Security and Privacy issues in Cloud Computing Siddharth Walia* ABSTRACT Cloud computing is a rapidly developing technology using internet and remote servers to maintain data and applications. The main aim of cloud computing is to provide ondemand services with scalability, reliability and availability. IBM, Amazon, Google, Microsoft are making millions of dollars each day by providing cloud services to users all over the world. In this paper, we provide an overview of cloud computing and then discuss some of the major security and privacy issues occurring in the cloud environment. We discuss about the techniques and approaches proposed by researches to tackle these problems. Some of the issues we discussed in the paper are privacy, integrity, security, trust, compliance and availability. REFERENCES [1]https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf. [2] R. Arora, A. Parashar, and C. C. I. Transforming.Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications (IJERA), 3(4):1922 1926,2013. [3] A. Aviram, S. Hu, B. Ford, and R. Gummadi.Determinating timing channels in compute clouds. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pages 103 108. ACM,2010. [4] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. Dependable and Secure Computing, IEEE Transactions on, 1(1):11 33, 2004. [5] J. Baker, C. Bond, J. Corbett, J. Furman, A. Khorlin, J. Larson, J.-M. L éon, Y. Li, A. Lloyd, and V. Yushprakh. Megastore: Providing scalable, highly available storage for interactive services. In CIDR, volume 11, pages 223 234, 2011. [6] A. Behl and K. Behl. Security paradigms for cloud computing. In Computational Intelligence, Communication Systems and Networks (CICSyN), 2012 Fourth International Conference on, pages 200 205. IEEE, 2012. [7] K. D. Bowers, A. Juels, and A. Oprea. Hail: a high-availability and integrity layer for cloud storage. In Proceedings of the 16th ACM conference on Computer and communications security, pages 187 198. ACM, 2009. *Queen s University, Kingston, Canada
[8] B. Calder, J. Wang, A. Ogus, N. Nilakantan, A. Skjolsvold, S. McKelvie, Y. Xu, S. Srivastav, J. Wu, H. Simitci, et al. Windows azure storage: a highly available cloud storage service with strong consistency. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages 143 157. ACM, 2011. [9] D. Chen and H. Zhao. Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, volume 1, pages 647 651. IEEE, 2012. [10] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages 85 90. ACM, 2009. [11] J. Dean and S. Ghemawat. Mapreduce: a flexible data processing tool. Communications of the ACM, 53(1):72 77, 2010. [12] M. Descher, P. Masser, T. Feilhauer, A. M. Tjoa, and D. Huemer. Retaining data control to the client in infrastructure clouds. In Availability, Reliability and Security, 2009. ARES 09. International Conference on, pages 9 16. IEEE, 2009. [13] C. Gentry. A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009. [14] A. Haeberlen. A case for the accountable cloud. ACM SIGOPS Operating Systems Review, 44(2):52 57, 2010. [15] A. Haeberlen, P. Aditya, R. Rodrigues, and P. Druschel. Accountable virtual machines. In OSDI, pages 119 134, 2010. [16] http://www.infoworld.com/d/security-central/gartner- seven-cloud-computingsecurity-risks 853. [17] http://www.roughtype.com. [18] I. Iankoulova and M. Daneva. Cloud computing security requirements: A systematic review. In Research Challenges in Information Science (RCIS), 2012 Sixth International Conference on, pages 1 7. IEEE, 2012. [19] J. Idziorek, M. Tannian, and D. Jacobson. Detecting fraudulent use of cloud resources. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pages 61 72. ACM, 2011. [20] W. Itani, A. Kayssi, and A. Chehab. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. In Dependable, Autonomic
