A NEW SOFTWARE DEVELOPMENT FOR SECURITY PURPOSES ON CLOUD COMPUTING Syahirah bt Abdul Rashid #1, Mohamed Faidz Mohamed Said #2 # Universiti Teknologi MARA 70300 Seremban, Negeri Sembilan, MALAYSIA 1 syahirahrashid7@gmail.com 2 faidzms@ieee.org Abstract—Cloud computing is gaining popularity and on-demand access among computer users. Due to this, security in cloud computing has gain attention and use became important element in cloud computing. In this paper, briefly of cloud computing and several security issues have been discussed which is traditional security challenges and cloud security challenges. Although there are many of new technologies that can improve security technologies yet there is no one solutions for all the problem which means standard solution does not exist. Keywords: traditional security issues, cloud security challenges REFERENCES [1] C. Rong, S. T. Nguyen, and M. G. Jaatun, "Beyond lightning: A survey on security challenges in cloud computing," Computers & Electrical Engineering, vol. 39, pp. 47-54, 2013. [2] M. Miao, J. Wang, H. Li, and X. Chen, "Secure multi-server-aided data deduplication in cloud computing," Pervasive and Mobile Computing, vol. 24, pp. 129-137, 2015. [3] Y. Lu and M. Zhu, "Secure cloud computing algorithms for discrete constrained potential games," IFAC-PapersOnLine, vol. 48, pp. 180-185, 2015. [4] J. Li, X. Chen, Q. Huang, and D. S. Wong, "Digital provenance: Enabling secure data forensics in cloud computing," Future Generation Computer Systems, vol. 37, pp. 259-266, 2014. [5] "." [6] D. C. Chou, "Cloud computing: A value creation model," Computer Standards & Interfaces, vol. 38, pp. 72-77, 2015. [7] V. Mauch, M. Kunze, and M. Hillenbrand, "High performance cloud computing," Future Generation Computer Systems, vol. 29, pp. 1408-1416, 2013. [8] A. N. Khan, M. L. Mat Kiah, S. U. Khan, and S. A. Madani, "Towards secure mobile cloud computing: A survey," Future Generation Computer Systems, vol. 29, pp. 1278-1299, 2013. [9] S. Singh, Y.-S. Jeong, and J. H. Park, "A survey on cloud computing security: Issues, threats, and solutions," Journal of Network and Computer Applications, vol. 75, pp. 200-222, 2016. [10] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, pp. 1-11, 2011. [11] D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Generation Computer Systems, vol. 28, pp. 583-592, 2012. [12] L. a. Tawalbeh, N. S. Darwazeh, R. S. Al-Qassas, and F. AlDosari, "A Secure Cloud Computing Model based on Data Classification," Procedia Computer Science, vol. 52, pp. 1153-1158, 2015. [13] M. Ali, S. U. Khan, and A. V. Vasilakos, "Security in cloud computing: Opportunities and challenges," Information Sciences, vol. 305, pp. 357-383, 2015. [14] N. vurukonda and B. T. Rao, "A Study on Data Storage Security Issues in Cloud Computing," Procedia Computer Science, vol. 92, pp. 128-135, 2016. [15] M. F. M. Said, M. N. Taib, and S. Yahya, "Analysis of the CPU Utilization for Point-to-Point Communication Operations in a Beowulf Cluster System," in 2008 International Symposium on Information Technology, 2008, pp. 1-6. [16] M. F. M. Said, M. N. Taib, and S. Yahya, "Analysis of TCP/IP Overhead on Overlapping Message Transfer and Computation in a Distributed Memory System Architecture," International Journal of Advanced Research in Computer Science (IJARCS), vol. 3, pp. 22-36, 2012. [17] M. F. M. Said, S. Yahya, and M. N. Taib, "Analysis of Different Programming Primitives used in a Beowulf Cluster," International Journal of Computer and Information Technology (IJCIT), vol. 1, pp. 25-33, 2012.