skip to main content
10.1145/2345396.2345474acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacciciConference Proceedingsconference-collections
research-article

State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment

Published: 03 August 2012 Publication History

Abstract

Cloud computing has taken center stage in the present business scenario due to its pay-as-you-use nature, where users need not bother about buying resources like hardware, software, infrastructure, etc. permanently. As much as the technological benefits, cloud computing also has risks involved. By looking at its financial benefits, customers who cannot afford initial investments, choose cloud by compromising on the security concerns. At the same time due to its risks, customers -- relatively majority in number, avoid migration towards cloud. This paper analyzes the current security challenges in cloud computing environment based on state-of-the-art cloud computing security taxonomies under technological and process-related aspects.

References

[1]
Michael Gregg. 2010. 10 Security Concerns for Cloud Computing. Technical Report. Global Knowledge.
[2]
Peter Mell, Timothy Grance. September 2011. The NIST Definition of Cloud Computing. NIST Special Publication 800--145. National Institute of Science and Technology.
[3]
Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. December 2009. Cloud Security Alliance.
[4]
Hong Li, Jeff Sedayao, Jay Hahn-Steichen, Ed Jimison, Catherine Spence, and Sudip Chahal. January 2009. Developing an Enterprise Cloud Computing Strategy. Technical Report. Intel Corporation.
[5]
Anu Gopalakrishnan. 2009. Cloud Computing Identity Management. SETLabs Briefings. Vol. 7, No. 7. Page no. 45--55.
[6]
Madhan Kumar Srinivasan, Paul Rodrigues. 2010. A roadmap for the comparison of identity management solutions based on state-of-the-art IdM taxonomies. Springer Communications in Computer and Information Science. Page no. 349--358. Springer-Verlag Berlin Heidelberg, New York, USA.
[7]
Madhan Kumar Srinivasan, Paul Rodrigues. 2010. Analysis on identity management systems with extended state-of-the-art IdM taxonomy factors, International Journal of Ad hoc, Sensor & Ubiquitous Computing. (December 2010), Vol.1, No.4. Page no. 62--70. DOI=10.5121/ijasuc.2010.1406.
[8]
Top Threats to Cloud Computing V1.0. March 2010. Cloud Security Alliance.
[9]
Maggie Shiels 2009. Malicious insider attacks to rise. Technical Report. BBC News, Silicon Valley.
[10]
Wade Baker, Alexander Hutton. 2010. 2010 Data Breach Investigations Report, A study conducted by the Verizon RISK Team with cooperation from the U. S. Secret Service and the Dutch High Tech Crime Unit. Technical Report. Verizon, New Jersey.
[11]
Bill Sunderland, Ajay Chandramouly. November 2011. Overcoming Security Challenges to Virtualize Internet-facing Applications. Technical Report. Intel Corporation.
[12]
Sabahi, F. 2011. Virtualization-level security in cloud computing. Proceedings of IEEE International Conference on Communication Software and Networks. Page no. 250--254.
[13]
Vaquero, L. M., Rodero-Merino, L., Caceres, J., Lindner, M. 2009. A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review. 39(1).
[14]
Jansen, W. A. 2011. Cloud Hooks: Security and Privacy Issues in Cloud Computing. Proceedings of 44th Hawaii International Conference on System Sciences. Page No. 1--10.
[15]
Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Atanu Rakshit. 2009. Cloud Security Issues. IEEE Computer Society. Page no. 517--520. DOI 10.1109/SCC.2009.84.
[16]
Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy. March 2012. SLAs in Cloud Systems: The Business Perspective. International Journal of Computer Science and Technology. Vol. 3, Issue 1. Page no. 481--488.

Cited By

View all
  • (2025)Cloud Access Security Brokers: An easy-implement Method for Accessing Cloud Services SecurelyWSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS10.37394/23209.2025.22.1722(189-202)Online publication date: 30-Jan-2025
  • (2024)Identifying Challenges in Remote DrivingSmart Cities, Green Technologies, and Intelligent Transport Systems10.1007/978-3-031-70966-1_7(146-166)Online publication date: 16-Sep-2024
  • (2024)Emerging Trends in Cloud Computing Paradigm: An Extensive Literature Review on Cloud Security, Service Models, and Practical SuggestionsCybersecurity and Artificial Intelligence10.1007/978-3-031-52272-7_5(117-142)Online publication date: 18-Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and Informatics
August 2012
1307 pages
ISBN:9781450311960
DOI:10.1145/2345396
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • ISCA: International Society for Computers and Their Applications
  • RPS: Research Publishing Services

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 August 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. SLA
  2. cloud API
  3. cloud computing
  4. cloud migration
  5. cloud security
  6. hypervisor vulnerabilities
  7. identity management
  8. logical storage segregation
  9. malicious insider
  10. multi-tenancy
  11. state-of-the-art cloud computing security taxonomies
  12. virtualization

Qualifiers

  • Research-article

Conference

ICACCI '12
Sponsor:
  • ISCA
  • RPS

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)40
  • Downloads (Last 6 weeks)2
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Cloud Access Security Brokers: An easy-implement Method for Accessing Cloud Services SecurelyWSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS10.37394/23209.2025.22.1722(189-202)Online publication date: 30-Jan-2025
  • (2024)Identifying Challenges in Remote DrivingSmart Cities, Green Technologies, and Intelligent Transport Systems10.1007/978-3-031-70966-1_7(146-166)Online publication date: 16-Sep-2024
  • (2024)Emerging Trends in Cloud Computing Paradigm: An Extensive Literature Review on Cloud Security, Service Models, and Practical SuggestionsCybersecurity and Artificial Intelligence10.1007/978-3-031-52272-7_5(117-142)Online publication date: 18-Apr-2024
  • (2023)Cloud-Based Intrusion Detection Approach Using Machine Learning TechniquesBig Data Mining and Analytics10.26599/BDMA.2022.90200386:3(311-320)Online publication date: Sep-2023
  • (2023)A Sorting-AB Approach for an Enhanced IDS in Cloud EnvironmentArtificial Intelligence and Smart Environment10.1007/978-3-031-26254-8_18(120-125)Online publication date: 8-Mar-2023
  • (2022)SEF4CPSIoT Software Engineering Framework for Cyber-Physical and IoT SystemsResearch Anthology on Convergence of Blockchain, Internet of Things, and Security10.4018/978-1-6684-7132-6.ch026(445-470)Online publication date: 8-Jul-2022
  • (2020)Securing the Deployment of Cloud-Hosted Services for Guaranteeing Multitenancy IsolationCloud Computing Security [Working Title]10.5772/intechopen.92142Online publication date: 18-Jun-2020
  • (2020)HadoopSec 2.0Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-18916539:6(8477-8486)Online publication date: 1-Jan-2020
  • (2020)Trusted Computing Technology and Proposals for Resolving Cloud Computing Security ProblemsCloud Computing Security10.1201/9780429055126-31(373-386)Online publication date: 31-Aug-2020
  • (2020)A contingency lens on cloud provider management processesBusiness Research10.1007/s40685-020-00128-8Online publication date: 2-Nov-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media