Did you know that about 25 000 new documents are uploaded to the IEEE Xplore Digital Library each month? With articles, e-books, technical standards, and educational courses, IEEE Xplore can be an invaluable, and even overwhelming, resource.
Recently, IEEE was recognized for its journals being rated some of the top in engineering, which are among the many research materials available to subscribers. To help navigate through the incredible amount of information (including more than 3 million full-text articles from IEEE’s highly cited engineering publications), The Institute will highlight unique research from the digital library on our blog each month.
This month we are featuring one of the most searched topics on IEEE Xplore today: cybersecurity. The research paper “Security Threats in Cloud Computing” made its way to the top of the library’s “Popular Downloads” list. As more companies use cloud computing today to deliver and store information, safeguarding the data has once again become an important topic of discussion.
Cloud computing refers to a network of computers that operate together via the Internet, sharing services and information remotely from any part of the world at any time. Think of Google Drive with its unlimited amount of data stored and shared in virtual clouds. With its rapid growth, and services like it, comes security concerns on a larger scale, and alternatively these concerns prevent wide adoption of cloud computing.
The study, published in Internet Technology and Secured Transactions in December 2011, takes a look at the potential risks of cloud computing. It was written by F.B. Shaikh from the department of computer and technology at the Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology, in Karachi, Pakistan, and S. Haider. They presented their work at the 2011 International Conference for Internet Technology and Secured Transactions, in Abu Dhabi, United Arab Emirates.
The research identifies the most vulnerable of security threats, including loss or leakage of data, identity management, improper usage of cloud services, and the potential of hijacking a user account when accessing data.
The authors cover the different models and tools available to limit security risk, such as the Cloud Security Alliance, which is a suite of cloud security tools available for free to help create public and private clouds that comply with current industry standards and best practices. But the research states that standards for security in cloud computing still need to be established. This not only benefits the users in keeping their information private and secure, but also applies to developers and suppliers of cloud computing services who rely on client trust.
The researchers emphasize the importance of service providers and clients working together to ensure the safety and security of data in cloud computing.