Published April 15, 2017 | Version v1
Journal article Open

A REVIEW ON SECURITY ISSUES AND CHALLENGES IN CLOUD COMPUTING MODEL OF RESOURCE MANAGEMENT

  • 1. Srinivas Institute of Management Studies, Pandeshwar, Mangalore, Karnataka

Description

Cloud computing services refer to set of IT-enabled services delivered to a customer as services over the Internet on a leased basis and have the capability to extend up or down their service requirements or needs. Usually, cloud computing services are delivered by third party vendors who own the infrastructure. It has several advantages include scalability, elasticity, flexibility, efficiency and outsourcing non-core activities of an organization. Cloud computing offers an innovative business concept for organizations to adopt IT enabled services without advance investment. Being a model for enabling convenient, on-request network accessibility to a shared pool of IT computing resources like networks, servers, storage, applications, and services, cloud computing can be quickly provisioned and released with negligible management exertion or service provider interaction. Despite many benefits of cloud computing, the organizations are slow in accepting cloud computing service model because of security concerns and challenges associated with management of this technology. Security is one of the major issues which hinder the growth of cloud computing service model. The idea of handing over confidential data to third party is risky such that the consumers need to be more attentive in understanding the risks of data breaches in this new environment. This paper reviews the security issues and the challenges in the adoption and management of cloud computing services in an organization.

Files

151.PDF

Files (255.0 kB)

Name Size Download all
md5:e45de871167e30e3c4ee43eb73325656
255.0 kB Preview Download

Additional details

References

  • 1. Gens, F. (2009). New IDC IT Cloud Services Survey: Top Benefits and Challenges, IDC eXchange, viewed 18 February 2010. 2. Brodkin, J. (2008). Gartner: Seven cloud-computing security risks. InfoWorld, 2008, 1-3. 3. Cloud Computing Use Case Discussion Group. "Cloud Computing UseCases Version 3.0," 2010. 4. European Network and Information Security Agency. (2009). Cloud Computing: Benefits, risks and recommendations for information security. ENISA. 5. Kandukuri, B. R., & Rakshit, A. (2009). Cloud security issues. In Services Computing, 2009. SCC'09. IEEE International Conference on (pp. 517-520). IEEE. 6. P. Kresimir and H. Zeljko, "Cloud computing security issues and challenges." In PROC Third International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, 2010, pp. 344-349. 7. Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. IEEE Security & Privacy, 9(2), 50-57. 8. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11. 9. Ramgovind, S., Eloff, M. M., & Smith, E. (2010). The management of security in cloud computing. In 2010 Information Security for South Africa (pp. 1-7). IEEE. 10. Almorsy, M., Grundy, J., & Müller, I. (2010). An analysis of the cloud computing security problem. In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov. 11. Cloud Security Alliance (CSA). Available: http://www.cloudsecurityalliance.org [Mar.19, 2010] 12. Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015). Cloud computing features, issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015 International Conference on (pp. 116-123). IEEE. 13. Hussein, N. H., & Khalid, A. (2016). A survey of Cloud Computing Security challenges and solutions. International Journal of Computer Science and Information Security, 14(1), 52. 14. Jafarpour, S., & Yousefi, A. (2016). Security Risks in Cloud Computing: A Review. 15. Sarkar, S., & Vimal Kumar Bharadwaj, P. G. (2016). Security Issues and Challenges in Cloud Computing. 16. Dubey, A. (2016). Cloud Computing and Its Security Issues. International Journal, 4(7). 17. Arnold, S. (2009). Cloud computing and the issue of privacy. KM World, 14-22. 18. A Platform Computing Whitepaper. "Enterprise Cloud Computing: Transforming IT." Platform Computing, pp6, 2010. 19. Global Netoptex Incorporated. "Demystifying the cloud. Important opportunities, crucial choices." pp4-14. Available: http://www.gni.com [Dec. 13, 2009]. 20. Lenk, A., Klems, M., Nimis, J., Tai, S., & Sandholm, T. (2009). What's inside the Cloud? An architectural map of the Cloud landscape. In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (pp. 23-31). IEEE Computer Society. 21. Weinhardt, C., Anandasivam, A., Blau, B., & Stosser, J. (2009). Business models in the service world. IT Professional Magazine, 11(2), 28. 22. Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009). On technical security issues in cloud computing. In 2009 IEEE International Conference on Cloud Computing (pp. 109-116). Ieee. 23. Leavitt, N. (2009). Is cloud computing really ready for prime time. Growth, 27(5), 15-20. 24. Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009). On technical security issues in cloud computing. In 2009 IEEE International Conference on Cloud Computing (pp. 109-116). 25. Soghoian, C. (2010). Caught in the cloud: Privacy, encryption, and government back doors in the web 2.0 era. J. on Telecomm. & High Tech. L., 8, 359. 26. Aithal, P. S. & Pai, V. T. (2016). Concept of Ideal Software and its Realization Scenarios. International Journal of Scientific Research and Modern Education (IJSRME), 1(1), 826-837. DOI: http://doi.org/10.5281/zenodo.160908.