Software Security Requirements Management as an Emerging Cloud Computing Service: Security Issues and Challenges

Abstract

Cloud computing is continuously getting standard an equal number of huge business applications and information are getting into cloud stages. Regardless, a major limit for cloud allocation is certifiable and seen nonattendance of security during this paper, we take a widely inclusive viewpoint on conveyed registering security-spreading over the expected issues and shortcomings identified with virtualization establishment, programming stage, character the chiefs and access control, data uprightness, mystery and assurance, physical and measure security points; and Bonafede consistency in the cloud. We present our disclosures from the viewpoints of a cloud master center, cloud purchaser, and pariah experts, for example, Govt. We moreover notice critical investigation headings in cloud security in zones, for example, Trusted Computing, Information-Centric Security, and Privacy-Preserving Models. Finally, we sketch a lot of steps that will be used, at a major level, to gauge security availability for a business application to be moved to the cloud. As the uses of appropriated processing are extending bit by bit, both authority centers and customers must attest that prosperity, security, and assurance covers and parts need to be as per the prerequisites. Circulated processing has gotten one of the vital renowned and important enrolling models recently and the predominance of using this figuring model is that it relies upon pay as you utilize the system. Security, security, and confirmation of information and various resources are among the different domains of investigation in dispersed figuring. Thusly, during this investigation paper, an endeavor has been made by the makers to distinguish various procedures or devices for the utilization and prerequisite of security parts inside the appropriated processing organizations and systems. 

Country : India

1 Potnuru Lavnya

  1. Assistant Professor, Department of Computer Science And Engineering, Malla Reddy College of Engineering for Women, Hyderabad -500100, Telangana, India

IRJIET, Volume 3, Issue 3, March 2019 pp. 29-33

.

References

  1. Kuyoro S.O., Ibikunle, F., andAwodele, O. (2011). Cloud Computing Security Issues and Challenges. International Journal of Computer Networks (IJCN), Vol. 3, Issue 5, pp. 247-255.
  2. V. J. Winkler, “Securing the Cloud,” Cloud Compute Secure. Tech. tactics. Elsevier., 2011.
  3. National Institute of Standards and Technology at http://www.nist.gov
  4. Coppolino, L., D’Antonio, S., Mazzeo, G., & Romano, L. (2016). Cloud security: Emerging threats and current solutions. Computers & ElectricalEngineering. https://doi.org/10.1016/j.compeleceng.2016.03.00
  5. T. Mather, S. Kumaraswamy, and S. Latif, “Cloud Security and Privacy,” p. 299, 2009.
  6. Lindell, Y., and Pinkas, B., Privacy Preserving Data Mining, Proceedings of 20th Annual International Cryptology Conference. 2000
  7. Ramachandran, M. (2015). Software security requirements management as an emerging cloud computing service. International Journal of Information Management, Vo l. 36, Issue 4,pp. 580-590.
  8. J. Srinivas, K. Reddy, and A. Qyser, “Cloud Computing Basics,” Build. Infrastruct. Cloud Secur. Vol. 1, no. September 2011, pp. 3–22, 2014.
  9. M. Jensen, N. Gruschka, and R. Herkenh¨oner, A survey of attacks on web services, Computer Science Research and Development (CSRD), Springer Berlin/Heidelberg. 2009.