Skip to main content

2024 | OriginalPaper | Buchkapitel

Analysis of Security Aspect in Cloud Implementation: A Case Study of Google Cloud Provider

verfasst von : Somesh Shrivastava, Manish Kumar Soni, Ajay Pratap

Erschienen in: Cryptology and Network Security with Machine Learning

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Virtually all organizations have embraced cloud computing to differing extents in their operations. However, along with this adoption of cloud technology, it’s imperative to ensure that the organization’s cloud security strategy is equipped to safeguard against the primary threats to cloud security. The largest worry with cloud computing is security, which also prevents many consumers from using these services. The security concerns at various cloud infrastructure layers are presented in-depth in this article. We delve into the attributes and methods of delivery presented by cloud computing, along with the conceivable hurdles and limitations encountered during its integration into the business environment. Our analysis extends to the cybersecurity aspects associated with cloud computing, with a specific focus on intrusion detection and prevention mechanisms, as well as their applicability within the cloud context. In this research paper, we have implemented the Google Cloud Platform for security considerations. Paper also discusses about provider and customer responsibility ratio for better security of cloud environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Elsherbiny S, Eldaydamony E, Alrahmawy M, Reyad AE (2018) An extended intelligent water drops algorithm for workflow scheduling in cloud computing environment. Egypt Inf J 19:33–55 Elsherbiny S, Eldaydamony E, Alrahmawy M, Reyad AE (2018) An extended intelligent water drops algorithm for workflow scheduling in cloud computing environment. Egypt Inf J 19:33–55
2.
Zurück zum Zitat Hanen J, Kechaou Z, Ben Ayed M (2016) An enhanced healthcare system in mobile cloud computing environment. Vietnam J Comput Sci 3:267–277 Hanen J, Kechaou Z, Ben Ayed M (2016) An enhanced healthcare system in mobile cloud computing environment. Vietnam J Comput Sci 3:267–277
3.
Zurück zum Zitat Dinh PT, Park M (2020) Dynamic economic-denial-of-sustainability (EDoS) detection in SDN-based cloud. In: Proceedings of the 2020 fifth international conference on fog and mobile edge computing (FMEC). IEEE Access, Paris, pp 62–69 Dinh PT, Park M (2020) Dynamic economic-denial-of-sustainability (EDoS) detection in SDN-based cloud. In: Proceedings of the 2020 fifth international conference on fog and mobile edge computing (FMEC). IEEE Access, Paris, pp 62–69
4.
Zurück zum Zitat Karajeh H, Maqableh M, Masa’deh R (2020) Privacy and security issues of cloud computing environment. In: Proceedings of the 23rd IBIMA conference vision. Spain, pp 1–6 Karajeh H, Maqableh M, Masa’deh R (2020) Privacy and security issues of cloud computing environment. In: Proceedings of the 23rd IBIMA conference vision. Spain, pp 1–6
5.
Zurück zum Zitat Alajmi Q, Sadiq AS, Kamaludin A, Al-Sharafi MA (2018) Cloud computing delivery and delivery models: opportunity and challenges. Adv Sci Lett 24:4040–4044 Alajmi Q, Sadiq AS, Kamaludin A, Al-Sharafi MA (2018) Cloud computing delivery and delivery models: opportunity and challenges. Adv Sci Lett 24:4040–4044
6.
Zurück zum Zitat Diaby T, Rad BB (2017) Cloud computing: a review of the concepts and deployment models. Int J Inf Technol Comput Sci 9:50–58 Diaby T, Rad BB (2017) Cloud computing: a review of the concepts and deployment models. Int J Inf Technol Comput Sci 9:50–58
7.
Zurück zum Zitat Tabrizchi H, Rafsanjani MK (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput 76:9493–9532CrossRef Tabrizchi H, Rafsanjani MK (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput 76:9493–9532CrossRef
8.
Zurück zum Zitat Faheem M, Akram U, Khan I, Naqeeb S, Shahzad A, Ullah A, Mushtaq MF (2017) Cloud computing environment and security challenges: a review. Int J Adv Comput Sci Appl 8:183–195 Faheem M, Akram U, Khan I, Naqeeb S, Shahzad A, Ullah A, Mushtaq MF (2017) Cloud computing environment and security challenges: a review. Int J Adv Comput Sci Appl 8:183–195
9.
