0% found this document useful (0 votes)
111 views26 pages

Cloud Computing Review - Concepts, Te PDF

Uploaded by

money_kandan2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views26 pages

Cloud Computing Review - Concepts, Te PDF

Uploaded by

money_kandan2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

32 Int. J. Cloud Computing, Vol. 6, No.

1, 2017

Cloud computing review: concepts, technology,


challenges and security

Mahantesh N. Birje*
Center for Post Graduate Studies,
VTU, Belagavi, Karnataka, India
Email: [email protected]
*Corresponding author

Praveen S. Challagidad
Department of CSE,
Basaveshwar Engineering College,
Bagalkot, Karnataka, India
Email: [email protected]

R.H. Goudar
Center for Post Graduate Studies,
VTU, Belagavi, Karnataka, India
Email: [email protected]

Manisha T. Tapale
Department of CSE,
KLE Dr. MSSCET,
Belagavi, India
Email: [email protected]

Abstract: Cloud computing delivers IT-related capabilities as a service through


internet to multiple customers and these services are charged based on
consumption. Many cloud computing providers such as Google, Microsoft,
Yahoo, IBM and Amazon are moving towards adoption of cloud technology
leading to considerable escalation in the usage of various cloud services.
Amazon is the pioneer in this field because of its more number of architectural
features compared to others. To meet the needs of cloud service providers and
customers various open source tools and commercial tools are being developed.
Though many more developments have been taken place in cloud computing
area, many challenges such as security, interoperability, resource scheduling,
virtualisation etc. are yet to be fine tuned. This paper reviews cloud computing
paradigm in terms of its historical evolution, concepts, technology, tools and
various challenges. Systematic literature review (SLR) of 77 selected papers,
published from 2000 to 2015 is done to properly understand the nuances
of the cloud computing paradigm. Since security is the major challenge
in cloud computing, it is discussed separately in detail. This review paper
helps researchers who would like to begin their research career in cloud
computing area.

Copyright © 2017 Inderscience Enterprises Ltd.


Cloud computing review: concepts, technology, challenges and security 33

Keywords: cloud computing; tools; challenges; security; issues; review.

Reference to this paper should be made as follows: Birje, M.N.,


Challagidad, P.S., Goudar, R.H. and Tapale, M.T. (2017) ‘Cloud computing
review: concepts, technology, challenges and security’, Int. J. Cloud
Computing, Vol. 6, No. 1, pp.32–57.

Biographical notes: Mahantesh N. Birje received his BE and MTech degree in


Computer Science and Engineering in 1997 and 2005 respectively. He obtained
his PhD degree from Visvesvaraya Technological University (VTU), Belagavi,
India, in 2012. His current research areas include cloud computing, data mining
and security. He has published many papers in reputed international journals
and conferences. He is a reviewer for few reputed journals. He has given many
invited lectures and has conducted several workshops and seminars for
faculty and students. He has executed various academic and administrative
responsibilities. Currently, he is working as Professor in the Centre for Post
Graduate Studies, VTU, Belagavi.

Praveen S. Challagidad received his BE and MTech degree in Computer


Science and Engineering in 2007 and 2009 respectively. His areas of interest
include cloud computing, computer networks and security. He has published
few papers in conferences and journals. Currently, he is working as an
Assistant Professor in the Department of Computer Science, Basaveshwar
Engineering College, Bagalkot.

R.H. Goudar is currently working as an Associate Professor in Center for Post


Graduate Studies, Visvesvaraya Technological University, Belagavi. He has
12 years of teaching experience at professional institutes across India. He
worked as a faculty at International Institute of Information Technology, Pune
for four years and at Indian National Satellite Master Control Facility, Hassan,
India. He has published over 100 papers in international journals, book chapters
and conferences of high repute. His subjects of interest include Semantic Web,
network security and wireless sensor networks.

Manisha T. Tapale received her BE and MTech degree in Computer Science


and Engineering in 2003 and 2010 respectively. Her areas of interest include
cloud computing, database systems and operating systems. She has published
few papers in conferences and journals. Currently, she is working as an
Assistant Professor in the Department of Computer Science, KLES’s College
of Engineeing and Technology, Belagavi.

1 Introduction

The term ‘cloud’ was coined from the computer network diagrams which use it to hide
the complexity of infrastructure involved. Cloud computing is gaining a great scope
towards IT industries, academics and individual users because of its ease of use,
on-demand access to network resources, minimal management effort and reduced cost
(Rajnish, 2011). The National Institute of Standards and Technology (NIST, 2014)
defines cloud computing as “a model for enabling ubiquitous, convenient, on-demand
34 M.N. Birje et al.

network access to a shared pool of configurable computing resources (e.g., networks,


servers, storage, applications, and services) that can be rapidly provisioned and released
with minimal management effort or service provider interaction”.
This new cloud computing technology has widely spread in the market and there is an
increase in the number of enterprises. It is fascinating the cloud customers by providing
services at low price, pay-for-use strategy, distributed nature, rapid delivery of computing
resources and provides data storage centre with infinite space and powerful computing
capacity for storing and managing data.
The cloud model consists of five essential characteristics – broad network access,
rapid elasticity, resource pooling, on-demand self-service, and measured service;
three service models – software as a service (SaaS), platform as a service (PaaS), and
infrastructure as a service (IaaS); and four deployment models – public cloud, private
cloud, hybrid cloud and community cloud. There are many advantages of cloud
computing – easy management, cost reduction, uninterrupted services, disaster
management and green computing (NIST, 2014).
In spite of the potential gains accomplished from the cloud computing, the
organisations are slow in adopting it due to the following limitations: data loss, data
cleaning, account hijacking, less control over the process, insider attacks by cloud service
providers (CSPs), lack of legal aspects, lack of portability/migration from one service
provider to another, less reliable, lack of auditability, less quality of service (QoS)
(Joel et al., 2012; Yashpalsinh and Kirit, 2012). These limitations lead to various
challenges in adoption of cloud computing such as virtualisation, interoperability,
resource scheduling, multi-tenancy, load balancing, security etc. still exist; these
challenges are to be fine tuned.
The paper tries to focus on the cloud computing technology considering multiple
perspectives. It reviews cloud technology in terms of its historical evolution, concepts,
technology and challenges as shown in Figure 1.

Figure 1 Cloud perspective

Cloud Perspective

History Concepts Technology


Challenges*

Service Models Deployment Models Tools Platforms

IasS Private Open Source Commercial AWS


PaaS Public IBM BC
SaaS Hybrid MS Azure
Community GAE

AWS – Amazon Web Service


IBM BC - IBM Blue Cloud Open Nebula SCALR
MS Azure – Microsoft Azure Apache Cloud Stack GRAVITANT
GAE – Google App Engine Nimbus Right Scale
Eucalyptus VMTurbo

Note: *Detailed in Section 2.4.


Cloud computing review: concepts, technology, challenges and security 35

With all of the potential gains and limitations, security is considered as one of the major
critical challenges in cloud computing because of shared nature of cloud ecosystem. For
example, data in cloud is stored remotely, totally out of the control of the data owner.
Actually, security can be an obstacle towards implementation of cloud computing in
enterprises, because of the great deal of uncertainty about how security at all levels can
be achieved (Ma, 2012). In cloud ecosystem, users lose the control over physical security
(Rittinghouse and Ransome, 2010), because users may have to share and store computing
resources on cloud servers. Unfortunately these servers are controlled and owned by
CSPs. It could be possible that CSPs may themselves modify the user’s data. It is also
possible for a user’s data to be exposed to another user without their knowledge and
control. The cloud computing system is based on the trust, what makes security and
confidentiality the major issue. Hence security becomes critical issue in cloud computing.
This challenge is affecting the widespread adoption of cloud computing. Therefore it is
discussed separately in detail.
The remainder of this paper is organised as follows: Section 2 presents cloud
perspective in terms of history, concepts, technology and challenges. Sub-section 2.1
describes how cloud is entered into the market; Sub-section 2.2 describes cloud concepts;
Sub-section 2.3 describes the technology in terms of architectural features and tools; and
Sub-section 2.4 discusses various challenges in cloud. Section 3 describes security in
cloud computing paradigm. Sub-section 3.1 describes security objectives; Sub-section 3.2
describes security issue and its countermeasures. Conclusions and future directions are
presented at the end.

2 Cloud perspective

The cloud paradigm can be viewed in different perspectives depending on how the user
wants to perceive cloud technology. The paper perceives and describes the cloud
technology in terms of its history, concepts, technology and challenges of a cloud
computing.

2.1 History
Table 1 describes how cloud is entered into the market from the past (Bashe, 1986; Tim,
1989; Bennett et al., 2000; Freiberger and Michael, 2000; Finch, 2006). Though it took
some time to agree and start using the cloud technology, many IT companies have come
forward to offer various types of cloud services.
Table 1 Cloud retrospective

Year Description
2000–2005 Dot.com bubble burst leads to introduction of cloud.
2006 Amazon enters the cloud market.
2007–2008 The market disagree on the understanding of cloud.
2008 Cloud market expands as more vendors join.
2008–2009 IT attention shift to emerging private cloud.
36 M.N. Birje et al.

Table 1 Cloud retrospective (continued)

Year Description
2009–2010 The open source cloud movement takes hold, example Openstack.
2009–2011 Cloud computing finds its way, become popular, every organisation started
and 2012 implementing cloud platform. In the year 2011, a new deployment model called
hybrid cloud born.
2012–2013 The Australian Bureau of Statistics (ABS) 2013–14 Business Characteristics
and 2014 Survey (BCS) showed that one in five businesses had been using some form of
paid cloud computing service. The overall results showed that between 2012–13
and 2013–14, businesses using information technology increased. When
examining the areas where businesses used IT to a high extent, 60% used it for
accounting, and 55% used it for invoicing business processes (http://www.zdnet
website, ABS article, online, 24 September 2015).
2014–2015 Many IT companies moving towards adoption of cloud technology because of its
effectiveness and fast growth.

2.2 Concepts
Cloud computing is a delivery of extremely scalable IT related facilities as a service
through the internet to multiple clients. Clients can have a choice of different cloud
service models based on his/her requirements (Edwards, 2012). It involves many services
to clients generally called as XaaS, where X stands for any kind of service like hardware,
software, platform, infrastructure, data and business etc. that the cloud offers to clients.
Basically, X involves three kinds of services which are widely used such as SaaS, PaaS
and IaaS.
This section describes cloud constituents such as three service models and four
deployment models. The three service models are briefly explained below:

2.2.1 Software as a service


SaaS is a collection of software or services or applications available on cloud that can be
accessed by end users based on subscription. End users consume the software application
services through this service delivery model directly over network according to
on-demand basis. Examples: Whats app, Facebook, Twitter, Google Docs and
spreadsheets, salesforce.com, NETSUITE, and IBM LotusLive.

2.2.2 Platform as a service


PaaS is a collection of runtime environments such as software and development
tools hosted on the provider’s servers. It acts as background that provides runtime
environment, software deployment framework and component on pay to facilitate the
direct deployment of application level assets or web applications. Application developers,
implementers, testers, and administrators can go for developing, testing and deploying
their software in this platform and here entire software life cycle is operated (Suruchee
and Raut, 2014). Examples: Amazon AWS, Rollbase, jelastic.com, force.com, Google
App Engine (GAE), Microsoft Azure, and LONG JUMP.
Cloud computing review: concepts, technology, challenges and security 37

2.2.3 Infrastructure as a service


IaaS is a collection of servers, storage, and networks. Virtualisation is the backbone
behind this model where resources like network, storage, virtualised servers, routers and
so are consumed by user through virtual desktop, provided by CSP. Based upon usage of
per CPU hour, data GB stored per hour, value added services used (e.g., monitoring,
auto-scaling etc.), network bandwidth consumed, network infrastructure used per hour,
users are charged. Examples: rackspace, VMWare, Joyent, Storage services provided by
Amazon S3, and Computation services provided by Amazon EC2.
Figure 2 depicts how customers have a choice of different cloud service models.

Figure 2 Cloud service models (see online version for colours)

IT Professional Developer Business End User

Customization Customization Customization


Client
Application Application
Clients

Platform
SaaS Cloud
SP

SP
PaaS Cloud
IaaS Cloud

SP: Service Provider

The four deployment models of cloud computing are almost the same except their scope
and accessibility given to the cloud users. Figure 3 depicts cloud deployment models and
their features. These models are briefly explained below:
1 Public cloud/external cloud
This cloud allows cloud environment as openly accessible to all users. Public cloud
is off premise in which various enterprises can be used to deliver the services to
users by taking it from the third party. Examples: Sun Cloud, Google AppEngine,
IBM’s Blue Cloud, Amazon Elastic Compute Cloud (EC2), and Windows Azure
Service Platform.
2 Private cloud/internal cloud
This cloud referred to on-premise cloud used to provide the high level control over
cloud services and infrastructure which is controlled or owned by an organisation. It
is built specifically to provide the services within an organisation for maintaining the
security and privacy. Examples: Seagate and RedHat.com etc.
38 M.N. Birje et al.

3 Hybrid cloud/virtual private cloud (VPC)


This cloud combines both public cloud and private models where cloud computing
ecosystem is hosted and managed by third party (off-premise) but only an
organisation can privately use some dedicated resources. Examples: Cybercon.com
(US Microsoft Hybrid Cloud), and Bluemix.net (IBM Cloud App Development), etc.
4 Community cloud
This cloud allows the cloud computing environment can be shared or managed by a
number of related organisations. Example: soourcingfocus.com.

Figure 3 Cloud deployment models

Hybrid Cloud:
xCombines Private, Public or
Community Clouds.
xAllows manipulation of CapEX
Private Cloud: and OpEX to reduce costs. Public Cloud:
xLeverages xSupports resource Portability. xShifts CapEx
existing
to OpEx
CapEx.
xOffers pay as
xCan Helps to
you grow.
reduce OpEx.
Community Cloud: xSupports
xIntended for
xAllows sharing of CapEx multiple
single tenant
and OpEx to reduce costs. tenants.
xBridges together groups or
organisations with
common goal.
xSupports reduce
portability.

2.3 Technology
This section describes various cloud platforms based on their features, and also various
tools that are available in the market.

2.3.1 Cloud platforms


Table 2 describes various features of four different cloud platforms (Amazon, IBM Blue
Cloud, Microsoft Azure and Google App Engine). Though many CSPs like Amazon,
IBM, Microsoft and Google are adopting cloud technology, Amazon is a pioneer.
Amazon Web Service platform has many features imbibed within it. It is still growing
faster compared to other CSPs.
Cloud computing review: concepts, technology, challenges and security 39

Table 2 Features of different platform

Platforms
Features
AWS IBM Blue Cloud Microsoft Azure GAE
SLA (Alexander AWS as SOA-based web SOA-based web Yes
2009) service service service
interface
Reliability Highly reliable Reliable Azure Fabric Sandbox
(Pol, 2009; IBM
Introduces
Ready-to-Use
Cloud Computing,
2014; Charlie and
Ramanathan, 2010;
Rajkumar et al.,
2011)
Auto-scaling Cloud Watch Maximum Azure fabric Memcache
Elasticity (Martijn, Elastic Load No Yes, as per AppLoad
2012) Balancing service usage Balancer
Service
Virtualisation (Bala VPC Xen and VM role runs an Guest VMs
and Girish, 2012) Power VM image VHD
Availability zone Yes, separate Yes, separate Yes, separate Yes, separate
(Jinesh, 2011) zone is present zone is not zone is not zone is not
present present present
Privacy VPC uses Yes AppFabric and App controller
IPSec Tunnel Geneva
mode framework
Storage Elastic Block SVC cluster Sql Azure Google APIs
(David et al., 2010; Storage (EBS) (IBM Total Storage connect open
Dong and Hui, and Simple Storage San databases, store
2010) Storage Volume data sync
Service (S3) Controller) and
XIV Nextra
Security AWS Identity Blue Gene Yes App controller
and Access Supercomputer,
Management System Z Parallel
Sysplex

2.3.2 Tools
Tools provide environment and platform for developing various cloud services,
implementing their own algorithms and mechanisms. Various tools that are available in
the market for implementing cloud computing technology are discussed here. Cloud tools
are categorised into open source tools and commercial tools.
40 M.N. Birje et al.