and Secure Computing, 2009. DASC 09. Eighth IEEE International Conference on, pages 711 716. IEEE, 2009. [21] R. Latif, H. Abbas, S. Assar, and Q. Ali. Cloud computing risk assessment: A systematic literature review. In Future Information Technology, pages 285 295. Springer, 2014. [22] H. Liu. A new form of dos attack in a cloud and its avoidance mechanism. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pages 65 76. ACM, 2010. [23] S. Luo, Z. Lin, X. Chen, Z. Yang, and J. Chen. Virtualization security for cloud computing service. In Cloud and Service Computing (CSC), 2011 International Conference on, pages 174 179. IEEE, 2011. [24] P. Mell and T. Grance. The nist definition of cloud computing. National Institute of Standards and Technology, 53(6):50, 2009. [25] U. F. Minhas, S. Rajagopalan, B. Cully, A. Aboulnaga, K. Salem, and A. Warfield. Remusdb: Transparent high availability for database systems. The VLDB Journal, 22(1):29 45, 2013. [26] A. K. Mishra, P. Matta, E. S. Pilli, and R. Joshi. Cloud forensics: State-of-theart and research challenges. In Cloud and Services Computing (ISCOS), 2012 International Symposium on, pages 164 170. IEEE, 2012. [27] E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby. Enhanced data security model for cloud computing. In Informatics and Systems (INFOS), 2012 8th International Conference on, pages CC 12. IEEE, 2012. [28] S. Pearson and A. Benameur. Privacy, security and trust issues arising from cloud computing. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, pages 693 702. IEEE, 2010. [29] S. Ramgovind, M. M. Eloff, and E. Smith. The management of security in cloud computing. In Information Security for South Africa (ISSA), 2010, pages 1 7. IEEE, 2010. [30] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security, pages 199 212. ACM, 2009. [31] A.-R. Sadeghi, T. Schneider, and M. Winandy. Token-based cloud computing. In Trust and Trustworthy Computing, pages 417 429. Springer, 2010.
[32] N. Santos, K. P. Gummadi, and R. Rodrigues. Towards trusted cloud computing. In Proceedings of the 2009 conference on Hot topics in cloud computing, pages 3 3. San Diego, California, 2009. [33] V. Sekar and P. Maniatis. Verifiable resource accounting for cloud computing services. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pages 21 26. ACM, 2011. [34] A. Squicciarini, S. Sundareswaran, and D. Lin. Preventing information leakage from indexing in the cloud. In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, pages 188 195. IEEE, 2010. [35] H. Takabi, J. B. Joshi, and G.-J. Ahn. Securecloud: Towards a comprehensive security framework for cloud computing environments. In Computer Software and Applications Conference Workshops (COMPSACW), 2010 IEEE 34th Annual, pages 393 398. IEEE, 2010. [36] H. Tianfield. Security issues in cloud computing. In Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on, pages 1082 1089. IEEE, 2012. [37] A. Ukil, D. Jana, and A. De Sarkar. A security framework in cloud computing infrastructure. International Journal of Network Security & Its Applications, 5(5), 2013. [38] C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1 9. IEEE, 2010. [39] C. Wang and Y. Zhou. A collaborative monitoring mechanism for making a multitenant platform accountable. Proc. HotCloud, 2010. [40] L. Wei, H. Zhu, Z. Cao, W. Jia, and A. V. Vasilakos. Seccloud: Bridging secure storage and computation in cloud. In Distributed Computing Systems Workshops (ICDCSW), 2010 IEEE 30th International Conference on, pages 52 61. IEEE, 2010. [41] Z. Xiao and Y. Xiao. Accountable mapreduce in cloud computing. SCNC 2011, 2011. [42] Z. Xiao and Y. Xiao. Security and privacy in cloud computing. Communications Surveys & Tutorials, IEEE, 15(2):843 859, 2013. [43] Z. Yandong and Z. Yongsheng. Cloud computing and cloud security challenges. In Information Technology in Medicine and Education (ITME), 2012 International Symposium on, volume 2, pages 1084 1088. IEEE, 2012. [44] J. Yang and Z. Chen. Cloud computing research and security issues. In Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on, pages 1 3. IEEE, 2010.
[45] P. You, Y. Peng, W. Liu, and S. Xue. Security issues and solutions in cloud computing. In Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, pages 573 577. IEEE, 2012. [46] H. Yu, N. Powell, D. Stembridge, and X. Yuan. Cloud computing and security challenges. In Proceedings of the 50th Annual Southeast Regional Conference, pages 298 302. ACM, 2012. [47] S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1 9. Ieee, 2010. [48] Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter. Homealone: Co-residency detection in the cloud via side-channel analysis. In Security and Privacy (SP), 2011 IEEE Symposium on, pages 313 328. IEEE, 2011.