Skip to main content

Ensuring Cloud Security: Current Concerns and Research Challenges

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 441))

Abstract

Over the past few years Cloud computing has been widely accepted and adopted as an alternative way for businesses to store data, communicate and operate. Consumers and enterprises regard this as a compelling opportunity to reduce or even in some cases completely eliminate costs, since Software as a Service (SaaS) offers a software delivery model in which software and the corresponding user data are being hosted on Cloud computing data centers. This shifts the costs of acquiring hardware and software and the additional costs for maintenance and personnel expenses from the enterprises to the Cloud providers, thus enabling business to reallocate IT operations costs. Alongside the emerging opportunities provided by the Cloud, security threads and concerns are also being raised. Providers and consumers must be aware and cautious of risks of data loss due to breaches. Security issues and current research challenges in securing cloud computing systems are reviewed here.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Aguiar, E., Zhang, Y., Blanton, M.: An overview of issues and recent developments in cloud computing and storage security. In: High Performance Cloud Auditing and Applications, pp. 1–31. Springer, New York (2013)

    Google Scholar 

  2. Ahuja, S.P., Komathukattil, D.: A survey of the state of cloud security. Netw. Commun. Technol. 1(2), 66–75 (2012)

    Google Scholar 

  3. Behl, A.: Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation. In: World Congr. on Information and Communication Technologies, pp. 217–222. IEEE (2011)

    Google Scholar 

  4. Behl, A., Behl, K.: Security paradigms for cloud computing. In: 4th International Conference on Computational Intelligence, Communication Systems and Networks, pp. 200–205. IEEE (2012)

    Google Scholar 

  5. Carlin, S., Curran, K.: Cloud computing security. Int. J. Ambient Comput. Intell. 3(1), 38–46 (2011)

    Article  Google Scholar 

  6. Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering, vol. 1, pp. 647–651. IEEE (2012)

    Google Scholar 

  7. Fugini, M.: Security and trust in Cloud scenarios. In: 1st International Workshop on Securing Services on the Cloud (IWSSC), pp. 22–29, September 2011

    Google Scholar 

  8. Gul, I., Rehman, A., Islam, M.: Cloud computing security auditing. In: The 2nd International Conference on Next Generation Information Technology, pp. 143–148. IEEE (2011)

    Google Scholar 

  9. Meetei, Z.M., Goel, A.: Security issues in cloud computing. In: 2012 5th International Conference on Biomedical Engineering and Informatics (BMEI), pp. 1321–1325 (2012)

    Google Scholar 

  10. Paquette, S., Jaeger, T.P., Wilson, C.S.: Identifying the security risks associated with governmental use of cloud computing. Gov. Inf. Quart. 27(3), 245–253 (2010)

    Article  Google Scholar 

  11. Plummer, C.D., Smith, M.D., Bittman, J.T., Cearley, W.D., Cappuccio, J.D., Scott, D., Kumar, R., Robertson, B.: Five refining attributes of public and private cloud computing, May 2009

    Google Scholar 

  12. Popovic, K., Hocenski, Z.: Cloud computing security issues and challenges. In: 2010 Proceedings of the 33rd International Convention, MIPRO, pp. 344–349 (2010)

    Google Scholar 

  13. Rong, C., Nguyen, S.T., Jaatun, M.G.: Beyond lightning: a survey on security challenges in cloud computing. Comput. Electr. Eng. 39, 47–54 (2012)

    Article  Google Scholar 

  14. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  15. Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. Science Direct, 2852–2856 (2011). Published by Elsevier Ltd

    Google Scholar 

  16. Tianfield, H.: Security issues in cloud computing. In: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (2012)

    Google Scholar 

  17. Tsai, H., Siebenhaar, M., Miede, A., Huang, Y., Steinmetz, R.: Threat as a service? virtualization’s impact on cloud security. IT Prof. 14(1), 32–37 (2012)

    Article  Google Scholar 

  18. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28, 583–592 (2012). Science Direct 2012

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elias Pimenidis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Vesyropoulos, N., Georgiadis, C.K., Pimenidis, E. (2014). Ensuring Cloud Security: Current Concerns and Research Challenges. In: Sideridis, A., Kardasiadou, Z., Yialouris, C., Zorkadis, V. (eds) E-Democracy, Security, Privacy and Trust in a Digital World. e-Democracy 2013. Communications in Computer and Information Science, vol 441. Springer, Cham. https://doi.org/10.1007/978-3-319-11710-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11710-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11709-6

  • Online ISBN: 978-3-319-11710-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics