Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(269.4KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Cloud Computing Security Issues and Challenges
Kuyoro 'Shade O., Ibikunle Frank, Awodele Oludele
Pages - 247 - 255     |    Revised - 01-11-2011     |    Published - 15-12-2011
Published in International Journal of Computer Networks (IJCN)
Volume - 3   Issue - 5    |    Publication Date - November / December 2011  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Cloud Computing, Scalability, Infrastructure, IT
ABSTRACT
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
ABSTRACTING & INDEXING
1 CiteSeerX 
2 Scribd 
3 SlideShare 
4 PdfSR 
REFERENCES
A Platform Computing Whitepaper. “Enterprise Cloud Computing: Transforming IT.” Platform Computing, pp6, 2010.
B. Grobauer, T. Walloschek and E. Stöcker, "Understanding Cloud Computing Vulnerabilities," IEEE Security and Privacy, vol. 99, 2010.
C. Soghoian. “Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era” The Berkman Center for Internet & Society Research Publication Series. Available: http://cyber.law.harvard.edu/publications [Aug.22, 2009].
C. Weinhardt, A. Anandasivam, B. Blau, and J. Stosser. “Business Models in the Service World.” IT Professional, vol. 11, pp. 28-33, 2009.
Cloud Computing Use Case Discussion Group. "Cloud Computing UseCases Version 3.0," 2010.
Cloud Security Alliance (CSA). Available: http://www.cloudsecurityalliance.org [Mar.19, 2010]
ENISA. (2009, Feb) "Cloud computing: benefits, risks and recommendations for information security." Available: http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computingrisk- assessment [Jul. 10, 2010].
F. Gens. (2009, Feb.). “New IDC IT Cloud Services Survey: Top Benefits and Challenges”, IDC eXchange, Available: [Feb. 18, 2010].
Global Netoptex Incorporated. “Demystifying the cloud. Important opportunities, crucial choices.” pp4-14. Available: http://www.gni.com [Dec. 13, 2009].
J. Brodkin. (2008, Jun.). “Gartner: Seven cloud-computing security risks.” Infoworld, Available: [Mar. 13, 2009].
M. A. Morsy, J. Grundy and Müller I. “An Analysis of the Cloud Computing Security Problem” In PROC APSEC 2010 Cloud Workshop. 2010.
M. Jensen, J. Schwenk, N. Gruschka and L. L. Iacono, "On Technical Security Issues in Cloud Computing." in PROC IEEE ICCC, Bangalore 2009, pp. 109-116.
M. Klems, A. Lenk, J. Nimis, T. Sandholm and S. Tai. “What’s Inside the Cloud? An Architectural Map of the Cloud Landscape.” IEEE Xplore, pp 23-31, Jun. 2009.
N. Gruschka, L. L. Iancono, M. Jensen and J. Schwenk. “On Technical Security Issues in Cloud Computing” In PROC 09 IEEE International Conference on Cloud Computing, 2009 pp 110-112.
N. Leavitt. “Is Cloud Computing Really Ready for Prime Time?” Computer, vol. 42, pp. 15- 20, 2009.
P. Kresimir and H. Zeljko "Cloud computing security issues and challenges." In PROC Third International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, 2010, pp. 344-349.
R. K. Balachandra, P. V. Ramakrishna and A. Rakshit. “Cloud Security Issues.” In PROC ‘09 IEEE International Conference on Services Computing, 2009, pp 517-520.
S. Arnold (2009, Jul.). “Cloud computing and the issue of privacy.” KM World, pp14-22. Available: www.kmworld.com [Aug. 19, 2009].
S. Ramgovind, M. M. Eloff, E. Smith. “The Management of Security in Cloud Computing” In PROC 2010 IEEE International Conference on Cloud Computing 2010.
S. Subashini, and V. Kavitha. (2010) “A survey on security issues in service delivery models of cloud computing.” J Network Comput Appl doi:10.1016/j.jnca.2010.07.006. Jul., 2010.
MANUSCRIPT AUTHORS
Miss Kuyoro 'Shade O.
Babcock University - Nigeria
afolashadeng@gmail.com
Dr. Ibikunle Frank
Covenant University - Nigeria
Dr. Awodele Oludele
Babcock University - Nigeria


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions