Open Access Open Access  Restricted Access Subscription Access

Cloud Computing and Storage Issues

Brijesh Aggarwal, Birender singh Rawat, Dishant Passi


This paper talks over security issues for cloud computing & presents a layered framework for secure clouds and then focus on layers, i.e., the storage layer & the data layer. Cloud computing is a set of IT facilities that are as long as to a customer over a network on adhoc basis and with the ability to scale up or down their service requirements. Generally cloud computing services are distributed by a third party provider who owns the groundwork. Its advantages to mention but some include scalability, flexibility,resilience, efficiency & outsourcing noncore actions. This paper will converse secure merged query handing out with map Reduce & Hadoop. Security is one of thekey issueswhich block the development of cloud. Even with the potential advantages achieved from the cloud computing, the organizations are unhurried in accepting it due to security issues and dares associated with it. The idea of handling over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a comprehensiveanalysis of the cloud computing security issues and tasks focusing continuouslyon the
cloud computing types and the service delivery types. This paper describes our approach to securing the cloud.


access control, bottom-up design, data mining, data layer, Cloud computing.

Full Text:



Microsoft. Multi-Tenant Data Architecture

2010 Oct. Available from:


Amazon. Amazon EC2 SLA. 2010 Oct.

Available from:


Mell P, Grance T. The NIST Definition of

Cloud Computing. USA: National Institute

of Standards and Technology; 2009.

Available from: http://www.wheresmyserv

pdf (accessed April 2010).

Jensen M, Schwenk J, Gruschka N, et al.

On Technical Security Issues in Cloud

Computing. Proceedings of the IEEE

International Conference on Cloud

Computing; 2009 Sep 21–25; Bangalore,

India. 109–16p.

Wenjun Z. Integrated Security Framework

for Secure Web Services. Proceedings of

the Third International Symposium on

Intelligent Information Technology and

Security Informatics; 2010 Apr 2–4;

Jinggangshan, China. USA: IEEE. 178–


Wang B, He H, Yuan LX, et al. Open

Identity Management Framework for SaaS

Ecosystem. Proceedings of the IEEE

International Conference on e-Business

Engineering; 2009 Oct 21–23; Macau,

China. USA: IEEE. 512–17p.

Subashini S, Kavitha V. A survey on

security issues in service delivery models

of cloud computing. Journal of Network

and Computer Applications. vol. (In

Press), Corrected Proof.

Fong E, Okun V. Web Application

Scanners: Definitions and Functions.

Proceedings of the 40th Hawaii

International Conference on System

Sciences (HICSS 2007); 2007 Jan 3–6;

Waikoloa, USA. USA: IEEE. 280b-280b.

NIST. National Vulnerability Database

(NVD). 2010 October. Available from:

OWASP. The Ten Most Critical Web

Application Security Vulnerabilities. 2010.

Available from:



  • »