Share This Article:

Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review

Abstract Full-Text HTML XML Download Download as PDF (Size:319KB) PP. 15-21
DOI: 10.4236/cn.2014.61003    11,943 Downloads   24,533 Views   Citations

ABSTRACT

Cloud computing is a set of Information Technology services offered to users over the web on a rented base. Such services enable the organizations to scale-up or scale-down their in-house foundations. Generally, cloud services are provided by a third-party supplier who possesses the arrangement. Cloud computing has many advantages such as flexibility, efficiency, scalability, integration, and capital reduction. Moreover, it provides an advanced virtual space for organizations to deploy their applications or run their operations. With disregard to the possible benefits of cloud computing services, the organizations are reluctant to invest in cloud computing mainly due to security concerns. Security is one of the main challenges that hinder the growth of cloud computing. At the same time, service providers strive to reduce the risks over the clouds and increase their reliability in order to build mutual trust between them and the cloud customers. Various security issues and challenges are discussed in this research, and possible opportunities are stated.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

O. Harfoushi, B. Alfawwaz, N. Ghatasheh, R. Obiedat, M. Abu-Faraj and H. Faris, "Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review," Communications and Network, Vol. 6 No. 1, 2014, pp. 15-21. doi: 10.4236/cn.2014.61003.

References

[1] M. Armbrust, A. Fox, R. Grith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, Vol. 53, No. 4, 2010, pp. 50-58.
http://dx.doi.org/10.1145/1721654.1721672
[2] A. M. Andrew, “Cloud Computing: Views on Cybersyn,” Kybernetes, Vol. 41, No. 9, 2012, pp. 1396-1399.
http://dx.doi.org/10.1108/03684921211275450
[3] S. Dhar, “From Outsourcing to Cloud Computing: Evolution of It Services,” Management Research Review, Vol. 35, No. 8, 2012, pp. 664-675.
http://dx.doi.org/10.1108/01409171211247677
[4] S. Subashini and V. Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” Journal of Network and Computer Applications, Vol. 34, No. 1, 2011, pp. 1-11.
http://www.sciencedirect.com/science/article/pii/S1084804510001281
http://dx.doi.org/10.1016/j.jnca.2010.07.006
[5] B. R. Kandukuri, V. R. Paturi and A. Rakshit, “Cloud Security Issues,” Proceedings of the 2009 IEEE International Conference on Services Computing, Washington DC, 21-25 September 2009, pp. 517-520.
http://dx.doi.org/10.1109/SCC.2009.84
[6] P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” Computer Security Division, IT Laboratory, National Institute of Standards and Technology, Gaithersburg, 2011.
http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
[7] M. Jensen, J. Schwenk, N. Gruschka and L. Iacono, “On Technical Security Issues in Cloud Computing,” IEEE International Conference on Cloud Computing, Bangalore, 21-25 September 2009, pp. 109-116.
[8] D. Zissis and D. Lekkas, “Addressing Cloud Computing Security Issues,” Future Generation Computer Systems, Vol. 28, No. 3, 2012, pp. 583-592.
http://www.sciencedirect.com/science/article/pii/S0167739X10002554
http://dx.doi.org/10.1016/j.future.2010.12.006
[9] F. Gens, “New IDC It Cloud Services Survey: Top Benefits and Challenges,” 2009.
http://blogs.idc.com/ie/?p=730
[10] C. Soghoian, “Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 era,” Journal on Telecommunications and High Technology Law, Vol. 8, No. 2, 2010, pp. 359-424.
[11] J. Brodkin, “Gartner: Seven Cloud-Computing Security Risks,” InfoWorld, 2008.
http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853
[12] D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” International Conference on Computer Science and Electronics Engineering, Vol. 1, Hangzhou, 23-25 March 2012, pp. 647-651.
[13] B. Grobauer, T. Walloschek and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” IEEE Security Privacy, Vol. 9, No. 2, 2011, pp. 50-57.
http://dx.doi.org/10.1109/MSP.2010.115
[14] M. Almorsy, J. Grundy and I. Müller, “An Analysis of the Cloud Computing Security Problem,” Proceedings of the 2010 Asia Pacific Cloud Workshop, Australia, 30 November 2010.
[15] N. Leavitt, “Is Cloud Computing Really Ready for Prime Time?” Computer, Vol. 42, No. 1, 2009, pp. 15-20.
http://dx.doi.org/10.1109/MC.2009.20
[16] K. Popovic and Z. Hocenski, “Cloud Computing Security Issues and Challenges,” Proceedings of the 33rd International Convention in MIPRO, 2010, pp. 344-349.
[17] D. Jamil and H. Zaki, “Cloud Computing Security,” International Journal of Engineering Science and Technology, Vol. 3, No. 4, 2011, pp. 3478-3483.
[18] C. Wang, Q. Wang, K. Ren and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proceedings IEEE in INFOCOM, San Diego, 14-19 March 2010, pp. 1-9.
[19] A. Lenk, M. Klems, J. Nimis, S. Tai and T. Sandholm, “What’s Inside the Cloud? An Architectural Map of the Cloud Landscape,” Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Washington DC, 23 May 2009, pp. 23-31.
http://dx.doi.org/10.1109/CLOUD.2009.5071529
[20] J. Shamsi, M. Khojaye and M. Qasmi, “Data-Intensive Cloud Computing: Requirements, Expectations, Challenges, and Solutions,” Journal of Grid Computing, Vol. 11, No. 2, 2013, pp. 281-310.
http://dx.doi.org/10.1007/s10723-013-9255-6
[21] S. Ramgovind, M. Elo and E. Smith, “The Management of Security in Cloud Computing,” Information Security for South Africa, Sandton, 2-4 August 2010, pp. 1-7.
[22] C. Weinhardt, A. Anandasivam, B. Blau and J. Stosser, “Business Models in the Service World,” IT Professional, Vol. 11, No. 2, 2009, pp. 28-33.
http://dx.doi.org/10.1109/MITP.2009.21
[23] A. Aleem and C. R. Sprott, “Let Me in the Cloud: Analysis of the Benet and Risk Assessment of Cloud Platform,” Journal of Financial Crime, Vol. 20, No. 1, 2013, pp. 6-24.
http://dx.doi.org/10.1108/13590791311287337
[24] F. Gens, “IDC’s Public IT Cloud Services Forecast: New Numbers, Same Disruptive Story,” 2010.
http://blogs.idc.com/ie/?p=922

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.