Identifying Cloud Computing Vulnerabilities

Authors

  • Baldev Singh  Lyallpur Khalsa College, Jalandhar, India

DOI:

https://doi.org//10.32628/IJSRSET207250

Keywords:

Cloud computing, vulnerability, Virtualization, Cloud Security.

Abstract

Cloud computing is passing through development stage and with the passage process of development, cloud is also posing with security threats, challenges and risks. Lots of security threats, risks and challenges are directly or indirectly due to vulnerabilities in cloud environment. Virtualization is the process used in cloud computing through which software hardware is provided to the cloud users and also load balancing is possible in cloud resources and this process is also prone to various security threats and risks. Vulnerabilities and threats to the cloud services leads not only to the malpractices, misuse and exploitation of resources but also to the privacy violations and breaches in data. If these vulnerabilities are not properly identified and specific security measures are not adopted then cloud services will be adversely affected and hence there is dire need to address these vulnerabilities and threats at the cloud customer satisfaction level. In this paper various vulnerabilities and threats to the cloud computing are highlighted which are definitely instrumental to act as the basis of cloud computing security solutions.

References

  1. Technical Standard Risk Taxonomy ISBN- 1-931624-77-1 Document Number-C081 Published by The Open Group January 2009
  2. B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” Security & Privacy, IEEE, vol. 9, no.2, pp. 50-57, 2011
  3. European Network and Information Security Agency (ENISA), Cloud Computing: Benefits, Risks and Recommendations for Information Security, Nov. 2009; www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport.
  4. Kevin Hemalen, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham, The University of Texas at Dallas, USA, “Security Issues for cloud computing”, April-June 2010,international Journal of Information Security and Privacy.
  5. Jinpeng Wei, Xiaolan Zhang, Glenn Ammons,Vasanth Bala,peng Ning.”Managing Security of virtual machine images in a cloud environment “.CCSW’09:Proceedings of the 2009 ACM workshop on Cloud computing security, November 2009, pp 91-96.
  6. Miranda Mowbray, Siani Pearson “A Client –based privacy Manager for Cloud Computing”. OMSWARE '09: Proceedings of the Fourth International ICST Conference on communication system software and middle ware, June 2009.
  7. Mervat Adib Bamiah, sarfraz Nawaz Brohi, “ Seven Deadly Threats and Vulnerabilities in Cloud Computing” International Journal of Advanced Engineering Sciences And Technologies, Vol No. 9, Issue No. 1. 2011.
  8. Song.D.,Shi.E,Fischer.I,Shankar.U,” Cloud Data protection for the masses”, IEEE computer Society,Vol: 45,issue:1,2012; pg: 39-45,ISSN:0018-9162
  9. A. J. Choudhury, P. Kumar, M. Sain, H. Lim and H. Jae-Lee, "A Strong User Authentication Framework for Cloud Computing," 2011 IEEE Asia-Pacific Services Computing Conference, Jeju Island, 2011, pp. 110-115.
  10. S .Kuyoro, F. Ibikunle, O. Awodele, “Cloud Computing Security Issues and Challenges,” in Proc. International Journal of Computer Networks (IJCN), volume 3, issue 5, 2011.
  11. W. Jansen and T.Grance, “Guidelines on Security and Privacy in Public Cloud Computing,” Nist Special Publication, NIST SP-800-144,Dec 2011.
  12. Meiko Jensen, Jörg Schwenk, Nils Gruschka and Luigi Lo Iacono, "On Technical Security Issues in Cloud Computing," in IEEE ICCC, Bangalore 2009, pp. 109-116.
  13. Kresimir Popovic , Zeljko Hocenski, "Cloud computing security issues and challenges," in The Third International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services, 2010, pp.344-349.\
  14. Balachandra Reddy Kandukuri, Ramakrishna Paturi and Atanu Rakshit, "Cloud Security Issues," in Proceedings of the 2009 IEEE International Conference on Services Computing, 2009, pp. 517-520.

Downloads

Published

2014-01-30

Issue

Section

Research Articles

How to Cite

[1]
Baldev Singh, " Identifying Cloud Computing Vulnerabilities, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 1, pp.198-202, -2014. Available at doi : https://doi.org/10.32628/IJSRSET207250