Asian Journal of Information Technology

Year: 2012
Volume: 11
Issue: 3
Page No. 83 - 93

Cloud Zones: Security and Privacy Issues in Cloud Computing

Authors : B. Jaya Chandrareddy, G. Uma Mahesh and Sreekanth Bandi

References

Brodkin, J., 2008. Loss of customer data spurs closure of onlin e storage service. The Linkup, Network World, http://www.networkworld.com/news/2008/081108 linkupfailure. html?page=1.

Brooks, C., 2009. Amazon EC2 attack prompts customer support changes. Tech Target, http://searchcloudcomputing.techtarget.com/news/article/0,2 89142,sid201_gci1371090,00.html.

Calore, M., 2009. Magnolia suffers major data loss, site taken offline, wired magazine. http://www.wired.com/epicenter/2009/01/magnolia-suffer/.

Cappelli, D., A. Moore, R. Trzeciak and T.J. Shimeall, 2009. Common Sense Guide to Prevention and Detection of Insider Threats. 3rd Edn., CERT, New York.

Chow, R., P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka and J. Molina, 2009. Controlling data in the cloud: Outsourcing computation without outsourcing control. Proceedings of the ACM Workshop on Cloud Computing Security, November 13, 2009, Chicago, Illinois, USA., pp: 85-90.

Clarke, G., 2009. Microsoft's azure cloud suffers first crash. The Register, March 16, 2009, http://www.theregister.co.uk/2009/03/16/azure_cloud_crash/

Cocheo, S., 1997. The bank robber, the quote and the final irony. nFront, ABA Banking Journal, 1997, http://www.banking.com/aba/profile_0397.html

Dunn, J.E., 2010. Ultra-secure firefox offered to UK bank users. Techworld, February 26, 2010, http://news.techworld.com/security/3213740/ultra-securefirefox- offered-to-uk-bank-users/

Dunn, J.E., 2010. Virtualised USB Key Beats Keyloggers. Techworld, February 22, 2010, http://news.techworld.com/security/3213277/virtualised-usbkey- beats-keyloggers/

Eisenhauer, M.P., 2005. Privacy and security law issues in off-shore outsourcing transactions. Hunton and Illiams LLP, The Outsourcing Institute, February 15, 2005, http://www.outsourcing.com/legal_corner/pdf/ Outsourcing_P rivacy.pdf

Ferguson, T., 2009. Salesforce.com outage hits thousands of businesses. CNET News, January 8, 2009, http://news.cnet.com/8301-1001_3-10136540-92.html

Ferrie, P., 2007. Attacks on Virtual Machine Emulators. White Paper, Symantec Corporation, January 2007, http://www.symantec.com/avcenter/reference/Virtual_Machi ne_Threats.pdf

Fowler, G. and B. Worthen, 2009. The internet industry is on acloud-whatever that may mean. The Wall Street Journal, March 26, 2009

Frei, S., T. Duebendorfer, G. Ollmann and M. May, 2008. Understanding the web browser threat. ETH Zurich, Tech Report Nr. 288, 2008, http://ecollection.ethbib.ethz.ch/eserv/eth:30892/eth-30892-01.pdf

Gajek, S., M. Jensen, L. Liao and J. Schwenk, 2009. Analysis of signature wrapping attacks and countermeasures. Proceedings of the IEEE International Conference on Web Services, July 6-10, 2009, Los Angeles, CA, pp: 575-582.

Garfinkel, S., 2007. An evaluation of amazon's grid computing services: EC2, S3 and SQS, technical report TR-08-07. Center for Research on Computation and Society, Harvard University, July, 2007

Garfinkel, T. and M. Rosenblum, 2005. When virtual is harder than real. HotOS'05, Santa Fe, NM, June 2005

Goodin, D., 2009. Salesforce.com outage exposes cloud's dark linings. The Register, January 6, 2009, http://www.theregister.co.uk/2009/01/06/salesforce_outage/

Goodin, D., 2009. Webhost hackwipes out data for 100,000 sites. The Register, June 8, 2009, http://www.theregister.co.uk/2009/06/08/webhost_attack/

Greenberg, A., 2009. IBM's Blindfolded Calculator, Forbes Magazine, July 13, 2009

Gruschka, N. and L.L. Iacono, 2009. Vulnerable cloud: SOAP message security validation revisited. Proceedings of the IEEE International Conference on Web Services, July 6-10, 2009, Los Angeles, CA, pp: 625-631.

