IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 6    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 6,June 2012
Security Problems And Possible Security Approaches In Cloud Computing
Full Text(PDF, )  PP.976-979  
R. Balasubramanian, Dr.M.Aramuthan
Security, Malware-injection, Flooding, Hypervisor, Accountability, Virtual Machine, Interrupt Descriptor Table.
In this paper we are going to discuss about the security issues of cloud computing which includes storage security, data security and network security. The major security challenge with clouds is that the owner of the data may not have control of where the data is placed. This is because if one wants to exploit the benefits of using cloud computing, one must also utilize the resource allocation and scheduling provided by clouds. Therefore there is need to safeguard the data in the midst of un-trusted processes. The emerging cloud computing model attempts to address the explosive growth of web-connected devices, and handle massive amounts of data.
[1] M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, D. Zamboni. Cloud Security is not (just) Virtualization Security, CCSW’09, Nov. 13, 2009, Chicago, Illinois, USA.

[2] L. Litty and D. Lie. Manitou: a layer-below approach to fighting malware. In ASID ’06: Proc. of the 1st workshop on Achitectural and system support for improving gsoftware dependability, pages 6-11, New York, NY, USA, 2006. ACM.

[3] B.D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. Security and Privacy, IEEE Symposium on, 0:233-247, 2008.

[4] VMware. Virtual Appliance Marketplace. http://www.vmware.com/appliances/.

[5] Amazon Elastic Compute Cloud (Amazon EC2). http://aws.amazon.com/ec2.

[6] M. A. Rahaman, A. Schaad, and M. Rits. Towards secure SOAP message exchange in a SOA. In SWS ’06: Proceedings of the 3rd ACM workshop on Secure Web Services, pages 77–84, New York, NY, USA, 2006. ACM Press.

[7] Meiko Jenson, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacono. On Technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing 2009.

[8] D. Kormann and A. Rubin, ―Risks of the passport single sign on protocol,‖ Computer Networks, vol. 33, no. 1–6, pp. 51–58, 2000.

Untitled Page