2.3.2.1 Open source tools


Open source tools can be used/accessed with free of cost such as Open Nebula, Apache
Cloud Stack, Nimbus and Eucalyptus. Table 3 describes all aforementioned tools.
Though many open source tools are available in the market, Apache Cloud Stack would
be the good open source tool to deploy cloud techniques because it is used for public
cloud, part of it is a hybrid cloud, has good features and secure AJAX console.
Table 3 Open source tools

Tool name Features Security API Cloud type


Open Nebula: It Cloud bursting, Fine-grained AWS EC2 and Private
adopts computing, on-demand ACLs and user EBS APIs. OGF
storage, security, provision of quotas. Integration OCCI APIs.
monitoring, virtual data with LDAP,
virtualisation and centres, multiple Active Directory.
networking in their zones, multi-VM
data centres (Open application
Nebula, 2015). management.
Apache Cloud Powerful API. Secure AJAX CloudStack Public,
Stack: Easy Multi-role support. console access. provides an API hybrid
integration with On-demand virtual Secure single sign that’s compatible
existing portal data centre on. Secure cloud with AWS EC2
and it is fully hosting. Dynamic deployments. and S3 for
AJAX-based workload MPLS support in organisations that
solution compatible management. the cloud. wish to deploy
with most of the Broad network hybrid clouds.
latest internet virtualisation
browsers (Apache capabilities.
Cloud Stack, 2015).
Nimbus: Power Support for ------- EC2/S3 an API as Private,
and versatility of proxy credentials a compatible IaaS. public
infrastructure for scientific
clouds to scientific community,
users. It allows batch schedulers,
combining Nimbus, best-effort
OpenStack, allocations and
Amazon, etc. others are special
(Nimbus, 2015). targeting features.
Eucalyptus: It Multi-cluster ---------- ---------- Private,
helps customers to tunnelling and hybrid
design and deploys LDAP integration.
cloud solutions
more quickly
(Eucalyptus, 2015).
Note: ----------: not applicable.

2.3.2.2 Commercial tools


Commercial tools such as RightScale, Gravitant, VMTurbo and Scalr etc. are briefly
described in this section. Though many commercial tools are available in the market,
Scalr is a best fit for those looking to implement and/or design their own algorithms or
projects.
Cloud computing review: concepts, technology, challenges and security 41

• RightScale: Automated management of workflow of messages and jobs as they move


through the computational, storage, and retrieval processes is achieved by RightScale
grid framework. Mechanism to implement the elasticity of the grid processing
solution is also provided by this tool. Monitoring of the input queue(s) of the system
is done continuously, when certain criteria are met; additional worker instances are
launched to handle the increased processing load. When the number of items in the
input queue comes down, these servers are automatically terminated, thus it takes
full advantage of utility computing (Brian, 2013).

• Gravitant: Gravitant’s cloudMatrix CSB platform is a market leading cloud services


brokerage and management platform that integrates multiple cloud provider services
(internal or external) into a catalogue and provisioning portal, so enterprises can
optimise the consumption of cloud services. The core services and features enabled
by Gravitant’s cloudMatrix CSB platform and are delivered as packages through a
single user interface on myGravitant.com and through a white labelled internal
broker platform. Enterprises can deploy these capabilities independently or as an
integrated suite based on their cloud services needs. The cloudMatrix CSB platform
is technology agnostic and will work and leverage current cloud platforms and
business systems deployed by the enterprise (Gravitant, 2014).

• VMTurbo: It provides a demand-driven cloud and virtualisation control platform for


enterprise businesses (VMTurbo, 2015).

• Scalr: Scalr is the best fit for those looking to explore the platform and to build
and test their projects on their own. It delivers self-service access to cloud
infrastructure and acts as an intermediary management layer between cloud
infrastructure and engineering, and provides the ownership of information security
back to IT department hands. Scalr enforces cloud infrastructure security such as
governance and compliance to create and enforce policies on the basis of budgets,
configurations, and user access across entire cloud portfolio. Network policy
enforcement allows securing cloud infrastructure by regulating the use of networks.
Enabling to deliver single sign-on (SSO) across private and public clouds is achieved
through authentication and authorisation techniques (Scalr, 2012).

2.4 Challenges of cloud computing


Despite the potential gains achieved from the cloud computing, the organisations are
slow in accepting it due to the following limitations: data loss, data cleaning, account
hijacking, less control over the process, insider attacks by the CSP’s, lack of legal
aspects, lack of portability/migration from one service provider to another, less reliable,
lack of auditability, less QoS (Joel et al., 2012; Rajnish, 2011; Yashpalsinh and
Kirit, 2012). These limitations lead to the issues or challenges such as – security,
interoperability, virtualisation, data leakage, resource sharing, load balancing,
multi-tenancy, and Service Level Agreement (SLA) (Daniel and Rich, 2009; Gurudatt
et al., 2012). Figure 4 depicts various challenges of cloud computing. Description of
challenges, their difficulties and possible solutions are given in Table 4.
42 M.N. Birje et al.

Figure 4 General challenges (see online version for colours)

Challenges

x Outsourcing Data and Applications


x SLA (Service Level Agreement)
x Extensibility and Shared Responsibility
x Cloud Interoperability
x Heterogeneity
x Multi-tenancy
x Load Balancing
x Resource Scheduling
x Virtualisation
x Privacy & Security

Security objectives Security Challenges

Confidentiality
Integrity Data Centres Network Common Challenges
Availability
Authentication
Accountability Countermeasures

Table 4 General challenges

Challenges/issues Difficulties Possible solutions


Outsourcing data and It is very difficult to have Any technical means could
applications appropriate mechanisms to not completely prevent
prevent cloud providers from cloud providers from abusing
Cloud user host data and using customers’ data in a way customer data in all cases, so
applications on cloud servers that has not been agreed upon. a combination of techni and
by relying on third parties to non-technical can be used to
make decisions about user achieve this. Clients need
data and platforms. Cloud to have significant trust in
Computing provides access to their provider’s technical
data, but the challenge is to competence and economic
ensure that only authorised stability.
user can gain access to it
(Takabi et al., 2010).
SLA 1 Definition of SLA Advanced SLA methods need
specification. to regularly integrate user
It is essential for customers to advice and customisation
get assurances from providers 2 Different cloud offerings features into the SLA
on service delivery. Typically, will need to classify assessment framework.
these are provided during different meta
SLAs negotiated between the specifications.
providers and customers
(John et al., 2009).
Cloud computing review: concepts, technology, challenges and security 43

Table 4 General challenges (continued)

