Abstract
Cloud Computing is continuously evolving and showing consistent growth in the field of computing. It is getting popularity by providing different computing services as cloud storage, cloud hosting, and cloud servers etc. for different types of industries as well as in academics. On the other side there are lots of issues related to the cloud security and privacy. Security is still critical challenge in the cloud computing paradigm. These challenges include user’s secret data loss, data leakage and disclosing of the personal data privacy. Considering the security and privacy within the cloud there are various threats to the user’s sensitive data on cloud storage. This paper is survey on the security and privacy issues and available solutions. Also present different opportunities in security and privacy in cloud environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Mell, P., Grance, T.: The NIST Definition of Cloud Computing. National Institute of Standards and Technology, Information Technology Laboratory (2011), http://csrc.nist.gov/groups/SNS/cloud-computing/
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1), 1–11 (2011)
Top Threats to the Cloud Computing V1.0, Cloud Security Alliance, http://www.cloudsecurityalliance.org/topthreats/2010
Babu, J., Kishore, K., Kumar, K.E.: Migration from Single to Multi-Cloud Computing. International Journal of Engg. Research and Tech. 2(4) (April 2013)
Chandran, S., Angepat, M.: CloudComputing: Analyzing the Risk involved in Cloud Computing Environment (2011)
Munir, K., Palaniappan, S.: Security threats/attacks present in cloud environment. IJCSNS 12(12) (2012)
Munir, K., Palaniappan, S.: Secure Cloud Architecture. ACIJ 4(1) (2013)
Sravani, K., Nivedita, K.L.A.: Effective service security schemes in cloud computing. IJCER 3(3)
Chen, D., Zhao, H.: Data Security and Privacy Protection Issues in Cloud Computing. In: IEEE International Conference on Computer Science and Electronics Engineering (2012)
Behl, A.: Emerging Security Challenges in Cloud Computing. In: IEEE International Conference Information and Communication Technologies, WICT (2011)
Mahmood, Z.: Data Location and Security Issues in Cloud Computing. In: IEEE International Conference on Emerging intelligent Data and Web Technologies (2011)
Attas, D., Batrafi, O.: Efficient integrity checking technique fro securing client data in cloud computing. IJECS-IJENS 11(5) (2011)
Arockiam, L., Parthasarathy, et al.: Privacy in Cloud Computing: Survey. CS&IT (2012)
Hashizume, K., et al.: An analysis of security issues for cloud computing. Journal of Internet Services and Applications, A Springer Open Journal, 1–13 (2013)
Sharma, P., Sood, S.K., Kaur, S.: Security Issues in Cloud Computing. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds.) HPAGC 2011. CCIS, vol. 169, pp. 36–45. Springer, Heidelberg (2011)
Popovic, K., Hocenski, Z.: Cloud Computing security issues and challenges. In: MIPRO, Proceedings of the 33rd International Convention (2010)
Siani, Miranda: Security Threats in cloud computing. In: 6th International Conference on Internet Technologies and Secure Transactions (2011)
Miranda, M., Pearson, S.: A Client-based Privacy Manager for cloud Computing. In: Proceeding of the Fourth International ICST Conference on Comm. and Middleware, COMSWARE 2009 (2009)
Wang, J., Zhao, Y., et al.: Providing Privacy preserving in cloud computing. In: International Conference on Test and Measurement, vol. 2, pp. 213–216 (2009)
Gentry, C.: Fully Homomorphic encryption using ideal lattices. In: STOC, pp. 169–178 (2009)
Squicciarini, A., Sundareswaran, S., Lin, D.: Preventing Information Leakage from Indexing in the Cloud. In: 2010 IEEE 3rd International Conference on Cloud Computing, pp. 188–195 (2010)
Wang, Q., Wang, C., et al.: Enabling public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE (2010)
Mishra, R., Dash, S., Mishra, D.: Privacy preserving Repository for securing data across the Cloud. IEEE (2011)
Greveler, U., Justus, B., et al.: A Privacy Preserving System for Cloud Computing. In: 11th IEEE International Conference on Computer and Information Technology, pp. 648–653 (2011)
Zhou, M., Mu, Y., et al.: Privacy-Preserved Access Control for Cloud Computing. In: International Joint Conference of IEEE TrustCom 2011/IEEE ICESS 2011/FCST 2011, pp. 83–90 (2011)
Singh, J., Kumar, B., Khatri, A.: Securing the Storage Data using RC5 Algorithm. Internatinal Journal of Advanced Computer Research 2(4(6)) (2012)
Stolfo, S.J., Salem, M.B., Keromytis, A.D.: Fog Computing: Mitigating Insider Data Theft Attacks in Cloud. In: IEEE CS Security and Privacy Workshop (2012)
Brun, Y., Medvidovic, N.: Keeping Data Private While Computing in Cloud. In: IEEE Fifth International Conference on Cloud Computing (2012)
Gampala, V., Inuganti, S., Muppidi, S.: Data Security in Cloud Computing using Elliptic Curve Cryptography. International Journal of Soft Computing and Engg 2(3) (July 2012)
Wang, C., Wang, Q., et al.: Privacy-Preserving Public Auditing for Storage Security in Cloud Computing. In: Proceedings of the IEEE INFOCOM 2010 (2010)
Wang, C., Chow, S., et al.: Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Transactions on Computers 62(2), 362–375 (2013)
Li, X., He, J., Zhang, T.: A Service Oriented Identity Authentication Privacy Protection Method in Cloud computing. International Journal of Grid and Distributed Computing 6(1) (February 2013)
IDC, It cloud services user survey, pt.2: Top benefits & challenges (2008), http://blogs.idc.com/ie/?p=210
Bohli, J.M., Gruschka, N., Jensen, M., Iacono, L.L., Marnau, N.: Security and Privacy-Enhancing Multi-cloud Architectures. IEEE Transactions on Dependable and Secure Computing 10(4) (July/August 2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Shankarwar, M.U., Pawar, A.V. (2015). Security and Privacy in Cloud Computing: A Survey. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-12012-6_1
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12011-9
Online ISBN: 978-3-319-12012-6
eBook Packages: EngineeringEngineering (R0)