Security and Privacy issues in Cloud Computing



Similar documents
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing

Secure Data Sharing in Cloud Computing using Hybrid cloud

A Secure Decentralized Access Control Scheme for Data stored in Clouds

5) Detailed description of problems/hypotheses you are planning to investigate.

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Information Security Management System for Cloud Computing

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Multi Tenancy Access Control Using Cloud Service in MVC

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Survey Paper on Integrity Auditing of Storage

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

How To Ensure Data Integrity In Cloud Computing

Survey on Data security Issues in Cloud Environment

Resource Allocation for Security Services in Mobile Cloud Computing

Improving data integrity on cloud storage services

COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

A Survey on Secure Storage Services in Cloud Computing

ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE

Review Article Data Security and Privacy in Cloud Computing

Service and Data Security for Multi Cloud Environment

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

International Journal of Advanced Research in Computer Science and Software Engineering

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

A Road Map on Security Deliverables for Mobile Cloud Application

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

A Conceptual Framework to analyze UML notations using SaaS : U-Code Generation

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A Survey on Trust Based Security and Privacy Issues of Cloud Computing Framework

ADVANCE SECURITY TO CLOUD DATA STORAGE

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Research on Storage Techniques in Cloud Computing

How To Design A Cloud Data Storage Service For A Cloud Computer System

A Secure and Dependable Cloud Storage Service in Cloud Computing

A Secure Cloud Storage Virtualization Model And user Authentication using Threshold Kerberosv5 Scheme

Customer Security Issues in Cloud Computing

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

International Journal of Advanced Research in Computer Science and Software Engineering

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): , ISSN (Print):

Cloud Battlefield Support and Security Assessment

Reduce cost and efficient access for cloud storage Using Intermediate Cloud Datasets

Privacy preserving technique to secure cloud

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

COMPUSOFT, An international journal of advanced computer technology, 4 (4), April-2015 (Volume-IV, Issue-IV)

Attribute Based Encryption with Privacy Preserving In Clouds

Secure Storage Services and Erasure Code Implementation in Cloud Servers

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

Secure Way of Storing Data in Cloud Using Third Party Auditor

Remote Data Auditing Scheme in Secured Cloud Storage Environment

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment

Security of Data from Public - Using Cloud Storage

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

A Survey on Data Storage Security in Cloud Computing

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

M Hasan Islam Department of Computer Sciences CASE Islamabad, Pakistan

Transcription:

Security and Privacy issues in Cloud Computing Siddharth Walia* ABSTRACT Cloud computing is a rapidly developing technology using internet and remote servers to maintain data and applications. The main aim of cloud computing is to provide ondemand services with scalability, reliability and availability. IBM, Amazon, Google, Microsoft are making millions of dollars each day by providing cloud services to users all over the world. In this paper, we provide an overview of cloud computing and then discuss some of the major security and privacy issues occurring in the cloud environment. We discuss about the techniques and approaches proposed by researches to tackle these problems. Some of the issues we discussed in the paper are privacy, integrity, security, trust, compliance and availability. REFERENCES [1]https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf. [2] R. Arora, A. Parashar, and C. C. I. Transforming.Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications (IJERA), 3(4):1922 1926,2013. [3] A. Aviram, S. Hu, B. Ford, and R. Gummadi.Determinating timing channels in compute clouds. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pages 103 108. ACM,2010. [4] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. Dependable and Secure Computing, IEEE Transactions on, 1(1):11 33, 2004. [5] J. Baker, C. Bond, J. Corbett, J. Furman, A. Khorlin, J. Larson, J.-M. L éon, Y. Li, A. Lloyd, and V. Yushprakh. Megastore: Providing scalable, highly available storage for interactive services. In CIDR, volume 11, pages 223 234, 2011. [6] A. Behl and K. Behl. Security paradigms for cloud computing. In Computational Intelligence, Communication Systems and Networks (CICSyN), 2012 Fourth International Conference on, pages 200 205. IEEE, 2012. [7] K. D. Bowers, A. Juels, and A. Oprea. Hail: a high-availability and integrity layer for cloud storage. In Proceedings of the 16th ACM conference on Computer and communications security, pages 187 198. ACM, 2009. *Queen s University, Kingston, Canada

[8] B. Calder, J. Wang, A. Ogus, N. Nilakantan, A. Skjolsvold, S. McKelvie, Y. Xu, S. Srivastav, J. Wu, H. Simitci, et al. Windows azure storage: a highly available cloud storage service with strong consistency. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages 143 157. ACM, 2011. [9] D. Chen and H. Zhao. Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, volume 1, pages 647 651. IEEE, 2012. [10] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages 85 90. ACM, 2009. [11] J. Dean and S. Ghemawat. Mapreduce: a flexible data processing tool. Communications of the ACM, 53(1):72 77, 2010. [12] M. Descher, P. Masser, T. Feilhauer, A. M. Tjoa, and D. Huemer. Retaining data control to the client in infrastructure clouds. In Availability, Reliability and Security, 2009. ARES 09. International Conference on, pages 9 16. IEEE, 2009. [13] C. Gentry. A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009. [14] A. Haeberlen. A case for the accountable cloud. ACM SIGOPS Operating Systems Review, 44(2):52 57, 2010. [15] A. Haeberlen, P. Aditya, R. Rodrigues, and P. Druschel. Accountable virtual machines. In OSDI, pages 119 134, 2010. [16] http://www.infoworld.com/d/security-central/gartner- seven-cloud-computingsecurity-risks 853. [17] http://www.roughtype.com. [18] I. Iankoulova and M. Daneva. Cloud computing security requirements: A systematic review. In Research Challenges in Information Science (RCIS), 2012 Sixth International Conference on, pages 1 7. IEEE, 2012. [19] J. Idziorek, M. Tannian, and D. Jacobson. Detecting fraudulent use of cloud resources. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pages 61 72. ACM, 2011. [20] W. Itani, A. Kayssi, and A. Chehab. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. In Dependable, Autonomic

