Open Access Open Access  Restricted Access Subscription or Fee Access

Cloud Computing and Storage Issues

Brijesh Aggarwal

Abstract


This paper talks over security issues for cloud computing & presents a layered framework for secure clouds and then focus on layers, i.e., the storage layer & the data layer. Cloud computing is a set of IT facilities that are as long as to a customer over a network on adhoc basis and with the ability to scale up or down their service requirements. Generally cloud computing services are distributed by a third party provider who owns the groundwork. Its advantages to mention but some include scalability, flexibility, resilience, efficiency & outsourcing noncore actions. This paper will converse secure merged query handing out with map Reduce & Hadoop. Security is one of the key issues which block the development of cloud. Even with the potential advantages achieved from the cloud computing, the organizations are unhurried in accepting it due to security issues and dares associated with it. The idea of handling over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a comprehensive analysis of the cloud computing security issues and tasks focusing continuously on the cloud computing types and the service delivery types. This paper describes our approach to securing the cloud.

Full Text:

PDF

References


Microsoft. Multi-Tenant Data Architecture 2006. 2010 Oct. Available from: http://msdn.microsoft.com/en-us/library/aa479086.aspx

Amazon. Amazon EC2 SLA. 2010 Oct. Available from: http://aws.amazon.com/ec2-sla/

Mell P, Grance T. The NIST Definition of Cloud Computing. USA: National Institute of Standards and Technology; 2009. Available from: http://www.wheresmyserver.co.nz/storage/media/faq-files/cloud-def-v15.pdf (accessed April 2010).

Jensen M, Schwenk J, Gruschka N, et al. On Technical Security Issues in Cloud Computing. Proceedings of the IEEE International Conference on Cloud Computing; 2009 Sep 21–25; Bangalore, India. 109–16p.

Wenjun Z. Integrated Security Framework for Secure Web Services. Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics; 2010 Apr 2–4; Jinggangshan, China. USA: IEEE. 178–83p.

Wang B, He H, Yuan LX, et al. Open Identity Management Framework for SaaS Ecosystem. Proceedings of the IEEE International Conference on e-Business Engineering; 2009 Oct 21–23; Macau, China. USA: IEEE. 512–17p.

Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications. vol. (In Press), Corrected Proof.

Fong E, Okun V. Web Application Scanners: Definitions and Functions. Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS 2007); 2007 Jan 3–6; Waikoloa, USA. USA: IEEE. 280b-280b.

NIST. National Vulnerability Database (NVD). 2010 October. Available from: http://nvd.nist.gov/home.cfm

OWASP. The Ten Most Critical Web Application Security Vulnerabilities. 2010. Available from: http://www.owasp.org/index.php/OWASP_Top_Ten_Project




DOI: https://doi.org/10.37628/ijocspl.v1i2.832

Refbacks

  • There are currently no refbacks.