Review of Potential Threats on Cloud Computing

Authors

  • Seshasaayee A Associate Professor and Head, Dept. of Comp Sci., Quaid-E-Millath College, Chennai
  • Subramanian S Research Scholar, Vels University, Chennai

Keywords:

DLP, SaaS, Cloud, Grid

Abstract

Cloud Computing is the evolution, over the past 20+ years, of a continuous trend towards the industrialization of IT. This is in part due to the popularity of outsourcing and hosting of increasingly industrialized service definitions and cost structures & pricing. This has also spurred dramatic growth in popularity and use of both internet and corporate wide intranets as trusted delivery models. But are they safe and secure for storing confidential information? How can we make sure that the client has total control over their data on the cloud? Is it true that in order to reduce the cost of operation and efficiency, we have to comprising giving away sensitive data? This paper does an in-depth study of the recurring vulnerabilities.

References

http://www.cio.com/article/680673/Forrester_Public_Cloud_Growth_to_Surge_Especially_SaaS.

E. Brown, ―NIST issues cloud computing guidelines for managing security and privacy,‖ National Institute of Standards and Technology Special Publication 800-144, January 2012.

Security Guidance for Critical Areas in Cloud Security by Cloud Security Alliance Available: https://downloads.cloudsecurityalliance.org/initiatives/guidance/csaguide.v3.0.pdf

―Top threats to cloud computing,‖ in Cloud Security Alliance, 2013.

Cloud Security Alliance. (2010). Top Threats to Cloud Computing (V2.0). Available: https://cloudsecurityalliance.org/topthreats/csathreats.v2.0.pdf

http://readwrite.com/2010/09/16/googles-internal-security-brea - Google Lawsuit and the trust in cloud.

Privacy in the Cloud: Google Lawsuits, Facebook Data Breach, NSA Leaks - http://blog.malwarebytes.org/whats-in-the-news/2013/06/privacy-in-the-cloud-google-lawsuits-facebook-data-breach-nsa-leaks/

Lightning strikes Amazon cloud (honest). Available: http://www.theregister.co.uk/2009/06/12/lightning_strikes_amazon_cloud/

Catastrophic Hardware Failure at Swissdisk http://www.theregister.co.uk/2009/10/19/swissdisk_failure/.

http://www.telegraph.co.uk/finance/newsbysector/epic/btdota/10089355/BT-dumps-Yahoo-email-after-hacking-claims.html

P. M. a. T. Grance, Effectively and Securely Using the Cloud Computing Paradigm (V0. 25), US National Institute of Standards and Technology, 2009.

Zhou M, Zhang R, Xie W, Qian W, Zhou A (2010) Security and Privacy in Cloud Computing: A Survey. Proceedings IEEE Sixth International Conference on Semantics, Knowledge and Grids 2010:106-112

NIST Recommended Security Controls for Federal Information Systems (SP800-53)

NIST SP 800-30 Risk Management Guide for Information Technology Systems

OATH- http://www.openauthentication.org

Justify Identity Management Investment with Metrics, by Roberta J. Witty, Kris Brittain and Ant

Downloads

Published

2024-02-26

How to Cite

Seshasaayee, A., & Subramanian, S. (2024). Review of Potential Threats on Cloud Computing. COMPUSOFT: An International Journal of Advanced Computer Technology, 2(07), 197–197. Retrieved from https://ijact.in/index.php/j/article/view/36

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.