An Overview of Public Cloud Security Issues

Authors

  • Atefeh Heydari Faculty of computer Science and Information systems, University Technology Malaysia
  • Mohammad Ali Tavakoli Faculty of Computer Science and Information System, UTM, Malaysia-81310
  • Mohammad Riazi Faculty of Computer Science and Information System, UTM, Malaysia-81310

DOI:

https://doi.org/10.17722/ijme.v3i2.259

Keywords:

Cloud computing, Security issues, Public cloud, Data integrity and confidentiality, Cloud security, Privacy, Moving to cloud, Security models

Abstract

Traditionally, computational needs of organizations were alleviated by purchasing, updating and maintaining required equipments. Beside expensive devices, physical space to hold them, technical staffs to maintain them and many other side costs were essential prerequisites of this matter. Nowadays with the development of cloud computing services, a huge number of peoples and organizations are served in terms of computational needs by large scale computing platforms. Offering enormous amounts of economical compute resources on-demand motivates organizations to outsource their computational needs incrementally. Public cloud computing vendors offer their infrastructure to the customers via the internet. It means that the control of customers’ data is not in their hands anymore. Unfortunately various security issues are emerged from this subject. In this paper the security issues of public cloud computing are overviewed. More destructive security issues are highlighted in order to be used by organizations in making better decisions for moving to cloud.

References

Cheng and Lai (2012). "The Impact of Cloud Computing Technology on Legal Infrastructure within Internet—Focusing on the Protection of Information Privacy." Procedia Engineering 29: 241-251.

Crowe Horwath LLP, Warren Chan, Eugene Leung & Heidi Pili, “Enterprise Risk Management For Cloud Computing”, Committee of Sponsoring Organizations of the Treadway Commission, 2012

Fitó and Guitart (2012). "Business-driven management of infrastructure-level risks in Cloud providers." Future Generation Computer Systems.

King and Raja (2012). "Protecting the privacy and security of sensitive customer data in the cloud." Computer Law & Security Review 28(3): 308-319.

PENG et al. (2012). "Secure cloud storage based on cryptographic techniques." The Journal of China Universities of Posts and Telecommunications 19: 182-189.

Zissis and Lekkas (2012). "Addressing cloud computing security issues." Future Generation Computer Systems 28(3): 583-592.

Che et al. (2011). "Study on the security models and strategies of cloud computing." Procedia Engineering 23: 586-593.

Sabahi (2011). Cloud computing security threats and responses. Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, IEEE.

Sengupta et al. (2011). Cloud computing security--trends and research directions. Services (SERVICES), 2011 IEEE World Congress on, IEEE.

Tripathi and Mishra (2011). Cloud computing security considerations. Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on, IEEE.

Hofmann and Woods (2010). "Cloud computing: the limits of public clouds for business applications." Internet Computing, IEEE 14(6): 90-93.

Khajeh-Hosseini et al. (2010). "Research challenges for enterprise cloud computing." arXiv preprint arXiv:1001.3257.

Orakwue (2010). "Private Clouds: Secure Managed Services." Information Security Journal: A Global Perspective 19(6): 295-298.

Ramgovind et al. (2010). The management of security in cloud computing. Information Security for South Africa (ISSA), 2010, IEEE.

Zhou et al. (2010). Security and privacy in cloud computing: A survey. Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on, IEEE.

Kandukuri et al. (2009). Cloud security issues. Services Computing, 2009. SCC'09. IEEE International Conference on, IEEE.

Muttik and Barton (2009). "Cloud security technologies." information security technical report 14(1): 1-6.

Brodkin (2008). Gartner: Seven cloud-computing security risks.

Mansfield-Devine (2008). "Danger in the clouds." Network Security 2008(12): 9-11.

Additional Files

Published

30-06-2014

How to Cite

Heydari , A., Ali Tavakoli , M., & Riazi, M. (2014). An Overview of Public Cloud Security Issues. International Journal of Management Excellence (ISSN: 2292-1648), 3(2), 440–445. https://doi.org/10.17722/ijme.v3i2.259