IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 4 - Issue 11, November 2015 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Cloud Computing Security: Latest Issues & Countermeasures

[Full Text]

 

AUTHOR(S)

Shelveen Pandey, Mohammed Farik

 

KEYWORDS

Index Terms: Cloud Computing, Security Countermeasures, Security Threats

 

ABSTRACT

Abstract: Cloud computing describes effective computing services provided by a third-party organization known as cloud service provider for organizations to perform different tasks over the internet for a fee. Cloud service provider’s computing resources are dynamically reallocated per demand, and their infrastructure, platform, and software, and other resources are shared by multiple corporate and private clients. With the steady increase in the number of cloud computing subscribers of these shared resources over the years, security on the cloud is a growing concern. In this review paper, the current cloud security issues and practices are described and a few innovative solutions are proposed that can help improve cloud computing security in the future.

 

REFERENCES

[1] Wikipedia, “Side-channel attack” September 22, 2012. https://en.wikipedia.org/wiki/Side-channel_attack

[2] Hashizume (2013). Journal of Internet Services and applications. An analysis of security issue for cloud computing, 8-9, 2013.

[3] M. Farik, “Improving Network Security: An Alogrithm to Enforce Strong Router Password”, The University of Fiji, 2014.

[4] T. Myers, “Azure Storage replication”. January 9, 2015. https://azure.microsoft.com/en-us/documentation/articles/storage-redundancy/

[5] M. Cobb, “API security: How to ensure secure API use in the enterprise. “ 2015. http://searchsecurity.techtarget.com/tip/API-security-How-to-ensure-secure-API-use-in-the-enterprise

[6] A. Thilakarathne, & J. Wijayanayake, “Security Challenges of Cloud Computing.” International Journal of Scientific & Technology Research, 3(11), 202, 2014.

[7] V. Ashktorab & S. R. Taghizadeh, “Security Threats and Countermeasures in Cloud Computing.” International Journal of Application or Innovation in Engineering & Management, 1(2), 242, October 2012.

[8] A. Venkatraman, “Azure CTO Mark Russinovich's top ten public cloud security risks.” 10 October 2014. http://www.computerweekly.com/news/2240232396/How-to-mitigate-top-ten-public-cloud-security-risks-Azure-CTO-Mark-Russinovich

[9] S. Pearson, G. Yee, “Privacy and Security for Cloud Computing.” London Heidelberg New York Dordrecht, London: Springer. 2013.

[10] M. Higashi, “3 Threats to Cloud Data, and How to Address Them.” 3 July 2014. http://www.ciphercloud.com/blog/3-threats-cloud-data-security-address

[11] M. Rouse, “Defense in depth.” 2015. http://searchsecurity.techtarget.com/definition/defense-in-depth

[12] T.T.W. Group, “The Notorious Nine: Cloud computing Top Threats in 2013”, 2013. https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf

[13] M. Kazim, & S. Zhu, “A Survey on Top Security Threats in Cloud Compting” International Jouornal of Advanced Computer Science and Applications, 6(3), 113, June 2015.