SlideShare a Scribd company logo
1 of 30
Information Sciences 305 (2015) 357–383
Contents lists available at ScienceDirect
Information Sciences
journal homepage: www.elsevier .com/locate / ins
Security in cloud computing: Opportunities and challenges
http://dx.doi.org/10.1016/j.ins.2015.01.025
0020-0255/� 2015 Elsevier Inc. All rights reserved.
⇑ Corresponding author.
E-mail addresses: [email protected] (M. Ali), [email protected]
(S.U. Khan), [email protected] (A.V. Vasilakos).
Mazhar Ali a,c,⇑ , Samee U. Khan a, Athanasios V. Vasilakos b
a North Dakota State University, USA
b Kuwait University, Kuwait
c COMSATS Institute of Information Technology, Abbottabad,
Pakistan
a r t i c l e i n f o
Article history:
Received 5 September 2014
Received in revised form 28 January 2015
Accepted 29 January 2015
Available online 7 February 2015
Keywords:
Cloud computing
Multi-tenancy
Security
Virtualization
Web services
a b s t r a c t
The cloud computing exhibits, remarkable potential to provide
cost effective, easy to man-
age, elastic, and powerful resources on the fly, over the
Internet. The cloud computing,
upsurges the capabilities of the hardware resources by optimal
and shared utilization.
The above mentioned features encourage the organizations and
individual users to shift
their applications and services to the cloud. Even the critical
infrastructure, for example,
power generation and distribution plants are being migrated to
the cloud computing
paradigm. However, the services provided by third-party cloud
service providers entail
additional security threats. The migration of user’s assets (data,
applications, etc.) outside
the administrative control in a shared environment where
numerous users are collocated
escalates the security concerns. This survey details the security
issues that arise due to the
very nature of cloud computing. Moreover, the survey presents
the recent solutions pre-
sented in the literature to counter the security issues.
Furthermore, a brief view of security
vulnerabilities in the mobile cloud computing are also
highlighted. In the end, the discus-
sion on the open issues and future research directions is also
presented.
� 2015 Elsevier Inc. All rights reserved.
1. Introduction
Since its inception, the cloud computing paradigm has gained
the widespread popularity in the industry and academia
[88]. The economical, scalable, expedient, ubiquitous, and on-
demand access to shared resources are some of the character-
istics of the cloud that have resulted in shifting the business
processes to the cloud [25,2]. The cloud computing attracts the
attention of research community due to its potential to provide
tremendous benefits to the industry and the community
[9,88]. The resources are provided to the users and released
based on demands from the pool of shared resources [4]. The
on-demand resource provisioning ensures the optimal resource
allocation and is also cost effective [78]. The consumers
(individuals and business organizations) no longer need to
invest heavily in the information technology (IT) infrastructure
[4]. Customers use resources provided by the cloud and pay
according to the use. On the other hand, cloud providers can
re-use resources as soon as they are released by a particular user
resulting in improved resource utilization [78]. Ease of
use is yet another advantage being offered by the cloud
computing because it does not require the customers to possess
extraordinary expertise pertaining to the cloud specific
technologies [5]. The management of the technology and
services
has moved from user to the service provider’s end [5].
http://crossmark.crossref.org/dialog/?doi=10.1016/j.ins.2015.01.
025&domain=pdf
http://dx.doi.org/10.1016/j.ins.2015.01.025
mailto:[email protected]
mailto:[email protected]
mailto:[email protected]
http://dx.doi.org/10.1016/j.ins.2015.01.025
http://www.sciencedirect.com/science/journal/00200255
http://www.elsevier.com/locate/ins
358 M. Ali et al. / Information Sciences 305 (2015) 357–383
The cloud computing provides virtualized resources to the
customers using various technologies, for example, Web ser-
vices, virtualization, and multi-tenancy. The cloud services are
delivered to the customer through the Internet [25]. The Web
applications are used to access and manage cloud resources that
makes Web applications an important component of the
cloud computing [70]. The customers’ processes are executed in
virtualized environment that in turn utilize the physical
resources [35]. Multiple virtual processes of various users are
allocated to same physical machines that are segregated
logically. This gives rise to a multi-tenant environment in the
cloud. Despite the provided advantages, the cloud computing
is not exclusive of risks with security being the key risk [57].
Security is one of the biggest obstacles that hamper the
widespread adoption of cloud computing [28]. Several business
and research organization are reluctant in completely trusting
the cloud computing to shift digital assets to the third-party
service providers [57]. The conventional IT infrastructure keeps
the digital assets in the administrative domain of the
organizations. All of the processing, movement, and
management of data/application are performed within the
organization-
al administrative domain. On the other hand, organizations do
not enjoy administrative control of cloud services and
infrastructure [52]. The security measures taken by the cloud
service providers (CSP) are generally transparent to the
organizations. The presence of large numbers of users that are
not related to the organizations, aggravate the concerns
further [57]. The users might be trusted by the CSP but they
may not be of trust to each other. The aforementioned reasons
keep the customers under uncertainties about their digital assets
located at the cloud resulting in reluctance to adopt cloud
computing [57].
There are various studies in the literature discussing the
security issues of the cloud computing. The authors in [85,101]
presented reviews on the security issues of the cloud computing.
However, the aforesaid studies are limited to the discussion
of security issues only and the security solutions are not
discussed. Ref. [71] reviewed the security issues at different
levels of
cloud computing. The security solutions have also been
presented in [71]. However, the future discussion has not been
dis-
cussed comprehensively and overview of the cloud technology
is missing. The authors in [1] presented a comprehensive
study of privacy preservation in the cloud with focus only on e-
health clouds. Moreover, the study in [1] is limited in scope
to the privacy only. Ref. [121] reviewed the security and
privacy challenges in the cloud computing and discussed the
defense strategies for the existing vulnerabilities. However, the
discussion of the security issues in [121] was centered on
confidentiality, integrity, availability, accountability, and
privacy-preservability with little discussion on the technologies
causing the vulnerability origination. The authors in [74]
elaborated the security issues in the cloud along with the
approach-
es that can be employed to tackle the vulnerabilities.
Nevertheless, the discussion on future research directions is
lacking in
the survey. Likewise, the work in [39] detailed the security
issues in the cloud computing in depth with brief discussion on
current and latest security solutions. The work in [18] surveyed
the popular security models of cloud computing, such as
cube model, multi-tenancy model, and risk assessment model.
Moreover, the authors of [18] have discussed the security
risks of cloud computing. However, the risks are discussed from
the perspective of different stack holders, like customers,
government, and service providers. Security issues from the
technological and operational point of view were not in the
scope of the aforesaid study. Similarly, the strategies to relieve
the security issues are discussed in terms of ‘‘what’’ compo-
nents and processes should be secured and evaluated. ‘‘How’’
the security objectives are achieved in current research is not
elaborated. Similarly, the article [104] describes the security
issues in cloud computing and associated security solutions.
However, the discussion is more focused on the privacy part of
cloud security. Moreover, there is no discussion on future
research directions. Our survey differs significantly from the
aforesaid surveys in terms of its extensiveness, comprehensive
discussion on security issues in cloud computing, and
emphasizes on latest security solutions presented in the
literature. We
also provide the tabulated comparisons of the presented
techniques. Moreover, we briefly discuss the security issues
pertain-
ing to mobile cloud computing and generic strategies that can
lead to solutions. The contributions of this survey with respect
to the aforesaid surveys are presented in Table 1. The ’’U’’ and
’’ ’’ denote whether the domain specified in the column has
been discussed in the survey or not.
The remainder of the paper is organized as follows. Section 2
provides the architectural framework of the cloud
computing. The security issues in the cloud computing paradigm
are detailed in Section 3 whereas the existing solutions
in the contemporary literature are presented in Section 4.
Section 5 highlights the security concerns in the mobile cloud
com-
puting (MCC). Section 6 discusses the techniques and open
issues and Section 7 concludes the survey.
Table 1
Contributions of this study with respect to the discussed
surveys.
Work Cloud overview Security issues Counter measures Open
issues
[85] U U
[101] U U
[71] U U
[1] Privacy only U U
[121] U U U Privacy only
[74] U U
[39] U U
[18] U U
This survey U U U U
M. Ali et al. / Information Sciences 305 (2015) 357–383 359
2. Cloud computing architectural framework
Cloud computing integrates various computing technologies to
provide services to the end users. To understand the secu-
rity issues pertaining to the cloud computing, it is important to
briefly introduce the concepts that contribute to the cloud
computing. The National Institute of Standards and
Technology’s (NIST) definition [69] of cloud computing is
widely accept-
ed [28]. The NIST definition considers the cloud computing as a
threefold model of service provisioning (Fig. 1), comprising
of: (a) essential characteristics, (b) service models, and (c)
deployment models. The cloud computing concepts in the light
of
NIST definition are presented below.
2.1. Essential characteristics
2.1.1. On-demand self-service
Customers can request and manage the services from the cloud
without any human interaction with the CSP. The provi-
sion of the services and the associated resources is
accomplished as and when required. This is usually done
through Web
services and management interfaces [28].
2.1.2. Broad network access
The services and the customer’s applications and data present
on the cloud must be accessible to the customers using the
standard mechanisms and protocols. The characteristic further
demands that the availability of services should support
heterogeneous thin or thick environment (for example, mobile
phones, laptops, workstations, tablets). Broad network access
is sometimes referred to as ubiquitous network access in the
literature [28].
2.1.3. Resource pooling
The cloud’s resources are shared among multiple customers by
pooling in a multi-tenant environment. The customers are
transparent about the location of the resources. There is a
mapping between physical and virtual resources provided to the
customers.
2.1.4. Rapid elasticity
The resources can be rapidly and elastically scaled as per
customer’s demands. The customer has a view of unlimited
resources that can be purchased as needed in a pay-as-you-go
manner.
2.1.5. Measured service
The scaling of resources up and down is performed dynamically
and the usage of services is metered and reported to the
customer and CSP. The metering also helps the optimization of
resource usage automatically while the users are charged in a
pay-as-you-use manner.
2.1.6. Multi-tenancy
The NIST defines the above mentioned five characteristics of
the cloud computing. However, the Cloud Security Alliance
(CSA) adds multi-tenancy as an important characteristic of the
cloud computing (although not an essential characteristic)
Fig. 1. NIST definition of cloud computing.
360 M. Ali et al. / Information Sciences 305 (2015) 357–383
[21]. Multi-tenancy is the property that enables the use of a
single resource by multiple customers that may or may not
belong to the same organization. Multi-tenancy results in
optimal use of resources and different customers are segregated
logically.
2.2. Service models
The NIST divides the services provided by the cloud computing
into three categories, namely: (a) software as a service
(SaaS), (b) platform as a service (PaaS), and (c) infrastructure
as a service (IaaS). The cloud service model is referred to as
SPI (software, platform, and infrastructure).
2.2.1. SaaS
The SaaS enables the customers to use CSP’s applications,
running on the cloud infrastructure, through the Internet. The
thin client interface can be used to access the applications such
as web browser. The SaaS does not provide the facility to
create an application or software. The SaaS only provides
software through Internet making it a model to distribute the
soft-
ware through Web. The customers pay for the usage and do not
own the software [96].
2.2.2. PaaS
The applications that are owned by the customer need a frame
work where they can be executed and managed. This
includes integrated development environments (IDE), operating
systems, and platform layer resources (run time engine that
executes the applications). The aforementioned services are
provided as PaaS. The PaaS does not provide customers with the
control over the underlying cloud infrastructure but only on the
applications that are moved to the cloud.
2.2.3. IaaS
The IaaS refers to the hardware infrastructure provided by the
CSP including the network, storage, memory, processor,
and various other computing resources. The resources are
provided in the form of virtualized systems accessible through
Internet. The CSP has a control over the underlying resources
[39].
2.3. Deployment models
There are four models that can be used to deploy a cloud
computing infrastructure, namely: (a) private cloud, (b) public
cloud, (c) community cloud, and (d) hybrid cloud.
2.3.1. Private cloud
The cloud that is run and managed only for a single
organization is the private cloud. The organization may or may
not
own the physical infrastructure and can be managed by the
organization itself or by a third party. Similarly, private cloud
may or may not be located at organization’s geographical site.
However, whatever the case may be, private cloud is for
the use of only single organization and the resources are not
utilized by any other customer.
2.3.2. Public cloud
The cloud’s physical infrastructure is owned by the CSP and is
open to general public and organizations. The resources are
shared among all the customers. The customers pay the cloud
owner according to the services and resources they use. The
physical infrastructure is located off-site to the customers and is
managed by the CSP.
2.3.3. Community cloud
The community cloud is shared by a number of organizations
and/or customers forming a community. Generally, the
community shares common interests, such as the mission,
security requirements, policy, and compliance considerations.
The community cloud may be managed by any of the
organizations in the community or a third party. Similarly, it
may
be located on premise or off-premise.
2.3.4. Hybrid cloud
The hybrid cloud is the mix of two or more clouds (public,
private, or community). All of the participating clouds retain
their status of a unique entity, but share standardized or
proprietary technology.
3. Cloud security challenges
The characteristics and models of the cloud computing
presented in previous section offer improved, optimized, and
low
cost services to the customers. The above given models
providing the mentioned characteristics are implemented using
var-
ious technologies, for example virtualization and multi-tenancy.
The technologies along with the cloud service and deploy-
ment models introduce cloud specific security risks and
vulnerabilities in addition to shared risks with the conventional
IT
infrastructure [87]. The security risks in cloud may differ from
the risks of conventional IT infrastructure either in nature or
M. Ali et al. / Information Sciences 305 (2015) 357–383 361
intensity or both. Resource pooling allows the use of same pool
by multiple users through multi-tenancy and virtualization
technologies. Although, the technologies introduce rapid
elasticity and optimal management of resources, they also intro-
