№2, 2023

SECURITY ISSUES AND SOLUTION MECHANISMS IN CLOUD COMPUTING SYSTEMS: A REVIEW

Rashid G. Alakbarov

The recent rapid development of cloud technologies has encouraged its widespread use by individual mobile users, private organizations and public institutions. Mobile users and organizations deploy their data on cloud servers and use it. Connections to cloud servers are realized over the Internet, which makes data transmitted over the network vulnerable to various types of attacks. Although numerous security solutions have been proposed for data security in cloud computing systems, the security of provided services remains an actual problem for both cloud users and cloud service providers. The article provides a general survey of security and privacy issues in cloud computing systems, and reviews various types of attacks and possible threats, as well as protection methods and available solutions against such attacks, and proposes mechanisms (pp.12-22).

Keywords: Mobile cloud computing, Mobile hardware, Security, Cyber-attacks, Computing and memory resources, Cloud computing, Privacy, Virtual machine, Cloud services
DOI : 10.25045/jpit.v14.i2.02
References
  • Abdul, N., Laiha M., Mazhar A., Shahaboddin Sh. (2014). “BSS: Block-based Sharing Scheme for secure data storage services in mobile cloud computing” The Journal of SuperComputing, vol. 70, no. 2, pp. 946-976. DOI: 10.1007/s11227-014-1269-8.
  • Ahmed B.U, Amin R., Mehmood M., Aldabbas H., Alharbi M.T. & Albaqa N.. (2023). “Cloud Security Threats and Solutions: A Survey”, Wireless Personal Communications, vol. 128, pp. 387-413. DOI: 10.1007/s11277-022-09960-z
  • Alakbarov R.G. (2021). “Mobile cloud technologies: current state, problems and security issues”, Information Technology Problems, vol.1, s. 15-32. DOI : 10.25045/jpit.v12.i1.02
  • Alakbarov R.G., Alakbarov O.R. (2018).“Security and privacy issues in mobile cloud computing”, Information Technology Problems, №1, s. 92-102. DOI : 10.25045/jpit.v09.i1.09
  • Alhenaki L., Alwatban A., Alahmri B., Alarifi N. (2019). “Security In Cloud Computing: A Survey”, International Journal of Computer Science and Information Security, vol.17, no.4, pp. 67-90.
  • AlZain M., Pardede E., Soh B., Thom J. (2012). “Cloud computing security: From single to multiclouds“, 45th Hawaii International Conference on System Science (HICSS), pp. 5490-5499.
  • Becher M., Freiling F., Hoffmann J., Holz T., Uellenbeck S., Wolf C. (2011). “Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices”, In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP’11, Oakland, IEEE Computer Society, Washington, pp. 96-111. doi:10.1109/SP.2011.29
  • Cachin C., Keidar I., Shraer A. (2009). “Trusting the cloud”, ACM SIGACT News, vol. 40, no. 2, pp. 81-86. DOI: 10.21522/TIJAR.2014.SE.19.01.Art009
  • Chris, J. David B., John A. (2012). “ThinAV: Truly Lightweight Mobile Cloud-based Anti-malware”, Twenty-Eighth Annual Computer Security Applications Conference, pp. 209-218. DOI: 10.1145/2420950.2420983.
  • Christodorescu, M., Sailer R., Schales D., Sgandurra D., Zamboni D. (2009). “Cloud security is not (just) virtualization security: a short paper” In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW’09, Chicago, ACM, New York, pp. 97-102. doi:10.1145/1655008.1655022
  • Dhanya N., Kousalya G. (2015). “Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing” International Symposium on Security in Computing and Communication, vol. 536, pp. 45-53. doi.org/10.1007/s11276-022-02920-2
  • Diaby, T. Rad B.B. (2017). “Cloud Computing: A review of the Concepts and Deployment Models”, I.J. Information Technology and Computer Science, vol. 6, pp. 50-58. doi:10.5815/IJITCS.2017.06.07
  • Donald, A., Oli S., Arockiam L. (2013).Mobile cloud security issues and challenges: A perspective, International Journal of Engineering and Innovative Technology, vol. 3 (1), pp. 401‒406.
  • Gayathri M.R., Srinivas K. (2014). “A Survey on Mobile Cloud Computing Architecture, Applications and Challenges”, International Journal of Scientific Research Engineering & Technology, vol. 3, no. 6, pp.1013-1021
  • Gopichand, M. (2016). “An Overview of Security and Privacy Issue in Mobil Cloud Computing Environment”, International Journal of Advanced Researc in Computer Science and Software Engineering, vol. 6, no. 5, pp. 779-784.
