Solutions of diagnosis of security issues and attacks for storage in cloud computing
Main Article Content
Abstract
Cloud computing is technique cost-effective, flexible, and convenient in remote access to applications and storage services, making it easy to provide information technology services and business across the Internet. Nevertheless, the use of cloud computing is an additional source of security risk due to third-party outsourcing, as makes maintaining the privacy, availability and security of data is very difficult. Cloud computing has many of its supporting technologies (virtualization, Web 2.0, service-oriented architecture), which inherits many security issues and makes them susceptible to attacks. Most of the previous work focused on storing data in the cloud without taking security issues and attacks into consideration. In this paper, we provide an analysis of security issues in cloud storage and possible solutions. With regard to the attacks on the data stored in the clouds, parametric comparison including all the details and countermeasures are provided. Finally, this paper provides a significant contribution to building a secure cloud environment for data storage, its privacy and recovery in disaster situations.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
Tikrit Journal of Pure Science is licensed under the Creative Commons Attribution 4.0 International License, which allows users to copy, create extracts, abstracts, and new works from the article, alter and revise the article, and make commercial use of the article (including reuse and/or resale of the article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made, and the licensor is not represented as endorsing the use made of the work. The authors hold the copyright for their published work on the Tikrit J. Pure Sci. website, while Tikrit J. Pure Sci. is responsible for appreciate citation of their work, which is released under CC-BY-4.0, enabling the unrestricted use, distribution, and reproduction of an article in any medium, provided that the original work is properly cited.
References
1- Cloud computing – A Practical Approach by Velte, Tata McGraw Hill Edition (ISBN-13:978-0-07-068351-8).
2- Rittinghouse JW, Ransome JF (2009) Security in the Cloud. In: Cloud Computing. Implementation, Management, and Security, CRC Press.
3- Minhaj Ahmad Khan, 2016. A survey of security issues for cloud computing, Journal of Network and Computer Applications 71, 11–29.
4- Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., Inácio, P.R., 2014. Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13 (2), 113–170.
5- Abbas, A., Khan, S.U., 2014. A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J. Biomed. Health Inform. 18 (4), 1431–1441.
6- Ali, M., Khan, S.U., Vasilakos, A.V., 2015. Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383.
7- Tari, Z., Yi, X., Premarathne, U.S., Bertok, P., Khalil, I., 2015. Security and privacy in cloud computing: vision, trends, and challenges. IEEE Cloud Comput. 2 (2), 30–38.
8- Omar Ali, Jeffrey Soar, Jianming Yong, 2016. An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments. journal of information security and applications 27-28 ( 2 0 1 6 ) 19–34.
9- Ali O, Soar J. Challenges and issues within cloud computing technology. In: The fifth international conference on cloud computing, GRIDs, and virtualization; 2014. p. 55–63.
10- Xiao, Z., Xiao, Y., 2013. Security and privacy in cloud computing. Ieee. Commun. Surv. Tutor. 15 (2), 843–859.
11- Rong, C., Nguyen, S.T., Jaatun, M.G., 2013. Beyond lightning: a survey on security Challenges in cloud computing. Comput. Electr. Eng. 39 (1), 47–54.
12- Li, Q., Clark, G., 2013. Mobile security: a look ahead. Ieee. Secur. Priv. 11 (1), 78–81.
13- Casale, A., 2013. The Dangers of Recycling in the Cloud. TheMakegood. Technologies, Mobility and Security (NTMS), pp.1–7.
14- Sood, S.K., 2012. A combined approach to ensure data security in cloud computing. J.
Netw. Comput. Appl. 35 (6), 1831–1838.
15- Ahuja, S.P., Komathukattil, D., 2012. A survey of the state of cloud security. Netw. Commun. Technol. 1 (2), 66–75.
16- Kaaniche, N., Laurent, M., 2014. A secure client side deduplication scheme in cloud storage environments. In: 2014 6th International Conference on New Technologies, Mobility and Security (NTMS), pp.1–7.
17- Hashizume, K., Rosado, D., Fernndez-Medina, E., Fernandez, E., 2013. An analysis of security issues for cloud computing. Journal of Internet Services and Applications. 4 (1).
18- Tebaa, M., ElHajji, S., ElGhazi, A., 2012. Homomorphic encryption method applied to cloud computing. In: 2012 National Days of Network Security and Systems (JNS2), pp.86–89.
19- Karnwal, T., Sivakumar, T., Aghila, G., 2012. A comber approach to protect cloud computing against xml ddos and http ddos attack. In: 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science (SCEECS), pp.1–5.
20- Harnik D, Pinkas B, Shulman-Peleg A (2010) Side channels in Cloud services: deduplication in Cloud Storage. IEEE Security Privacy 8(6):40–47.
21- Sanchez, R., Almenares, F., Arias, P., Diaz-Sanchez, D., Marin, A., 2012. Enhancing privacy and dynamic federation in IdM for consumer cloud computing. IEEE Trans.Consum.Electron.58(1),95–103.