Abstract
Computing is a new computing paradigm that enables firms to do this without making a huge initial investment. Despite the potential advantages of cloud technology, modeling security remains a worry, limiting cloud model adoption. Additional factors such as prototype model, multi-tenancy, adaptability, and the tiered dependency stacking have been introduced to the problem scope beneath the cloud model, increasing the complexity of the security threat. In this work, we examine the cloud security challenge in depth. We investigated the issue from the standpoint of a cloud system, cloud service delivery models, computing stakeholders, and cloud stakeholders.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mell, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards and Technology. Information Technology Laboratory, Version, 15(10.07) (2009)
Gens, F., Mahowald, R.P., Richard, L.: Villars. 2009. IDC Cloud Computing 2010 (2010)
Almorsy, M., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107 (2016)
Enisa, C.C.: Benefits, risks and recommendations for information security. Eur. Netw. Inform. Secur. 23, 1–6 (2009)
Stavinoha, K.E.: What is Cloud Computing and Why Do We Need It (2010). Retrieved 18 Sep 2015
Kandukuri, B.R., Rakshit, A.: Cloud security issues. In: 2009 IEEE International Conference on Services Computing, pp. 517–520. IEEE (2009)
Popović, K., Hocenski, Ž.: Cloud computing security issues and challenges. In: The 33rd International Convention Mipro, pp. 344–349. IEEE (2010)
Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: 2009 IEEE International Conference on Cloud Computing, pp. 109–116. IEEE (2009)
Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50–57 (2010)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security, pp. 199–212 (2009)
Zhang, W., et al.: A comprehensive study of co-residence threat in multi-tenant public PaaS clouds. In: Lam, K.-Y., Chi, C.-H., Qing, S. (eds.) ICICS 2016. LNCS, vol. 9977, pp. 361–375. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-50011-9_28
Tajadod, G., Batten, L., Govinda, K.: Microsoft and Amazon: a comparison of approaches to cloud security. In: 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp. 539–544. IEEE (2012)
Holstein, D.K., Stouffer, K.: Trust but verify critical infrastructure cyber security solutions. In: 2010 43rd Hawaii International Conference on System Sciences, pp. 1–8. IEEE (2010)
Zhang, W.: Integrated security framework for secure web services. In: 2010 Third International Symposium on Intelligent Information Technology and Security Informatics, pp. 178–183. IEEE (2010)
Bin, W., Yuan, H.H., Xi, L.X., Min, X.J.: Open identity management framework for SaaS ecosystem. In: 2009 IEEE International Conference on e-Business Engineering, pp. 512–517. IEEE (2009)
Fong, E., Okun, V.: Web application scanners: definitions and functions. In: 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07), pp. 280b–280b. IEEE (2007)
Vaibhav, A., Shukla, D., Das, S., Sahana, S., Johri, P.: Security challenges, authentication, application and trust models for vehicular ad hoc network-a survey. IJ Wireless Microw. Technol. 3, 36–48 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Maheshwari, V., Sahana, S., Das, S., Das, I., Ghosh, A. (2023). Factors Influencing Security Issues in Cloud Computing. In: Shaw, R.N., Paprzycki, M., Ghosh, A. (eds) Advanced Communication and Intelligent Systems. ICACIS 2022. Communications in Computer and Information Science, vol 1749. Springer, Cham. https://doi.org/10.1007/978-3-031-25088-0_31
Download citation
DOI: https://doi.org/10.1007/978-3-031-25088-0_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-25087-3
Online ISBN: 978-3-031-25088-0
eBook Packages: Computer ScienceComputer Science (R0)