  • Gupta, B., Badve, O. (2016). “Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment.” Neural Computing and Applications, 28(12), pp.3655-3682. DOI:10.1007/s00521-016-2317-5
  • Hao, Z. Tang Y., Zhang Y., Novak E., Carter N., Li Q. (2015). “SMOC: A secure mobile cloud computing platform”, in Computer Communications (INFOCOM), IEEE Conference on, pp. 2668-2676. DOI:10.20944/preprints201912.0079.v1
  • Hassan N., Ahmed H. (2016). “A survey of Cloud Computing Securitychallenges and solutions”, International Journal of Computer Science and Information Security (IJCSIS), vol. 14, no. 1, pp. 52-58
  • Huan, L. A. (2010). “New form of DoS attack in a cloud and its avoidance mechanism”, In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security, CCSW’10, Chicago, ACM, New York, pp. 65-76. doi:10.1145/1866835.1866849
  • Jiang, X. Kong W., Jin X., Shen J. (2019). “A Cooperative Placement Method for Machine Learning Workflows and Meteorological Big Data Security Protection in Cloud Computing”, In International Conference on Machine Learning for Cyber Security, Springer, Cham, pp. 94-111. https://doi.org/10.1007/978-3-030-30619-9_8
  • Kalaivani A., Sangeetha S. (2021). “Cloud computing data security challenges and algorithms to protect security issues”, Journal of Hunan University(Natural Sciences, vol. 48, no. 12. pp. 2312-2323.
  • Kim T., et al. (2012). “Monitoring and detecting abnormal behavior in mobile cloud infrastructure”, IEEE Network Operations and Management Symposium, pp. 1303-1310.
  • Kovachev D., Klamma R. (2012). “Framework for Computation Offloading in Mobile Cloud Computing”, International Journal of Artificial Intelligence and Interactive Multimedia, vol. 1, no. 7, pp. 6-15. DOI:10.9781/ijimai.2012.171
  • Ko S., Jeon K., Morales R. (2011). “The HybrEx model for confidentiality and privacy in cloud computing”, In: Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing, HotCloud’11, Portland, USENIX Association, Berkeley, pp. 1-5.
  • Kumar R. Rajalakshmi S. (2013). “Mobile cloud computing: Standard approach to protecting and securing of mobile cloud ecosystems”, In 2013 International Conference on Computer Sciences and Applications, IEEE, pp. 663-669.
  • Li, H. Shou G., Hu Y., Guo Z. (2016). “Mobile edge computing: Progress and challenges”, In 2016 4th IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud) IEEE, pp. 83-84. DOI:10.1109/MobileCloud.2016.16
  • Liu, F., Shu P., Jin H., Ding L., Yu J., Niu D., Li B. (2013). “Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications”, IEEE Wireless Communications, vol. 20, no. 3, pp. 14-22.
  • Mazhar, A. Revathi Dh., Eraj K., Samee U., Athanasios V., Keqin Li L., Albert Y. (2015). “SeDaSC: Secure Data Sharing in Clouds”, IEEE Systems Journal, vol. 11, no. 2, pp. 1-29. DOI: http://doi.org/10.1109/JSYST.2014.2379646
  • Monjur A., Hossain M. (2014). “Cloud computing and security issues in the cloud”, International Journal of Network Security & Its Applications, vol. 6, no. 1, pp. 25-36.
  • Nicolae, P. Christian G., Antonis M. (2017.) “Providing User Security Guarantees in Public Infrastructure Clouds”, IEEE Transactions on Cloud Computing, pp. 1-15.
  • Odun-Ayo I., Ajayi O., Misr S. (2018). “Cloud Computing Security: Issues and Developments”, Proceedings of the World Congress on Engineering, vol. , pp. 1-7.
  • Popa, D. Cremene M., Borda M., Boudaoud K.. (2013). “A Security Framework for Mobile Cloud Applications”, Eleventh Roedunet International Conference, pp. 1-2. DOI: 10.1109/RoEduNet.2013.6511724
  • Popovic K., Hocenski V. (2010). “Cloud computing security issues and challenges”, MIPRO, Proceedings of the 33rd International Convention, pp. 344-349.
