SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IJAPRR Page 1 
International Journal of Allied Practice, Research and Review 
Website: www.ijaprr.com (ISSN 0000-0000) 
Cloud Computing: Unexampled firmness of purpose 
of Java Technologies as for Security vulnerabilities 
and Cloud user’s Interaction on the Web. 
1 Dr. Tejinder Singh 
Assistant Professor of Computer Science and Deputy Dean IRP, Baba Farid College, 
Bathinda, Email: - tejinder31.singh@gmail.com 
Abstract - Here in this paper, we explore comparative study to analyze the cloud computing with the use of Java Technologies. 
Cloud computing is a natural firmness of purpose for data and computation centers with automated systems management, 
workload balancing, and virtualization technologies. A mounting number of vendors are contribution Java Platform as a Service 
(PaaS) solutions that support the Java Standard Edition (JSE) and JEE standard. Java EE 7 Provides more or less additional 
functionality even you can handle the security purpose and applications on the web community. We have seen that Java EE is the 
major enterprise platform with millions of lines of code available in the data centers, a path to move them to Cloud will be very 
attractive to enterprises. As a security issues on cloud environment data transfer, data sharing and user permission’s which form 
could be accessed on via cloud computing. Java EE 7 be responsible for regarding data transfer and user permissions. In this 
paper, the author discuss security issues, privacy and control issues, accessibility issues, confidentiality, integrity of data and 
many more for cloud computing And discuss, three cloud service models were compared; cloud security risks and threats were 
investigated based on the nature of the cloud service models. 
Keywords: J2EE, Enterprise; Security; Users; Applications 
I. Introduction 
As presently, java introduces the concept of cloud computing with the Enterprise technology. Java 
provides the environment for cloud, Service engines provide logic in the environment, such as XSL 
(Extensible Stylesheet Language) transformation or BPEL (Business Process Execution Language) 
orchestration. Binding components are sort of "connectors" to external services or applications. They 
allow communication with various protocols, such as SOAP, REST, Java Message Service, or ebXML. 
Especially if you mean the enterprise as we know it today. While there are important security, privacy and 
regulatory issues that enterprises need to sort through before full migration to the cloud, and cloud 
vendors need to strengthen cloud capabilities in these areas before enterprise applications can be 
effectively hosted in the cloud, there are benefits that cloud technologies do offer today that can be 
leveraged in the deployment of many enterprise applications [1]. In simple words, Cloud computing is the 
combination of a technology, platform that provides hosting and storage service on the Internet. Cloud 
computing aims to provide scalable and inexpensive on -demand computing infrastructures with good 
quality of service levels. “A model for enabling convenient, on-demand network access to a shared pool 
of configurable service delivery models coexist in one cloud platform the security management process 
[2].
IJAPRR Page 2 
Figure 1: Cloud Service models 
II. Cloud Computing Threats 
Cloud computing faces just as much security threats that are currently found in the existing computing platforms, networks, intranets, internets in enterprises. These threats, risk vulnerabilities come in various forms. It identified the following seven major threats: [3]. 
 Abuse and Nefarious Use of Cloud Computing 
 Insecure Application Programming Interfaces 
 Malicious Insiders 
 Shared Technology Vulnerabilities 
 Data Loss/Leakage 
 Account, Service & Traffic Hijacking 
 Unknown Risk Profile 
III. Cloud Security with the security risk and vulnerability in the enterprise cloud computing that are being discovered enterprises that want to proceed with cloud computing should, use the following steps to verify and understand cloud security provided by a cloud provider: [3]  Understand the cloud  Demand Transparency  Reinforce Internal Security  Consider the Legal Implications  Pay attention 
a. Issues to Clarify Before Adopting Cloud Computing An enterprise cloud computing user should address with cloud computing providers before adopting: [3] 
 User Access 
 Regulatory Compliance
IJAPRR Page 3 
 Data location 
 Data Segregation 
 Disaster Recovery Verification 
 Disaster Recovery 
 Long-term Viability 
IV. Data Security on the Cloud Side 
From the laaS on the bottom foundation layer to the PaaS on the middle layer and the SaaS on the top layer, cloud storage is always an important key factor for implement the application of cloud computing. lasS layer is supporting the networking service. In the following, some consideration regarding the security issue for device and equipment must be focused. 
 Storage and system protection 
 Data protection 
Encrypt those confidential file or sensitive data before uploading. After then, those encrypted data could be uploading to the storage designated and provided by service provider of the cloud computing through secure channel. The demonstrated operating process is shown [4] 
Figure 2: Data Encryption before Uploading 
V. Java Vulnerabilities for Cloud 
Over the years that the X-Force team has been tracking Security incidents, the overall attack tactics and techniques have not changed significantly. The number of overall incidents has increased, the amount of traffic used in distributed-denial-of-service (DDoS) attacks has multiplied and the number of leaked records has been steadily rising. They successfully exploited vulnerable web applications with attacks such as SQL injection (SQLi) and cross-site scripting (XSS), as well as utilized a mix of sophisticated and generally accessible toolkits to gain critical points of entry. [5]
IJAPRR Page 4 
Figure 3. Most-Commonly Attacked Industries 
Figure 4. Most-Common Attack Types 
An analysis of X-Force threat intelligence data during the month of December, 2013 reveals that out of a survey of more than one million Trusteer banking and enterprise customers, the most targeted applications were Oracle Java, Adobe Reader and popular browsers.[5] 
Figure 5. Exploitation of application vulnerabilities 
Disclosure comes in the form of two detailed reports 
 Weaknesses with the PaaS’s implementation and configuration. 
 Opportunities for users to access other users’ applications, and, most importantly, 
• Issues that could expose the service platform to attacks from remotely executed code. 
VI Conclusion 
In this paper I have provided some information regarding java Vulnerabilities for cloud web applications and others. I have showing the survey report e-force that it is shown in figures most-common attack types 
Cloud security and most common attacked Industries. The advent of cloud computing emphasizes the importance of service availability; in fact, for an increasing number of mission-critical applications,
IJAPRR Page 5 
availability becomes subject to contractual obligations. We present evidence that the infrastructure that underlies, and the applications that rely upon, cloud computing undergo a fast-paced evolution. 
VII References 
[1] "Cloud computing A collection of working papers", Thomas B Winans , John Seely Brown, 2009 Deloitte Development LLC., www.deloitte.com 
[2] "Security Issues with Possible Solutions in Cloud Computing-A Survey", Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 2, Issue 2, February 2013, ISSN: 2278 – 1323, pp-652-661. 
[3] "AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING", Anthony Bisong1 and Syed (Shawon) M. Rahman, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011, PP-30-45. 
[4] "Information Security Issue of Enterprises Adopting the Application of Cloud Computing", Chang-Lung Tsai Uei-Chin Lin Allen Y. Chang Chun-Jung Chen, National Science Council and Chinese Culture University of Taiwan, R.O.C., PP-648- 649. 
[5] “IBM X-Force Threat Intelligence Quarterly 1Q 2014”, IBM Security Systems, February 2014. 
[6] “Cloud Software Upgrades: Challenges and Opportunities”, Iulian Neamtiu, Department of Computer Science and Engineering University of California, Riverside Email: neamtiu@cs.ucr.edu 
[7]” Security Vulnerability Notice” ,SE-2013-01-ORACLE,Security vulnerabilities in Oracle Java Cloud Service, Issues 1- 28.