duce certain risks in the system. Multi-tenancy leads to the risks
of data visibility to other users and trace of operations.
On-demand self-service characteristic is provided to the
customers by means of Web based management interfaces that
causes the probability of unauthorized access to the
management interface higher than the traditional systems [28].
Similar-
ly, virtualized environment introduces its own set of risks and
vulnerabilities that includes malicious cooperation between
virtual machines (VM) and VM escape. Likewise, from the
cloud service model view point, the service models are
dependent
on each other. The SaaS applications are built and deployed
over the PaaS and the PaaS is dependent on the underlying IaaS.
This operational dependency of the service models on each
other brings in the security dependency also. For example, if an
attacker succeeds to take control of IaaS, the result will be a
compromised PaaS that is utilizing IaaS. A compromised PaaS
can lead to compromised SaaS. In short, any compromised
service model gives access to other layer of the service model.
The
private cloud deployment model inherits the same set of
vulnerabilities as possessed by the conventional IT
infrastructure.
The reason being the private cloud is meant for the use of a
single organization. The public, community, and hybrid clouds
possess more cloud specific vulnerabilities and risks due to
presence of users from different origins and administrative con-
trol of a third party [15]. The presence of multi-tenants using
virtualized resources that may correspond to same physical
resources introduces many security concerns. The perfect
segregation of numerous tenants and allocated resources is a
com-
plex task and needs much higher level of security. In the
following discussion we present the security challenges being
faced
by the cloud computing. There are numerous works that look
upon the cloud security challenges from service model per-
spective. In this paper we detail the challenges based on three
abstract domains, namely, (a) architectural issues, (b) com-
munication issues, and (c) contractual and legal issues. Some of
the technologies in cloud computing do not affect any
particular service model. Instead more than one models become
affected, such as, virtualization that can affect both the IaaS
and PaaS. Therefore, we look at the challenges at abstract level
irrespective of the service model. The taxonomy of the secu-
rity challenges in the cloud computing is depicted in Fig. 2.
3.1. Challenges at communication level
The cloud services are normally available to the customers
through the Internet [125]. Standard Internet protocols and
mechanisms are used for communication between the customers
and the cloud [101]. The communication process results
in transmission of either data/information or applications
between the customer and the cloud. Moreover, there exists
com-
munication within cloud between VMs. We divide the cloud
communication into two categories, namely: (a) communica-
tion external to the cloud (between customers and cloud) and
(b) communication internal to the cloud (communication
occurring within cloud infrastructure).
Fig. 2. Cloud security challenges.
362 M. Ali et al. / Information Sciences 305 (2015) 357–383
The external communication of cloud is similar as any other
communication over the Internet. Therefore the challenges
faced by the cloud due to Internet characteristic are same as the
challenges of conventional IT communication [30]. These
challenges include denial-of-service, man-in-the-middle,
eavesdropping, IP-spoofing based flooding, and masquerading
[94,62]. The solutions to these challenges are also the same as
employed conventionally, such as, Secure Socket Layer
(SSL), Internet Security Protocol (IPSec), cryptographic
algorithms, intrusion detection and prevention systems, traffic
clean-
ing, and digital certificates [94,43]. As these challenges and
solutions are inherent from conventional IT infrastructure, we
do
not detail them in this study. We focus on internal cloud
communication that generates cloud specific challenges because
of
cloud specific characteristics and technologies.
3.1.1. Shared communication infrastructure
Resource pooling not only results in sharing of computational
and storage resources but also sanctions the sharing of
network infrastructure components [28]. The sharing of network
components provides attacker the window of cross-tenant
attack [39]. The vulnerability stems from the resource pooling
characteristic of the cloud computing and affects the IaaS
service model of the cloud. Due to the fact that it is hard to
distinguish between a legal vulnerability scan of network and
attacker activity, usually such scans are not allowed by the
service providers. Similarly, the IP-based segregation of
network
portions are not applied as network resources are dynamically
provisioned and released and cannot be associated to
particular set of users.
The users on the cloud are usually granted with the super-user
access for the purpose of managing their VMs [12]. The
access capability empowers the malicious user to acquire system
IP or MAC addresses and make malicious use of IaaS net-
work interfaces. The malicious user with super-user access to
the real network components may launch attacks, such as,
sniffing and spoofing over the real network.
3.1.2. Virtual network
In cloud computing systems, the communication takes place not
only on real networks but virtualized networks also play
an important role in communication. Virtual network is a
logical network built over a physical network [116]. The virtual
networks are responsible for communication between VMs. The
software-based network components, such as bridges,
routers, and software-based network configurations, support the
networking of VMs over the same host. The virtualized
networks are able to generate the following security challenges
in the cloud environment.
Security and protection mechanisms over the physical network
are not able to monitor the traffic over virtualized
network. This becomes a serious challenge as malicious
activities of the VMs go beyond the monitoring of security
tools.
Intrusion detection and prevention mechanisms usually depend
on the traffic patterns and activities to judge the anomalies
and detect the possibility of the attack. Virtualized network
poses a hindrance to the goal of such preventive measures [47].
The virtualized network is shared among multiple VMs that
causes the possibility of certain attacks, such as, Denial of
Service (DoS), spoofing and sniffing of virtual network. The
traffic rates can be monitored for malicious purposes. The cryp-
tographic keys become vulnerable to leakage, in case of
malicious sniffing and spoofing of virtual network [33]. The
data in
transit belonging to users can suffer from costly breaches due to
risks presented in Section 3.1.1 and Section 3.1.2.
3.1.3. Security misconfigurations
Security configurations of the cloud network infrastructure are
of significant importance in providing secure cloud ser-
vices to the user [24]. Misconfigurations can radically
compromise the security of customers, applications, and the
whole
system [26]. Customers outsource their applications and data to
the cloud with the trust that their assets are secure within
the cloud environment. A small misconfiguration can breach the
security of the system. The configurations need to be well in
place not only at the time of cloud infrastructure development,
deployment, and operations but subsequent changes in the
cloud network should also keep the configuration consistent
with the security policies [24]. One of the most common
misconfiguration occur when administrators select such a
configuration tool that they are familiar with but not necessarily
covers all the security requirements [24]. The migration of
VMs, data, and applications across multiple physical nodes,
changes in traffic patterns, and topology can generate the
requirement of varied security policies [66]. In such a scenario,
the configuration of the cloud should dynamically be managed
to ensure the security of the cloud. Likewise, any weakness
in session configurations and protocol configurations can be
exploited for session hijacking and to gain user sensitive data
[101].
3.2. Challenges at architectural level
3.2.1. Virtualization issues
Virtualization is one of the strategic components of the cloud.
Virtualization allows the use of same physical resources by
multiple customers. A separate VM is instantiated for each user
that virtually provides a complete operating machine to the
user [74]. Several VMs can be mapped to the same physical
resources allowing the resource pooling in multi-tenant envi-
ronment. A VM monitor (VMM) or hypervisor is the module
that manages the VMs and permits various operating systems
to run simultaneously on the same physical system [74].
Nevertheless, virtualization also introduces security challenges
to
the cloud users and infrastructure [83]. We discuss the security
issues related to virtualization below.
M. Ali et al. / Information Sciences 305 (2015) 357–383 363
3.2.1.1. VM image sharing. A VM image is used to instantiate
VMs. A user can create his/her own VM image or can use an
image from the shared image repository [39]. The users are
allowed to upload and download images from the repository
(for example Amazons image repository) [39]. Sharing of VM
images in the image repositories is a common practice and
can evolve as a serious threat if it is used in malicious manner
[47]. A malicious user can investigate the code of the image
to look for probable attack point. On the other hand, a malicious
user can upload an image that contains a malware [47]. The
VM instantiated through the infected VM image will become
source of introducing malware in the cloud computing system.
Moreover, an infected VM can be used to monitor the activities
and data of other users resulting in privacy breach. Likewise,
if the image is not properly cleaned, it can expose some
confidential information of the user [39].
3.2.1.2. VM isolation. VMs running on the same physical
hardware need to be isolated from each other. Although logical
iso-
lation is present between different VMS, the access to same
physical resources can lead to data breach and cross-VM
attacks.
Isolation is not only needed on storage devices but memory and
computational hardware also needs fine grained isolation of
VMs [33,101].
3.2.1.3. VM escape. VM escape is a situation in which a
malicious user or VM escapes from the control of VMM or
hypervisor
[97]. A VMM is a software component that manages all the
VMs and their access to the hardware. The VM escape situation
can provide attacker access to other VMs or can bring the VMM
down [47]. A successful VM escape attack can provide access
to the computing and storage hardware. The IaaS service model
is affected that can in turn effect other service models [73].
3.2.1.4. VM migration. The VM migration is the process of
relocating a VM to another physical machine without shutting
down the VM [128]. The VM migration is carried out for a
number of reasons, such as load balancing, fault tolerance, and
maintenance [39,20]. During the migration phase, the contents
of the VM are exposed to the network that might lead to data
privacy and integrity concerns. Besides data, the code of VM
also becomes vulnerable to attackers during migration [128,47].
The migration module can be compromised by an attacker to
relocate the VM to a compromised server or under the control
of compromised VMM. The VM migration is a crucial phase and
needs to be carried out in a secured manner [39].
3.2.1.5. VM rollback. Virtualization allows the rollback of a
VM to some previous state whenever it is needed. The rollback
feature provides flexibility to the user. However, rollback also
raises security concerns [90]. For example, the rollback can
enable the security credentials that were previously disabled
[39]. Moreover, the rollback can also render the VM to a vul-
nerability that was previously patched [116]. Furthermore, the
rollback can revert the VM to previous security policies and
configuration errors [39].
3.2.1.6. Hypervisor issues. The key module of virtualization is
hypervisor or VMM. The VMs management and isolation is the
responsibility of the VMM. Generating and managing virtual
resources, is yet another function performed by the VMM. A
VMM may affect the execution of VMs running on the host
system [106]. A compromised VMM can put all the VMs that
are managed by the victim VMM under attacker’s control [102].
The metadata of the VMs, kept by the VMM, may also be
exposed …
Background
Cloud computing is an evolving technological paradigm that has
outgrown decades of research in computing, networking,
virtualization and Service-Oriented Architectures (SOA). The
technology paradigm offers scalable and on-demand access to a
pool of resources that are hosted by cloud providers in the data
centers (Roy et al. 2015). Cloud computing is a widely
integrated technology today based on its ability to reduce costs
in the computing environment while also enhancing scalability
and flexibility of the computer processes (Roy et al. 2015). As
such, cloud computing has grown from a promising technology
to one that is highly adopted by the fast-growing businesses in
the IT industry. Considerably, cloud computing is an
architectural movement that presents new ways to deploy and
manage applications. Its significance is underlined by its ability
to support business-critical applications, an aspect that is
behind its extensive integration in the business environment
(Ahuja & Mani, 2013). However, organizations have highlighted
vast concerns regarding the integration of this technology
ranging from security vulnerabilities to the availability of
services. While cloud computing is associated with vast security
vulnerabilities, the availability of critical services is a
significant factor as this affects the operability of the business
processes. Availability ends a critical challenge in the cloud
computing paradigm as it affects access to critical services.
The paper evaluates the availability of critical services as a
significant challenge in the cloud computing environment. The
goal of the research is to highlight the inherent flaw of the
overall approach that impedes access to business resources in
the cloud environment and provides countermeasures for
adoption to design a lean system that enables businesses to
access services at all times. The proposal provides an overview
of the literature review regarding why the problem exists, its
impact on the users and its relevance and significance in the
cloud computing environment. Considerably, the paper provides
a detailed discussion of how the study will be undertaken
relative to the goal to be achieved. Moreover, the proposal
details on the hurdles likely to be encountered during the
research process. Problem Statement
Notably, cloud computing is designed to enable access to a pool
of resources such as data, application, servers, and computer
networks. The access to this resources is done by either a
privately owned cloud or a third-party server that is situated in
a data center. With this, access to the resources is made more
reliable and efficient (Roy et al. 2015). Given the fact that the
cloud environment utterly depends on the allocation of
resources to the economy of scale and consistency, it is a cost-
effective technology solution making it a viable option for most
businesses. Despite this, service downtime is a significant
challenge of the cloud technology (Hashem et al. 2015). The
availability of different cloud providers set the stage for
enhancing effectiveness in service provision. However, no
single service provider can guarantee its user’s access to the
critical resources at all times. While the cloud technology
makes businesses reliant on their connectivity, its effective use
is hampered by possible downtimes that bars access to the
critical resources (Hashem et al. 2015). Thus, cloud technology
is designed to provide vast benefits to its users including
efficiency. However, outages negatively affect access to critical
resources thereby affecting business operations.
The strength of the cloud computing technology is assessed
based on its availability and reliability. Notably, availability
denotes the possibility of accessing resources when needed
while taking into consideration the time it takes for the
resources to be provisioned. Comparatively, reliability
highlights the availability of resources at all times without
disruption and how often the platform fails (Hashem et al.
2015). An important aspect that poses significant problems in
the cloud computing environment is the possible downtime.
Regardless of the seamless nature of the architecture that is
