Biotechnol. ISSN: 2320-3471 (Online), 2321–5674 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gagged, G., Jaisakthi, S.M. (2020). Overview on Security Concerns Associated in Cloud Computing. In: Satapathy, S., Bhateja, V., Mohanty, J., Udgata, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 159. Springer, Singapore. https://doi.org/10.1007/978-981-13-9282-5_9
Download citation
DOI: https://doi.org/10.1007/978-981-13-9282-5_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9281-8
Online ISBN: 978-981-13-9282-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)