Contenu connexe

Tendances

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosDeepak Bagga
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework forIJCNCJournal
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 

Tendances (20)

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using Kerberos
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
B1802041217
B1802041217B1802041217
B1802041217
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 
J3602068071
J3602068071J3602068071
J3602068071
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework for
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 

En vedette

Express way-towers-bochure
Express way-towers-bochureExpress way-towers-bochure
Express way-towers-bochurenishantsirohi2
 
The Internet Of Things: What Is It And What Does It Do?
The Internet Of Things: What Is It And What Does It Do?The Internet Of Things: What Is It And What Does It Do?
The Internet Of Things: What Is It And What Does It Do?Mobile Pundits
 
Tgtb iii ñƒð»ð¸ñ€ð°ð»ñ‹ð½ ð±ð¸ðµð»ñð»ñ‚
Tgtb iii ñƒð»ð¸ñ€ð°ð»ñ‹ð½ ð±ð¸ðµð»ñð»ñ‚Tgtb iii ñƒð»ð¸ñ€ð°ð»ñ‹ð½ ð±ð¸ðµð»ñð»ñ‚
Tgtb iii ñƒð»ð¸ñ€ð°ð»ñ‹ð½ ð±ð¸ðµð»ñð»ñ‚only_olzii
 
Hbel 3203 teaching of grammar asgnmt qns
Hbel 3203 teaching of grammar asgnmt qnsHbel 3203 teaching of grammar asgnmt qns
Hbel 3203 teaching of grammar asgnmt qnsperoduaaxia
 
Zar tuslah 2014
Zar tuslah 2014Zar tuslah 2014
Zar tuslah 2014only_olzii
 
2013 guitsetgel
2013 guitsetgel2013 guitsetgel
2013 guitsetgelonly_olzii
 
Ijaprr vol1-2-6-9naseer
Ijaprr vol1-2-6-9naseerIjaprr vol1-2-6-9naseer
Ijaprr vol1-2-6-9naseerijaprr
 
Barilga zurag 2014
Barilga zurag 2014Barilga zurag 2014
Barilga zurag 2014only_olzii
 
Express way-towers-bochure
Express way-towers-bochureExpress way-towers-bochure
Express way-towers-bochurenishantsirohi2
 
What is app store optimization?
What is app store optimization?What is app store optimization?
What is app store optimization?Mobile Pundits
 
iPhone application development in India
iPhone application development in IndiaiPhone application development in India
iPhone application development in IndiaMobile Pundits
 
Making the world a better place, one analysis at a time
Making the world a better place, one analysis at a timeMaking the world a better place, one analysis at a time
Making the world a better place, one analysis at a timeSuasive Consulting & Analytics
 
Ijaprr vol1-4-15-23tkjain
Ijaprr vol1-4-15-23tkjainIjaprr vol1-4-15-23tkjain
Ijaprr vol1-4-15-23tkjainijaprr
 

En vedette (16)

Redvolución
Redvolución Redvolución
Redvolución
 
Express way-towers-bochure
Express way-towers-bochureExpress way-towers-bochure
Express way-towers-bochure
 
The Internet Of Things: What Is It And What Does It Do?
The Internet Of Things: What Is It And What Does It Do?The Internet Of Things: What Is It And What Does It Do?
The Internet Of Things: What Is It And What Does It Do?
 
Tgtb iii ñƒð»ð¸ñ€ð°ð»ñ‹ð½ ð±ð¸ðµð»ñð»ñ‚
Tgtb iii ñƒð»ð¸ñ€ð°ð»ñ‹ð½ ð±ð¸ðµð»ñð»ñ‚Tgtb iii ñƒð»ð¸ñ€ð°ð»ñ‹ð½ ð±ð¸ðµð»ñð»ñ‚
Tgtb iii ñƒð»ð¸ñ€ð°ð»ñ‹ð½ ð±ð¸ðµð»ñð»ñ‚
 
Hbel 3203 teaching of grammar asgnmt qns
Hbel 3203 teaching of grammar asgnmt qnsHbel 3203 teaching of grammar asgnmt qns
Hbel 3203 teaching of grammar asgnmt qns
 
Zar tuslah 2014
Zar tuslah 2014Zar tuslah 2014
Zar tuslah 2014
 
2013 guitsetgel
2013 guitsetgel2013 guitsetgel
2013 guitsetgel
 
Ijaprr vol1-2-6-9naseer
Ijaprr vol1-2-6-9naseerIjaprr vol1-2-6-9naseer
Ijaprr vol1-2-6-9naseer
 
Barilga zurag 2014
Barilga zurag 2014Barilga zurag 2014
Barilga zurag 2014
 
Express way-towers-bochure
Express way-towers-bochureExpress way-towers-bochure
Express way-towers-bochure
 
Film Pitch Preparation
Film Pitch PreparationFilm Pitch Preparation
Film Pitch Preparation
 
