Security Architecture for Cloud Networking: A Survey

In the cloud computing hierarchy IaaS is the lowest
layer, all other layers are built over it. Thus it is the most important
layer of cloud and requisite more importance. Along with advantages
IaaS faces some serious security related issue. Mainly Security
focuses on Integrity, confidentiality and availability. Cloud
computing facilitate to share the resources inside as well as outside of
the cloud. On the other hand, cloud still not in the state to provide
surety to 100% data security. Cloud provider must ensure that end
user/client get a Quality of Service. In this report we describe
possible aspects of cloud related security.





References:
[1] Seol, J.; Jin, S.; Maeng, S., "Secure Storage Service for IaaS Cloud
Users," Cluster, Cloud and Grid Computing (CCGrid), 2013 13th
IEEE/ACM International Symposium, pp.190-191, 13-16 May 2013.
[2] Yandong, Z,; Yongsheng, Z., "Cloud computing and cloud security
challenges," Information Technology in Medicine and Education
(ITME), 2012 International Symposium, vol.2, pp.1084,1088, 3-5 Aug.
2012
[3] Jog, M.; Madiajagan, M., "Cloud Computing: Exploring security design
approaches in Infrastructure as a Service," Cloud Computing
Technologies, Applications and Management (ICCCTAM), 2012
International, pp.156-159, 8-10 Dec. 2012
[4] Villegas, D.; Bobroff, N.; Rodero, I.; Delgado, J.; Liu, Y.; Devarakonda,
A.; Fong, L.; Sadjadi, S.M.; Parashar, M.; “Cloud federation in a layered
service model,” Journal of Computer and System Sciences, Volume 78,
Issue 5, Pages 1330-1344, September 2012
[5] Banirostam, H.; Hedayati, A.; Zadeh, A.K.; Shamsinezhad, E., "A Trust
Based Approach for Increasing Security in Cloud Computing
Infrastructure," Computer Modelling and Simulation (UKSim), 2013
UKSim 15th International Conference, pp.717-721, 10-12 April 2013
[6] Fusenig, V.; Sharma, A., "Security architecture for cloud networking,"
Computing, Networking and Communications (ICNC), 2012
International Conference, pp.45-49, Jan. 30 2012-Feb. 2 2012
[7] Kandukuri, B.R.; Paturi, V.R.; Rakshit, A., "Cloud Security Issues,"
Services Computing, 2009. SCC '09. IEEE International Conference,
pp.517-520, 21-25 Sept. 2009
[8] Peng, Y.; Zhao, W.; Xie, F.; Dai, Z.H.; Gao, Y.; Chen, D.G., “Secure
cloud storage based on cryptographic techniques,” The Journal of China
Universities of Posts and Telecommunications, Volume 19, Supplement
2, pp. 182-189, October 2012
[9] Dawoud, W.; Takouna, I.; Meinel, C., "Infrastructure as a service
security: Challenges and solutions," Informatics and Systems (INFOS),
2010 The 7th International Conference, pp.1-8, 28-30 March 2010
[10] Gupta, S.; Satapathy, S.R.; Mehta, P.; Tripathy, A., "A secure and
searchable data storage in Cloud computing," Advance Computing
Conference (IACC), 2013 IEEE 3rd International conference, pp.106-
109, 22-23 Feb. 2013
[11] Meera, A.; Swamynathan, S., “Agent based Resource Monitoring
System in IaaS Cloud Environment,” Procedia Technology, Volume 10,
Pages 200-207, ISSN 2212-0173, 2013