Zurück zum Zitat Dong S, Abbas K, Jain R (2019) A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access 7:80813–80828CrossRef Dong S, Abbas K, Jain R (2019) A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access 7:80813–80828CrossRef
10.
Zurück zum Zitat Kumar R, Goyal R (2019) On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Comput Sci Revision 33:1–48MathSciNetCrossRef Kumar R, Goyal R (2019) On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Comput Sci Revision 33:1–48MathSciNetCrossRef
11.
Zurück zum Zitat Qureshi A, Dashti W, Jahangeer A, Zafar A (2020) Security challenges over cloud environment from service provider prospective. Cloud Comput Data Sci 1:1–48 Qureshi A, Dashti W, Jahangeer A, Zafar A (2020) Security challenges over cloud environment from service provider prospective. Cloud Comput Data Sci 1:1–48
12.
Zurück zum Zitat Farsi M, Ali M, Shah RA, Wagan AA, Kharabsheh R (2020) Cloud computing and data security threats taxonomy: a review. J Intell Fuzzy Syst 38:2517–2527CrossRef Farsi M, Ali M, Shah RA, Wagan AA, Kharabsheh R (2020) Cloud computing and data security threats taxonomy: a review. J Intell Fuzzy Syst 38:2517–2527CrossRef
13.
Zurück zum Zitat Wani AR, Rana QP, Saxena U, Pandey N (2019) Analysis and detection of DDoS attacks on cloud computing environment using machine learning techniques. In: Proceedings of AICAI2019, Dubai, United Arab Emirates, pp 74–81 Wani AR, Rana QP, Saxena U, Pandey N (2019) Analysis and detection of DDoS attacks on cloud computing environment using machine learning techniques. In: Proceedings of AICAI2019, Dubai, United Arab Emirates, pp 74–81
14.
Zurück zum Zitat Tank D, Aggarwal A, Chaubey N (2019) Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison. Int J Inf Technol 8(3):1–16 Tank D, Aggarwal A, Chaubey N (2019) Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison. Int J Inf Technol 8(3):1–16
15.
Zurück zum Zitat Krishna SR, Rani BP (2017) Virtualization security issues and mitigations in cloud computing. In: Proceedings of the first international conference on computational intelligence and informatics. Springer, Singapore, pp 117–128 Krishna SR, Rani BP (2017) Virtualization security issues and mitigations in cloud computing. In: Proceedings of the first international conference on computational intelligence and informatics. Springer, Singapore, pp 117–128
16.
Zurück zum Zitat Khan IA, Qazi R (2019) Data security in cloud computing using elliptic curve cryptography. Int J Comput Commun Netw 1:46–52 Khan IA, Qazi R (2019) Data security in cloud computing using elliptic curve cryptography. Int J Comput Commun Netw 1:46–52
17.
Zurück zum Zitat Sajay KR, Babu SS, Vijayalakshmi Y (2019) Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Hum Comput 1–10 Sajay KR, Babu SS, Vijayalakshmi Y (2019) Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Hum Comput 1–10
18.
Zurück zum Zitat Deebak B, Al-Turjman F, Mostarda L (2020) Seamless secure anonymous authentication for cloud-based mobile edge computing. Comput Electr Eng 87:106782CrossRef Deebak B, Al-Turjman F, Mostarda L (2020) Seamless secure anonymous authentication for cloud-based mobile edge computing. Comput Electr Eng 87:106782CrossRef
19.
Zurück zum Zitat Irshad A, Chaudhry SA, Alomari OA, Yahya K, Kumar NA (2021) Novel pairing-free lightweight authentication protocol for mobile cloud computing framework. IEEE Syst J 15:3664–3672CrossRef Irshad A, Chaudhry SA, Alomari OA, Yahya K, Kumar NA (2021) Novel pairing-free lightweight authentication protocol for mobile cloud computing framework. IEEE Syst J 15:3664–3672CrossRef
20.
Zurück zum Zitat Yang C, Tan L, Shi N, Xu B, Cao Y, Yu K (2020) AuthPrivacyChain: a blockchain-based access control framework with privacy protection in cloud. IEEE Access 8:70604–70615CrossRef Yang C, Tan L, Shi N, Xu B, Cao Y, Yu K (2020) AuthPrivacyChain: a blockchain-based access control framework with privacy protection in cloud. IEEE Access 8:70604–70615CrossRef
Metadaten
Titel
Analysis of Security Aspect in Cloud Implementation: A Case Study of Google Cloud Provider
verfasst von
Somesh Shrivastava
Manish Kumar Soni
Ajay Pratap
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_38

Neuer Inhalt