designed to foster reliability and availability of resources, cloud
technology tends to experience service downtime, denial of
service attacks, equipment outages, performance slowdowns,
and natural disasters. Research has shown that cloud providers
have experienced service outages in the past, such as Amazon, a
problem that impedes service provision to users (Roy et al.
2015). Such challenges have enhanced uncertainty and doubt
among cloud users thereby prompting the need to design
approaches to address the inherent flaws of the technological
architecture. The level of reliability and availability of
resources in the cloud environment is a serious issue as it
affects effective service provisions to the customers.
Availability is a significant challenge in cloud computing
environments. Due to the critical services provided by most
organizations, the systems should be available at all times. This
ensures that users can have regular access to their data and
applications (Ahuja & Mani, 2013). Despite this, achieving high
availability in cloud computing is challenging than initially
perceived. While most critical business applications are running
in the cloud computing environment, there are inherent flaws in
the overall approach. The flaws are not appropriate for mission-
critical workloads as they impede access to applications and
data that are vital to an organization’s processes (Roy et al.
2015). Given the fact that the cloud computing environments are
subject to an outage, organizations are concerned that their
demands such as critical applications and data cannot be
accessed.
Within the cloud environment, various virtual machines are
used to host the same physical server infrastructure. The
standards model used by most cloud service providers to make
resources such as data and applications available to its users is
the public cloud (Hashem et al. 2015). While the public cloud
services might be free, vast concerns are associated with its use,
particularly the availability of resources in critical moments
(Ahuja & Mani, 2013). Notably, irrespective of whether the
cloud is operating on private, public or hybrid models,
availability is an important aspect of the virtualization
technology that ought to be addressed. Such problems involve
system overflows due to the excessive combination of the VM
to a physical server which affects resource availability
(Aldossary & Allen, 2016). Because of these issues, the cloud
computing environments are vulnerable to attacks such as the
Denial of Service (DoS) which makes the server inaccessible to
the legitimate users (Shukhman et al. 2015). With this,
businesses are increasingly wary of the cloud computing service
providers as they need high resource availability to enhance
their normal processes. In this context, providers must
guarantee that legitimate users will have high availability of
their resources (critical applications and data). Therefore, the
availability of resources in cloud computing is a significant
issue that ought to be addressed.Goal
The study explores reliability and availability of resources
in cloud technology and how this hampers effective service
provision for businesses. The goal of the study is to highlight
the inherent flaw of the overall approach that impedes access to
business resources in the cloud environment and provides
countermeasures for adoption to design a lean system that
enables businesses to access services at all times. By evaluating
the reliability and availability of resources in the cloud
architecture, it can be identified with ease measures for
adoption to address the inherent flaw of the technology. As
such, the study conducts a review of the reliability and
availability of resources in the cloud environment to ascertain
its impact on businesses and mechanisms for adoption to
improve the system. Through this, the study explores major
issues including service downtime, denial of service attacks,
equipment outages, performance slowdowns, and natural
disasters. To ascertain its success, the study will evaluate
whether the proposed measures are effective in addressing both
reliability and availability of resources. Relevance and
Significance
Security is an aspect of concern in the cloud environment. This
is enhanced by the extensive vulnerabilities associated with the
system, susceptibilities that can be readily exploited by the
cyber attackers (Ali, Khan & Vasilakos, 2015). With this,
cyber-attacks are a major cause of service unavailability in
cloud computing. By executing Denial of Service attacks, the
attacker can obtain authorized access to the system processes
similar to that of the legitimate users. Given the fact that most
organizations need their resources all the time, the DoS is
catastrophic as it impedes access to critical services. By using
all the resources, other system users cannot access the services
(Shukhman et al. 2015). Besides, the attacker can slow access to
the critical services through the use of Denial of Service
attacks. The lack of virtual IPs for the virtual machines is a
significant factor in the unavailability of business-critical
resources. During the setup process, the virtual machines
assume a regular IP address that never changes (Ali, Khan &
Vasilakos, 2015). With this, increased traffic results in system
slow down or failure thereby impeding access to the critical
services. While the static IP address is administered to maintain
the virtual machines, increased traffic can result in system slow
down or failure. Thus, the lack of virtual IPs for the virtual
machines often results in resource unavailability for the cloud
computing systems. Additionally, system overflows due to an
excessive combination of the VM to physical server affects
resource availability.
Service unavailability in the clouds is enhanced by the inherent
flaws of the overall approach in its set up. For instance, most
cloud providers leverage on out of the box clustering or virtual
machines solutions migration. Notably, these features are not
only complex to manage but also fail to adequately protect the
applications for transaction loss (Noor et al. 2013).
Considerably, the availability approaches solely focus on the
discrete application for the virtual machines over the entire
application service chain. Most of the cloud computing
technologies are designed around commoditized software and
hardware (Noor et al. 2013). As such, the monitoring and
management of the system activity are left to the cloud
management software. With this, there is a lag time between
system outage and the management software noticing the
problem to start the recovery process (Noor et al. 2013).
System downtime hampers the legitimate cloud users from
accessing their resources which can be catastrophic. Even
though availability differs among the users, its effect is
quantified on the accessibility of business-critical resources
(Santos et al. 2017). Moreover, resource unavailability does not
only affect user experience but also incurs direct costs for both
the organizations and the cloud providers. As such, the study’s
significance is to evaluate the causative factors of resource
unavailability in cloud computing to identify the failure point
and propose effective countermeasures for adoption. The
identification of the failure points is important as this will serve
future research studies for cloud provider seeking to improve
service provision. Thus, the outcome of the study serves to
address resources reliability and availability in the cloud
environment by identifying failure points. Literature Review
Cloud computing is a multifaceted technology that offers
scalable and on-demand access to a pool of resources that are
hosted by cloud providers in the data centers. Cloud computing
is a widely integrated technology today based on its ability to
reduce costs in the computing environment while also enhancing
scalability and flexibility of the computer processes. Despite its
promise, vast concerns have been highlighted regarding
resources reliability and availability (Hashem et al. 2015).
Notably, the strength of the cloud computing technology is
assessed based on its availability and reliability of resources.
The existence of different failure points in the system hampers
access to business-critical services, an aspect that is of
significant concern in the IT sector (Aldossary & Allen, 2016).
Inefficient reliability and availability of resources are attributed
to different factors including system vulnerability to attack,
lack of virtual IPs for the virtual machines, system overflows
due to an excessive combination of the VM to physical servers
and inherent flaw of the overall approach deployed by cloud
providers (Santos et al. 2017). The existence of the problem
poses vats implications to the business, aspects that not only bar
business operations but also incur additional costs.
System vulnerability is a major aspect hampering resource
reliability and availability in the cloud environment. The
existence of different failure points in the cloud environment
predisposes the infrastructure to third-party intrusion to
instigate Denial of Service (DoS) attacks (Aldossary & Allen,
2016). Cyber attackers can infect the cloud architecture with a
malicious program such a botnet that enables them to execute
DoS by obtaining access to the system processes similar to that
of authentic cloud users (Aldossary & Allen, 2016). The DoS
attacks are castigated to hamper access to business-critical
resources such as applications software by either slowing down
the system or impeding access for the legitimate users (Santos
et al. 2017). The traditional countermeasure to this attack is
increasing the number of critical resources, but a serious
problem occurs when the intruder occourstrate an attack using
the botnet. The current network countermeasures are not
effective in preventing the DoS attacks as they cannot stop the
deluge of the traffic and cannot distinguish between good and
bad traffic. However, Intrusive Prevention Systems (IPS) are
effective countermeasures particularly if the attacks can be
identified or have pre-existing signatures (Ahuja & Mani,
2013). Despite this, such countermeasures are ineffective when
there is legitimate content with bad intentions. Moreover, the
use of firewalls is not only ineffective but also vulnerable to
different types of attacks as the attackers can bypass them
(Santos et al. 2017). Thus, the current countermeasures are
ineffective in curtailing DoS attacks that attribute to resource
unavailability.
The use of cloud technology infers that data and applications
will be mover under the control of a third-party (Aldossary &
Allen, 2016). Based on the cloud-services delivery model,
clouds with virtual perimeters are created together with security
controls that are shared between the cloud service provider and
the customer. The shared-responsibility model is associated
with vast security and resource availability challenges to the
business operations. The biggest challenge is accessing
business-critical services at all time as this is imperative for
business success (Santos et al. 2017). However, this is impeded
by the lack of virtual IPs for the virtual machines and system
overflows due to an excessive combination of the VM to
physical servers. The lack of virtual IPs for the virtual machines
results in increased traffic, an aspect that is enhanced by the
fact that the security countermeasures cannot differentiate
between good and bad traffic. This results in system downtime
thereby hampering access to business-critical services.
Moreover, system overflow due to the combination of the
virtual machines to the physical serves predisposes the cloud
technology to third-party intrusions which result in system
downtime. This is a significant factor that fosters DoS attacks
on the system thereby impeding access to resources.
The overall system approach integrated for use by cloud
providers hampers resource availability and reliability at all
times. The widely used approaches are challenging to manage
and fail to integrate robust security mechanisms to prevent DoS
attacks. Having evolved as a promising technology in the past
decade, cloud technology is facing negative shifts to its use as
users are wary of its capacity to meet business demands (Santos
et al. 2017). There is a need for a universal model to be adopted
by the cloud providers to guarantee resource reliability and
availability. Researchers have proposed the integration of a
HAIL (high availability and integrity layer) model to address
the issue of server unavailability (Bowers, Juels & Oprea,
2010). The HAIL model is designed to distribute data across
different servers to ensure resource availability at all times. The
HAIL model can be adopted by cloud service providers as it
leverages on unreliable components to create a reliable solution
that is cost effective (Bowers, Juels & Oprea, 2010). Approach
For this research, secondary data analysis will be used to
evaluate resource reliability and availability in cloud
computing. The research methodology aims at evaluating
resource availability in cloud technologies by collecting
information from case studies and peer-reviewed sources (Gall
et al. 2014). Extensive information will be obtained from peer-
reviewed research to establish the basis of resource reliability
and availability in cloud computing and the countermeasures for
adoption to curtail this problem. The articles and case studies
for research will be obtained from library databases to
determine why the problem exists, its impact and the current
countermeasures in practice. Conducting extensive research
from secondary sources is augmented by the notion that the
problem cannot be quantified (Gall et al. 2014).
The data will be collected and then assessed to discuss the
problem of resource availability in cloud computing
extensively. The identified articles will be evaluated through an
established inclusion and exclusion criteria relative to its
significance to the problem of discussion in cloud computing.
Considerably, keywords such as reliability and availability will
be used to identify relevant articles for study and use for
research (Gall et al. 2014). The findings from the research
articles will be tabulated based on the significance relative to
resource availability (Gall et al. 2014). Given the fast changes
in the cloud computing paradigm, vast challenges will be
encountered such as identifying effective measures for
curtailing system intrusion. However, this can be addressed by
determining system design flaws exploited by the attackers.
Therefore, secondary data analysis will establish the basis of
collecting extensive information regarding resource reliability
and availability in cloud computing.
References
Ahuja, S. P., & Mani, S. (2013). Availability of services in the
era of cloud computing. Network and Communication
Technologies, 1(1), 2.
Aldossary, S., & Allen, W. (2016). Data security, privacy,
availability and integrity in cloud computing: issues and
current solutions. International Journal of Advanced Computer
Science and Applications, 7(4), 485-498.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in
cloud computing: Opportunities and
challenges. Information sciences, 305, 357-383.
Bowers, K. D., Juels, A., & Oprea, A. (2010, November). HAIL:
A high-availability and integrity layer for cloud storage.
In Proceedings of the 16th ACM conference on Computer
and communications security (pp. 187-198). ACM.
Gall, M. D., Gall, J. P., Borg, W. R., & Meredith (Mark) D.
Gall. (2014). Applying educational research: How to read, do,
and use research to solve problems of practice. Pearson.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani,
A., & Khan, S. U. (2015). The rise of “big data” on cloud
computing: Review and open research issues. Information
systems, 47, 98-115.
Noor, T. H., Sheng, Q. Z., Zeadally, S., & Yu, J. (2013). Trust
management of services in cloud environments: Obstacles
and solutions. ACM Computing Surveys (CSUR), 46(1), Article
12, pp. 1-30.
Roy, A., Sarkar, S., Ganesan, R., & Goel, G. (2015). Secure the
Cloud: From the Perspective of a Service-Oriented
Organization. ACM Computing Surveys (CSUR), 47(3), Article
41, pp.1-30
Santos, G. L., Endo, P. T., Gonçalves, G., Rosendo, D., Gomes,
D., Kelner, J., & Mahloo, M. (2017, July). Analyzing the IT
subsystem failure impact on availability of cloud services.
In Computers and Communications (ISCC), 2017 IEEE
Symposium on (pp. 717-723). IEEE.
Shukhman, A., Polezhaev, P., Ushakov, Y., Legashev, L.,
Toarasov, V., & Bakhareva, N. (2015). Development of
network security tools for enterprise software-defined networks.
Proceedings of the 8th International Conference on
Security of Information and Networks (pp. 224-228). New
York, NY: ACM.
Information Sciences 305 (2015) 357–383Contents lists availa.docx

