An Overview of Public Cloud Security Issues
DOI:
https://doi.org/10.17722/ijme.v3i2.259Keywords:
Cloud computing, Security issues, Public cloud, Data integrity and confidentiality, Cloud security, Privacy, Moving to cloud, Security modelsAbstract
Traditionally, computational needs of organizations were alleviated by purchasing, updating and maintaining required equipments. Beside expensive devices, physical space to hold them, technical staffs to maintain them and many other side costs were essential prerequisites of this matter. Nowadays with the development of cloud computing services, a huge number of peoples and organizations are served in terms of computational needs by large scale computing platforms. Offering enormous amounts of economical compute resources on-demand motivates organizations to outsource their computational needs incrementally. Public cloud computing vendors offer their infrastructure to the customers via the internet. It means that the control of customers’ data is not in their hands anymore. Unfortunately various security issues are emerged from this subject. In this paper the security issues of public cloud computing are overviewed. More destructive security issues are highlighted in order to be used by organizations in making better decisions for moving to cloud.
References
Cheng and Lai (2012). "The Impact of Cloud Computing Technology on Legal Infrastructure within Internet—Focusing on the Protection of Information Privacy." Procedia Engineering 29: 241-251.
Crowe Horwath LLP, Warren Chan, Eugene Leung & Heidi Pili, “Enterprise Risk Management For Cloud Computing”, Committee of Sponsoring Organizations of the Treadway Commission, 2012
Fitó and Guitart (2012). "Business-driven management of infrastructure-level risks in Cloud providers." Future Generation Computer Systems.
King and Raja (2012). "Protecting the privacy and security of sensitive customer data in the cloud." Computer Law & Security Review 28(3): 308-319.
PENG et al. (2012). "Secure cloud storage based on cryptographic techniques." The Journal of China Universities of Posts and Telecommunications 19: 182-189.
Zissis and Lekkas (2012). "Addressing cloud computing security issues." Future Generation Computer Systems 28(3): 583-592.
Che et al. (2011). "Study on the security models and strategies of cloud computing." Procedia Engineering 23: 586-593.
Sabahi (2011). Cloud computing security threats and responses. Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, IEEE.
Sengupta et al. (2011). Cloud computing security--trends and research directions. Services (SERVICES), 2011 IEEE World Congress on, IEEE.
Tripathi and Mishra (2011). Cloud computing security considerations. Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on, IEEE.
Hofmann and Woods (2010). "Cloud computing: the limits of public clouds for business applications." Internet Computing, IEEE 14(6): 90-93.
Khajeh-Hosseini et al. (2010). "Research challenges for enterprise cloud computing." arXiv preprint arXiv:1001.3257.
Orakwue (2010). "Private Clouds: Secure Managed Services." Information Security Journal: A Global Perspective 19(6): 295-298.
Ramgovind et al. (2010). The management of security in cloud computing. Information Security for South Africa (ISSA), 2010, IEEE.
Zhou et al. (2010). Security and privacy in cloud computing: A survey. Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on, IEEE.
Kandukuri et al. (2009). Cloud security issues. Services Computing, 2009. SCC'09. IEEE International Conference on, IEEE.
Muttik and Barton (2009). "Cloud security technologies." information security technical report 14(1): 1-6.
Brodkin (2008). Gartner: Seven cloud-computing security risks.
Mansfield-Devine (2008). "Danger in the clouds." Network Security 2008(12): 9-11.