17-09-2014, 02:34 PM
Cloud Computing Security: From Single to Multi-Clouds
Cloud Computing.pdf (Size: 366.18 KB / Downloads: 25)
Abstract
The use of cloudcomputing has increased rapidly
in many organizations. Cloud computing provides
many benefits in terms of low cost and accessibility of
data. Ensuring the security of cloud computing is a
major factor in the cloud computing environment, as
users often store sensitive information with cloud
storage providers but these providers may be
untrusted. Dealing with “single cloud” providers is
predicted to become less popular with customers due
to risks of service availability failure and the
possibility of malicious insiders in the single cloud. A
movement towards “multi-clouds”, or in other words,
“interclouds” or “cloud-of-clouds” has emerged
recently.
This paper surveys recent research related to single
and multi-cloud security and addresses possible
solutions. It is found that the research into the use of
multi-cloud providers to maintain security has received
less attention from the research community than has
the use of single clouds. This work aims to promote the
use of multi-clouds due to its ability to reduce security
risks that affect the cloud computing user.
Introduction
The use of cloud computing has increased rapidly in
many organizations. Subashini and Kavitha [49] argue
that small and medium companies use cloud computing
services for various reasons, including because these
services provide fast access to their applications and
reduce their infrastructure costs
Security Risks in Cloud Computing
Although cloud service providers can offer benefits
to users, security risks play a major role in the cloud
computing environment [53]. Users of online data
sharing or network facilities are aware of the potential
loss of privacy [12]. According to a recent IDC survey
[16], the top challenge for 74% of CIOs in relation to
cloud computing is security. Protecting private and
important information such as credit card details or
patients’ medical records from attackers or malicious
insiders is of critical importance [34]. Moving
databases to a large data centre involves many security
challenges [55] such as virtualization vulnerability,
accessibility vulnerability, privacy and control issues
related to data accessed from a third party, integrity,
confidentiality, and data loss or theft. Subashini and
Kavitha [49] present some fundamental security
challenges, which are data storage security, application
security, data transmission security, and security
related to third-party resources
2 Data Intrusion
According to Garfinkel[19], anoth