More Related Content

Similar to Information Sciences 305 (2015) 357–383Contents lists availa.docx

A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...IJERA Editor
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsjournalBEEI
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...Claire Webber
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembeShibwabo Christopher Anyembe
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 

Similar to Information Sciences 305 (2015) 357–383Contents lists availa.docx (20)

A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in clouds
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
 
Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
D32035052
D32035052D32035052
D32035052
 
D32035052
D32035052D32035052
D32035052
 
Outsourcing control
Outsourcing controlOutsourcing control
Outsourcing control
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembe
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 

More from annettsparrow

Initial Post  (250 words)Read and interpret the short story .docx
Initial Post  (250 words)Read and interpret the short story .docxInitial Post  (250 words)Read and interpret the short story .docx
Initial Post  (250 words)Read and interpret the short story .docxannettsparrow
 
initial post one paragraph intext citation and reference Require.docx
initial post one paragraph intext citation and reference Require.docxinitial post one paragraph intext citation and reference Require.docx
initial post one paragraph intext citation and reference Require.docxannettsparrow
 
Initial Post InstructionsTriggers are ethnocentric responses to .docx
Initial Post InstructionsTriggers are ethnocentric responses to .docxInitial Post InstructionsTriggers are ethnocentric responses to .docx
Initial Post InstructionsTriggers are ethnocentric responses to .docxannettsparrow
 
Initial Post InstructionsFor the initial post,consider thr.docx
Initial Post InstructionsFor the initial post,consider thr.docxInitial Post InstructionsFor the initial post,consider thr.docx
Initial Post InstructionsFor the initial post,consider thr.docxannettsparrow
 
Initial Post InstructionsFor the initial post, choose and ad.docx
Initial Post InstructionsFor the initial post, choose and ad.docxInitial Post InstructionsFor the initial post, choose and ad.docx
Initial Post InstructionsFor the initial post, choose and ad.docxannettsparrow
 
Initial Post InstructionsDiscuss the differences and similaritie.docx
Initial Post InstructionsDiscuss the differences and similaritie.docxInitial Post InstructionsDiscuss the differences and similaritie.docx
Initial Post InstructionsDiscuss the differences and similaritie.docxannettsparrow
 
Initial Post InstructionsAs we jump into the world of Alge.docx
Initial Post InstructionsAs we jump into the world of Alge.docxInitial Post InstructionsAs we jump into the world of Alge.docx
Initial Post InstructionsAs we jump into the world of Alge.docxannettsparrow
 
Initial Post InstructionsFor the initial post, respond to one .docx
Initial Post InstructionsFor the initial post, respond to one .docxInitial Post InstructionsFor the initial post, respond to one .docx
Initial Post InstructionsFor the initial post, respond to one .docxannettsparrow
 
Initial Post InstructionsAgenda setting can be a difficult t.docx
Initial Post InstructionsAgenda setting can be a difficult t.docxInitial Post InstructionsAgenda setting can be a difficult t.docx
Initial Post InstructionsAgenda setting can be a difficult t.docxannettsparrow
 
Initial Post Identify all the components of a cell. Describe the fu.docx
Initial Post Identify all the components of a cell. Describe the fu.docxInitial Post Identify all the components of a cell. Describe the fu.docx
Initial Post Identify all the components of a cell. Describe the fu.docxannettsparrow
 
Initial Discussion Board Post Compare and contrast life for col.docx
Initial Discussion Board Post Compare and contrast life for col.docxInitial Discussion Board Post Compare and contrast life for col.docx
Initial Discussion Board Post Compare and contrast life for col.docxannettsparrow
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxannettsparrow
 
Inital post please respond for the above post question one page with.docx
Inital post please respond for the above post question one page with.docxInital post please respond for the above post question one page with.docx
Inital post please respond for the above post question one page with.docxannettsparrow
 
Infornnation Technologyin Hunnan ResourceAnEmpirical .docx
Infornnation Technologyin Hunnan ResourceAnEmpirical .docxInfornnation Technologyin Hunnan ResourceAnEmpirical .docx
Infornnation Technologyin Hunnan ResourceAnEmpirical .docxannettsparrow
 
