Risks of the passport single signon protocol
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
Service specific anomaly detection for network intrusion detection
Proceedings of the 2002 ACM symposium on Applied computing
Virtual machines and data security
Proceedings of the workshop on virtual computer systems
Software as a Service: Implications for Investment in Software Development
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
Breaking and fixing the inline approach
Proceedings of the 2007 ACM workshop on Secure web services
netWorker - Cloud computing: PC functions move onto the web
Computer Security and Penetration Testing
Computer Security and Penetration Testing
The Eucalyptus Open-Source Cloud-Computing System
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
Data Security in the World of Cloud Computing
IEEE Security and Privacy
Cloud Computing and the Common Man
Computer
SCC '09 Proceedings of the 2009 IEEE International Conference on Services Computing
Towards best practices in designing for the cloud
Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications
Internetware computing: issues and perspective
Proceedings of the First Asia-Pacific Symposium on Internetware
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
Resource management for isolation enhanced cloud services
Proceedings of the 2009 ACM workshop on Cloud computing security
Mining significant factors affecting the adoption of SaaS using the rough set approach
Journal of Systems and Software
Dark clouds on the horizon: using cloud storage as attack vector and online slack space
SEC'11 Proceedings of the 20th USENIX conference on Security
Clouds & grids: a network and simulation perspective
Proceedings of the 14th Communications and Networking Symposium
Redundancy-aware SOAP messages compression and aggregation for enhanced performance
Journal of Network and Computer Applications
Extracting trust information from security system of a service
Journal of Network and Computer Applications
An observational study of undergraduate students' adoption of (mobile) note-taking software
Computers in Human Behavior
Future Generation Computer Systems
Cloud patterns for mOSAIC-Enabled scientific applications
Euro-Par'11 Proceedings of the 2011 international conference on Parallel Processing
From cloud computing to cloud manufacturing
Robotics and Computer-Integrated Manufacturing
Robotics and Computer-Integrated Manufacturing
A Metric-Based Approach to Assess Risk for "On Cloud" Federated Identity Management
Journal of Network and Systems Management
Multimedia Applications and Security in MapReduce: Opportunities and Challenges
Concurrency and Computation: Practice & Experience
Review: An intrusion detection and prevention system in cloud computing: A systematic review
Journal of Network and Computer Applications
Usage control model specification in XACML policy language
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Tackling Insider Threat in Cloud Relational Databases
UCC '12 Proceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing
Virtualization: Issues, security threats, and solutions
ACM Computing Surveys (CSUR)
A survey on security issues and solutions at different layers of Cloud computing
The Journal of Supercomputing
Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Towards a Generic Security Framework for Cloud Data Management Environments
International Journal of Distributed Systems and Technologies
Reducing Information Asymmetry in Cloud Marketplaces
International Journal of Human Capital and Information Technology Professionals
Collaborative learning in the clouds
Information Systems Frontiers
Towards secure mobile cloud computing: A survey
Future Generation Computer Systems
Future Generation Computer Systems
Pragmatic assessment of research intensive areas in cloud: a systematic review
ACM SIGSOFT Software Engineering Notes
Characterizing hypervisor vulnerabilities in cloud computing servers
Proceedings of the 2013 international workshop on Security in cloud computing
PRAM: privacy preserving access management scheme in cloud services
Proceedings of the 2013 international workshop on Security in cloud computing
A framework to support selection of cloud providers based on security and privacy requirements
Journal of Systems and Software
From Young Hackers to Crackers
International Journal of Technology and Human Interaction
An authentication framework for peer-to-peer cloud
Proceedings of the 6th International Conference on Security of Information and Networks
Proceedings of the 6th International Conference on Security of Information and Networks
International Journal of Wireless and Mobile Computing
Sustainable interoperability on space mission feasibility studies
Computers in Industry
Proceedings of the First International Conference on Technological Ecosystem for Enhancing Multiculturality
ECC-based anti-phishing protocol for cloud computing services
International Journal of Security and Networks
Cloud computing in cryptography and steganography
Cybernetics and Systems Analysis
International Journal of Automation and Computing
Integration, optimization and usability of enterprise applications
Journal of Network and Computer Applications
Privacy Preserving Index for Encrypted Electronic Medical Records
Journal of Medical Systems
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
Information Sciences: an International Journal
Architecture and protocol for intercloud communication
Information Sciences: an International Journal
Future Generation Computer Systems
Learning management systems and cloud file hosting services: A study on students' acceptance
Computers in Human Behavior
XML privacy protection model based on cloud storage
Computer Standards & Interfaces
Journal of Network and Computer Applications
Journal of Theoretical and Applied Electronic Commerce Research
Cloud service access control system based on ontologies
Advances in Engineering Software
Review: A survey of secure protocols in Mobile IPv6
Journal of Network and Computer Applications
Computer Standards & Interfaces
Intelligent Decision Technologies - IT Service Management and Engineering: An Intelligent Decision-Making Support Systems Approach
Hi-index | 0.00 |
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. It extends Information Technology's (IT) existing capabilities. In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. The advent of an advanced model should not negotiate with the required functionalities and capabilities present in the current model. A new model targeting at improving features of an existing model must not risk or threaten other important features of the current model. The architecture of cloud poses such a threat to the security of the existing technologies when deployed in a cloud environment. Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment. In this paper, a survey of the different security risks that pose a threat to the cloud is presented. This paper is a survey more specific to the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system.