80 Years Straight
80 Years Straight80 Years Straight
80 Years Straight
 
What is app store optimization?
What is app store optimization?What is app store optimization?
What is app store optimization?
 
iPhone application development in India
iPhone application development in IndiaiPhone application development in India
iPhone application development in India
 
Making the world a better place, one analysis at a time
Making the world a better place, one analysis at a timeMaking the world a better place, one analysis at a time
Making the world a better place, one analysis at a time
 
Ijaprr vol1-4-15-23tkjain
Ijaprr vol1-4-15-23tkjainIjaprr vol1-4-15-23tkjain
Ijaprr vol1-4-15-23tkjain
 

Similaire à Ijaprr vol1-1-1-5dr tejinder

SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...Claire Webber
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingYolanda Ivey
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture IJECEIAES
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docxRAHUL126667
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunalKashyap Kunal
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGijccsa
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
 

Similaire à Ijaprr vol1-1-1-5dr tejinder (20)

SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
G0314043
G0314043G0314043
G0314043
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
489 493
489 493489 493
489 493
 
H046053944
H046053944H046053944
H046053944
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTING
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 

Dernier

Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentBharaniDharan195623
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate productionChinnuNinan
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptbibisarnayak0
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 

Dernier (20)

Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managament
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate production
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.ppt
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 

Ijaprr vol1-1-1-5dr tejinder

  • 1. IJAPRR Page 1 International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 0000-0000) Cloud Computing: Unexampled firmness of purpose of Java Technologies as for Security vulnerabilities and Cloud user’s Interaction on the Web. 1 Dr. Tejinder Singh Assistant Professor of Computer Science and Deputy Dean IRP, Baba Farid College, Bathinda, Email: - tejinder31.singh@gmail.com Abstract - Here in this paper, we explore comparative study to analyze the cloud computing with the use of Java Technologies. Cloud computing is a natural firmness of purpose for data and computation centers with automated systems management, workload balancing, and virtualization technologies. A mounting number of vendors are contribution Java Platform as a Service (PaaS) solutions that support the Java Standard Edition (JSE) and JEE standard. Java EE 7 Provides more or less additional functionality even you can handle the security purpose and applications on the web community. We have seen that Java EE is the major enterprise platform with millions of lines of code available in the data centers, a path to move them to Cloud will be very attractive to enterprises. As a security issues on cloud environment data transfer, data sharing and user permission’s which form could be accessed on via cloud computing. Java EE 7 be responsible for regarding data transfer and user permissions. In this paper, the author discuss security issues, privacy and control issues, accessibility issues, confidentiality, integrity of data and many more for cloud computing And discuss, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Keywords: J2EE, Enterprise; Security; Users; Applications I. Introduction As presently, java introduces the concept of cloud computing with the Enterprise technology. Java provides the environment for cloud, Service engines provide logic in the environment, such as XSL (Extensible Stylesheet Language) transformation or BPEL (Business Process Execution Language) orchestration. Binding components are sort of "connectors" to external services or applications. They allow communication with various protocols, such as SOAP, REST, Java Message Service, or ebXML. Especially if you mean the enterprise as we know it today. While there are important security, privacy and regulatory issues that enterprises need to sort through before full migration to the cloud, and cloud vendors need to strengthen cloud capabilities in these areas before enterprise applications can be effectively hosted in the cloud, there are benefits that cloud technologies do offer today that can be leveraged in the deployment of many enterprise applications [1]. In simple words, Cloud computing is the combination of a technology, platform that provides hosting and storage service on the Internet. Cloud computing aims to provide scalable and inexpensive on -demand computing infrastructures with good quality of service levels. “A model for enabling convenient, on-demand network access to a shared pool of configurable service delivery models coexist in one cloud platform the security management process [2].
  • 2. IJAPRR Page 2 Figure 1: Cloud Service models II. Cloud Computing Threats Cloud computing faces just as much security threats that are currently found in the existing computing platforms, networks, intranets, internets in enterprises. These threats, risk vulnerabilities come in various forms. It identified the following seven major threats: [3].  Abuse and Nefarious Use of Cloud Computing  Insecure Application Programming Interfaces  Malicious Insiders  Shared Technology Vulnerabilities  Data Loss/Leakage  Account, Service & Traffic Hijacking  Unknown Risk Profile III. Cloud Security with the security risk and vulnerability in the enterprise cloud computing that are being discovered enterprises that want to proceed with cloud computing should, use the following steps to verify and understand cloud security provided by a cloud provider: [3]  Understand the cloud  Demand Transparency  Reinforce Internal Security  Consider the Legal Implications  Pay attention a. Issues to Clarify Before Adopting Cloud Computing An enterprise cloud computing user should address with cloud computing providers before adopting: [3]  User Access  Regulatory Compliance
  • 3. IJAPRR Page 3  Data location  Data Segregation  Disaster Recovery Verification  Disaster Recovery  Long-term Viability IV. Data Security on the Cloud Side From the laaS on the bottom foundation layer to the PaaS on the middle layer and the SaaS on the top layer, cloud storage is always an important key factor for implement the application of cloud computing. lasS layer is supporting the networking service. In the following, some consideration regarding the security issue for device and equipment must be focused.  Storage and system protection  Data protection Encrypt those confidential file or sensitive data before uploading. After then, those encrypted data could be uploading to the storage designated and provided by service provider of the cloud computing through secure channel. The demonstrated operating process is shown [4] Figure 2: Data Encryption before Uploading V. Java Vulnerabilities for Cloud Over the years that the X-Force team has been tracking Security incidents, the overall attack tactics and techniques have not changed significantly. The number of overall incidents has increased, the amount of traffic used in distributed-denial-of-service (DDoS) attacks has multiplied and the number of leaked records has been steadily rising. They successfully exploited vulnerable web applications with attacks such as SQL injection (SQLi) and cross-site scripting (XSS), as well as utilized a mix of sophisticated and generally accessible toolkits to gain critical points of entry. [5]
  • 4. IJAPRR Page 4 Figure 3. Most-Commonly Attacked Industries Figure 4. Most-Common Attack Types An analysis of X-Force threat intelligence data during the month of December, 2013 reveals that out of a survey of more than one million Trusteer banking and enterprise customers, the most targeted applications were Oracle Java, Adobe Reader and popular browsers.[5] Figure 5. Exploitation of application vulnerabilities Disclosure comes in the form of two detailed reports  Weaknesses with the PaaS’s implementation and configuration.  Opportunities for users to access other users’ applications, and, most importantly, • Issues that could expose the service platform to attacks from remotely executed code. VI Conclusion In this paper I have provided some information regarding java Vulnerabilities for cloud web applications and others. I have showing the survey report e-force that it is shown in figures most-common attack types Cloud security and most common attacked Industries. The advent of cloud computing emphasizes the importance of service availability; in fact, for an increasing number of mission-critical applications,
  • 5. IJAPRR Page 5 availability becomes subject to contractual obligations. We present evidence that the infrastructure that underlies, and the applications that rely upon, cloud computing undergo a fast-paced evolution. VII References [1] "Cloud computing A collection of working papers", Thomas B Winans , John Seely Brown, 2009 Deloitte Development LLC., www.deloitte.com [2] "Security Issues with Possible Solutions in Cloud Computing-A Survey", Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 2, Issue 2, February 2013, ISSN: 2278 – 1323, pp-652-661. [3] "AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING", Anthony Bisong1 and Syed (Shawon) M. Rahman, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011, PP-30-45. [4] "Information Security Issue of Enterprises Adopting the Application of Cloud Computing", Chang-Lung Tsai Uei-Chin Lin Allen Y. Chang Chun-Jung Chen, National Science Council and Chinese Culture University of Taiwan, R.O.C., PP-648- 649. [5] “IBM X-Force Threat Intelligence Quarterly 1Q 2014”, IBM Security Systems, February 2014. [6] “Cloud Software Upgrades: Challenges and Opportunities”, Iulian Neamtiu, Department of Computer Science and Engineering University of California, Riverside Email: neamtiu@cs.ucr.edu [7]” Security Vulnerability Notice” ,SE-2013-01-ORACLE,Security vulnerabilities in Oracle Java Cloud Service, Issues 1- 28.