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docxINFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docxannettsparrow
 
INFORMATIONGOVERNANCEFounded in 1807, John W.docx
INFORMATIONGOVERNANCEFounded in 1807, John W.docxINFORMATIONGOVERNANCEFounded in 1807, John W.docx
INFORMATIONGOVERNANCEFounded in 1807, John W.docxannettsparrow
 
Informative Presentation Delivery OutlineI. HeaderSpeec.docx
Informative Presentation Delivery OutlineI.  HeaderSpeec.docxInformative Presentation Delivery OutlineI.  HeaderSpeec.docx
Informative Presentation Delivery OutlineI. HeaderSpeec.docxannettsparrow
 
Informed Consent FormBy the due date assigned, submit the Inform.docx
Informed Consent FormBy the due date assigned, submit the Inform.docxInformed Consent FormBy the due date assigned, submit the Inform.docx
Informed Consent FormBy the due date assigned, submit the Inform.docxannettsparrow
 
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docxINFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docxannettsparrow
 
Information Technology Capstone ProjectIn this course, learners .docx
Information Technology Capstone ProjectIn this course, learners .docxInformation Technology Capstone ProjectIn this course, learners .docx
Information Technology Capstone ProjectIn this course, learners .docxannettsparrow
 

More from annettsparrow (20)

Initial Post  (250 words)Read and interpret the short story .docx
Initial Post  (250 words)Read and interpret the short story .docxInitial Post  (250 words)Read and interpret the short story .docx
Initial Post  (250 words)Read and interpret the short story .docx
 
initial post one paragraph intext citation and reference Require.docx
initial post one paragraph intext citation and reference Require.docxinitial post one paragraph intext citation and reference Require.docx
initial post one paragraph intext citation and reference Require.docx
 
Initial Post InstructionsTriggers are ethnocentric responses to .docx
Initial Post InstructionsTriggers are ethnocentric responses to .docxInitial Post InstructionsTriggers are ethnocentric responses to .docx
Initial Post InstructionsTriggers are ethnocentric responses to .docx
 
Initial Post InstructionsFor the initial post,consider thr.docx
Initial Post InstructionsFor the initial post,consider thr.docxInitial Post InstructionsFor the initial post,consider thr.docx
Initial Post InstructionsFor the initial post,consider thr.docx
 
Initial Post InstructionsFor the initial post, choose and ad.docx
Initial Post InstructionsFor the initial post, choose and ad.docxInitial Post InstructionsFor the initial post, choose and ad.docx
Initial Post InstructionsFor the initial post, choose and ad.docx
 
Initial Post InstructionsDiscuss the differences and similaritie.docx
Initial Post InstructionsDiscuss the differences and similaritie.docxInitial Post InstructionsDiscuss the differences and similaritie.docx
Initial Post InstructionsDiscuss the differences and similaritie.docx
 
Initial Post InstructionsAs we jump into the world of Alge.docx
Initial Post InstructionsAs we jump into the world of Alge.docxInitial Post InstructionsAs we jump into the world of Alge.docx
Initial Post InstructionsAs we jump into the world of Alge.docx
 
Initial Post InstructionsFor the initial post, respond to one .docx
Initial Post InstructionsFor the initial post, respond to one .docxInitial Post InstructionsFor the initial post, respond to one .docx
Initial Post InstructionsFor the initial post, respond to one .docx
 
Initial Post InstructionsAgenda setting can be a difficult t.docx
Initial Post InstructionsAgenda setting can be a difficult t.docxInitial Post InstructionsAgenda setting can be a difficult t.docx
Initial Post InstructionsAgenda setting can be a difficult t.docx
 
Initial Post Identify all the components of a cell. Describe the fu.docx
Initial Post Identify all the components of a cell. Describe the fu.docxInitial Post Identify all the components of a cell. Describe the fu.docx
Initial Post Identify all the components of a cell. Describe the fu.docx
 
Initial Discussion Board Post Compare and contrast life for col.docx
Initial Discussion Board Post Compare and contrast life for col.docxInitial Discussion Board Post Compare and contrast life for col.docx
Initial Discussion Board Post Compare and contrast life for col.docx
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
Inital post please respond for the above post question one page with.docx
Inital post please respond for the above post question one page with.docxInital post please respond for the above post question one page with.docx
Inital post please respond for the above post question one page with.docx
 
Infornnation Technologyin Hunnan ResourceAnEmpirical .docx
Infornnation Technologyin Hunnan ResourceAnEmpirical .docxInfornnation Technologyin Hunnan ResourceAnEmpirical .docx
Infornnation Technologyin Hunnan ResourceAnEmpirical .docx
 
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docxINFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
 
INFORMATIONGOVERNANCEFounded in 1807, John W.docx
INFORMATIONGOVERNANCEFounded in 1807, John W.docxINFORMATIONGOVERNANCEFounded in 1807, John W.docx
INFORMATIONGOVERNANCEFounded in 1807, John W.docx
 
Informative Presentation Delivery OutlineI. HeaderSpeec.docx
Informative Presentation Delivery OutlineI.  HeaderSpeec.docxInformative Presentation Delivery OutlineI.  HeaderSpeec.docx
Informative Presentation Delivery OutlineI. HeaderSpeec.docx
 
Informed Consent FormBy the due date assigned, submit the Inform.docx
Informed Consent FormBy the due date assigned, submit the Inform.docxInformed Consent FormBy the due date assigned, submit the Inform.docx
Informed Consent FormBy the due date assigned, submit the Inform.docx
 
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docxINFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
 
Information Technology Capstone ProjectIn this course, learners .docx
Information Technology Capstone ProjectIn this course, learners .docxInformation Technology Capstone ProjectIn this course, learners .docx
Information Technology Capstone ProjectIn this course, learners .docx
 

Recently uploaded

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Information Sciences 305 (2015) 357–383Contents lists availa.docx