Challenges/issues Difficulties Possible solutions


Extensibility and shared 1 Providing privacy and security to Provide the security to
responsibility all deployment models is each level of resource
Cloud providers and difficult. sharing and make use of
customers must share the 2 Private clouds could also demand available, advanced and
responsibility for security more extensibility to new protection mechanisms
and privacy accommodate customised to provide privacy and
in cloud computing requirements so providing security to each level. the
environments, but sharing security in that stage is difficult. hardware
levels will differ for
different delivery models,
which in turn affect cloud
extensibility (Takabi et al.,
2010).
Cloud interoperability 1 Cloud APIs makes it Standardisation approach
Which provide the freedom very difficult to merge cloud would be a good solution to
to customer to switch from services with an organisation’s deal with this issue. For
alternative own existing legacy systems. example optimising in
vendors/offerings/ 2 Aim of interoperability outsourcing a number of
providers simultaneously to is to detect the faultless fluid data insignificant functions to
optimise resources at various across local applications, across cloud services offered by
stages in an organisation clouds and among clouds and it different vendors.
(Gundeep et al., 2012). is difficult to detect.
Heterogeneity A potential issue are: Designing of more efficient
Cloud providers use various 1 If a client subscribes to different privacy and security
hardware and software cloud providers for different mechanisms could
resources to build cloud services then the assumptions overcome the said
environments. To some that each of these cloud providers difficulties.
extent, resource make in building the services can
virtualisation achieves high- severely affect the emergent trust
level system homogeneity, and security properties.
but the same infrastructure 2 Generates integration challenges.
being used to support
different tenants with 3 In a multi-tenant environment,
different protection and the protection requirements for
system requirements can each tenant might differ, which
generate difficulties (Takabi can make a multi-tenant cloud a
et al., 2010). single point of compromise.
Multi-tenancy 1 Opponents who may also be There are three kinds of
This means that the cloud legal cloud clients may utilise the multi-tenancy enablement
platform is shared and co-residence issue. approaches such as sharing,
exploited by number of 2 Many security issues such as data arbitration and
clients (Bhaskar et al., 2009; breach, computation breach, virtualisation. To achieve
Xiao and Xiao, 2012). flooding attack, etc., are incurred. the full potential of multi-
tenancy three issues
3 It supplies new vulnerabilities to continue to be solved such
the cloud platform. as resource sharing,
security isolation,
customisation.
44 M.N. Birje et al.

Table 4 General challenges (continued)

Challenges/issues Difficulties Possible solutions


Load balancing Continuous monitoring of the Effectively implementing load
Load balancing can be defined components becomes overhead balancer by using new
as assigning a part of job to and when one becomes mechanism.
another or idle computer to non-responsive, the load
improve the efficiency and balancer needs to inform that
optimise the use of resources stop sending traffic to
(Tsai et al., 2010). overloaded system.

Resource scheduling Implementing multitasking Implement scheduler to have


Means assigning the resources and multiplexing techniques in advanced algorithm and
such as hardware, software, scheduler is somewhat tedious mechanism which concern
process time, communication task. about the throughput, latency,
bandwidth and applications to specifically: turnaround
the processes. time, response time and
fairness/waiting time.
Virtualisation 1 Rise of high density. Physical infrastructure
IT virtualisation is the 2 Reduced IT load affects efficiency measured as PUE
abstraction of physical power usage effectiveness will increase if the power
infrastructures such as servers, (PUE). and cooling infrastructure is
data centres, networks right-sized to the new lesser
3 Dynamic IT loads. overall load, then necessity
capabilities and storage
resources (Tsai et al., 2010). 4 Lower redundancy for idleness in the physical
requirements are possible. infrastructure may be reduced
by using highly virtualised
data centre design and IT
fault-tolerance functioned with
a high level.
Privacy and security Finding the solutions for the Requires novel techniques
A third party causes the attacks: Malware-injection, to tackle with. Some of the
security and privacy issues flooding, accountability check countermeasures are described
more critical when outsourcing problem, browser security, in Table 5.
the data and business securing data in transmission,
applications (Bhaskar et al., identity and access
2009). management is difficult.

3 Security

In a cloud, responsibility for employing and preserving efficient security mechanisms are
in the hands of the providers. To reduce their customer’s panic of the cloud, these
providers want to convince them that their data and applications will be accurately
secured (Bernsmed et al., 2012). Security is considered to be a dangerous obstacle for
cloud computing in its lane to success (Bhaskar et al., 2009), and hence it is a major
challenge. This section discusses security objectives and issues.

3.1 Security objectives


Five key objectives such as confidentiality, integrity, availability, authenticity and
accountability are most important for computer security.
Cloud computing review: concepts, technology, challenges and security 45

These five objectives represent the basic security objectives for data, information and
computing services (William, 2010).
• Confidentiality: It is used to preserve authorised limitations on accessing information
and disclosure, including means for protecting personal privacy and proprietary
information. It has two types:
1 data confidentiality: it assures that private or sensitive information is made
unavailable or disclosed to illegal persons
2 privacy: it assures that persons control or influence what information feel right
to them is collected and stored and by whom and to whom that information is
disclosed.
• Integrity: Protecting against inappropriate information destruction or modification,
including ensuring information non-repudiation and authenticity. It has two types:
1 data integrity: it assures that information and programs are altered only a
specified and authorised manner
2 system integrity: it assures that a system makes its intended function in
superior way, free from inadvertent or deliberate illegal handling of the
system.
• Availability: Ensuring reliable and timely access to and use of information.
• Authenticity: Assurance that a message, transaction, or additional exchange of
information is from the source it claims to be from. It entails evidence of
identity.
• Accountability: The security goal is that creates the requisite for actions of an entity
to be traced uniquely to that entity.

3.2 Security issues


Security is a critical issue in cloud computing paradigm that affects the widespread
adoption of cloud computing technology (Ennajjar et al., 2014). Amazon network host
service, S3 (Simple Storage Service was broken down for four hours in 2010; this
incident made people aware of the risks that may be encountered in users data stored in
cloud (Zhang et al., 2012). Other incidents related to traditional web application and data
storage security concerns are still occurring in high profile companies like Google,
Microsoft, Twitter and Amazon such as data phishing, downtime, data loss, password
weakness and compromised hosts running botnet and other threats associated to network
and applications (Chen et al., 2010; Subashini and Kavita, 2011).
Another side of security issue that breaches is related to surveillance. In 2013, it has
been exposed that the National Security Agency (NSA) and other US law enforcement
and national security agencies have access to information from telecommunications and
internet providers via secret court orders as specified by USA Patriot Act and the Foreign
Intelligence Surveillance Act (FISA) to obtain electronic data from third parties. As this
news become accepted widely, it led to a number of questions about appropriate access to
an individual’s digital information within the USA and other countries, which affects
attitudes about using public cloud providers (Castro, 2013).
46 M.N. Birje et al.

These technical and legal plan related security issues lead to decrease in the
confidence of cloud technology adoption. Similarly security issues related to the location
of data centre, network and other common issues also hinder the growth of cloud
technology adoption. These issues are depicted in Figure 5. Description of various issues
related to the location of data centre, network and other common issues are described in
Table 5, Table 6 and Table 7 respectively.

Figure 5 Security issues

Security issues related to

Data centres Networks Other common challenges

x Multi-location of x SQL injection attack. x Abuse and nefarious


service provider. x Cross site scripting use of cloud
x Data combination attack. computing.
and commingling. x Man in middle attack. x Insecure application
x Restrictions on x Sniffer attack. programming interface.
techniques and x Reuse IP addresses. x Malicious insider.
logistics. x Security concerns with x Shared technology
x Data transfer Hypervisor. vulnerability.
across gateway. x DoS attack. x Data loss/leakage.
x Multi-location of x Cookie poisoning x Traffic hijacking and
private data. x DDoS attack. account.
x COPTCHA x Investigation.
splitting/breaking. x Data segregation.

3.2.1 Data centre


Table 5 discusses security issues related to data centre along with their possible
countermeasures. In this table, the countermeasure for the issue data transfer across
gateway has not been discussed; this need to be fine tuned. This could be a one of the
research objectives to find out an efficient mechanism which overcomes this issue.

3.2.2 Networks
Table 6 discusses the security issues related to networks along with their possible
countermeasures. In this table, the countermeasures for the every issue has been
discussed but there is need for more efficient algorithms and techniques in issues such as
SQL injection attacks, Google hacking, sniffer attacks, cookie poisoning and CAPTCHA
splitting.

3.2.3 Other challenges


Table 7 discusses the security issues related to networks along with their possible
countermeasures. In this table, the countermeasures for the every issue has been
discussed but there is a need for an efficient techniques for the issue insecure applications
Cloud computing review: concepts, technology, challenges and security 47

programming interface, traffic hijacking and account service, data loss/leakage,


investigation and data segregation.
Table 5 Security issues related to data centre

Data centres security issues


Countermeasures
(Jensen et al., 2009; Rameshwari, 2013)
Multi-location of the service provider: Protection from attacks at various levels:
The cloud clients for example private user or Fundamental technical security issues which
business user also have to ensure that how the cover security of web service using XML and
cloud service provider performs their affirmed SOAP messages, and SSL with transport layer
services. Hence, this makes possible for cloud security are provided (Arshad et al., 2009). A
client to make a straight relationship with the technique to guarantee quality of service for
provider, and control over their private data compute intensive workloads in term of security
(Jensen et al., 2009). attack, encryption algorithm and authentication
has been proposed. Haizea is used as an open
source resource manager for giving an estimation
to achieve security and to perform
experimentations. Guest operating system
integrity, VM specific attack, backdoor
protection, etc., are considered as security
requirements.
Data combination and commingling: The Data security: Rules and regulations for privacy
cloud client should ensure that its confidential enhancement methods and tools are discussed
data is stored separately from others or not. If (Macquarir University, 2008). Privacy in terms
private data are combined with those of other of lawful compliance, user trust and data leakage
client’s data, then it is very vulnerable to for confidential data are provided. A standard to
attack. For example, viruses might be secure data-in-transit in the cloud has been
broadcasted from one client to other clients. proposed (Ji, 2009). Large scale search system
The attack might influence the integrity and for the function of information switch over
data availability of other companies existing between internet communities leads to creation
in the same environment, if another client is of covert channels (Rizwana and Sasikumar,
the victim of a hack attack. 2012). To control data from covert channel an
agent-based security model is presented. This
could resolve the problem of data leakage in the
cloud ecosystem. The privacy issue by retaining
data control to user to increase self-assurance is
discussed (Descher et al., 2009). Some
requirements and means to overcome from the
cloud computing attacks are proposed.
Restrictions on techniques and logistics: To Architecture security: Challenges of cloud
assure storage locations of cloud computing computing security can be handled practically by
client’s data might be very difficult or even performing security assessment is discussed
impossible for cloud service provider. For (Sonali, 2014). Definition of an architecture
example, Amazon has data centres ontology approach for secure cloud computing
everywhere; the client’s data is stored discussed (Kevin, 2009). The architecture of
automatically across them unless Amazon cloud comprises a variety of security
uses particular servers for dedicated client mechanisms such as storage security, access
therefore the cloud service provider should management, network security, and security API.
address logistics (Vahid and Seyed, 2012). These mechanisms implanted in the cloud
architecture to endow with secure cloud
computing.
Note: ----------: not applicable.
48 M.N. Birje et al.

Table 5 Security issues related to data centre (continued)

Data centres security issues


Countermeasures
(Jensen et al., 2009; Rameshwari, 2013)
Data transfer across the gateway: It is ---------------------------
prerequisite to know where the cloud service
provider will store the data for transferring
data across the country gateway. Because of
multi-locations of the XaaS user, the cloud
service provider and the cloud owner in the
cloud computing ecosystem. Requesting,
processing and storing of data usually done in
different places of inside or outside countries
(Vahid and Seyed, 2012).
Multi-location of the private data: If business Using mirage image management system: The
stores private data or confidential data in the issues related to secure virtual-machine images
third party’s device, then it is vulnerable, management that encapsulate each application of
because the business’s private data are present the cloud are addressed by this system. This
in someone else’s computer, and in someone system has three major components, such as
else’s facility. Then, much stuff goes wrong. image maintenance, access control, and image
1 CSPs may force to go away from business transformation by running filters has been
proposed (Vahid and Seyed, 2012).
2 CSPs may decide to block the data if there
is a dispute
3 It is rather difficult for a company to know
where its data will be hosted.
Note: ----------: not applicable.
Table 6 Security issues related to networks

Network security issues (Khan et al., 2012) Countermeasures


SQL injection attacks: A standard SQL code SQL injection attacks: To check the SQL
is made malicious by injecting malicious injection attacks filtering techniques etc. can be
code. Consequently the attackers are able to used to sanitise the user input. A proxy-based
access sensitive information and gain architecture can be used to prevent SQL
unauthorised access to a database. injection attacks which dynamically detects and
extracts user’s inputs for suspected SQL control
sequences has been proposed (Liu et al., 2009).
Cross site scripting (XSS) attacks: Injecting Cross site scripting (XSS) attacks: Various
malicious scripts into web is done through techniques such as web application vulnerability
these attacks. This is achieved through two detection technology, active content filtering,
methods such as stored XSS and reflected content-based data leakage prevention
XSS. In case of stored XSS, resources technology, has been proposed to prevent
managed by the web application stores the XSS attacks (Kevin, 2009). These techniques
attack script permanently. In case of a implement a variety of methodologies to identify
Reflected XSS, the attack is reflected back to and fix security flaws. A blueprint-based
the user immediately and it is not permanently approach reduces the dependency on web
stored (Vahid and Seyed, 2012a). browsers towards identifying not trusted content
over the network (Ter and Venkatakrishnan,
2009).
Cloud computing review: concepts, technology, challenges and security 49

Table 6 Security issues related to networks (continued)

Network security issues Countermeasures


Man in middle attacks (MITM): Here an Man in the middle attacks: Various tools
attacker/entity tries to interrupt by injecting implementing strong encryption technologies
fake information and to have awareness of the such as Airjack, Ettercap, Dsniff, Cain, Wsniff,
significant data transferred in an enduring etc. has been developed to provide protect
conversation between a sender and a receiver. against them. A few of them are separate
endpoint and server security processes,
evaluating software as a service security;
evaluating virtualisation at the end-point has
been proposed to tackle with this attack (Neha
and Chetan, 2015). In all cases, the security
practices employed in the organisation’s private
network and private cloud. However, in case of a
public cloud implementation, network topology
need to be modified to implement the security
features (Pearson, 2009).
Google hacking: Google App engine is one of To avoid these threats, an application security
the well-known solution providers in the should be evaluated at the various levels of the
scope of cloud computing. Google three service delivery models in cloud such as
geo-distributed architecture is used here as a IaaS, PaaS and SaaS. In an IaaS, security
distributed architecture. In Google hacking policies applied by the customer and the
attack, loophole of all the possible systems are application’s management are mostly not
searched by the hacker, once he finds out concerned by cloud providers. The following
those systems having loopholes then he measures should be taken care of while
wishes to hack those systems. designing the application in PaaS and SaaS:
Common vulnerabilities associated with the web
must be safeguarded by implementing standard
security measures.
Traditional implementation of authorisation and
authentication techniques should be tested
properly before implementation. To avoid data
recovery issues in case of a sudden attack back
up policies such as continuous data protection
(CDP) should be implemented (Zhou et al.,
2010).
Sniffer attacks: Applications initiate this Sniffer attacks: Address resolution protocol
which can capture packets streaming in a (ARP) and round trip time (RTT) can be
transmission media of the network. Recording implemented in malicious sniffing detection
of the traffic/data linked to other systems on platform to discover a sniffing system running
the network through the network interface on a network has been proposed (Zouheir et al.,
card (NIC) can be done with the help of 2004).
sniffer program.
Cookie poisoning: An unauthorised access to Cookie poisoning: Avoidance of cookie
a webpage or to an application modifications poisoning has described in Vieira et al. (2010).
are made to the contents of cookie. Cookies This can be avoided by cleaning cookie regularly
basically contain the user’s identity related or implementing an encryption method for the
credentials and once these cookies are cookie data.
accessible, the content of these cookies can be
forged to imitate an authorised user.
50 M.N. Birje et al.

Table 6 Security issues related to networks (continued)

Network security issues Countermeasures


Reused IP addresses: In this case, when a Using client-based privacy manager: This helps
meticulous user/customer moves away from have more privacy of the sensitive data and to
network coverage, then the IP-address reduce the risk of data leakage and provides
assigned earlier to him is allocated to a new additional privacy related benefits processing in
user/customer. Occasionally even though the the cloud. The important features of the privacy
old IP address is being assigned to a new user manager are:
still there are possibilities of fetching the data 1 Obfuscation, which automatically complicates
by some other user is significant because the some or all of the fields in a data structure
address still present in the DNS cache and the before it is sent off.
data belonging to a particular user may
become accessible to some other user 2 Preference setting this is a method for
breaching the privacy of the earlier user. permitting users to set their preferences about
the switching of personal data.
3 Data access this is a module that permits
users to access personal information in the
cloud, in order to see what is being held about
them, and to check its accuracy.
4 Feedback module is used for managing and
displaying feedback to the user regarding
usage of his personal information, personae
that allow the user to choose between
multiple personae when interacting with
cloud services has been proposed
(Abdul et al., 2012).
Security concerns with the hypervisor: Security concerns with the hypervisor: Hacker
Virtualisation is main backbone of cloud can do changes to any of the guest operating
computing. In a virtualised environment, systems and get a hold on all the data passing
hypervisor is a controller known as virtual through the hypervisor if a hacker is able to get
machine manager (VMM) which allows hold on the hypervisor then it harms cloud
running of multiple operating systems ecosystem which is discussed in Cloud Security
simultaneously on a system. Since number of Alliance (2013). Based on the understanding of
operating systems would be running on a behaviour of different devices in the hypervisor
solitary hardware platform thus it is architecture, an advanced cloud protections
impossible to monitor all such systems and system can be developed to monitor the activities
hence it is difficult to maintain the security of of the guest virtual machines (VMs) and
the operating systems (Liu et al., 2009). inter-communication between the various
infrastructure components (Flavio and Roberto,
2011; Wu et al., 2010).
Denial of service attacks: A DoS attack is an Denial of service attacks: Use of an intrusion
effort to make unavailability of services detection system (IDS) is popular method of
assigned to the authorised users. In this attack, protection against these attacks (Vieira et al.,
a large number of requests are flooded to 2010). A defence federation is used for guarding
service which is been provided by the server against such attacks (Ruiping and Kin, 2011).
hence the service turn out to be unavailable to Every cloud is loaded with separate IDS.
the authorised user. Information exchange is the basis for working
different intrusion detection systems. The whole
system is made alerted in case a particular cloud
attacked by the cooperative IDS. A decision on
trustworthiness of a cloud is taken by voting, and
sees to it that the overall system performance is
not hindered.
Cloud computing review: concepts, technology, challenges and security 51

Table 6 Security issues related to networks (continued)

Network security issues Countermeasures


Distributed denial of service attacks: DDoS is A group-based logic for protecting against the
an advanced adaptation of DoS, this attack is DDoS attack (Gellman, 2009). IDS in the virtual
achieved by flooding the destination severs machine is used to protect the cloud from DDoS
with huge numbers of packets such that the attacks (Aman and Yogesh, 2010). A SNORT
target server is not able to handle it. This is like intrusion detection mechanism is
done to deny the important services running implemented onto the virtual machine for
on a server. In this attack it is spread from sniffing all traffics, either incoming, or outgoing.
different dynamic networks which have Another method used to guard against DDoS is
already been compromised unlike the DoS to implement intrusion detection systems on all
attack. the physical machines which have the user’s
virtual machines (Claudio et al., 2010). This
technique had been illustrated in Nurmi et al.
(2009) to perform reasonably well in a
Eucalyptus cloud.
CAPTCHA splitting/breaking: Recently, it has CAPTCHA breaking: By integrating various
been noticed that the spammers are able to authentication techniques along with CAPTCHA
split the CAPTCHA, according to information identification which are adopted by companies
provided by the Hotmail and Gmail service such as Facebook, Google etc., would be a
providers (Jenni, 2007). By making use of the suitable option against CAPTCHA splitting.
audio system spammers are able to read the Various techniques such as expanding the string
CAPTCHA characters. length and using a variation in the background
implementing letter overlap, variable fonts of the
letters used to design a CAPTCHA, can be used
to avoid CAPTCHA breaking (John, 2009).
Single frame zero knowledge CAPTCHA design
principles are able to resist any attack method of
static optical character recognition (OCR).

Table 7 Security issues related to other challenges

Other common issues (Gordon and Richard,


Countermeasures
2012; Padhy et al., 2011)
Abuse and nefarious use of cloud computing: To confront this threat, one should strict initial
For example, use of botnets to spread malware registration and validation processes. Another
and spam. A public cloud can be infiltrated by effective measure is to use enhanced credit card,
attackers. Attackers discover a way to insert fraud monitoring system, and comprehensive
malware to thousands of computers and use introspection of customer network traffic.
the cloud infrastructure to attack other Another useful step to take is to monitor public
machines. blacklists for one’s own network blocks.
Insecure application programming interface: Confronting insecure application programming
APIs or software interfaces must have interfaces: To deal this threat, one should
extremely secure access control, analyse the security model of cloud provider
authentication, encryption and activity interfaces. Another effective measure is to
monitoring mechanisms – especially when guarantee standard authentication and access
third parties begin to fabricate on them. controls are implemented in concert with
encrypted transmission, and identify the
dependency chain associated with the API.
52 M.N. Birje et al.

Table 7 Security issues related to other challenges (continued)

Other common issues (Gordon and Richard,


Countermeasures
2012; Padhy et al., 2011)
Malicious insiders: People or group of people Confronting malicious insiders: To confront this
wish to insert some unwanted, garbage data threat, one should implement strict supply chain
across the network. management and conduct a supplier assessment
completely. Another effective measure is to
make out necessity of human resource as part of
legal contracts, and required transparency into
overall information security and management
practices, as well as agreement reporting.
Another step is to determine security breach
notification processes.
Traffic hijacking and account service: Traffic DNS attacks: Although using DNS security
hijacking and account service two issues that measures such as Domain Name System
cloud users need to be aware. These threats Security Extensions (DNSSEC) minimises the
range from spam campaigns, to denial-of effects of DNS threats but still there are cases
service attacks and man-in-the-middle attacks, when these security measures are proves to be
to phishing. insufficient then the lane between a sender and a
recipient gets redirected through some malicious
link.
Shared technology vulnerability: IaaS Confronting shared technology vulnerabilities:
provides sharing of infrastructure. To confront this threat, one should implement
Unfortunately, this is not designed for the security best practices for installation/
devices on which this infrastructure is based. configuration. Another effective measure is to
Strong compartmentalisation and monitoring monitor environment for unauthorised
are required to ensure that customers do not changes/activity, and promote strong
line on each other’s ‘territory’. authentication and access control for
administrative access and operations. Other
useful steps are to enforce SLAs for patching
and vulnerability remediation, and to perform
vulnerability scanning and configuration audits.
Data loss/leakage: Data is always in danger Confronting data loss/leakage: To confront this
of being lost or stolen; it may be by deletion threat, one should implement strong API access
without a backup, by illegal access or by control. Another effective measure is to encrypt
loss of the encoding key. This is important and protects data integrity in transit and analyse
concerns for businesses, because they not only data protection at both run time and design.
stand to lose their reputation in the market, but Other good steps are to implement generation of
are also forced by law to keep it safe. strong key, storage and management, and
destruction practices, and contractually before it
are released into the pool demand providers to
clean persistent media. The manager can also
contractually specify provider backup and
preservation strategies.
Regulatory compliance: Traditional service CSPs must ensure the data security in natural
providers are concerned to external audits and man-made disasters. Generally, data is
and security certifications. Customer trust replicated across multiple sites. However, in the
diminishes if CSPs does not stick to these case of any such surplus event, provider must do
security audits. an immediate and complete restoration.
Cloud computing review: concepts, technology, challenges and security 53

4 Conclusions and future directions

This paper reviewed cloud computing paradigm in terms of various perspectives such as
concepts, cloud platforms, tools, and challenges. The history of cloud computing
evolution is presented in Sub-section 2.1. Three service models (SaaS, PaaS and IaaS)
and four deployment models (private, public, hybrid and community cloud) are described
in Sub-section 2.2. Description of cloud platforms by different CSPs (Amazon, IBM,
Microsoft, Google) are discussed in Sub-section 2.3; it also discussed open source tools
(Open Nebula, Apache CloudStack, Nimbus and Eucalyptus) and commercial tools
(RightScale, Gravitant, VMTurbo and Scalr). Various general challenges of cloud
computing and the number of difficulties involved in those challenges are identified and
the possible solutions are presented in Sub-section 2.4. These solutions would help the
researchers to have proper directions for future research and to get into the efficient
implementation of the techniques. Security objectives and security issues related to
the location of data centres, network and other common issues are discussed in
Sub-sections 3.1 and 3.2 respectively. There is a need of designing efficient solutions
to address security issues such as data transfer across gateway, long-term viability,
compromised services, regulatory compliance, virtualisation in cloud computing
paradigm.
We believe this paper helps researchers who would like to begin their research career
in the area of cloud computing.

References
Abdul, W.K. et al. (2012) ‘A literature survey on data privacy/protection issues and challenges in
cloud computing’, IOSR Journal of Computer Engineering (IOSRJCE), Vol. 1, No. 3,
pp.28–36.
Alexander, Z. (2009) ‘Google App Engine’, Seminar on Internetworking, from Google website,
[online] http://www.cse.hut.fi/en/publications/B/5/papers/1Zahariev_final.pdf (accessed 21
January 2014).
Aman, B. and Yogesh, B.D. (2010) ‘Securing cloud from DDoS attacks using intrusion
detection system in virtual machine’, Proceeding of the Second International Conference on
Communication Software and Networks (ICCSN’10), pp.260–264.
Apache Cloud Stack (2015) World Wide Web Consortium [online] https://www.cloudstack.apache.
org/docs/ (accessed 23 January 2014).
Arshad, J., Townend, P. and Xu, J. (2009) ‘Quantification of security for compute intensive
workloads in clouds’, 15th International Conference on Parallel and Distributed Systems,
School of Computation, pp.478–486.
Bala, P.P. and Girish, P. (2012) Windows Azure – The Cloud Computing Platform, White Paper,
Tata Consultancy Services.
Bashe, C.J. (1986) IBM’s Early Computers, MIT Press Series in the History of Computing,
MIT Press, Cambridge, Mass [online] http://mitprss.mit.edu/books/ibms-early-c
(accessed November 19 2014).
Bennett, K., Layzell, P., Budgen, D. et al. (2000) ‘Service-based software: the future for flexible
software’, Seventh Asia-Pacific Software Engineering Conference (APSEC), Singapore.
Bernsmed, K. et al. (2012) ‘Thunder in the clouds: security challenges and solutions for federated
clouds’, 4th IEEE International Conference on Cloud Computing Technology and Science
Proceedings.
54 M.N. Birje et al.

Bhaskar, P., Rimal, E.C. and Ian, L. (2009) ‘A taxonomy and survey of cloud computing systems’,
Fifth International Joint Conference on INC, IMS and IDC, 978-0-7695-3769-6/.
Brian, A. (2013) RightScale Grid: Grid Computing Applications in the Cloud, Technical White
Paper, RightScale, Inc.
Castro, D. (2013) How Much Will PRISM Cost the U.S Cloud Computing Industry?, August 2013
[online] http://www2.itif.org/2013-cloud-computing-costs.pdf (accessed 21 January 2015).
Charlie, K. and Ramanathan, V. (2010) Windows Azure™ Security Overview, White technical
paper [online] http://www.research.ijcaonline.org/volume98/number1/pxc3897184.pdf
(accessed 12 March 2015).
Chen, Y., Paxson, V. and Katz, R.H. (2010) What’s New About Cloud Computing Security [online]
http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html (accessed 14 March
2015).
Claudio, M., Roberto, B. and Roberto, C. (2010) ‘Integrating a network IDS into an open source
cloud computing environment’, Sixth International Conference on Information Assurance and
Security, USA, pp.265–270.
Cloud Security Alliance (2013) Security Guidance for Critical Areas of Focus in Cloud Computing
V3.0 [online] https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf (accessed 15
August 2014).
Daniel, N. and Rich, W. (2009) ‘Eucalyptus: an open source cloud computing infrastructure’, 9th
IEEE/ACM International symposium on Cluster Computing and the Grid.
David, C. et al. (2010) Introducing the Azure Services Platform, Sponsored by Microsoft
Corporation [online] http://www.ijcsit.com/docs/Volume%202/vol2issue2/ijcsit2011020205.
pdf (accessed 15 March 2015).
Descher, M., Masser, P., Feilhauer, T., Tjoa, A.M. and Huemer, D. (2009) ‘Retaining data control
to the client in infrastructure cloud’, International Conference on Availability, Reliability and
Security, pp.9–16, Dornbirn.
Dong, X. and Hui, L. (2010) ‘Reviewing some cloud computing platforms’, Proc. of Second
International Symposium on Networking and Network Security (ISNNS ‘10), Jinggangshan,
China.
Edwards, J.D. (2012) Choosing a Deployment Strategy that Fits, Oracle White Paper, Oracle JD
Edwards Cloud Computing.
Ennajjar, I., Tabbi, Y. and Benkadour, A. (2014) ‘Security in cloud computing approaches and
solutions’, 2014 Third IEEE International Colloquium in Information Science and Technology
(CIST), Tetouan.
Eucalyptus (2015) World Wide Web Consortium [online] http://www.eucalyptus.com/reference-
architecture/ (accessed 23 January 2015).
Finch, C. (2006) The Benefits of the Software-as-a-Service Model, Computer World Management
[online] http://www.computerworld.com/s/article/107276/The_Benefits_of_the_Software_as_
a_Service_Model (accessed 17 March 2015).
Flavio, L. and Roberto, D.P. (2011) ‘Secure virtualization for cloud computing’, Journal of
Network and Computer Applications, Vol. 34, No. 4, pp.1113–1122, Academic Press Ltd.,
London, UK.
Freiberger, P. and Michael, S. (2000) Fire in the Valley: The Making of the Personal Computer,
2nd ed., McGraw-Hill, New York.
Gellman, R. (2009) Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud
Computing [online] http://www.worldprivacyforum.org/.../wprivacyforum/.../WPF_Cloud_
Privacy (accessed 12 April 2015).
Gordon, R. and Richard, M. (2012) ‘Security issues of a publicly accessible cloud computing
infrastructure’, 2012 IEEE 11th International Conference on Trust, Security and Privacy in
Cloud Computing and Communications, Liverpool.
Cloud computing review: concepts, technology, challenges and security 55

Gravitant (2014) ‘The power to transform’, Transformational Cloud Services Brokage and
Management Empowering Enterprises to Optimize Cloud Consumption [online]
http://www.gravitant.com/hybrid-it-cloud-service-broker/.
Gundeep, S.B., Prashantkumar, S., Krishen, K.K. and Seema, K. (2012) ‘Cloud security: analysis
and risk management of VM images’, Proceeding of the IEEE International Conference on
Information and Automation Shenyang, China.
Gurudatt, K., Nikita, C., Ruchitra, C., Rani, W. and Rajnikant, P. (2012) ‘Cloud security
challenges’, 7th International Conference on Telecommunication Systems, Services, and
Applications [TSSA], 978-1-4673-4550-7/12/2012 IEEE.
IBM Introduces Ready-to-Use Cloud Computing (2014) [online]
http://phys.org/news114365558.html (accessed 23 November 2014).
Jenni, S.R. (2009) ‘A survey on virtual machine security’, Seminar of Network Security, Helsinki
University of Technology.
Jensen, M., Schwenk, J. and Gruschka, N.I. (2009) ‘On technical security issues in cloud’, IEEE
International Conference on Cloud Computing, Germany, pp.109–116.
Ji, H.K. (2009) ‘A Benchmark of transparent data encryption for migration of web application
in cloud’, Eighth IEEE International Conference on Dependable, Autonomic and Secure
Computing, Chengdu, pp.735–740.
Jinesh, V. (2011) Architecting for the Cloud: Best Practices, White paper, Amazon Web Service
[online] https://aws.amazon.com/blogs/aws/new-whitepaper-architecture-for-the-cloud-best-
practices/.
Joel, G., Darren, E., Robin, R. and Qing, T. (2012) ‘Benefits and challenges of three cloud
computing service models’, 2012 Fourth International Conference on Computational Aspects
of Social Networks [CASoN], 978-1-4673-4794-5/12/2012 IEEE.
John, E.D. (2009) Spammers Break Hotmail’s CAPTCHA Yet Again, Tech-world.
John, H., Lorti, M.K. and Bruce, P. (2009) Data Security in the World of Cloud Computing,
IEEE Security & Privacy, Co-published by the IEEE Computer and Reliability Societies,
Vol. 7, No. 4, pp.61–64.
Kevin, J. (2009) Secure Cloud Computing: An Architecture Ontology Approach [online]
http://sunset.usc.edu/gsaw/gsaw2009/s12b/jackson.pdf (accessed 12 February 2015).
Khan, A.W. et al. (2012) ‘A literature survey on data privacy protection issues and challenges in
cloud computing’, IOSR Journal of Computer Engineering (IOSRJCE), Vol. 1, No. 5, ISSN:
2278-0661.
Liu, A., Yuan, T. and Stavrou, A. (2009) SQLProb: A Proxybased Architecture towards Preventing
SQL Injection Attacks, 8–12 March, SAC, Honolulu, Hawaii, USA.
Ma, X. (2012) ‘Security concerns in cloud computing’, Fourth International Conference on
Computational and Information Science.
Macquarir University (2008) Guide to Implementation of Assessment Policies, September [online]
https://staff.mq.edu.au/public/download/?id=40234 (accessed 10 April 2015).
Martijn, Z. (2012) How to Optimize the Usability of Cloud Computing, Without Losing Control?,
Dutch Cloud B.V., Netherlands.
National Institute of Standards and Technology (NIST) (2014) Computer Security Resource Center
[online] http://www.csrc.nist.gov [online] (accessed 15 July 2014).
Neha, K. and Kumar, C. (2015) ‘Security in cloud: attacks & prevention techniques’, International
Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 5, No. 1, pp.85–88.
Nimbus (2015) World Wide Web Consortium [online] http://www.nimbusproject.org/ (accessed
23 January 2015).
Nurmi, D., Wolski, R., Grzegorczyk, C., Obertelli, G., Soman, S., Youseff, L. and Zagorodnov, D.
(2009) ‘The Eucalyptus open-source cloud-computing system’, Proceedings of the 9th
IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID ‘09),
pp.124–131.
56 M.N. Birje et al.

Open Nebula (2015) World Wide Web Consortium [online] https://www.opennebula.org/about/


(accessed 23 January 2015).
Padhy, R.P., Patra, M.R. and Satapathy, S.C. (2011) ‘Cloud computing: security issues and
research challenges’, IRACST – International Journal of Computer Science and Information
Technology & Security (IJCSITS), Vol. 1, No. 2, pp.136–146.
Pearson, S. (2009) ‘Taking account of privacy when designing cloud computing services’, Software
Engineering Challenges of Cloud Computing, pp.44–52, Vancouver, BC.
Pol, M.A. (2009) Terena – IBM Cloud Computing, IBM Emerging Business Incubation Center
Dublin, Ireland.
Rajkumar, B., James, B. and Andrzej, G. (2011) Cloud Computing Principles and Paradigms, John
Wiley & Sons, Inc. Publications, Indian edition.
Rajnish, C. (2011) ‘A survey on cloud computing security, challenges and threats’, International
Journal on Computer Science and Engineering [IJCSE], Vol. 3, No. 3, pp.1227–1231, ISSN:
0975-3397.
Rameshwari, M. (2013) ‘Security on cloud computing: a review’, International Journal of Science
and Research (IJSR), Vol. 4, No. 4, pp.1722–1729.
Rittinghouse, J. and Ransome, J. (2010) Cloud Computing: Implementation, Management and
Security, CRC Press, Taylor & Francis Group, Boca Raton.
Rizwana, S. and Sasikumar, M. (2012) ‘Security issues in cloud computing: a survey’,
International Journal of Computer Applications, Vol. 44, No. 19, pp.4–10.
Ruiping, L. and Kin, C.Y. (2011) ‘Mitigating DDoS attacks with transparent and intelligent
fast-flux swarm network’, IEEE Network, Vol. 25, No. 4, pp.28–33.
Scalr (2012) Reconciling Cloud and Security, White Paper [online] http://www.scalr.com/lp2/
white-paper/reconciling_cloud_and_security (accessed 15 January 2015).
Sonali, R.C. (2014) ‘Network security issues in cloud computing’, International Journal of Pure
and Applied Research in Engineering and Technology, Vol. 2, No. 9, pp.761–768.
Subashini, S. and Kavita, J. (2011) ‘A survey on security issues in service delivery models of cloud
computing’, Journal of Network and Computer Applications, Vol. 34, No. 1, pp.268–274.
Suruchee, V.N. and Raut, A.B. (2014) ‘A comprehensive study on cloud computing’, International
Journal of Computer Science and Mobile Computing, Vol. 3, No. 4, pp.733–738.
Takabi, H., Joshi, J.B.D. and Ahn, G-J. (2010) Security and Privacy Challenges in Cloud
Computing Environment, IEEE Computer and Reliability Societies, Vol. 8, No. 6, pp.24–31.
Ter, L. and Venkatakrishnan, V.N. (2009) ‘BluePrint: robust prevention of cross-site scripting
attacks for existing browsers’, 30th IEEE Symposium on Security and Privacy, pp.331–346.
Tim, B.L. (1989) ‘Information management: a proposal’, World Wide Web Consortium [online]
http://www.w3.org/History/1989/proposal.html (accessed 12 January 2015).
Tsai, W.T., Sun, X. and Balasooriya, J. (2010) ‘Service-oriented cloud computing architecture’,
Seventh International Conference on Information Technology, 978-0-7695-3984-3/10/2010
IEEE.
Vahid, A. and Seyed, R.T. (2012) ‘Security threats and countermeasures in cloud computing’,
International Journal of Application or Innovation in Engineering & Management (IJAIEM),
Vol. 1, No. 2, pp.206–215.
Vieira, K., Schulter, A., Westphall, C.B. and Westphall, C.M. (2010) ‘Intrusion detection
techniques for grid and cloud computing environment’, IT Professional, Vol. 12, No. 4,
pp.38–43, IEEE Computer Society.
VMTurbo (2015) [online] https://ww.vmturbo.com (accessed 26 March 2015).
William, S. (2010) ‘Cryptography and network security’, Principles and Practice, 5th ed., Pearson
Publication, Indian edition.
Wu, H., Ding, Y., Winer, C. and Yao, L. (2010) ‘Network security for virtual machines in
cloud computing’, 5th Intel Conference on Computer Sciences and Convergence Information
Technology, pp.18–21, Seoul.
Cloud computing review: concepts, technology, challenges and security 57

Xiao, Z. and Xiao, Y. (2012) ‘Security and privacy in cloud computing’, IEEE Communications
Surveys & Tutorials, accepted for publication.
Yashpalsinh, J. and Kirit, M. (2012) ‘Cloud computing – concepts, architecture and challenges’,
2012 International Conference on Computing, Electronics and Electrical Technologies
[ICCEET], 978-1-4673-0210-4/12/2012.
Zhang, S., Chen, X., Zhang, S. and Huo, X. (2010) ‘Cloud computing research and development
trend’, Second International Conference on Future Networks, (ICFN 2010).
Zhou, M., Zhang, R., Xie, W., Qian, W. and Zhou, A. (2010) ‘Security and privacy in cloud
computing: a survey’, Sixth International Conference on Semantics Knowledge and Grid
(SKG), p.105.
Zouheir, T., Hamza, R., Kamel, K. and Mounir, F. (2004) ‘Malicious sniffing system detection
platform’, Proceedings of the International Symposium on Applications and the Internet
(SAINT’04), pp.201–207.

You might also like