Preview

Research Papers and Journals

Good Essays
Open Document
Open Document
922 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Research Papers and Journals
Systematic Literature Review

Groups
Security in Cloud Computing
The area of research discussed in this paper is about security challenges in cloud computing. I reviewed five papers, which are mentioned in this paper. First paper is about “emerging security challenges in cloud computing,” An insight to cloud security challenges and their mitigation”. It was presented by Akhil Behl [1] and it was published by IEEE on 2011 World Congress on Information Security and Communication Technologies. Second paper is about “Information Security Risk Management Framework for the Cloud Computing Environments”. It was presented by Xuan Zhang et al.[2], School of Information and Software, Yunnan University china and it was published by IEEE on 2010 10th International Conference on Computer and Information Technology. Third paper is about “MCDB: Using Multi-Clouds to ensure Security in Cloud Computing”. It was presented by Mohammad A. AlZain, et al.[3], Department of Computer Science and Computer Engineering, La Trobe University, Bundoora 3086, Australia and it was published by IEEE on 2011 9th International Conference on Dependable, Autonomic and Secure Computing. Fourth paper is about “attack sequence detection in Cloud using Hidden Markov Model” and it is presented by Chia-Mei Chen, et al. [4], and published on IEEE on 2012 seventh Asia Joint Conference on Information Security. Fifth paper is about “A novel Approach for Security in Cloud Computing using Hidden Markov Model and Clustering” and it was presented by Pardeep Kumar et al. [5]. It was published on IEEE on 2011 World Congress on Information and Communication Technologies.

Description
In first paper, “emerging security challenges in cloud computing,” some existing security challenges such as Insider threats, outsider malicious attacks, Data loss, Service Disruption, Multi-tenancy issues and loss of control have been discussed to secure the cloud infrastructure and their applications and their drawbacks and



References: 1. Research paper “Emerging Security challenges in cloud computing,” World Congress on Information Security and Communication Technologies 2011. 2. Xuan Zhang, Natta pong Wuwong, Hao Li, Xuejie, “Information Security Risk Management Framework for the Cloud Computing Environments,”10th International Conference on Computer and Information Technology 2010. 3. Mohammad A. AlZain ,Ben Soh and Eric Pardede , “MCDB: Using Multi-Clouds to ensure Security in Cloud Computing,” 9th International Conference on Dependable, Autonomic and Secure Computing 2011 4. Chia-Mei Chen, D.J. Guan, Yu-Zi Huang, and Ya-Hui Ou “Attack sequence detection in Cloud using Hidden Markov Model,” 2012 seventh Asia Joint Conference on Information Security. 5. Pardeep Kumar, Nitin, Vivek Sehgal, Kinjal Shah, Shiv Shankar Prasad Shukla ”A novel Approach for security in cloud computing using Hidden Markov Model and Clustering,” Information and Communication technologies(WICT), pp.810-815,2011.

You May Also Find These Documents Helpful

  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Kak, A. (2012). Lecture notes on “computer and network security”. (Lecture Notes, Purdue University Retrieved from https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture20.pdf…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Satisfactory Essays

    In this article, Patrick Thibodeau comments on Federal CIO Vivek Kundra’s claim that cloud computing concerns are exaggerated. Thibodeau explains clearly the claims made by Kundra about the overall security with cloud computing. Thibodeau blames the scare of cloud computing to IT developers belief of a status quo. Thibodeau concludes the article with a few success stories of basic cloud computing services working in the U.S. Government.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Business Trend Memo

    • 1299 Words
    • 6 Pages

    Nowadays, all types of organizations are trending toward cloud computing. It reflects the ability of having access to information, software, and computing resource infrastructure without necessarily having to own them. By deploying cloud computing, it will allow students to personalize their environments in which they learn, help cut down our expense on IT management cost, and provide greater flexibility in maintaining security, reliability and compliance. Overall, the cloud computing can be a strong tool in enhancing our teaching and learning.…

    • 1299 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Cloud Computing Security Threats and Responses Farzad Sabahi Faculty of Computer Engineering Azad University Iran fsabahi@ieee.org Abstract-Cloud Hybrid clouds. A public cloud is standard model which providers make several resources, such as applications and storage, available to the public.…

    • 3527 Words
    • 15 Pages
    Best Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    References: Kim, D., & Solomon, M. (2013). Fundamentals of information systems security (2nd ed.). Sudbury, MA: Jones and Bartlett.…

    • 609 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Organizations considering cloud-based services must understand the associated risks, defining acceptable use cases and necessary compensating controls before allowing them to be used for regulated or sensitive information. Cloud-computing environments have IT risks in common with any externally provided service. There are also some unique attributes that require risk assessment in areas such as data integrity, recovery and privacy, and an evaluation of legal issues in areas such as e-discovery, regulatory compliance and auditing. Key Findings…

    • 2907 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Thus began the opening chapter of one of the foundation books in the computer security field. This book, commissioned by the National Academy of sciences, was the product of twenty-one…

    • 2101 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Security Principles

    • 682 Words
    • 3 Pages

    The management issue has concurred with technological innovations that enable information to be used and stored more effectively than previously. Management needs to understand the issues impacting information systems to be effective meet the company goals. A cloud is a powerful arrangement of cloud computing, networking, storage, management solutions, and business applications that facilitate a new generation of IT and consumer services. These services are available on demand and are delivered economically without compromising security or functionality. Solving today 's biggest business and technology challenges requires an approach that fully integrates the three pillars of cloud computing: applications and services, data centers, and networks (Cloud Computing, 2012). There is an issue that should be very important to all of us regarding the internet. Security problems happen on a consistent when we are using our computer to do business online. When we are doing our banking or setting up…

    • 682 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Internal Use Only

    • 474 Words
    • 2 Pages

    1. Kim and Solomon, “: The Need for Information Security,” pgs 13-36 in Fundamentals of Information Systems Security, 2nd ed. David Kim & Michael G. Solomon et al. (Jones & Bartlett Learning - Burlington, MA 01803).…

    • 474 Words
    • 2 Pages
    Good Essays