International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 3- Issue 11, November 2014 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Security Challenges Of Cloud Computing

[Full Text]



Anuradha Thilakarathne, Janaka I Wijayanayake



Index Terms: Cloud, Malware, Network, Security, Spyware, Virtualization, Zombie



Abstract: In today’s ICT service industry, there are many changes that promote technology services in many markets. Cloud Computing is a comprehensive solution that delivers IT as a service. Different Cloud Services enable an organization to operate its IT applications on an OPEX model rather than the traditional CAPEX model. The cloud computing significantly impacts shifting of both IT paradigm and Telecom platform. Telecommunication services, especially the Internet service have flooded the world with huge volume of information and posing challenges to the organizations and telecommunication operators on keeping up expanding the network in order to provide the good quality of services while providing higher level of security on service deliverables. In this paper, we examine the types of security risks been glued on to the cloud computing and the importance of refrain from those vulnerabilities in mass scale.



[1] Albus J., 2002. A reference model architecture for intelligent unmanned ground vehicles. In Proceedings of SPIE Aerosense Conference. Pp. 303-310.

[2] Ghosh R., Naik V.K, Trivedi K.S. 2011. Power-performance trade-offs in IaaS cloud: A scalable analytic approach. In IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W). Hong Kong, 27-30 June. China: IEEE. 152 - 157.

[3] Qayyum J., et al. 2011. Implementing and Managing framework for PaaS in Cloud Computing. IJCSI International Journal of Computer Science, 8 (5), pp. 474-479.

[4] Banerjee S., Jain S., 2014. A survey on Software as a service (SaaS) using quality model in cloud computing. International Journal of Engineering and Computer Science, 3 (1), pp. 3598-3602.

[5] Gurav U. and Shaikh R., 2010. Virtualization: a key feature of cloud computing, In Proceedings of the International Conference and Workshop on Emerging Trends in Technology. Mumbai, 26-27 February. 227-229.

[6] Lombardi F. and Pietro R.De. 2011. ‘Secure virtualization for cloud computing’. Journal of Network and Computer Applications, 34(4), pp. 1113–1122.

[7] Pal S., Kumar P., 2012. 'Efficient Architectural Framework for Cloud Computing ', International Journal of Cloud Computing and Services Science (IJ-CLOSER), 1(2), pp. 66-73.

[8] Yinqian Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart., 2012. Cross-VM side channels and their use to extract private keys. In Proceedings of the 2012 ACM conference on Computer and communications security (CCS '12). USA, 16-18 Oct. New York: ACM. 305-316.

[9] Sharif M., Lee W., Cui W., and Lanzi A., 2009. Secure in-vm monitoring using hardware virtualization. In Proceedings of the 16th ACM Conference on Computer and Communications Security. Chicago, 9-13 November. New York: ACM. 477-487.

[10] Kuyoro S.O., Ibikunle F., Awodele O. 2011. Cloud Computing Security Issues and Challenges. International Journal of Computer Networks (IJCN), 3(5), 247-255.

[11] Padhy R.P., Patra M.R. 2012. 'An Enterprise Cloud Model for Optimizing IT Infrastructure ', International Journal of Cloud Computing and Services Science (IJ-CLOSER), 1(3), pp. 123-133.

[12] Nimje A.R, Gaikwad V.T, Datir H.N., 2013. Green Cloud Computing: A Virtualized Security Framework for Green Cloud Computing. International Journal of Advanced Research in Computer Science and Software Engineering, 3 (4), pp. 642-646.

[13] Li C., Jiang W., and Zou X., 2009 Botnet: Survey and Case Study. In Fourth International Conference on Innovative Computing, Information and Control (ICICIC). Kaohsiung, 7-9 Dec. Kaohsiung: IEEE. 1184 - 1187.

[14] Jansen W. and Grance T., 2011. SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing. Technical Report. NIST, Gaithersburg, MD, United States.

[15] Buyya R. et al. 2009. ‘Future Generation Computer Systems’. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, 25(2009), pp. 599-616.

[16] Jensen M., Schwenk J., Gruschka N., and Iacono L., 2009. On Technical Security Issues in Cloud Computing. In IEEE International Conference on Cloud Computing, 2009. CLOUD '09. Bangalore, 21-25 September. Bangalore: IEEE. 109 - 116.

[17] Wang X., Ting-lei H., Zhi-jian R., 2010. Notice of Retraction Research on the anti-virus system of military network based on cloud security. In International Conference on Intelligent Computing and Integrated Systems (ICISS). Guilin, 22-24 Oct. New York: IEEE. 656 - 659.

[18] Balduzzi M., Zaddach J., Balzarotti D., Kirda E., Loureiro S., 2012. A security analysis of amazon's elastic compute cloud service. In SAC '12 Proceedings of the 27th Annual ACM Symposium on Applied Computing. Italy, 26-30 March. New York: ACM. 1427-1434.

[19] Ristenpart T., Tromer e., Shacham H., Savage S., 2009. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In Proceedings of Computer and Communications Security -- CCS '09. USA, 9–13 November. New York: ACM. 199-212.

[20] Jensen M., Gruschka N., and Luttenberger N., 2008. The Impact of Flooding Attacks on Network-based Services. In third International Conference on Availability, Reliability and Security, 2008. ARES 08. Barcelona, 4-7 March. Barcelona: IEEE. 509-513.

[21] David T., 2009. Cloud Security Is Not (Just) Virtualization Security. CCSW 2009: The ACM Cloud Computing Security Workshop. Chicago, 13 November.

[22] Shacham H., Ristenpart T., Tromer E. and Savage S., 2009. Hey, you, get out of my cloud: Exploring information leakage in third-party compute clouds. Proc. 16th ACM Conf. Computer and Communications Security. Chicago, 9-13 November. New York: ACM. 199-212.

[23] Biggs S., Vidalis S., 2010. ‘Cloud Computing Storms’, International Journal of Intelligent Computing Research (IJICR), 1(1/2), pp. 61-68.

[24] Duncan A.J., Creese S., Goldsmith M., 2012. Insider Attacks in Cloud Computing. In IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Liverpool, 25-27 June. California: IEEE. 857-862.

[25] Pai S., et al., 2011. Formal Verification of OAuth 2.0 using Alloy Framework. In International Conference on Communication Systems and Network Technologies (CSNT). India, 3-5 June. USA: IEEE. 655-659.

[26] Georgiev M., et al., 2012. The most dangerous code in the world: validating SSL certificates in non-browser software. In ACM Conference on Computer and Communications Security. Raleigh, 16-18 October. USA: ACM. 38-49.

[27] Padhy R., Patra M., Satapathy S., 2011. Cloud Computing: Security Issues and Research Challenges. International Journal of Computer Science and Information Technology & Security (IJCSITS), 1(2), 136-146.