Analysis of Various Security Issues and Challenges in Cloud Computing Environment: A Survey

Analysis of Various Security Issues and Challenges in Cloud Computing Environment: A Survey

Zhaolong Gou (Yamaguchi University, Japan), Shingo Yamaguchi (Yamaguchi University, Japan) and B. B. Gupta (National Institute of Technology Kurukshetra, India)
DOI: 10.4018/978-1-5225-0105-3.ch017
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Cloud computing is a system, where the resources of a data center are shared using virtualization technology, such that it provides elastic, on demand and instant services to its customers and charges them based on the resources they use. In this chapter, we will discuss recent developments in cloud computing, various security issues and challenges associated with Cloud computing environment, various existing solutions provided for dealing with these security threats and will provide a comparative analysis these approaches. This will provide better understanding of the various security problems associated with the cloud, current solution space, and future research scope to deal with such attacks in better way.
Chapter Preview
Top

1. Introduction

Along with the increase of various internet-related services, the concept of cloud computing (Mather, 2009) is becoming more well-known. Cloud computing is a terminology that involves resource through the internet to provide dynamic and scalable system virtualization. Cloud computing involves deploying groups of remote servers and software networks, and allows centralized data storage and online access to computer services or resources. The definition of cloud computing is mainly based on five characteristics: multi-tenancy (shared resources), massive scalability, elasticity, pay as you go, and self-provisioning of resources. Cloud computing is a system, where the shared resource is used by the data center virtualization technology (Hassan, 2011), such that it provides elastic, on demand and instant services to its customers and charges them based on the resources they use.

Cloud computing applications are already present on the market, trying to help companies and individuals to stretch resources and work smarter by moving everything to the cloud. Nowadays the business operations (Marston, 2011) are more and more dependent on cloud computing (Mather, 2009), the situations are more focused on business growth and product enhancements, rather than worrying about storage or maintaining 24-hour server to ensure maximum throughput.

For example the first approaches belongs to the Amazon and it is called AWS (Amazon Web Services), launched in 2002. (Surcel, 2008) AWS is a collection of remote services intended for client applications or web sites. According to the Amazon news, there are almost 500,000 developers that are subscribed to the AWS.

However, there are various security issues and challenges being related to cloud security. There are many security issues and challenges which we are faced in, so we should analyses for cloud computing situations.

Therefore, in this chapter, we will discuss recent developments in cloud computing, various security issues and challenges associated with Cloud computing environment, various existing solutions provided for dealing with these security threats and will provide a comparative analysis these approaches. This will provide better understanding of the various security problems associated with the cloud, current solution space, and future research scope to deal with such attacks in better way.

In Sect.2 we will discuss about the background of Cloud computing, including its history and models. In Sect.3 we discuss mainly about issues in cloud computing, and Sect.4 we reveal challenges in Cloud computing. Finally we discuss current situations about Cloud computing.

Complete Chapter List

Search this Book:
Reset