Security and Privacy Challenges in Cloud Computing

Salasiah Abdullah, Khairul Azmi Abu Bakar 

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Cloud computing plays a crucial role in supporting the virtualization synergy as there is a large-scale demand among users in adopting cloud solutions. However, preserving the security of storage while maintaining users' privacy brings new challenges in protecting cloud computing from illegal access and shared network environment. Thus, Risk-Adaptable Access Control (RAdAC) is known within privacy-preserving perspective as a flexible prospect in managing exceptional access request and reacting to suspicious user. However, most of the previous work on the cloud security focused on storage security rather than anonymity of user nor identity. This paper explores the fundamental concept of cloud computing architecture and identifies the security requirements in cloud. In this work, the prerequisite elements in RAdAC framework has been discussed precisely and ambiguity factor is found in protecting privacy of user. Thus, we proposed the viable two-factor authentication scheme in RAdAC for future road ahead in cloud industry.

Original languageEnglish
Title of host publicationProceedings of the 2018 Cyber Resilience Conference, CRC 2018
EditorsKhairul Akram Zainol Abidin, Masnizah Mohd, Zarina Shukur
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538675410
DOIs
Publication statusPublished - 25 Jan 2019
Event2018 Cyber Resilience Conference, CRC 2018 - Putrajaya, Malaysia
Duration: 13 Nov 201815 Nov 2018

Publication series

NameProceedings of the 2018 Cyber Resilience Conference, CRC 2018

Conference

Conference2018 Cyber Resilience Conference, CRC 2018
CountryMalaysia
CityPutrajaya
Period13/11/1815/11/18

Fingerprint

Cloud computing
Access control
privacy
Authentication
virtualization
anonymity
synergy
road
Industry
industry
demand

Keywords

  • Access control
  • Cloud computing
  • Privacy
  • Security

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Social Sciences (miscellaneous)
  • Computer Networks and Communications

Cite this

Abdullah, S., & Abu Bakar , K. A. (2019). Security and Privacy Challenges in Cloud Computing. In K. A. Z. Abidin, M. Mohd, & Z. Shukur (Eds.), Proceedings of the 2018 Cyber Resilience Conference, CRC 2018 [8626872] (Proceedings of the 2018 Cyber Resilience Conference, CRC 2018). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CR.2018.8626872

Security and Privacy Challenges in Cloud Computing. / Abdullah, Salasiah; Abu Bakar , Khairul Azmi.

Proceedings of the 2018 Cyber Resilience Conference, CRC 2018. ed. / Khairul Akram Zainol Abidin; Masnizah Mohd; Zarina Shukur. Institute of Electrical and Electronics Engineers Inc., 2019. 8626872 (Proceedings of the 2018 Cyber Resilience Conference, CRC 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abdullah, S & Abu Bakar , KA 2019, Security and Privacy Challenges in Cloud Computing. in KAZ Abidin, M Mohd & Z Shukur (eds), Proceedings of the 2018 Cyber Resilience Conference, CRC 2018., 8626872, Proceedings of the 2018 Cyber Resilience Conference, CRC 2018, Institute of Electrical and Electronics Engineers Inc., 2018 Cyber Resilience Conference, CRC 2018, Putrajaya, Malaysia, 13/11/18. https://doi.org/10.1109/CR.2018.8626872
Abdullah S, Abu Bakar  KA. Security and Privacy Challenges in Cloud Computing. In Abidin KAZ, Mohd M, Shukur Z, editors, Proceedings of the 2018 Cyber Resilience Conference, CRC 2018. Institute of Electrical and Electronics Engineers Inc. 2019. 8626872. (Proceedings of the 2018 Cyber Resilience Conference, CRC 2018). https://doi.org/10.1109/CR.2018.8626872
Abdullah, Salasiah ; Abu Bakar , Khairul Azmi. / Security and Privacy Challenges in Cloud Computing. Proceedings of the 2018 Cyber Resilience Conference, CRC 2018. editor / Khairul Akram Zainol Abidin ; Masnizah Mohd ; Zarina Shukur. Institute of Electrical and Electronics Engineers Inc., 2019. (Proceedings of the 2018 Cyber Resilience Conference, CRC 2018).
@inproceedings{6cdf62147db64f94bb4d23ddc22bb3c7,
title = "Security and Privacy Challenges in Cloud Computing",
abstract = "Cloud computing plays a crucial role in supporting the virtualization synergy as there is a large-scale demand among users in adopting cloud solutions. However, preserving the security of storage while maintaining users' privacy brings new challenges in protecting cloud computing from illegal access and shared network environment. Thus, Risk-Adaptable Access Control (RAdAC) is known within privacy-preserving perspective as a flexible prospect in managing exceptional access request and reacting to suspicious user. However, most of the previous work on the cloud security focused on storage security rather than anonymity of user nor identity. This paper explores the fundamental concept of cloud computing architecture and identifies the security requirements in cloud. In this work, the prerequisite elements in RAdAC framework has been discussed precisely and ambiguity factor is found in protecting privacy of user. Thus, we proposed the viable two-factor authentication scheme in RAdAC for future road ahead in cloud industry.",
keywords = "Access control, Cloud computing, Privacy, Security",
author = "Salasiah Abdullah and {Abu Bakar }, {Khairul Azmi}",
year = "2019",
month = "1",
day = "25",
doi = "10.1109/CR.2018.8626872",
language = "English",
series = "Proceedings of the 2018 Cyber Resilience Conference, CRC 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
editor = "Abidin, {Khairul Akram Zainol} and Masnizah Mohd and Zarina Shukur",
booktitle = "Proceedings of the 2018 Cyber Resilience Conference, CRC 2018",
address = "United States",

