A Simplified Review on Cloud Computing Security Vulnerabilities

Volume: 10 | Issue: 02 | Year 2024 | Subscription
International Journal of Distributed Computing and Technology
Received Date: 09/07/2024
Acceptance Date: 09/15/2024
Published On: 2024-11-13
First Page: 26
Last Page: 34

Journal Menu

By: Rajesh Yadav

Abstract

Cloud computing is the joint source of the computer system resources that are verily configured as well as the high-level services that can be delivered via the internet with minimal effort of the respective administrator. However, these advantages along with the security concerns are also quite prevalent. It is very important for the customers to know the risks and vulnerabilities in cloud services that might exist while considering counter measures before moving storage, applications, and computing to the cloud. In the cloud, the development of risks comes together with the source of the vulnerabilities and the most effective measures which should then be spread through restricting in-cloud reinforcement steps. This review paper talks about the vulnerabilities that are likely to creep in and the measures to combat them. Also, it suggests a list of preventive measures that can be taken by focusing on each hazard. The paper also discusses various types of clouds – private, public and hybrid cloud and services like SaaS, IaaS and PaaS that are provided by the cloud. A tabular representation of vulnerabilities and problems associated with it gives an easy understanding to user and helps them to decide what measures can be taken for prevention and safety.

Keywords: Cloud computing, security vulnerabilities, cloud service provider, Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), security systems

Loading

Citation:

How to cite this article: Rajesh Yadav, A Simplified Review on Cloud Computing Security Vulnerabilities. International Journal of Distributed Computing and Technology. 2024; 10(02): 26-34p.

How to cite this URL: Rajesh Yadav, A Simplified Review on Cloud Computing Security Vulnerabilities. International Journal of Distributed Computing and Technology. 2024; 10(02): 26-34p. Available from:https://journalspub.com/publication/ijdct/article=11911

Refrences:

  1. Ma X. Security concerns in cloud computing. In2012 Fourth International Conference on Computational and Information Sciences 2012 Aug 17 (pp. 1069–1072). IEEE.
  2. Bharti J, Singh S. A Review on Security Vulnerabilities in Cloud Computing. In: International Conference on Data, Engineering and Applications; 2022 Dec 23; pp. 229–47. Singapore: Springer Nature.
  3. Grover J, Sharma M. Cloud computing and its security issues-A review. In: 2012 Fourth International Conference on Computational and Information Sciences; 2012 Aug 17; pp. 1069–72. IEEE.
  4. Cafaro M, Aloisio G. Grids, clouds, and virtualization. London: Springer; 2011.
  5. Rittinghouse JW, Ransome JF. Cloud computing: implementation, management, and security. CRC press; 2017 Mar 27.
  6. Bernsmed K, Jaatun MG, Meland PH, Undheim A. Thunder in the clouds: Security challenges and solutions for federated clouds. In: 4th IEEE International Conference on Cloud Computing Technology and Science; 2012 Dec;p.113–20. IEEE.
  7. Dar AR, Ravindran D. A comprehensive study on cloud computing paradigm. Int J Adv Res Sci Eng. 2018;7(4):235–42.
  8. Singh N, Jangra A. Challenges and prosperity research in cloud computing. Int J Comput Trends Technol. 2017;49(4):200–5.
  9. Saad M, Khormali A, Mohaisen A. End-to-end analysis of in-browser cryptojacking. arXiv preprint arXiv:1809.02152. 2018 Sep.
  10. Chou TS. Security threats on cloud computing vulnerabilities. Int J Comput Sci Inf Technol. 2013 Jun 1;5(3):79.
  11. Grobauer B, Walloschek T, Stocker E. Understanding cloud computing vulnerabilities. IEEE Secur priv. 2010 Jun 17;9(2):50–7.
  12. Yan Q, Yu FR, Gong Q, Li J. Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Commun Surv Tutor. 2015 Oct 5;18(1):602–22.
  13. Fernandes DA, Soares LF, Gomes JV, Freire MM, Inácio PR. Security issues in cloud environments: a survey. Int J Inf Secur.. 2014 Apr;13:113–70.
  14. AlZain MA, Pardede E, Soh B, Thom JA. Cloud computing security: From single to multi-clouds. In: 2012 45th Hawaii International Conference on System Sciences; 2012 Jan 4; pp. 5490–5499. IEEE.
  15. Tabrizchi H, Kuchaki Rafsanjani M. A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput. 2020 Dec;76(12):9493–532.
  16. Perez-Botero D, Szefer J, Lee RB. Characterizing hypervisor vulnerabilities in cloud computing servers. In: Proceedings of the 2013 International Workshop on Security in Cloud Computing; 2013 May 8; pp. 3–10.
  17. Alhaidary M, Rahman SM, Zakariah M, Hossain MS, Alamri A, Haque MS, Gupta BB. Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol. IEEE Access. 2018 Jan;6:6071–81.
  18. Yesilyurt M, Yalman Y. New approach for ensuring cloud computing security: using data hiding methods. Sādhanā. 2016 Nov;41(11):1289–98.
  19. Khalil IM, Khreishah A, Azeem M. Cloud computing security: A survey. Comput. 2014 Feb ;3(1):1–35.
  20. Potey MM, Dhote CA, Sharma DH. Cloud computing-understanding risk, threats, vulnerability and controls: a survey. Int J Comput Appl. 2013 Jan 1;67(3).
  21. Barakat OL, Hashim SJ, Raja Abdullah RS, Ramli AR, Hashim F, Samsudin K, Ab Rahman M. Malware analysis performance enhancement using cloud computing J Comput Virol Hacking Tech. 2014 Feb;10:1–10.
  22. Takabi H, Joshi JB, Ahn GJ. Security and privacy challenges in cloud computing environments. IEEE Secur Priv. 2010 Dec;8(6):24–31.
  23. Chakraborty R, Ramireddy S, Raghu TS, Rao HR. The information assurance practices of cloud computing vendors. IT Prof. 2010 Mar;12(4):29–37.
  24. Musa FA, Sani SM. Security threats and countermeasures in cloud computing. Int Res J Electron Comput Eng. 2016 Dec 15;2(4):22–7.
  25. Singh S, Jeong YS, Park JH. A survey on cloud computing security: Issues, threats, and solutions. J Netw Comput Appl. 2016 Nov 1;75:200–22.
  26. Catteddu D. Cloud Computing: benefits, risks and recommendations for information security. Web Application Security: Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10–11, 2009. Berlin: Springer; 2010.p17.
  27. Sen J. Security and privacy issues in cloud computing. In: Architectures and protocols for secure information technology infrastructures; 2014. p. 1–45. IGI Global. Available from: https://www.igi-global.com/gateway/chapter/78864.
  28. Krishnan R. Security and Privacy in Cloud Computing. 2017. Available from: https://scholarworks.wmich.edu/cgi/viewcontent.cgi?article=1932&context=masters_theses
  29. Jamil D, Zaki H. Security issues in cloud computing and countermeasures. Int J Eng Sci Technol. 2011 Apr;3(4):2672–6.
  30. Zhang Q, Cheng L, Boutaba R. Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl. 2010 May;1:7–18.
  31. Ashraf M, Kamel F. Vendor lock-in in the transition to a cloud computing platform. Degree project in Communication Systems, Second Level; Stockholm, Sweden; 2015. p.1–42.
  32. Paquette S, Jaeger PT, Wilson SC. Identifying the security risks associated with governmental use of cloud computing. Gov Inf Q. 2010 Jul;27(3):245–53.