Skip to main content

Security Validation of Cloud Based Storage

  • Conference paper
  • First Online:
Advances in Computing and Data Sciences (ICACDS 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1046))

Included in the following conference series:

Abstract

In the era of big data and IoT, rate of data generation is very high which needs lot of space. So it is not feasible to store such huge data locally. Hence, to cater the large storage need cloud based storage models has evolved. With the increasing demand of cloud storage, occurrence frequency of security threats has increased exponentially. The steep rise in threat incidences cannot be ignored, as cloud storage model is being used for storing confidential data. Increased threat rate cause decline in the acceptance rate of cloud-based storage models besides it numerous benefits. In this paper, we are evaluating our existing proposal by applying it on an open source cloud based system. Evaluation is done by comparing the threats identified using our approach and threats reported on it by CVE.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, F., et al.: NIST cloud computing reference architecture: recommendations of the national institute of standards and technology. NIST Special Publication 500-292, Gaithersburg (2011)

    Google Scholar 

  2. Honer, P.: Cloud computing security requirements and solutions: a systematic literature review. In: 19th Twenty Student Conference on IT (2013)

    Google Scholar 

  3. Rong, C., Nguyen, S., Jaatun, M.: Beyond lighting: a survey on security challenges in cloud computing. Comput Elect. Eng. 39(1), 47–54 (2013)

    Article  Google Scholar 

  4. Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. Proc. Eng. 15, 2852–2856 (2011). Advances in control engineering and information science

    Article  Google Scholar 

  5. Che, J., Duan, Y., Zhang, T., Fan, J.: Study on the security models and strategies of cloud computing. Proc. Eng. 23, 586–593 (2011). International conference on power electronic and engineering application

    Article  Google Scholar 

  6. Ficco, M., Palmieri, F., Castiglione, A.: Modeling security requirements for cloud-based system development. Concurrency Comput.: Pract. Experience 27(8), 2107–2124 (2015)

    Article  Google Scholar 

  7. Islam, S., Mouratidis, H., Edgar, R.W.: A goal-driven risk management approach to support security and privacy analysis of cloud- based system. In: Mario Piattini, E.F.-M. (ed.) Security Engineering for Cloud Computing. IGI Global, Hershey (2011)

    Google Scholar 

  8. Naveed, R., Abbas, H.: Security requirements specification framework for cloud users. In: Park, J., Stojmenovic, I., Xhafa, F. (eds.) Future Information Technology. LNEE, vol. 276, pp. 297–305. Springer, Berlin (2014). https://doi.org/10.1007/978-3-642-40861-8_43

    Chapter  Google Scholar 

  9. Jaiswal, S., Gupta, D.: Security requirements prioritiztion. Softw. Eng. Res. Pract. 673–679 (2009)

    Google Scholar 

  10. Chatterjee, K., Gupta, D., De, A.: A framework for development of secure software. CSI Trans. ICT 1(1), 143–157 (2013)

    Article  Google Scholar 

  11. Jaiswal, S., Gupta, D.: Int. J. Syst. Assur. Eng. Manag. 8(Suppl 2), 1419 (2017). https://doi.org/10.1007/s13198-017-0612-x

    Article  Google Scholar 

  12. Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50–57 (2011)

    Article  Google Scholar 

  13. Fernandes, D., Soares, L., Gomes, J., Freire, M., Ińacio, P.: Security issues in cloud environments—a survey. Int. J. Inf. Secur. (IJIS) 13(2), 113–170 (2014)

    Article  Google Scholar 

  14. Vu, Q.H., Pham, T.-V., Truong, H.-L., Dustdar, S., Asal, R.: DEMODS: a description model for data-as-a-service. In: 26th IEEE International Conference on Advanced Information Networking and Applications, pp. 605–612. IEEE (2012)

    Google Scholar 

  15. Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutorials 15(2), 843–859 (2013)

    Article  Google Scholar 

  16. Firesmith, D.G.: Engineering security requirements. J. Object Technol. 2(1), 53–68 (2003)

    Article  Google Scholar 

  17. CVE Details: owncloud: vulnerability statistics. www.cvedetails.com: https://www.cvedetails.com/product/22262/Owncloud-Owncloud.html?vendor_id=11929 (2012)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shruti Jaiswal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jaiswal, S., Gupta, D. (2019). Security Validation of Cloud Based Storage. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ören, T., Kashyap, R. (eds) Advances in Computing and Data Sciences. ICACDS 2019. Communications in Computer and Information Science, vol 1046. Springer, Singapore. https://doi.org/10.1007/978-981-13-9942-8_55

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-9942-8_55

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-9941-1

  • Online ISBN: 978-981-13-9942-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics