Analysing security risk of a cloud computing system to produce a model for secured business environment
Abstract
These days, almost all the medium and big size of businesses is using the cloud computing system to run their business across the globe and around the clock. It becomes popular and of huge application due to its characteristics such as large scale computation and data storage, virtualization, high expansibility, high reliability and low price service. Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. This is an affordable and effective place for businesses to sell and promote their goods and services. However the security problems for the cloud computing system are very significant. It can ruin the rapid development of cloud computing. In Business, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. The data privacy and service availability in cloud computing are the key security problem. The internet also provides opportunities for fraudulent behaviour and unauthorized access to business and client data. Attacks on the computer system of a business can have immediate and ongoing effects, such as targeting customers for identity crimes or infecting website visitors with malicious software. Due to having combination of various types of models in the cloud computing, the single security method cannot solve its security problem. Various traditional and new technologies and strategies together need to consider for protecting a cloud computing system totally. The aim of this paper is to bring into the deep sight of the cloud computing systems working and then to analyse the cloud computing security problem and its strategy according to the cloud computing concepts and characters. In addition to that, we are identifying the higher vulnerabilities in this type of systems and the most important threats found in the literature study related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with the possible solutions.
Downloads
References
J. Watson Research Center Chair, ACM Tech Pack Committee on Cloud Computing
Copyright © ACM 2015
[2]. A REVIEW OF CLOUD COMPUTING SECURITY ISSUES, Manpreet Kaur etl,
International Journal of Advances in Engineering & Technology, June, 2015On Security
Issues in Web Applications through Cross Site Scripting (XSS), IEEE, Published in:
Software Engineering Conference (APSEC), 2013 20th Asia-Pacific (Volume:1 )
[3]. An analysis of security issues for cloud computing, David G Rosado, Eduardo FernándezMedina et al, Journal of Internet Services and
Applications,http://jisajournal.springeropen.com/articles/10.1186/1869-0238-4-5, 27
February 2013
[4]. Cloud Computing and Security, Venkat Reddy Melachervu et al, ISACA Hyderabad, Jul
21, 2013
[5]. Data Security and Privacy in Cloud Computing, Yunchuan Sun et al, International Journal
of Distributed Sensor Networks Volume 2014 (2014), Article ID 190903, 9 pages,
http://dx.doi.org/10.1155/2014/190903, 2014
[6]. Microsoft cloud services and network security, azure.microsoft.com
[7]. Research on cloud computing security problem and strategy, W. Liu ; Dept. of Comput..
& Inf. Eng., Wuhan Polytech. Univ., Wuhan, China, 21 -23 April 2012
[8]. Special issue on security in cloud computing, Jaatun et al. Journal(Springer) of Cloud
Computing: Advances, Systems and Applications 2012
[9]. Security Issue for cloud computing , Kevin Hamlen, Murut kantarcioglu, The University
of Texas at Dallas, Feb 2010
[10]. Study and Analysis of Various Security models for better Alignment and Effectiveness,
Dr. Binod Kumar, Kanak Saxena, PhD Thesis Report, Barakkat Ullah University, M.P. India,
Jan 2009
[11]. Security Issues of IEEE 802.16 (WiMAX),Jamshed Hasan, Edith Cowan University,
Australian Information Security Management Conference, 2006.
[12]. Trends & issues in crime and criminal justice, Australian Government, Australian
Institute of Criminology, No. 433 February 2012
Author(s) and co-author(s) jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere. Author(s) agree to the terms that the GPH Journal will have the full right to remove the published article on any misconduct found in the published article.