Analysis of Security Threats of Cloud Computing

Authors

  • Tomas Svoboda University of Pardubice, Faculty of Electrical Engineering and Informatics, Pardubice, Czech Republic.
  • Simeon Karamazov University of Pardubice, Faculty of Electrical Engineering and Informatics, Pardubice, Czech Republic.

Keywords:

Cloud Computing, Research Cloud, Corporate Environment, Cloud Security,

Abstract

The aim of this paper is to introduce the result of a long-term research done in the Czech Republic and focused on the security of cloud services. The results of the research reflect more than eighty representatives of national and supranational organizations in the environment of the Czech Republic, and also state organizations within self-government territorial units. The paper examined cloud deployment issues connected with the current legislative and law on cybernetic security. The results of the research are summarized in a SWOT analysis.

References

P. Mell, and T. Grance, “The NIST Definition of Cloud Computing, Recommendations of the National Institute of Standards and Technology (NIST)”, September 2011, Available at: http://goo.gl/3nGfE0

J. Winkler, “Securing the cloud: cloud computer security techniques and tactics”,in Syngress/Elsevier, pp. 290, 2011, ISBN 978-159-7495-929

L. M. Kaufman, “Data security in the world of cloud computing”, inIEEE Security and Privacy, vol. 7, pp. 61-64.

doi:10.1109/MSP.2009.87

B. Halpert, “Auditing cloud computing: a security and privacy guide”, inJohn Wiley, pp. 206, 2011, ISBN 978-047-0874-745

M. Hussain, and H. M. Abdulsalam, “Software quality in the clouds: a cloud-based solution”, inCluster Computing, vol. 17, iss. 2, pp. 389-402, 2014. doi: 10.1007/s10586-012-0233-8

Anthony T. Velte, Toby J. Velte and Robert C. Elsenpeter. “Cloud Computing: praktický průvodce”, inComputer Press, pp. 344, 2011,ISBN 978-80-251-3333-0

M.I. Salam, W.-C. YAU, J.-J. Chin, S.-H. Heng, H.-C. Ling, R.C.-W. Phan, G.S. Pog, S.-Y. Tan, W.-S Yap, “Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage”, inHuman-centric Computing and Information Sciences, vol. 5, no. 19, pp. 16.

J. Brodkin, Gartner: “Seven cloud-computing security risks”, Available at: www.infoworld.com/d/security-central/gartner sevencloud-computing-security-risks-853.

Cloud security alliance, “Cloud Computing Top Threats in 2013:The Notorious Nine”, 2013, Available at :

https://downloads.cloudsecurityalliance.org/initiatives/top_threats/Th

e_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf

H. Lin, L. Xu, Y. Mu, W. Wu, “A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing”, inFuture Generation Computer Systems, vol. 52, pp. 125-136, ISSN 0167-739X, Available at:

http://dx.doi.org/10.1016/j.future.2014.10.032.

R. Cimler, J. Matyska, L. Balik, J. Horalek, V. Sobeslav, “Security Issues of Mobile Application Using Cloud Computing”, In: Advances in Intelligent Systems and Computing, pp. 347-357, 2014. doi: 10.1007/978-3-319-13572-4_29

J. Horalek, V. Sobeslav, “Intelligent Car Localization with the Use of Andruino Platform and Cloud Storage”, In: Lecture Notes in Electrical Engineering, pp. 795-805, 2015. doi: 10.1007/978-3-319-24584-3_67

M. Penhaker, O. Krejcar, V. Kasik, V. Snasel, “Cloud Computing Environments for Biomedical Data Services”, In:Intelligent Data Engineering and Automated Learning, LNCS vol. 7435. pp. 336-343, 2012, doi: 10.1007/978-3-642-32639-4_41

V. Sobeslav, P. Maresova, O. Krejcar, TC. Franca, K. Kuca, “Use of Cloud computing in Biomedicine”. In: Journal of Biomolecular Structure and Dynamics, pp. 1-10, 2016. ISSN 0739-1102

J. Machaj, P. Brida, “Wireless Positioning as a Cloud Based Service”, In: ACIIDS, pp. 430-439, 2015, Springer LNAI9012, doi: 10.1007/978-3-319-15705-4

R. Cimler, J. Matyska, L. Balik, J. Horalek, V. Sobeslav, “Security Aspects of Cloud Based Mobile Health Care Application” In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 202,doi: 10.1007/978-3-319-15392-6_20

M. Sujithra, G. Padmavathi, Sathya Narayanan, “Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud”, InProcedia Computer Science, vol. 47, pp. 480-485, ISSN 1877-0509, Available at:

http://dx.doi.org/10.1016/j.procs.2015.03.232.

R. Velumadhava Rao, K. Selvamani, “Data Security Challenges and Its Solutions in Cloud Computing”, In:Procedia Computer Science, Volume 48, Pages 204-209, 2015, ISSN 1877-0509, Available at: http://dx.doi.org/10.1016/j.procs.2015.04.171.

Downloads

Published

2017-03-15

How to Cite

Svoboda, T., & Karamazov, S. (2017). Analysis of Security Threats of Cloud Computing. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(1-3), 59–64. Retrieved from https://jtec.utem.edu.my/jtec/article/view/1745