}

TY - GEN

T1 - Security and Privacy Challenges in Cloud Computing

AU - Abdullah, Salasiah

AU - Abu Bakar , Khairul Azmi

PY - 2019/1/25

Y1 - 2019/1/25

N2 - Cloud computing plays a crucial role in supporting the virtualization synergy as there is a large-scale demand among users in adopting cloud solutions. However, preserving the security of storage while maintaining users' privacy brings new challenges in protecting cloud computing from illegal access and shared network environment. Thus, Risk-Adaptable Access Control (RAdAC) is known within privacy-preserving perspective as a flexible prospect in managing exceptional access request and reacting to suspicious user. However, most of the previous work on the cloud security focused on storage security rather than anonymity of user nor identity. This paper explores the fundamental concept of cloud computing architecture and identifies the security requirements in cloud. In this work, the prerequisite elements in RAdAC framework has been discussed precisely and ambiguity factor is found in protecting privacy of user. Thus, we proposed the viable two-factor authentication scheme in RAdAC for future road ahead in cloud industry.

AB - Cloud computing plays a crucial role in supporting the virtualization synergy as there is a large-scale demand among users in adopting cloud solutions. However, preserving the security of storage while maintaining users' privacy brings new challenges in protecting cloud computing from illegal access and shared network environment. Thus, Risk-Adaptable Access Control (RAdAC) is known within privacy-preserving perspective as a flexible prospect in managing exceptional access request and reacting to suspicious user. However, most of the previous work on the cloud security focused on storage security rather than anonymity of user nor identity. This paper explores the fundamental concept of cloud computing architecture and identifies the security requirements in cloud. In this work, the prerequisite elements in RAdAC framework has been discussed precisely and ambiguity factor is found in protecting privacy of user. Thus, we proposed the viable two-factor authentication scheme in RAdAC for future road ahead in cloud industry.

KW - Access control

KW - Cloud computing

KW - Privacy

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=85062732167&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85062732167&partnerID=8YFLogxK

U2 - 10.1109/CR.2018.8626872

DO - 10.1109/CR.2018.8626872

M3 - Conference contribution

T3 - Proceedings of the 2018 Cyber Resilience Conference, CRC 2018

BT - Proceedings of the 2018 Cyber Resilience Conference, CRC 2018

A2 - Abidin, Khairul Akram Zainol

A2 - Mohd, Masnizah

A2 - Shukur, Zarina

PB - Institute of Electrical and Electronics Engineers Inc.

ER -