and Secure Computing, 2009. DASC 09. Eighth IEEE International Conference on, pages 711 716. IEEE, 2009. [21] R. Latif, H. Abbas, S. Assar, and Q. Ali. Cloud computing risk assessment: A systematic literature review. In Future Information Technology, pages 285 295. Springer, 2014. [22] H. Liu. A new form of dos attack in a cloud and its avoidance mechanism. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pages 65 76. ACM, 2010. [23] S. Luo, Z. Lin, X. Chen, Z. Yang, and J. Chen. Virtualization security for cloud computing service. In Cloud and Service Computing (CSC), 2011 International Conference on, pages 174 179. IEEE, 2011. [24] P. Mell and T. Grance. The nist definition of cloud computing. National Institute of Standards and Technology, 53(6):50, 2009. [25] U. F. Minhas, S. Rajagopalan, B. Cully, A. Aboulnaga, K. Salem, and A. Warfield. Remusdb: Transparent high availability for database systems. The VLDB Journal, 22(1):29 45, 2013. [26] A. K. Mishra, P. Matta, E. S. Pilli, and R. Joshi. Cloud forensics: State-of-theart and research challenges. In Cloud and Services Computing (ISCOS), 2012 International Symposium on, pages 164 170. IEEE, 2012. [27] E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby. Enhanced data security model for cloud computing. In Informatics and Systems (INFOS), 2012 8th International Conference on, pages CC 12. IEEE, 2012. [28] S. Pearson and A. Benameur. Privacy, security and trust issues arising from cloud computing. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, pages 693 702. IEEE, 2010. [29] S. Ramgovind, M. M. Eloff, and E. Smith. The management of security in cloud computing. In Information Security for South Africa (ISSA), 2010, pages 1 7. IEEE, 2010. [30] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security, pages 199 212. ACM, 2009. [31] A.-R. Sadeghi, T. Schneider, and M. Winandy. Token-based cloud computing. In Trust and Trustworthy Computing, pages 417 429. Springer, 2010.

[32] N. Santos, K. P. Gummadi, and R. Rodrigues. Towards trusted cloud computing. In Proceedings of the 2009 conference on Hot topics in cloud computing, pages 3 3. San Diego, California, 2009. [33] V. Sekar and P. Maniatis. Verifiable resource accounting for cloud computing services. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pages 21 26. ACM, 2011. [34] A. Squicciarini, S. Sundareswaran, and D. Lin. Preventing information leakage from indexing in the cloud. In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, pages 188 195. IEEE, 2010. [35] H. Takabi, J. B. Joshi, and G.-J. Ahn. Securecloud: Towards a comprehensive security framework for cloud computing environments. In Computer Software and Applications Conference Workshops (COMPSACW), 2010 IEEE 34th Annual, pages 393 398. IEEE, 2010. [36] H. Tianfield. Security issues in cloud computing. In Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on, pages 1082 1089. IEEE, 2012. [37] A. Ukil, D. Jana, and A. De Sarkar. A security framework in cloud computing infrastructure. International Journal of Network Security & Its Applications, 5(5), 2013. [38] C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1 9. IEEE, 2010. [39] C. Wang and Y. Zhou. A collaborative monitoring mechanism for making a multitenant platform accountable. Proc. HotCloud, 2010. [40] L. Wei, H. Zhu, Z. Cao, W. Jia, and A. V. Vasilakos. Seccloud: Bridging secure storage and computation in cloud. In Distributed Computing Systems Workshops (ICDCSW), 2010 IEEE 30th International Conference on, pages 52 61. IEEE, 2010. [41] Z. Xiao and Y. Xiao. Accountable mapreduce in cloud computing. SCNC 2011, 2011. [42] Z. Xiao and Y. Xiao. Security and privacy in cloud computing. Communications Surveys & Tutorials, IEEE, 15(2):843 859, 2013. [43] Z. Yandong and Z. Yongsheng. Cloud computing and cloud security challenges. In Information Technology in Medicine and Education (ITME), 2012 International Symposium on, volume 2, pages 1084 1088. IEEE, 2012. [44] J. Yang and Z. Chen. Cloud computing research and security issues. In Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on, pages 1 3. IEEE, 2010.

[45] P. You, Y. Peng, W. Liu, and S. Xue. Security issues and solutions in cloud computing. In Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, pages 573 577. IEEE, 2012. [46] H. Yu, N. Powell, D. Stembridge, and X. Yuan. Cloud computing and security challenges. In Proceedings of the 50th Annual Southeast Regional Conference, pages 298 302. ACM, 2012. [47] S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1 9. Ieee, 2010. [48] Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter. Homealone: Co-residency detection in the cloud via side-channel analysis. In Security and Privacy (SP), 2011 IEEE Symposium on, pages 313 328. IEEE, 2011.