  • 1. Information Sciences 305 (2015) 357–383 Contents lists available at ScienceDirect Information Sciences journal homepage: www.elsevier .com/locate / ins Security in cloud computing: Opportunities and challenges http://dx.doi.org/10.1016/j.ins.2015.01.025 0020-0255/� 2015 Elsevier Inc. All rights reserved. ⇑ Corresponding author. E-mail addresses: [email protected] (M. Ali), [email protected] (S.U. Khan), [email protected] (A.V. Vasilakos). Mazhar Ali a,c,⇑ , Samee U. Khan a, Athanasios V. Vasilakos b a North Dakota State University, USA b Kuwait University, Kuwait c COMSATS Institute of Information Technology, Abbottabad, Pakistan a r t i c l e i n f o Article history: Received 5 September 2014 Received in revised form 28 January 2015 Accepted 29 January 2015 Available online 7 February 2015 Keywords: Cloud computing Multi-tenancy Security Virtualization Web services
  • 2. a b s t r a c t The cloud computing exhibits, remarkable potential to provide cost effective, easy to man- age, elastic, and powerful resources on the fly, over the Internet. The cloud computing, upsurges the capabilities of the hardware resources by optimal and shared utilization. The above mentioned features encourage the organizations and individual users to shift their applications and services to the cloud. Even the critical infrastructure, for example, power generation and distribution plants are being migrated to the cloud computing paradigm. However, the services provided by third-party cloud service providers entail additional security threats. The migration of user’s assets (data, applications, etc.) outside the administrative control in a shared environment where numerous users are collocated escalates the security concerns. This survey details the security issues that arise due to the very nature of cloud computing. Moreover, the survey presents the recent solutions pre- sented in the literature to counter the security issues. Furthermore, a brief view of security vulnerabilities in the mobile cloud computing are also highlighted. In the end, the discus- sion on the open issues and future research directions is also presented. � 2015 Elsevier Inc. All rights reserved. 1. Introduction Since its inception, the cloud computing paradigm has gained the widespread popularity in the industry and academia
  • 3. [88]. The economical, scalable, expedient, ubiquitous, and on- demand access to shared resources are some of the character- istics of the cloud that have resulted in shifting the business processes to the cloud [25,2]. The cloud computing attracts the attention of research community due to its potential to provide tremendous benefits to the industry and the community [9,88]. The resources are provided to the users and released based on demands from the pool of shared resources [4]. The on-demand resource provisioning ensures the optimal resource allocation and is also cost effective [78]. The consumers (individuals and business organizations) no longer need to invest heavily in the information technology (IT) infrastructure [4]. Customers use resources provided by the cloud and pay according to the use. On the other hand, cloud providers can re-use resources as soon as they are released by a particular user resulting in improved resource utilization [78]. Ease of use is yet another advantage being offered by the cloud computing because it does not require the customers to possess extraordinary expertise pertaining to the cloud specific technologies [5]. The management of the technology and services has moved from user to the service provider’s end [5]. http://crossmark.crossref.org/dialog/?doi=10.1016/j.ins.2015.01. 025&domain=pdf http://dx.doi.org/10.1016/j.ins.2015.01.025 mailto:[email protected] mailto:[email protected] mailto:[email protected] http://dx.doi.org/10.1016/j.ins.2015.01.025 http://www.sciencedirect.com/science/journal/00200255 http://www.elsevier.com/locate/ins 358 M. Ali et al. / Information Sciences 305 (2015) 357–383 The cloud computing provides virtualized resources to the
  • 4. customers using various technologies, for example, Web ser- vices, virtualization, and multi-tenancy. The cloud services are delivered to the customer through the Internet [25]. The Web applications are used to access and manage cloud resources that makes Web applications an important component of the cloud computing [70]. The customers’ processes are executed in virtualized environment that in turn utilize the physical resources [35]. Multiple virtual processes of various users are allocated to same physical machines that are segregated logically. This gives rise to a multi-tenant environment in the cloud. Despite the provided advantages, the cloud computing is not exclusive of risks with security being the key risk [57]. Security is one of the biggest obstacles that hamper the widespread adoption of cloud computing [28]. Several business and research organization are reluctant in completely trusting the cloud computing to shift digital assets to the third-party service providers [57]. The conventional IT infrastructure keeps the digital assets in the administrative domain of the organizations. All of the processing, movement, and management of data/application are performed within the organization- al administrative domain. On the other hand, organizations do not enjoy administrative control of cloud services and infrastructure [52]. The security measures taken by the cloud service providers (CSP) are generally transparent to the organizations. The presence of large numbers of users that are not related to the organizations, aggravate the concerns further [57]. The users might be trusted by the CSP but they may not be of trust to each other. The aforementioned reasons keep the customers under uncertainties about their digital assets located at the cloud resulting in reluctance to adopt cloud computing [57]. There are various studies in the literature discussing the security issues of the cloud computing. The authors in [85,101]
  • 5. presented reviews on the security issues of the cloud computing. However, the aforesaid studies are limited to the discussion of security issues only and the security solutions are not discussed. Ref. [71] reviewed the security issues at different levels of cloud computing. The security solutions have also been presented in [71]. However, the future discussion has not been dis- cussed comprehensively and overview of the cloud technology is missing. The authors in [1] presented a comprehensive study of privacy preservation in the cloud with focus only on e- health clouds. Moreover, the study in [1] is limited in scope to the privacy only. Ref. [121] reviewed the security and privacy challenges in the cloud computing and discussed the defense strategies for the existing vulnerabilities. However, the discussion of the security issues in [121] was centered on confidentiality, integrity, availability, accountability, and privacy-preservability with little discussion on the technologies causing the vulnerability origination. The authors in [74] elaborated the security issues in the cloud along with the approach- es that can be employed to tackle the vulnerabilities. Nevertheless, the discussion on future research directions is lacking in the survey. Likewise, the work in [39] detailed the security issues in the cloud computing in depth with brief discussion on current and latest security solutions. The work in [18] surveyed the popular security models of cloud computing, such as cube model, multi-tenancy model, and risk assessment model. Moreover, the authors of [18] have discussed the security risks of cloud computing. However, the risks are discussed from the perspective of different stack holders, like customers, government, and service providers. Security issues from the technological and operational point of view were not in the scope of the aforesaid study. Similarly, the strategies to relieve the security issues are discussed in terms of ‘‘what’’ compo-
  • 6. nents and processes should be secured and evaluated. ‘‘How’’ the security objectives are achieved in current research is not elaborated. Similarly, the article [104] describes the security issues in cloud computing and associated security solutions. However, the discussion is more focused on the privacy part of cloud security. Moreover, there is no discussion on future research directions. Our survey differs significantly from the aforesaid surveys in terms of its extensiveness, comprehensive discussion on security issues in cloud computing, and emphasizes on latest security solutions presented in the literature. We also provide the tabulated comparisons of the presented techniques. Moreover, we briefly discuss the security issues pertain- ing to mobile cloud computing and generic strategies that can lead to solutions. The contributions of this survey with respect to the aforesaid surveys are presented in Table 1. The ’’U’’ and ’’ ’’ denote whether the domain specified in the column has been discussed in the survey or not. The remainder of the paper is organized as follows. Section 2 provides the architectural framework of the cloud computing. The security issues in the cloud computing paradigm are detailed in Section 3 whereas the existing solutions in the contemporary literature are presented in Section 4. Section 5 highlights the security concerns in the mobile cloud com- puting (MCC). Section 6 discusses the techniques and open issues and Section 7 concludes the survey. Table 1 Contributions of this study with respect to the discussed surveys. Work Cloud overview Security issues Counter measures Open issues
  • 7. [85] U U [101] U U [71] U U [1] Privacy only U U [121] U U U Privacy only [74] U U [39] U U [18] U U This survey U U U U M. Ali et al. / Information Sciences 305 (2015) 357–383 359 2. Cloud computing architectural framework Cloud computing integrates various computing technologies to provide services to the end users. To understand the secu- rity issues pertaining to the cloud computing, it is important to briefly introduce the concepts that contribute to the cloud computing. The National Institute of Standards and Technology’s (NIST) definition [69] of cloud computing is widely accept- ed [28]. The NIST definition considers the cloud computing as a threefold model of service provisioning (Fig. 1), comprising of: (a) essential characteristics, (b) service models, and (c) deployment models. The cloud computing concepts in the light of NIST definition are presented below. 2.1. Essential characteristics 2.1.1. On-demand self-service Customers can request and manage the services from the cloud without any human interaction with the CSP. The provi- sion of the services and the associated resources is
  • 8. accomplished as and when required. This is usually done through Web services and management interfaces [28]. 2.1.2. Broad network access The services and the customer’s applications and data present on the cloud must be accessible to the customers using the standard mechanisms and protocols. The characteristic further demands that the availability of services should support heterogeneous thin or thick environment (for example, mobile phones, laptops, workstations, tablets). Broad network access is sometimes referred to as ubiquitous network access in the literature [28]. 2.1.3. Resource pooling The cloud’s resources are shared among multiple customers by pooling in a multi-tenant environment. The customers are transparent about the location of the resources. There is a mapping between physical and virtual resources provided to the customers. 2.1.4. Rapid elasticity The resources can be rapidly and elastically scaled as per customer’s demands. The customer has a view of unlimited resources that can be purchased as needed in a pay-as-you-go manner. 2.1.5. Measured service The scaling of resources up and down is performed dynamically and the usage of services is metered and reported to the customer and CSP. The metering also helps the optimization of resource usage automatically while the users are charged in a
  • 9. pay-as-you-use manner. 2.1.6. Multi-tenancy The NIST defines the above mentioned five characteristics of the cloud computing. However, the Cloud Security Alliance (CSA) adds multi-tenancy as an important characteristic of the cloud computing (although not an essential characteristic) Fig. 1. NIST definition of cloud computing. 360 M. Ali et al. / Information Sciences 305 (2015) 357–383 [21]. Multi-tenancy is the property that enables the use of a single resource by multiple customers that may or may not belong to the same organization. Multi-tenancy results in optimal use of resources and different customers are segregated logically. 2.2. Service models The NIST divides the services provided by the cloud computing into three categories, namely: (a) software as a service (SaaS), (b) platform as a service (PaaS), and (c) infrastructure as a service (IaaS). The cloud service model is referred to as SPI (software, platform, and infrastructure). 2.2.1. SaaS The SaaS enables the customers to use CSP’s applications, running on the cloud infrastructure, through the Internet. The thin client interface can be used to access the applications such as web browser. The SaaS does not provide the facility to create an application or software. The SaaS only provides software through Internet making it a model to distribute the soft-
  • 10. ware through Web. The customers pay for the usage and do not own the software [96]. 2.2.2. PaaS The applications that are owned by the customer need a frame work where they can be executed and managed. This includes integrated development environments (IDE), operating systems, and platform layer resources (run time engine that executes the applications). The aforementioned services are provided as PaaS. The PaaS does not provide customers with the control over the underlying cloud infrastructure but only on the applications that are moved to the cloud. 2.2.3. IaaS The IaaS refers to the hardware infrastructure provided by the CSP including the network, storage, memory, processor, and various other computing resources. The resources are provided in the form of virtualized systems accessible through Internet. The CSP has a control over the underlying resources [39]. 2.3. Deployment models There are four models that can be used to deploy a cloud computing infrastructure, namely: (a) private cloud, (b) public cloud, (c) community cloud, and (d) hybrid cloud. 2.3.1. Private cloud The cloud that is run and managed only for a single organization is the private cloud. The organization may or may not own the physical infrastructure and can be managed by the organization itself or by a third party. Similarly, private cloud
  • 11. may or may not be located at organization’s geographical site. However, whatever the case may be, private cloud is for the use of only single organization and the resources are not utilized by any other customer. 2.3.2. Public cloud The cloud’s physical infrastructure is owned by the CSP and is open to general public and organizations. The resources are shared among all the customers. The customers pay the cloud owner according to the services and resources they use. The physical infrastructure is located off-site to the customers and is managed by the CSP. 2.3.3. Community cloud The community cloud is shared by a number of organizations and/or customers forming a community. Generally, the community shares common interests, such as the mission, security requirements, policy, and compliance considerations. The community cloud may be managed by any of the organizations in the community or a third party. Similarly, it may be located on premise or off-premise. 2.3.4. Hybrid cloud The hybrid cloud is the mix of two or more clouds (public, private, or community). All of the participating clouds retain their status of a unique entity, but share standardized or proprietary technology. 3. Cloud security challenges The characteristics and models of the cloud computing presented in previous section offer improved, optimized, and
