Waziri Umaru Federal Polytechnic, Nigeria
* Corresponding author
Federal College of Education (Tech.), Nigeria
Waziri Umaru Federal Polytechnic, Nigeria
Kaduna Polytechnic, Nigeria

Article Main Content

Cloud computing holds the possibility to annihilate the needs for setting up of costly computing infrastructure for IT-based services and proffering IT Solutions.  It offers an adaptable IT architecture which is accessible via the internet for lightweight and hand-held compact gadgets. The concept has encouraged numerous folds to improve in the capacity or capabilities of the existing and new software. In the cloud computing environment, the whole data/information is available over a set of networked resources, empowering the information to be accessible via virtual machines. Considering the fact that the cloud computing server may be located in any part of the world beyond the reach and control of users, there are various security issues and privacy challenges that need to be clearly understood with a view to identifying how to mitigate them.  Likewise, there are possibilities of the imminent breakdown of servers which have been witnessed in recent times. This research addresses the security issues connected with cloud computing, provides analysis of the militating factors against the successful implementation of cloud computing and proffers useful recommendations on how to ameliorate identified issues.

References

  1. L.M. Vaquero, L. Rodero-Merino, J. Caceres and M. Lindner, ?A break in the clouds: Towards a cloud definition,? ACM SIGCOMM Comput. Commun. Rev., 39: 50-55, 2009.
     Google Scholar
  2. Computer Infographics (May 2013). ?Infographic Zone: The No. 1 source of data visualization,? [Online]. Available: http://www.infographicszone.com/computers/top-5-cloud-computing-infographics
     Google Scholar
  3. I. P. Sokolov, ?Cloud Computing: Overview, Concepts and Business Development Scenerio,? Thesis, Vienna University of Economics and Business:, p. 9, 2009.
     Google Scholar
  4. J. Mckendric (2012), ?Forbes?, [Online]. Available: http://www.forbes.com/sites/joemckendrick/2012/02/22/6-shining-examples-of-cloud-computing-in-action/
     Google Scholar
  5. M. Armburst, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Pattersson, A. Rabkin, I. Stoica and M. Zaharia, ?Above the Clouds: A Berkeley View of Cloud Computing,? Berkeley: EECS Department, University of Califonia, 2009.
     Google Scholar
  6. ORACLE (2012), ?Oracle?s Cloud Solutions for Public Sector,? [Online]. Available: http://www.oracle.com/us/industries/public-sector/cloud-solutions-public-sector-wp-323002.pdf.
     Google Scholar
  7. D. Farber. (2006), ?Oracle's Ellison nails cloud computing,? [Online]. Available: http://news.cnet.com/8301-13953_3-10052188-80.html.
     Google Scholar
  8. Intel IT Centre. (2012), ?Planning guide cloud security,? pp. 5.
     Google Scholar
  9. Z. Whittaker. (2012), ?Amazon Web Services suffers partial outage,? [Online]. Available: http://www.zdnet.com/blog/btl/amazon-web-services-suffers-partial-outage/79981.
     Google Scholar
  10. M. J. Schwartz. (2011), ?6 Worst Data Breaches of 2011,? [Online]. Available: http://www.informationweek.com/news/security/attacks/232301079.
     Google Scholar
  11. N. Cao, (2012) ?Secure and reliable data outsourcing in Cloud computing,? Worcester Polytechnic Institute: S.N, 2012.
     Google Scholar
  12. IDC. (2011). ?Cloud will have dramatic impact on IT organisations, vendors and enterprises,? [Online]. Available: Accessed 13th March 2010 via. http://www.idc.com/getdoc.jsp?containerId=prUS22903111.
     Google Scholar
  13. G. Reese, ?Cloud Application Architectures: Building Applications and Infrastructure in the Cloud,?. S.L.:O?Reilly, (2009).
     Google Scholar
  14. R. Jacob, ?Security in the Cloud: The threat of coexist with an unknown tenant on a public environment?, Royal Holloway, University of London: s.n., 2012.
     Google Scholar
  15. CSIS. (2009), ?Threats Posed by the Internet,? [Online]. Available: http://csis.org/files/media/csis/pubs/081028_threats_working_group.pdf.
     Google Scholar
  16. Cloud Security Alliance. (2011), ?Encription and key management,?. [Online]. Available:https://wiki.cloudsecurityalliance.org/guidance/index.php/Encryption_and_Key_Management.
     Google Scholar
  17. NIST. (2009), ?The NIST definition of cloud computing,?. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
     Google Scholar
  18. T. Grance. (2011). ?The NIST Definition of Cloud Computing? [Online]. Available at: http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf.
     Google Scholar
  19. CSA. (2010). Encription and key management. [Online] Available at: https://wiki.cloudsecurityalliance.org/guidance/index.php/Encryption_and_Key_Management.
     Google Scholar
  20. CSA, ?Security Guidance for Critical Area of Focus in Cloud computing,? Cloud Security Alliance, V2.1. p. 33, (2009).
     Google Scholar
  21. F. Jericho. (2009). ?Cloud Cube Model?. [Online]. Available: http://www.opengroup.org/jericho/cloud_cube_model_v1.0.pdf.
     Google Scholar
  22. ENISA. (2009). ?Cloud computing: Benefits, risks and recommendations for information security,? [Online]. Available: http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment.
     Google Scholar
  23. Gartner. (2011). ?CIO Agenda Findings,? [Online]. Available: http://www.gartner.com/technology/cio/cioagenda_findings.jsp.
     Google Scholar
  24. T. J. Velte, R. Elsenpeter. (2010). ?Cloud computing: A practical Approach,? s.l.:McGraw - Hill.
     Google Scholar
  25. R. L. Krutz et al, ?Cloud Security: A Comprehensive Guide To Secure Cloud Computing,? 2010.
     Google Scholar
  26. Global Knowledge. (2011). ?10 security concerns for cloud computing,?. [Online]. Available at: http://viewer.media.bitpipe.com/1078177630_947/1268847180_5/WP_VI_10SecurityConcernsCloudComputing.pdf.
     Google Scholar
  27. R. Murch (2004), ?Autonomic Computing,?. s.l.:IBM press, pp. 336, 2004.
     Google Scholar
  28. M. Rouse. (2006), ?Autonomic Computing,? [Online]. Available at: http://searchcio-midmarket.techtarget.com/definition/autonomic-computing.
     Google Scholar
  29. P. Horn. (2001), ?Autonomic Computing: IBM perspective on the state of information technology,? [Online]. Available at: http://www.research.ibm.com/autonomic.
     Google Scholar
  30. J. Kephart, ?The Vision of Autonomic Computing,? IEEE Comput 2003; vol. 36, pp. 41 - 50. 2003.
     Google Scholar
  31. IBM, ?Autonomic Computing: IBM perspective on the state of information technology,? IBM J., 2003.
     Google Scholar
  32. R. Buyya, C. S. Yeo, and S. Venugopal (2008), ?Market-oriented cloud computing: Vision, Hype, and reality for delivering IT services as Computing Utilities,?, Keynote Paper, China, Dalian, 2008.
     Google Scholar
  33. D. Neumann, M. Baker, J. Altmann and O.F. Rana, (2010) ?Economic Models and Algorithm for Distributed Systems,? Birkauser, Berlin, 2010.
     Google Scholar
  34. Gridpedia. (n.d). ?The European Grid Marketplace,? [Online]. Available at: http://www.gridipedia.eu/sla-article.html.
     Google Scholar
  35. F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger and D. Leaf, ?NIST Cloud computing reference architecture; Recommendations of the National Institute of Standards and Technology,? Gaithersburg: NIST, 2011.
     Google Scholar
  36. O. Florence. (2012). ?The Effects of The Amazon Web Services Outages,? [Online]. Available: http://www.cloudtweaks.com/2012/06/the-effects-of-the-amazon-web-services-outages/.
     Google Scholar
  37. J. W. Rittinghouse and J. F. Ransome, ?Cloud Computing: Implementation, Management, and Security,? Auerbach Publications, New York, 2009.
     Google Scholar
  38. S. K. Sood. ?A combined approach to ensure data security in cloud computing,?, Gurdaspur, India: Department of Computer Science and Engineering, GNDU, 2012.
     Google Scholar
  39. T. Dierks and C. Allen, ?The TLS Protocol, Certicom: Network Working Group,? The Internet Society, 1999.
     Google Scholar
  40. A. Whitten, ?Consumer Online Privacy: Statement at hearing of Senate Committee on Commerce, Science, and Transportation?, July 27 2010.
     Google Scholar
  41. A. Friedman, A. Allan, and M. D. M. West, ?Privacy and Security in Cloud Computing,? Issues of Technology Innovation, pp. 1, 2010.
     Google Scholar
  42. B. Lev, ?Remarks on the Measurement, Valuation, and Reporting of Intangible Assets,? FRBNY Economic Policy Review. 2003.
     Google Scholar
  43. K. Hon. (2011). ?Data protection, the law and you,? [Online]. Available:http://blogs.computerworlduk.com/cloud-vision/2011/04/data-protection-the-law-and-you-1/index.htm.
     Google Scholar
  44. D. Preez. (2011). ?UK census contractor says data privacy laws will have to change,? [Online]. Available: http://www.computing.co.uk/ctg/news/2029852/uk-census-contractor-privacy-laws-change.
     Google Scholar
  45. A. Oza, (2008). Amend the ECPA: Fourth Amendment Protection Erodes as E-Mails Get Dusty. BUL Rev., 88.
     Google Scholar


Most read articles by the same author(s)