Research Article

Security Related Risks and their Monitoring in Cloud Computing

by  Sachin Achara, Rakesh Rathi
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Issue 13
Published: January 2014
Authors: Sachin Achara, Rakesh Rathi
10.5120/15049-3417
PDF

Sachin Achara, Rakesh Rathi . Security Related Risks and their Monitoring in Cloud Computing. International Journal of Computer Applications. 86, 13 (January 2014), 42-47. DOI=10.5120/15049-3417

                        @article{ 10.5120/15049-3417,
                        author  = { Sachin Achara,Rakesh Rathi },
                        title   = { Security Related Risks and their Monitoring in Cloud Computing },
                        journal = { International Journal of Computer Applications },
                        year    = { 2014 },
                        volume  = { 86 },
                        number  = { 13 },
                        pages   = { 42-47 },
                        doi     = { 10.5120/15049-3417 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2014
                        %A Sachin Achara
                        %A Rakesh Rathi
                        %T Security Related Risks and their Monitoring in Cloud Computing%T 
                        %J International Journal of Computer Applications
                        %V 86
                        %N 13
                        %P 42-47
                        %R 10.5120/15049-3417
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud services is one of the most rapidly growing services over internet, which at the same time also faces serious security challenges. Recently, several cloud-storage service providers started to provide encryption protection to client data in the cloud. However, encryption imposes significant limits on data us . In this paper, we report security related risks and their monitoring in cloud computing. Cloud services data can be accessed only by authorized users. The security of data will be in control of the data owner. This paper shows the security challenges and monitoring and management of these security risks involved in cloud computing services. And a methodology is proposed for performing security risk assessment for cloud computing architectures presenting some of the initial results.

References
  • Yashpa lsinh Jadeja & Kirit Modi,(2012) "Cloud Computing-Concepts,ArchitectureandChallenges", International Conference on Computing, Electronics and Electrical Technologies[ICCEET].
  • Wayne Jansen,Timothy Grance,(2012)IEEE,"Draft NIST SpecialPublicationGuidelinesonSecurity and Privacy in Public Cloud Computing", Computer Security.
  • Folker den Braber, Gyrd Brændeland, Heidi E. I. Dahl, Iselin Engan, Ida Hogganvik, Mass S. Lund, Bjørnar Solhaug, Ketil Stølen, Fredrik The Coras Model-based method for security risk analysis, SINTEF Oslo September 2006.
  • A. Juan Ferrer, F. Hernandez, J. Tordsson, E. Elmroth, C. Zsigri, R. Sirvent, J. Guitart, R. M. Badia,K. Djemame, W. Ziegler,T. Dimitrakos, S. K. Nair, G. Kousiouris, K. Konstanteli,T. VarvarigouB. Hudzia, Kipp, S. Wesner, M. Corrales, N. Forgo, T. Sharif, and C. Sheridan, OPTIMIS Holistic Approach to Cloud Service Provisioning, Proceedings of 1st International Conference on Utility Cloud Computing (UCC 2010), Chennai, India, December 2010
  • Information risk analysis methodology (IRAM), Information Security Forum (ISF), Available at: https://www. securityforum. org/iram
  • P. Mell and T. Grance, The NIST Definition of Cloud Computing, National Institute of Standards and Technology, October 2009.
  • P. Saripalli and B. Walters, QUIRC: A Quantitative Impact and Risk assessment framework for Cloud security, pgs: 280-288, Proceedings of IEEE 3rd International Conference on Cloud Computing, 2010.
  • SAS 70 Type 2 Audit, SAS 70, Website Available at http://sas70. com/sas70_overview. html
  • ISO 27002 Standard, The ISO 27000 Directory, Website Available at http://www. 27000. org/iso-27002. htm
  • Sales force Security Data sheet, Availableathttp://www. salesforce. com/assets/pdf/datasheets/security. pdf
  • B. Krebs, Amazon: Hey Spammers, Get Off My Cloud! The Washington Post, Article Available at http://voices. washingtonpost. com/securityfix/2008/07/amazon_hey_s pammers_get_off_my. html Last Accessed November 2010.
  • I. Thomson, Google Docs Leaks Private User Data Online, Article, March 2009, Available athttp://www. v3. co. uk/vnunet/news/2238122/google-docs-leaks-privateLast Accessed November 2010.
  • Information risk analysis methodology IRAM, available at: https://www. securityforum. org/iram#iramtva
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Risk Monitoring Threats Risk assessment Cloud computing.

Powered by PhDFocusTM