A Review on Cloud Computing Security

Marry Teo - Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia
Hairulnizam Mahdin - Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia
Lee Jia Hwee - Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia
Haezel Dicken - Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia
Tay Hui - Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia
Teng Ling - Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia
Mohd Azmi - Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Melaka, Malaysia

Abstract


Cloud computing is a technology that maintain the data and application by using the central remote server with the internet connection. By utilizing cloud computing, user can reduce their costs as they no need to purchase their own hardware and software. However cloud computing still has many issues concerning securities, such as privacy issues, loss of data and stolen of data. Some security issues over cloud services including confidentiality, integrity, availability, privacy and attacks are concerned by the users. This paper reviews some of the issues and its current solutions.

Keywords


cloud computing; security

Full Text:

PDF

References


Griffith E. (2015). What is cloud computing? [Online]. Available: http://sea.pcmag.com/networking-communicationssoftware/2919/feature/what-is-cloud-computing

Lamba, Harjit Singh, and Gurdev Singh. "Cloud Computing Future Framework for e-management of NGO's." arXiv preprint arXiv:1107.3217 (2011).

Singh, Gurdev, Shanu Sood, and Amit Sharma. "CM-measurement facets for cloud performance." International Journal of Computer Applications 23, no. 3 (2011): 37-42.

Schaper, Joachim. "Cloud Services." In Digital Ecosystems and Technologies (DEST), 2010 4th IEEE International Conference on, pp. 91-91. IEEE, 2010.

Mathkunti, Nivedita M. "Cloud Computing: Security Issues." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 259.

Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

Ashraf, Imran. "An overview of service models of cloud computing." International Journal of Multidisciplinary and Current Research 2, no.1 (2014): 779-783.

Hamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. "Security Issues for Cloud Computing." International Journal of Information Security and Privacy 4, no. 2 (2010): 36-48.

Modi, Chirag, Dhiren Patel, Bhavesh Borisaniya, Avi Patel, and Muttukrishnan Rajarajan. "A survey on security issues and solutions at different layers of Cloud computing." The journal of supercomputing 63, no. 2 (2013): 561-592.

Singh, Saurabh, Young-Sik Jeong, and Jong Hyuk Park. "A survey on cloud computing security: Issues, threats, and solutions." Journal of Network and Computer Applications 75 (2016): 200-222.

Almorsy, Mohamed, John Grundy, and Ingo Müller. "An analysis of the cloud computing security problem." arXiv preprint arXiv:1609.01107 (2016).

Arora, Rachna, Anshu Parashar, and Cloud Computing Is Transforming. "Secure user data in cloud computing using encryption algorithms." International journal of engineering research and applications 3, no. 4 (2013): 1922-1926.

An, Y. Z., Z. F. Zaaba, and N. F. Samsudin. "Reviews on security issues and challenges in cloud computing." In IOP Conference Series: Materials Science and Engineering, vol. 160, no. 1, p. 012106. IOP Publishing, 2016.

Hamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. "Security issues for cloud computing." Optimizing information security and advancing privacy assurance: new technologies: new technologies 150 (2012).

Kandias, Miltiadis, Nikos Virvilis, and Dimitris Gritzalis. "The insider threat in cloud computing." In International Workshop on Critical Information Infrastructures Security, pp. 93-103. Springer, Berlin, Heidelberg, 2011.




DOI: http://dx.doi.org/10.30630/joiv.2.4-2.171

Citation Format:

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

__________________________________________________________________________
JOIV : International Journal on Informatics Visualization
ISSN 2549-9610  (print) | 2549-9904 (online)
Organized by Department of Information Technology - Politeknik Negeri Padang, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
Published by Department of Information Technology - Politeknik Negeri Padang
W : http://joiv.org
E : joiv@pnp.ac.id, rahmat@pnp.ac.id, hidra@pnp.ac.id (publication issues)

View JOIV Stats

 

 


Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.