American Journal of Information Science and Computer Engineering
Articles Information
American Journal of Information Science and Computer Engineering, Vol.5, No.2, Jun. 2019, Pub. Date: May 5, 2019
Security Issues, Threats and Possible Solutions in Cloud Computing
Pages: 38-46 Views: 105 Downloads: 59
Authors
[01] Emmanuel Kolawole, Department of Electrical and Computer Engineering, Prairie View A&M University, Prairie View, USA.
[02] Warsame Ali, Department of Electrical and Computer Engineering, Prairie View A&M University, Prairie View, USA.
[03] Olusegun Odejide, Department of Electrical and Computer Engineering, Prairie View A&M University, Prairie View, USA.
[04] John Fuller, Department of Electrical and Computer Engineering, Prairie View A&M University, Prairie View, USA.
Abstract
In today’s advancement, Information Technology infrastructure continues to grow with the evolution of daily technology. The invention of the Internet has increased the use of computer and the mobile device. Nowadays, many people in the world use these devices, and as a result, a large amount of data stored device and each device in the Internet were required to be connected to each other because of sharing information. This innovation then brought about Cloud computing which is an Internet-based computing where shared resources, software and information are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications. This paper shows Successful implementation of cloud computing in an enterprise which requires proper planning and understanding of emerging risks, threats and possible countermeasures. This paper also shows how we secure the cloud security, privacy and reliability when a third party is processing sensitive data. In this paper, we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. This paper also covers the advantages and disadvantages of cloud computing. Finally, this paper identifies security threats focused on cloud computing which is an essential part of the companies that want to use cloud computing services, and some solutions about security threats for enterprise and service provider for the cloud computing deployment to provide the security of information.
Keywords
Cloud Computing, Enterprise Computing, Risk, IaaS, PaaS, SaaS, Security, Threats, Controls, CIA
References
[01] NIST, “The NIST definition of cloud computing”, http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf. Accessed on 12 Aug, 2015.
[02] http://www.ece.rutgers.edu/~psannuti/ece224/PEEII-Expt-2-07.
[03] https://www.incapsula.com/blog/top-10-cloud-security-concerns.html
[04] Te-Shun Chou, “Security Threats on Cloud Computing Vulnerabilities,” International Journal of Computer Science & Information Technology (IJCSIT) Vol. 5, No 3, June 2013.
[05] J. Stirling, “HP unveils more public loud service info”, http://www.itpro.co.uk/639508/hp-unveils-more-public-cloudservice-info. 12.3.2012.
[06] http://en.wikipedia.org/wiki/Cloud_computing
[07] Pradeep Kumar Tiwari, Dr. Bharat Mishra “Cloud Computing Security Issues, Challenges and Solution.” International Journal of Emerging Technology and Advanced Engineering. (ISSN 2250-2459, Volume 2, Issue 8, August 2012).
[08] N. Brender, I. Markov, "Risk perception and risk management in cloud computing: Results from a case study of Swiss companies", International Journal of Information Management 33 (2013) 726-733.
[09] Hanim Eken, Gazi University, Ankara, Turkey, “Security Threats and Solutions in Cloud Computing” World Congress on Internet Security (WorldCIS-2013). 978-1-908320-22/3/2013 IEEE.
[10] Kashif M and Prof Dr. Sellapan P, “Framework for Secure Cloud Computing International Journal on Cloud Computing” Services and Architecture, (IJCCSA), Vol. 3, No. 2, April 2013.
[11] Sophia Palmira, Saas, PaaS, and IaaS: Understanding the Three Cloud Computing Service Models https://doublehorn.com/saas-paas-and-paas-and-iaas, https://doublehorn.com/saas-paas-and-iaas-understanding. August 24, 2017.
[12] Xiaotong Sun, " Critical Security Issues in Cloud Computing: A Survey ", IEEE International Conference on Big Data Security on Cloud, pages 216-221, New York, NY, USA, 2018.
[13] L. Wu, B. Brandt, X. Du, and B. Ji. “Analysis of clickjacking attacks and an effective defense scheme for android devices” Communications and Network Security (CNS), 2016 IEEE Conference on, pages 55–63, Philadelphia, PA, USA, 2016.
[14] Muhammad Kazim, “A survey on top security threats in cloud computing” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 6, No. 3, 2015.
[15] C. S. Alliance, “Top threats to cloud computing v1. 0,” Cloud Security, Alliance, USA, 2010.
[16] Wag Jun-jie, Mu Sen, "Security Issues and Countermeasures in Cloud Computing ", IEEE International Conference, pages 843-846, Nanjing, China, 2011.
600 ATLANTIC AVE, BOSTON,
MA 02210, USA
+001-6179630233
AIS is an academia-oriented and non-commercial institute aiming at providing users with a way to quickly and easily get the academic and scientific information.
Copyright © 2014 - American Institute of Science except certain content provided by third parties.