  • Portokalidis G., Homburg P., Anagnostakis K., Bos H. (2010). “Paranoid Android: versatile protection for smartphones”, Proceedings of the 26th Annual Computer Security Application Conference (ACSAC), pp. 347-356. DOI:10.1145/1920261.1920313
  • Prasanga, H. (2016). “Security Issues of Mobile Cloud Computing”, Independent Study Final Report. pp. 1-7.
  • Rahul, N., Nishi W. (2017). “Survey on Security issues of Fog Computing” International Journal of Innovative Research in Computer and Communication Engineering, vol. 5, no. 10, pp. 15731-15736. DOI: 10.15680/IJIRCCE.2017. 0510009
  • Rajeshkumar V. Patel, Dhaval Bhoi, Chandrashekhar S. Pawar., Rajeshkumar V. (2020). “International Journal of Scientific Research in Computer Science”, Engineering and Information Technology, vol. 6, no. 4, pp. 48-58
  • Rayapuri, B. (2018). “A Survey of Security and Privacy in Mobile Cloud Computing”, Masters Theses. 3406. Western Michigan University, pp. 1-55.
  • Rosenfeld K., Karri R. (2010). “Attacks and defenses for JTAG”, IEEE Des. Test, vol. 27, no. 1, pp. 36-47. doi:10.1109/MDT.2010.9
  • Sarrab M. (2015). “Mobile Cloud Computing: Security Issues and Considerations” Journal of Advances in Information Technology, vol. 6, no. 4, pp. 248-251.
  • Shahzad A. Hussain M. (2013). “Security Issues and Challenges of Mobile Cloud Computing”, International Journal of Grid and Distributed Computing, vol. 6, no. 6, pp. 37-50. http://dx.doi.org/10.14257/ijgdc.2013.6.6.04
  • Shajan A., Rangaswamy Sh. (2021). “Survey of Security Threats and Countermeasures in Cloud Computing”, United International Journal for Research & Technology, vol. 2, no. 7, pp. 201-207
  • Shankarwar M., Pawar A. (2015). “Security and privacy in cloud computing: A survey”, Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), ser. Advances in Intelligent Systems and Computing. Springer International Publishing, vol. 328, pp. 1-11
  • Singh S., Jeong Y., Hyuk Park J. (2016). “A survey on cloud computing security: Issues, threats, and solutions”, Journal of Network and Computer Applications, vol. 75, pp. 200-222 DOI:10.1016/j.jnca.2016.09.002
  • Subramaniam. T.K, Deepa B. (2016). “Security Attack Issues and Mitigation Techniques in Cloud Computing Environments”, Int. J. UbiComp, vol. 7, no. 1, pp. 1-11.
  • Tan J., Gandhi R., Narasimhan P. (2014). “STOVE: Strict, Observable, Verifiable Data and Execution Models for Untrusted Applications”, IEEE Sixth International Conference on Cloud Computing Technology and Science, pp. 644-649. DOI: 10.1109/CloudCom.2014.116pp
  • Toro, M., Muhammad N, Shu’aibu A., Garba M., Abdulaziz A., Musa K. (2021). “Security, Privacy Issues and Solutions of Mobile Cloud Computing”, United international journal for research & technology, vol 2, no. 7, pp. 112-117.
  • Tysowski P., Hasan M. A. (2013). “Hybrid Attribute-Based Encryption and Re-Encryption for Scalable Mobile Applications in Clouds”, IEEE Transactions on Cloud Computing, vol. 1, no. 2, ‒ pp. 172-186. DOI: 10.1109/TCC.2013.11.
  • Yubin X. Yutao L., Cheng T., Mingyang M., Haibing G., Binyu Z., Haibo C. (2015). “TinMan: Eliminating Confidential Mobile Data Exposure with Security Oriented Offloading”, Tenth European Conference on Computer Systems, vol. 27, pp. 1-16. DOI: 10.1145/2741948.2741977.
  • Zhang Y. Su S., Wang Y., Chen W., Yang F. (2014). “Privacy-assured substructure similarity query over encrypted graph-structured data in cloud”, Journal of Security and Communication Networks, vol. 7, no. 11, pp. 1933-1944. https://doi.org/10.1002/sec.907
  • Zonouz S.Z., Houmansadr A., Berthier R., Borisov N., Sanders W. (2013). “Secloud: A cloud-based comprehensive and lightweight security solution for smartphones, Journal of Computer and Security, vol. 37, pp. 215-227. doi: 10.1016/j.cose.2013.02.002.