  • 12. low cost services to the customers. The above given models providing the mentioned characteristics are implemented using var- ious technologies, for example virtualization and multi-tenancy. The technologies along with the cloud service and deploy- ment models introduce cloud specific security risks and vulnerabilities in addition to shared risks with the conventional IT infrastructure [87]. The security risks in cloud may differ from the risks of conventional IT infrastructure either in nature or M. Ali et al. / Information Sciences 305 (2015) 357–383 361 intensity or both. Resource pooling allows the use of same pool by multiple users through multi-tenancy and virtualization technologies. Although, the technologies introduce rapid elasticity and optimal management of resources, they also intro- duce certain risks in the system. Multi-tenancy leads to the risks of data visibility to other users and trace of operations. On-demand self-service characteristic is provided to the customers by means of Web based management interfaces that causes the probability of unauthorized access to the management interface higher than the traditional systems [28]. Similar- ly, virtualized environment introduces its own set of risks and vulnerabilities that includes malicious cooperation between virtual machines (VM) and VM escape. Likewise, from the cloud service model view point, the service models are dependent on each other. The SaaS applications are built and deployed over the PaaS and the PaaS is dependent on the underlying IaaS. This operational dependency of the service models on each other brings in the security dependency also. For example, if an attacker succeeds to take control of IaaS, the result will be a
  • 13. compromised PaaS that is utilizing IaaS. A compromised PaaS can lead to compromised SaaS. In short, any compromised service model gives access to other layer of the service model. The private cloud deployment model inherits the same set of vulnerabilities as possessed by the conventional IT infrastructure. The reason being the private cloud is meant for the use of a single organization. The public, community, and hybrid clouds possess more cloud specific vulnerabilities and risks due to presence of users from different origins and administrative con- trol of a third party [15]. The presence of multi-tenants using virtualized resources that may correspond to same physical resources introduces many security concerns. The perfect segregation of numerous tenants and allocated resources is a com- plex task and needs much higher level of security. In the following discussion we present the security challenges being faced by the cloud computing. There are numerous works that look upon the cloud security challenges from service model per- spective. In this paper we detail the challenges based on three abstract domains, namely, (a) architectural issues, (b) com- munication issues, and (c) contractual and legal issues. Some of the technologies in cloud computing do not affect any particular service model. Instead more than one models become affected, such as, virtualization that can affect both the IaaS and PaaS. Therefore, we look at the challenges at abstract level irrespective of the service model. The taxonomy of the secu- rity challenges in the cloud computing is depicted in Fig. 2. 3.1. Challenges at communication level The cloud services are normally available to the customers through the Internet [125]. Standard Internet protocols and mechanisms are used for communication between the customers and the cloud [101]. The communication process results
  • 14. in transmission of either data/information or applications between the customer and the cloud. Moreover, there exists com- munication within cloud between VMs. We divide the cloud communication into two categories, namely: (a) communica- tion external to the cloud (between customers and cloud) and (b) communication internal to the cloud (communication occurring within cloud infrastructure). Fig. 2. Cloud security challenges. 362 M. Ali et al. / Information Sciences 305 (2015) 357–383 The external communication of cloud is similar as any other communication over the Internet. Therefore the challenges faced by the cloud due to Internet characteristic are same as the challenges of conventional IT communication [30]. These challenges include denial-of-service, man-in-the-middle, eavesdropping, IP-spoofing based flooding, and masquerading [94,62]. The solutions to these challenges are also the same as employed conventionally, such as, Secure Socket Layer (SSL), Internet Security Protocol (IPSec), cryptographic algorithms, intrusion detection and prevention systems, traffic clean- ing, and digital certificates [94,43]. As these challenges and solutions are inherent from conventional IT infrastructure, we do not detail them in this study. We focus on internal cloud communication that generates cloud specific challenges because of cloud specific characteristics and technologies. 3.1.1. Shared communication infrastructure Resource pooling not only results in sharing of computational and storage resources but also sanctions the sharing of
  • 15. network infrastructure components [28]. The sharing of network components provides attacker the window of cross-tenant attack [39]. The vulnerability stems from the resource pooling characteristic of the cloud computing and affects the IaaS service model of the cloud. Due to the fact that it is hard to distinguish between a legal vulnerability scan of network and attacker activity, usually such scans are not allowed by the service providers. Similarly, the IP-based segregation of network portions are not applied as network resources are dynamically provisioned and released and cannot be associated to particular set of users. The users on the cloud are usually granted with the super-user access for the purpose of managing their VMs [12]. The access capability empowers the malicious user to acquire system IP or MAC addresses and make malicious use of IaaS net- work interfaces. The malicious user with super-user access to the real network components may launch attacks, such as, sniffing and spoofing over the real network. 3.1.2. Virtual network In cloud computing systems, the communication takes place not only on real networks but virtualized networks also play an important role in communication. Virtual network is a logical network built over a physical network [116]. The virtual networks are responsible for communication between VMs. The software-based network components, such as bridges, routers, and software-based network configurations, support the networking of VMs over the same host. The virtualized networks are able to generate the following security challenges in the cloud environment. Security and protection mechanisms over the physical network are not able to monitor the traffic over virtualized
  • 16. network. This becomes a serious challenge as malicious activities of the VMs go beyond the monitoring of security tools. Intrusion detection and prevention mechanisms usually depend on the traffic patterns and activities to judge the anomalies and detect the possibility of the attack. Virtualized network poses a hindrance to the goal of such preventive measures [47]. The virtualized network is shared among multiple VMs that causes the possibility of certain attacks, such as, Denial of Service (DoS), spoofing and sniffing of virtual network. The traffic rates can be monitored for malicious purposes. The cryp- tographic keys become vulnerable to leakage, in case of malicious sniffing and spoofing of virtual network [33]. The data in transit belonging to users can suffer from costly breaches due to risks presented in Section 3.1.1 and Section 3.1.2. 3.1.3. Security misconfigurations Security configurations of the cloud network infrastructure are of significant importance in providing secure cloud ser- vices to the user [24]. Misconfigurations can radically compromise the security of customers, applications, and the whole system [26]. Customers outsource their applications and data to the cloud with the trust that their assets are secure within the cloud environment. A small misconfiguration can breach the security of the system. The configurations need to be well in place not only at the time of cloud infrastructure development, deployment, and operations but subsequent changes in the cloud network should also keep the configuration consistent with the security policies [24]. One of the most common misconfiguration occur when administrators select such a configuration tool that they are familiar with but not necessarily covers all the security requirements [24]. The migration of
  • 17. VMs, data, and applications across multiple physical nodes, changes in traffic patterns, and topology can generate the requirement of varied security policies [66]. In such a scenario, the configuration of the cloud should dynamically be managed to ensure the security of the cloud. Likewise, any weakness in session configurations and protocol configurations can be exploited for session hijacking and to gain user sensitive data [101]. 3.2. Challenges at architectural level 3.2.1. Virtualization issues Virtualization is one of the strategic components of the cloud. Virtualization allows the use of same physical resources by multiple customers. A separate VM is instantiated for each user that virtually provides a complete operating machine to the user [74]. Several VMs can be mapped to the same physical resources allowing the resource pooling in multi-tenant envi- ronment. A VM monitor (VMM) or hypervisor is the module that manages the VMs and permits various operating systems to run simultaneously on the same physical system [74]. Nevertheless, virtualization also introduces security challenges to the cloud users and infrastructure [83]. We discuss the security issues related to virtualization below. M. Ali et al. / Information Sciences 305 (2015) 357–383 363 3.2.1.1. VM image sharing. A VM image is used to instantiate VMs. A user can create his/her own VM image or can use an image from the shared image repository [39]. The users are allowed to upload and download images from the repository (for example Amazons image repository) [39]. Sharing of VM images in the image repositories is a common practice and
  • 18. can evolve as a serious threat if it is used in malicious manner [47]. A malicious user can investigate the code of the image to look for probable attack point. On the other hand, a malicious user can upload an image that contains a malware [47]. The VM instantiated through the infected VM image will become source of introducing malware in the cloud computing system. Moreover, an infected VM can be used to monitor the activities and data of other users resulting in privacy breach. Likewise, if the image is not properly cleaned, it can expose some confidential information of the user [39]. 3.2.1.2. VM isolation. VMs running on the same physical hardware need to be isolated from each other. Although logical iso- lation is present between different VMS, the access to same physical resources can lead to data breach and cross-VM attacks. Isolation is not only needed on storage devices but memory and computational hardware also needs fine grained isolation of VMs [33,101]. 3.2.1.3. VM escape. VM escape is a situation in which a malicious user or VM escapes from the control of VMM or hypervisor [97]. A VMM is a software component that manages all the VMs and their access to the hardware. The VM escape situation can provide attacker access to other VMs or can bring the VMM down [47]. A successful VM escape attack can provide access to the computing and storage hardware. The IaaS service model is affected that can in turn effect other service models [73]. 3.2.1.4. VM migration. The VM migration is the process of relocating a VM to another physical machine without shutting down the VM [128]. The VM migration is carried out for a number of reasons, such as load balancing, fault tolerance, and maintenance [39,20]. During the migration phase, the contents
  • 19. of the VM are exposed to the network that might lead to data privacy and integrity concerns. Besides data, the code of VM also becomes vulnerable to attackers during migration [128,47]. The migration module can be compromised by an attacker to relocate the VM to a compromised server or under the control of compromised VMM. The VM migration is a crucial phase and needs to be carried out in a secured manner [39]. 3.2.1.5. VM rollback. Virtualization allows the rollback of a VM to some previous state whenever it is needed. The rollback feature provides flexibility to the user. However, rollback also raises security concerns [90]. For example, the rollback can enable the security credentials that were previously disabled [39]. Moreover, the rollback can also render the VM to a vul- nerability that was previously patched [116]. Furthermore, the rollback can revert the VM to previous security policies and configuration errors [39]. 3.2.1.6. Hypervisor issues. The key module of virtualization is hypervisor or VMM. The VMs management and isolation is the responsibility of the VMM. Generating and managing virtual resources, is yet another function performed by the VMM. A VMM may affect the execution of VMs running on the host system [106]. A compromised VMM can put all the VMs that are managed by the victim VMM under attacker’s control [102]. The metadata of the VMs, kept by the VMM, may also be exposed … Background Cloud computing is an evolving technological paradigm that has outgrown decades of research in computing, networking,
  • 20. virtualization and Service-Oriented Architectures (SOA). The technology paradigm offers scalable and on-demand access to a pool of resources that are hosted by cloud providers in the data centers (Roy et al. 2015). Cloud computing is a widely integrated technology today based on its ability to reduce costs in the computing environment while also enhancing scalability and flexibility of the computer processes (Roy et al. 2015). As such, cloud computing has grown from a promising technology to one that is highly adopted by the fast-growing businesses in the IT industry. Considerably, cloud computing is an architectural movement that presents new ways to deploy and manage applications. Its significance is underlined by its ability to support business-critical applications, an aspect that is behind its extensive integration in the business environment (Ahuja & Mani, 2013). However, organizations have highlighted vast concerns regarding the integration of this technology ranging from security vulnerabilities to the availability of services. While cloud computing is associated with vast security vulnerabilities, the availability of critical services is a significant factor as this affects the operability of the business processes. Availability ends a critical challenge in the cloud computing paradigm as it affects access to critical services. The paper evaluates the availability of critical services as a significant challenge in the cloud computing environment. The goal of the research is to highlight the inherent flaw of the overall approach that impedes access to business resources in the cloud environment and provides countermeasures for adoption to design a lean system that enables businesses to access services at all times. The proposal provides an overview of the literature review regarding why the problem exists, its impact on the users and its relevance and significance in the cloud computing environment. Considerably, the paper provides a detailed discussion of how the study will be undertaken relative to the goal to be achieved. Moreover, the proposal details on the hurdles likely to be encountered during the research process. Problem Statement
  • 21. Notably, cloud computing is designed to enable access to a pool of resources such as data, application, servers, and computer networks. The access to this resources is done by either a privately owned cloud or a third-party server that is situated in a data center. With this, access to the resources is made more reliable and efficient (Roy et al. 2015). Given the fact that the cloud environment utterly depends on the allocation of resources to the economy of scale and consistency, it is a cost- effective technology solution making it a viable option for most businesses. Despite this, service downtime is a significant challenge of the cloud technology (Hashem et al. 2015). The availability of different cloud providers set the stage for enhancing effectiveness in service provision. However, no single service provider can guarantee its user’s access to the critical resources at all times. While the cloud technology makes businesses reliant on their connectivity, its effective use is hampered by possible downtimes that bars access to the critical resources (Hashem et al. 2015). Thus, cloud technology is designed to provide vast benefits to its users including efficiency. However, outages negatively affect access to critical resources thereby affecting business operations. The strength of the cloud computing technology is assessed based on its availability and reliability. Notably, availability denotes the possibility of accessing resources when needed while taking into consideration the time it takes for the resources to be provisioned. Comparatively, reliability highlights the availability of resources at all times without disruption and how often the platform fails (Hashem et al. 2015). An important aspect that poses significant problems in the cloud computing environment is the possible downtime. Regardless of the seamless nature of the architecture that is designed to foster reliability and availability of resources, cloud technology tends to experience service downtime, denial of service attacks, equipment outages, performance slowdowns, and natural disasters. Research has shown that cloud providers have experienced service outages in the past, such as Amazon, a