Gunderloy, M., 2008. Who protects your cloud data? Web Worker Daily, January 13, 2008, http://webworkerdaily.com/2008/01/13/who-protects-yourcloud-data/

Jacobs, D. and S. Aulbach, 2007. Ruminations on multi-tenant databases. Fachtagung fur Datenbanksysteme in Business, Technologie und Web, March 2007, http://www.btw2007.de/paper/p514.pdf

Jansen, W., 2009. Directions in Security Metrics Research. Interagency Report 7564, National Institute of Standards and Technology (NIST), April 2009

Jensen, M., J. Schwenk, N. Gruschka and L.L. Iacono, 2009. On technical security issues in cloud computing. Proceedings of the IEEE International Conference on Cloud Computing, September 21-25, 2009, Bangalore, India, pp: 109-116.

Kandukuri, B.R., V.R. Paturi and A. Rakshit, 2009. Cloud security issues. Proceedings of the IEEE International Conference on Services Computing, September 21-25, 2009, Bangalore, India, pp: 517-520.

Karger, P.A., 2008. I/O for virtual machine monitors: Security and performance issues. IEEE Secur. Privacy, 6: 16-23.
Direct Link  |  

Katz, N., 2010. Austin plane crash: Pilot joseph andrew stack may have targeted IRS offices. Says FBI, CBS News, February 18, 2010, http://www.cbsnews.com/8301- 504083_162-6220271504083.html?tag=content Main%3bcontentBody

Keleta, Y., J.H.P. Eloff and H.S. Venter, 2005. Proposing a secure XACML architecture ensuring privacy and trust. Research in Progress Paper, University of Pretoria, 2005, http://icsa.cs.up.ac.za/issa/2005/Proceedings/ Research/093_A rticle.pdf

Kerner, S.M., 2010. Mozilla confirms security threat from malicious firefox add-ons. eSecurity Planet, February 5, 2010, http://www.esecurityplanet.com/news/article.php/3863331/M ozilla-Confirms-Security, Threat-From-Malicious-Firefox- Add-Ons.html

King, S. and P.M. Chen, 2006. SubVirt: Implementing malware with virtual machines. Proceedings of the IEEE Symposium on Security and Privacy, May 21-24, 2006, Berkeley, California, pp: 14-14.

Kowalski, E., 2008. Insider threat study: Illicit cyber activity in the government sector. Software Engineering Institute, January 2008, http://www.cert.org/archive/pdf/insiderthreat_gov2008.pdf

Krebs, B., 2007. Salesforce.com Acknowledges Data Loss. Security Fix, The Washington Post.

Krigsma, M., 2008. Amazon S3 web services down. Bad, bad news for customers. ZDNET, February 15, 2008, http://blogs.zdnet.com/projectfailures/?p=602

Labaton, S., 1995. Men held in attempt to bomb I.R.S. office. New York Times, December 29, 1995

Leavitt, N., 2009. Is cloud computing really ready for prime time? IEEE Comput., 42: 15-20.
CrossRef  |  Direct Link  |  

McMillan, R., 2007. Salesforce.com warns customers of phishing scam. PC Magazine, IDG News Network, November 6, 2007, http://www.pcworld.com/businesscenter/ article/139353/sales forcecom_ warns_customers_of_ phishing_scam.html

McMillan, R., 2009. Hackers find a home in Amazon's EC2 cloud. Infoworld, IDG News Network, December 10, 2009, http://www.infoworld.com/d/cloud-computing/hackers-findhome- in-amazons-ec2-cloud-742

McMillan, R., 2009. Misdirected spyware infects Ohio hospital. PC Magazine, IDG News Service Sept. 17, 2009,http://www.pcworld.com/businesscenter/article/172185/misdirected_spyware_infects_ ohio_hospital.html

Mell, P. and T. Grance, 2009. The NIST definition of cloud computing. Version 15, National Institute of Standards and Technology (NIST), Gaithersburg, MD., USA., October 7, 2009.

Metz, C., 2009. DDoS attack rains down on amazon cloud. The Register, October 5, 2009, http://www.theregister.co.uk/2009/10/05/amazon_bitbucket_ outage/

Miller, R., 2008. Major outage for amazon S3 and EC2. Data Center Knowledge, February 15, 2008, http://www.datacenterknowledge.com/archives/2008/02/15/ major-outage-for-amazon-s3-and ec2/

Miller, R., 2009. Lightning strike triggers amazon EC2 outage. Data Center Knowledge, June 11, 2009, http://www.datacenterknowledge.com/archives/2009/06/11/li ghtning-strike triggers-amazon-ec2-outage/

NIST., 2010. Guide for applying the risk management framework to federal information systems. Joint Task Force Transformation Initiative, Special Publication 800-37, Revision 1, NIST, Gaithersburg, MD., USA.

Oberheide, J., E. Cooke and F. Jahanian, 2008. Empirical exploitation of live virtual machine migration. Proceedings of the Black Hat Security Conference, February, 2008, Washington, DC -.

Ormandy, T., 2007. An empirical study into the security exposure to hosts of hostile virtualized environments. http://taviso.decsystem.org/virtsec.pdf

Overby, S., 2010. How to negotiate a better cloud computing contract. CIO, April 21, 2010, http://www.cio.com/article/591629/How_to_Negotiate_a_Better_Cloud_Computing_Contract

Pearson, S., 2009. Taking account of privacy when designing cloud computing services. Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing, May 22-23, 2009, Vancouver, Canada, pp: 44-52.

Provos, N., 2007. The ghost in the browser: Analysis of web-based malware. Proceedings of the Hot Topics in Understanding Botnets (HotBots), April 10, 2007, Cambridge, MA -.

Provos, N., M.A. Rajab and P. Mavrommatis, 2009. Cybercrime 2.0: When the cloud turns dark. Commun. ACM, 52: 42-47.
CrossRef  |  Direct Link  |  

Ristenpart, T., E. Tromer, H. Shacham and S. Savage, 2009. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. Proceedings of the the 16th ACM Conference on Computer and Communications Security, November 9-13, 2009, Chicago, IL., USA., pp: 199-212.

Shah, A., 2008. Kernel-based virtualization with KVM. Linux Magazine, issue 86, January 2008, http://www.linuxmagazine. com/w3/issue/86/Kernel_Based_Virtualization_Wi th_KVM.pdf

Shelton, T., 2005. Remote heap overflow. ID: ACSSEC-2005-11-25-0x1, http://packetstormsecurity.org/0512-advisories/ACSSEC-2005-11-25-0x1.txt

Slaviero, M., 2009. BlackHat presentation demo vids: Amazon. Part 4 of 5, AMIBomb, August 8, 2009, http://www.sensepost.com/blog/3797.html

Sutter, J.D., 2009. Twitter hack raises questions about cloud computing. CNN, July 16, 2009, http://edition.cnn.com/2009/TECH/07/16/twitter.hack/.

Vaquero, L.M., L.R. Merino, J. Caceres and M. Lindner, 2009. A break in the clouds: Towards a cloud definition. Comput. Commun. Rev., 39: 50-55.
Direct Link  |  

Vieira, K., A. Schulter, C. Westphall and C. Westphall, 2009. Intrusion detection techniques in grid and cloud computing environment. IT Professional, 99: 1-1.
Direct Link  |  

Wainewright, P., 2008. Many degrees of multi-tenancy. ZDNET News and Blogs, June 16, 2008, http://blogs.zdnet.com/SAAS/?p=533

Wei, J.P., X.L. Zhang, G. Ammons, V. Bala and P. Ning, 2009. Managing security of virtual machine images in a cloud environment. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, November 13, 2009, Chicago, Illinois, USA, pp: 91-96.

Whitney, L., 2009. Amazon EC2 cloud service hit by botnet, outage. December 11, 2009, CNET News, http://news.cnet.com/8301-1009_3-10413951 83.html

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved