On cloud computing security issues

  • Authors:
  • Ainul Azila Che Fauzi;A. Noraziah;Tutut Herawan;Noriyani Mohd. Zin

  • Affiliations:
  • Faculty of Computer System and Software Engineering, Universiti Malaysia Pahang, Kuantan, Pahang, Malaysia;Faculty of Computer System and Software Engineering, Universiti Malaysia Pahang, Kuantan, Pahang, Malaysia;Faculty of Computer System and Software Engineering, Universiti Malaysia Pahang, Kuantan, Pahang, Malaysia;Faculty of Computer System and Software Engineering, Universiti Malaysia Pahang, Kuantan, Pahang, Malaysia

  • Venue:
  • ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part II
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. The concept of cloud computing is using a virtual centralization. This means, in one part, we have a full control on data and processes in his computer. On the other part, we have the cloud computing where the service and data maintenance is provided by vendors. The client or customers usually unaware about the place where processes are running or the data is stored. So, logically speaking, the client has no control over it. This is the reason cloud computing facing so many security challenge. In this paper, we presented selection issues in cloud computing and focus on the security issues. There are four cloud computing security issues that will be focused, namely XML signature, browser security, cloud integrity and binding issues and flooding attacks. Data security on the cloud side is not only focused on the process of data transmission, but also the system security and data protection for those data stored on the storages of the cloud side. There are some considerations that need to be focused in order to achieve better safe environment in cloud computing such as storage and system protection and data protection. In order to achieve better performance in security, cloud computing needs to fulfill five goals which are availability, confidentiality, data integrity, control and audit. By implementing these goals, we hope data security in cloud computing will be more secure. We also hope that cloud computing will have a bright future with arise of a large number of enterprises and will bring an enormous change in the Internet since it is a low-cost supercomputing to provide services.