  • 22. problem that impedes service provision to users (Roy et al. 2015). Such challenges have enhanced uncertainty and doubt among cloud users thereby prompting the need to design approaches to address the inherent flaws of the technological architecture. The level of reliability and availability of resources in the cloud environment is a serious issue as it affects effective service provisions to the customers. Availability is a significant challenge in cloud computing environments. Due to the critical services provided by most organizations, the systems should be available at all times. This ensures that users can have regular access to their data and applications (Ahuja & Mani, 2013). Despite this, achieving high availability in cloud computing is challenging than initially perceived. While most critical business applications are running in the cloud computing environment, there are inherent flaws in the overall approach. The flaws are not appropriate for mission- critical workloads as they impede access to applications and data that are vital to an organization’s processes (Roy et al. 2015). Given the fact that the cloud computing environments are subject to an outage, organizations are concerned that their demands such as critical applications and data cannot be accessed. Within the cloud environment, various virtual machines are used to host the same physical server infrastructure. The standards model used by most cloud service providers to make resources such as data and applications available to its users is the public cloud (Hashem et al. 2015). While the public cloud services might be free, vast concerns are associated with its use, particularly the availability of resources in critical moments (Ahuja & Mani, 2013). Notably, irrespective of whether the cloud is operating on private, public or hybrid models, availability is an important aspect of the virtualization technology that ought to be addressed. Such problems involve system overflows due to the excessive combination of the VM to a physical server which affects resource availability (Aldossary & Allen, 2016). Because of these issues, the cloud
  • 23. computing environments are vulnerable to attacks such as the Denial of Service (DoS) which makes the server inaccessible to the legitimate users (Shukhman et al. 2015). With this, businesses are increasingly wary of the cloud computing service providers as they need high resource availability to enhance their normal processes. In this context, providers must guarantee that legitimate users will have high availability of their resources (critical applications and data). Therefore, the availability of resources in cloud computing is a significant issue that ought to be addressed.Goal The study explores reliability and availability of resources in cloud technology and how this hampers effective service provision for businesses. The goal of the study is to highlight the inherent flaw of the overall approach that impedes access to business resources in the cloud environment and provides countermeasures for adoption to design a lean system that enables businesses to access services at all times. By evaluating the reliability and availability of resources in the cloud architecture, it can be identified with ease measures for adoption to address the inherent flaw of the technology. As such, the study conducts a review of the reliability and availability of resources in the cloud environment to ascertain its impact on businesses and mechanisms for adoption to improve the system. Through this, the study explores major issues including service downtime, denial of service attacks, equipment outages, performance slowdowns, and natural disasters. To ascertain its success, the study will evaluate whether the proposed measures are effective in addressing both reliability and availability of resources. Relevance and Significance Security is an aspect of concern in the cloud environment. This is enhanced by the extensive vulnerabilities associated with the system, susceptibilities that can be readily exploited by the cyber attackers (Ali, Khan & Vasilakos, 2015). With this, cyber-attacks are a major cause of service unavailability in cloud computing. By executing Denial of Service attacks, the
  • 24. attacker can obtain authorized access to the system processes similar to that of the legitimate users. Given the fact that most organizations need their resources all the time, the DoS is catastrophic as it impedes access to critical services. By using all the resources, other system users cannot access the services (Shukhman et al. 2015). Besides, the attacker can slow access to the critical services through the use of Denial of Service attacks. The lack of virtual IPs for the virtual machines is a significant factor in the unavailability of business-critical resources. During the setup process, the virtual machines assume a regular IP address that never changes (Ali, Khan & Vasilakos, 2015). With this, increased traffic results in system slow down or failure thereby impeding access to the critical services. While the static IP address is administered to maintain the virtual machines, increased traffic can result in system slow down or failure. Thus, the lack of virtual IPs for the virtual machines often results in resource unavailability for the cloud computing systems. Additionally, system overflows due to an excessive combination of the VM to physical server affects resource availability. Service unavailability in the clouds is enhanced by the inherent flaws of the overall approach in its set up. For instance, most cloud providers leverage on out of the box clustering or virtual machines solutions migration. Notably, these features are not only complex to manage but also fail to adequately protect the applications for transaction loss (Noor et al. 2013). Considerably, the availability approaches solely focus on the discrete application for the virtual machines over the entire application service chain. Most of the cloud computing technologies are designed around commoditized software and hardware (Noor et al. 2013). As such, the monitoring and management of the system activity are left to the cloud management software. With this, there is a lag time between system outage and the management software noticing the problem to start the recovery process (Noor et al. 2013). System downtime hampers the legitimate cloud users from
  • 25. accessing their resources which can be catastrophic. Even though availability differs among the users, its effect is quantified on the accessibility of business-critical resources (Santos et al. 2017). Moreover, resource unavailability does not only affect user experience but also incurs direct costs for both the organizations and the cloud providers. As such, the study’s significance is to evaluate the causative factors of resource unavailability in cloud computing to identify the failure point and propose effective countermeasures for adoption. The identification of the failure points is important as this will serve future research studies for cloud provider seeking to improve service provision. Thus, the outcome of the study serves to address resources reliability and availability in the cloud environment by identifying failure points. Literature Review Cloud computing is a multifaceted technology that offers scalable and on-demand access to a pool of resources that are hosted by cloud providers in the data centers. Cloud computing is a widely integrated technology today based on its ability to reduce costs in the computing environment while also enhancing scalability and flexibility of the computer processes. Despite its promise, vast concerns have been highlighted regarding resources reliability and availability (Hashem et al. 2015). Notably, the strength of the cloud computing technology is assessed based on its availability and reliability of resources. The existence of different failure points in the system hampers access to business-critical services, an aspect that is of significant concern in the IT sector (Aldossary & Allen, 2016). Inefficient reliability and availability of resources are attributed to different factors including system vulnerability to attack, lack of virtual IPs for the virtual machines, system overflows due to an excessive combination of the VM to physical servers and inherent flaw of the overall approach deployed by cloud providers (Santos et al. 2017). The existence of the problem poses vats implications to the business, aspects that not only bar business operations but also incur additional costs. System vulnerability is a major aspect hampering resource
  • 26. reliability and availability in the cloud environment. The existence of different failure points in the cloud environment predisposes the infrastructure to third-party intrusion to instigate Denial of Service (DoS) attacks (Aldossary & Allen, 2016). Cyber attackers can infect the cloud architecture with a malicious program such a botnet that enables them to execute DoS by obtaining access to the system processes similar to that of authentic cloud users (Aldossary & Allen, 2016). The DoS attacks are castigated to hamper access to business-critical resources such as applications software by either slowing down the system or impeding access for the legitimate users (Santos et al. 2017). The traditional countermeasure to this attack is increasing the number of critical resources, but a serious problem occurs when the intruder occourstrate an attack using the botnet. The current network countermeasures are not effective in preventing the DoS attacks as they cannot stop the deluge of the traffic and cannot distinguish between good and bad traffic. However, Intrusive Prevention Systems (IPS) are effective countermeasures particularly if the attacks can be identified or have pre-existing signatures (Ahuja & Mani, 2013). Despite this, such countermeasures are ineffective when there is legitimate content with bad intentions. Moreover, the use of firewalls is not only ineffective but also vulnerable to different types of attacks as the attackers can bypass them (Santos et al. 2017). Thus, the current countermeasures are ineffective in curtailing DoS attacks that attribute to resource unavailability. The use of cloud technology infers that data and applications will be mover under the control of a third-party (Aldossary & Allen, 2016). Based on the cloud-services delivery model, clouds with virtual perimeters are created together with security controls that are shared between the cloud service provider and the customer. The shared-responsibility model is associated with vast security and resource availability challenges to the business operations. The biggest challenge is accessing business-critical services at all time as this is imperative for
  • 27. business success (Santos et al. 2017). However, this is impeded by the lack of virtual IPs for the virtual machines and system overflows due to an excessive combination of the VM to physical servers. The lack of virtual IPs for the virtual machines results in increased traffic, an aspect that is enhanced by the fact that the security countermeasures cannot differentiate between good and bad traffic. This results in system downtime thereby hampering access to business-critical services. Moreover, system overflow due to the combination of the virtual machines to the physical serves predisposes the cloud technology to third-party intrusions which result in system downtime. This is a significant factor that fosters DoS attacks on the system thereby impeding access to resources. The overall system approach integrated for use by cloud providers hampers resource availability and reliability at all times. The widely used approaches are challenging to manage and fail to integrate robust security mechanisms to prevent DoS attacks. Having evolved as a promising technology in the past decade, cloud technology is facing negative shifts to its use as users are wary of its capacity to meet business demands (Santos et al. 2017). There is a need for a universal model to be adopted by the cloud providers to guarantee resource reliability and availability. Researchers have proposed the integration of a HAIL (high availability and integrity layer) model to address the issue of server unavailability (Bowers, Juels & Oprea, 2010). The HAIL model is designed to distribute data across different servers to ensure resource availability at all times. The HAIL model can be adopted by cloud service providers as it leverages on unreliable components to create a reliable solution that is cost effective (Bowers, Juels & Oprea, 2010). Approach For this research, secondary data analysis will be used to evaluate resource reliability and availability in cloud computing. The research methodology aims at evaluating resource availability in cloud technologies by collecting information from case studies and peer-reviewed sources (Gall et al. 2014). Extensive information will be obtained from peer-
  • 28. reviewed research to establish the basis of resource reliability and availability in cloud computing and the countermeasures for adoption to curtail this problem. The articles and case studies for research will be obtained from library databases to determine why the problem exists, its impact and the current countermeasures in practice. Conducting extensive research from secondary sources is augmented by the notion that the problem cannot be quantified (Gall et al. 2014). The data will be collected and then assessed to discuss the problem of resource availability in cloud computing extensively. The identified articles will be evaluated through an established inclusion and exclusion criteria relative to its significance to the problem of discussion in cloud computing. Considerably, keywords such as reliability and availability will be used to identify relevant articles for study and use for research (Gall et al. 2014). The findings from the research articles will be tabulated based on the significance relative to resource availability (Gall et al. 2014). Given the fast changes in the cloud computing paradigm, vast challenges will be encountered such as identifying effective measures for curtailing system intrusion. However, this can be addressed by determining system design flaws exploited by the attackers. Therefore, secondary data analysis will establish the basis of collecting extensive information regarding resource reliability and availability in cloud computing. References Ahuja, S. P., & Mani, S. (2013). Availability of services in the era of cloud computing. Network and Communication Technologies, 1(1), 2. Aldossary, S., & Allen, W. (2016). Data security, privacy, availability and integrity in cloud computing: issues and current solutions. International Journal of Advanced Computer Science and Applications, 7(4), 485-498. Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.
  • 29. Bowers, K. D., Juels, A., & Oprea, A. (2010, November). HAIL: A high-availability and integrity layer for cloud storage. In Proceedings of the 16th ACM conference on Computer and communications security (pp. 187-198). ACM. Gall, M. D., Gall, J. P., Borg, W. R., & Meredith (Mark) D. Gall. (2014). Applying educational research: How to read, do, and use research to solve problems of practice. Pearson. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information systems, 47, 98-115. Noor, T. H., Sheng, Q. Z., Zeadally, S., & Yu, J. (2013). Trust management of services in cloud environments: Obstacles and solutions. ACM Computing Surveys (CSUR), 46(1), Article 12, pp. 1-30. Roy, A., Sarkar, S., Ganesan, R., & Goel, G. (2015). Secure the Cloud: From the Perspective of a Service-Oriented Organization. ACM Computing Surveys (CSUR), 47(3), Article 41, pp.1-30 Santos, G. L., Endo, P. T., Gonçalves, G., Rosendo, D., Gomes, D., Kelner, J., & Mahloo, M. (2017, July). Analyzing the IT subsystem failure impact on availability of cloud services. In Computers and Communications (ISCC), 2017 IEEE Symposium on (pp. 717-723). IEEE. Shukhman, A., Polezhaev, P., Ushakov, Y., Legashev, L., Toarasov, V., & Bakhareva, N. (2015). Development of network security tools for enterprise software-defined networks. Proceedings of the 8th International Conference on Security of Information and Networks (pp. 224-228). New York, NY: ACM.