SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
DOI:10.5121/ijcsa.2014.4112 125
A Survey on Cloud Security Issues and Techniques
Garima Gupta1
, P.R.Laxmi2
and Shubhanjali Sharma3
1,2,3
Department of Computer Engineering, Government Engineering College, Ajmer
Abstract:
Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of
resources and services that are offered by the network or internet. Cloud computing extends various
computing techniques like grid computing, distributed computing. Today cloud computing is used in both
industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As
the field of cloud computing is spreading the new techniques are developing. This increase in cloud
computing environment also increases security challenges for cloud developers. Users of cloud save their
data in the cloud hence the lack of security in cloud can lose the user’s trust.
In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy,
elasticity, availability etc. the paper also discuss existing security techniques and approaches for a secure
cloud. This paper will enable researchers and professionals to know about different security threats and
models and tools proposed.
Keywords:
Cloud Computing, Cloud Security, Security Threats, Security Techniques.
1. Introduction
Cloud computing is another name for Internet computing. The definition of cloud computing
provided by National Institute of Standards and Technology (NIST) says that: "Cloud computing
is a model for enabling on-demand and convenient network access to a shared pool of
configurable computing resources (e.g., networks, servers, storage applications and services) that
can be rapidly provisioned and released with minimal management effort or service provider
interaction[9]. For some it is a paradigm that provides computing resources and storage while for
others it is just a way to access software and data from the cloud. Cloud computing is popular in
organization and academic today because it provides its users scalability, flexibility and
availability of data. Also cloud computing reduces the cost by enabling the sharing of data to the
organization. Organization can port their data on the cloud so that their shareholders can use their
data. Google apps is an example of cloud computing.
However Cloud provides various facility and benefits but still it has some issues regarding safe
access and storage of data. Several issues are there related to cloud security as: vendor lock-in,
multi-tenancy, loss of control, service disruption, data loss etc. are some of the research problems
in cloud computing [2]. In this paper we analyze the security issues related to cloud computing
model. The main goal is to study different types of attacks and techniques to secure the cloud
model.
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
126
d
Figure 1. Layers of Cloud Computing
2. Cloud security issues
Organization uses various cloud services as IaaS, PaaS, SaaS and the models like public, private,
hybrid. These models and services has various cloud security issues. Each service model is
associated with some issues. Security issues are considered in two views first in the view of
service provider who insures that services provided by them should be secure and also manages
the customer’s identity management. Other view is customer view that ensures that service that
they are using is secure enough.
2.1 Multi-tenancy
A cloud model is built for reasons like sharing of resources, memory, storage and shared
computing [2]. Multi-tenancy provides efficient utilization of resources, keeping cost lower. It
implies sharing of computational resources, services storage and application with other tenants
residing on same physical/logical platform at provider’s premises. Thus it violates the
confidentiality of data and results in leakage of information and encryption and increase the
possibility of attacks.
2.2 Elasticity
Elasticity is defined as the degree to which a system is able to adapt to workload changes by
provisioning and deranged resources in an autonomic manner, such that the available resources
match the current demand at any time as closely as possible .Elasticity implies scalability. It says
that consumers are able to scale up and down as needed. This scaling enables tenants to use a
resource that is assigned previously to other tenant. However this may lead to confidentiality
issues.
2.3 Insider attacks
Cloud model is a multitenant based model that is under the provider’s single management
domain. This is a threat that arises within the organization. There are no hiring standards and
SaaS
Software as a Service: Complete applications, customizable within limits, solving specific
business needs, with focus on end-users requirements
PaaS
Platform as a Services: No need to directly manage OS, databases, etc. API’s for
building higher level applications. Pre-built applications components.
IaaS
Infrastructure as a service: No need to purchase or manage physical data center
equipment(servers, storage, networking, etc.)
manage
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
127
providers for cloud employees [1]. So a third party vendor can easily hack the data of one
organization and may corrupt or sell that data to other organization.
2.4 Outsider attacks
This is the one of the major concerning issue in an organization because it releases the
confidential information of an organization in open. Clouds are not like a private network, they
have more interfaces than private network. So hackers and attackers have advantage of exploiting
the API, weakness and may do a connection breaking [1] .These attacks are less harmful than the
insider attacks because in the later we sometimes unable to identify the attack.
Figure 2. Percentage of Insiders versus Outsiders [1]
2.5 Loss of control
Cloud uses a location transparency model by which it enable organizations to unaware about the
location of their services and data. Hence provider can host their services from anywhere in the
cloud. In this case organization may lose their data and possibly they are not aware about security
mechanism put in place of the provider.
Figure 3. Loss of Control over Data [1]
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
128
2.6 Data Loss
As in cloud, there are multiple tenants, data integrity and safety could not be provided. Data loss
can results in financial, customer count loss for an organization. An important example of this can
be updating and deletion of data without having any backup of that data.
2.7 Network security
2.7.1 Man in middle attack:-
In this attack, attacker makes an independent connection and communicates with the cloud user
on its private network where all control is in the hand of attacker.
2.7.2 Distributed denial of service attacks: -
In DDOS attack, servers and networks are brought down by a huge amount of network traffic
and users are denied the access to a certain Internet based Service.[3]
2.7.3 Port scanning:-
Port is a place from where information exchange takes place. Port scanning is taking place when
subscriber configures the group. Port scanning is done automatically when you configure the
internet so this violates the security concerns [3].
2.8 Malware Injection Attack Problem
In cloud computing, a lot of data is transferred between cloud provider and consumer, there is a
need of user authentication and authorization [10]. When the data is transferred between cloud
provider and user, attacker can introduce malicious code into it. As a result, the original user may
have to wait until the completion of the job that was maliciously introduced.
2.9 Flooding Attack Problem
In cloud, there is a no. of servers that communicate with one another and transfer data. The
requests is processed, the requested jobs are authenticated first, but this authentication requires a
lot of CPU utilization, memory and finally due to these server is overloaded and it passes its
offload to other server[10]. By all this the usual processing of system is interrupted, and the
system is flooded.
3. Techniques to secure data in cloud
3.1 Authentication and Identity
Authentication of users and even of communicating systems is performed by various methods,
but the most common is cryptography [8]. Authentication of users takes place in various ways
like in the form of passwords that is known individually, in the form of a security token, or in the
form a measurable quantity like fingerprint. One problem with using traditional identity
approaches in a cloud environment is faced when the enterprise uses multiple cloud service
providers (CSPs)[8]. In such a use case, synchronizing identity information with the enterprise is
not scalable. Other problems arise with traditional identity approaches when migrating
infrastructure toward a cloud-based solution.
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
129
3.2 Data Encryption
If you are planning to store sensitive information on a large data store than you need to use data
encryption techniques. Having passwords and firewalls is good, but people can bypass them to
access your data. When data is encrypted it is in a form that cannot be read without an encryption
key. The data is totally useless to the intruder. It is a technique of translation of data into secret
code. If you want to read the encrypted data, you should have the secret key or password that is
also called encryption key.
3.3 Information integrity and Privacy
Cloud computing provides information and resources to valid users. Resources can be accessed
through web browsers and can also be accessed by malicious attackers [2]. A convenient solution
to the problem of information integrity is to provide mutual trust between provider and user.
Another solution can be providing proper authentication, authorization and accounting controls so
the process of accessing information should go through various multi levels of checking to ensure
authorized use of resources [2]. Some secured access mechanisms should be provided like RSA
certificates, SSH based tunnels.
3.4 Availability of Information(SLA)
Non availability of information or data is a major issue regarding cloud computing services.
Service Level agreement is used to provide the information about whether the network resources
are available for users or not. It is a trust bond between consumer and provider [2].An way to
provide availability of resources is to have a backup plan for local resources as well as for most
crucial information. This enables the user to have the information about the resources even after
their unavailability.
3.5 Secure Information Management
It is a technique of information security for a collection of data into central repository. It is
comprised of agents running on systems that are to be monitored and then sends information to a
server that is called “Security Console”. The security console is managed by admin who is a
human being who reviews the information and takes actions in response to any alerts. As the
cloud user base, dependency stack increase, the cloud security mechanisms to solve security
issues also increase, this makes cloud security management much more complicated. It is also
referred as a Log Management. Cloud providers also provide some security standards like PCI
DSS, SAS 70[2]. Information Security Management Maturity is another model of Information
Security Management System.
3.6 Malware-injection attack solution
This solution creates a no. of client virtual machines and stores all of them in a central storage. It
utilizes FAT (File Allocation Table) consisting of virtual operating systems[10]. The application
that is run by a client can be found in FAT table. All the instances are managed and scheduled by
Hypervisor. IDT (Interrupt Descriptor Table) is used for integrity checking.
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
130
Figure 4. Malware-Injection attack solution [10]
3.7 Flooding Attack Solution
All the servers in cloud are considered as a fleet of servers. One fleet of server is considered for
system type requests, one for memory management and last one for core computation related
jobs. All the servers in fleet can communicate with one another. When one of the server is
overloaded, a new server is brought and used in the place of that server and an another server that
is called name server has all the record of current states of servers and will be used to update
destinations and states. Hypervisor can be used for managing jobs[10]. Hypervisor also do the
authorization and authentication of jobs. An authorized customer’s request can be identified by
PID. RSA can also be used to encrypt the PID.
Figure 5. Flooding Attack solution [10]
4. Cloud computing Security Standards
Standards for security define procedure and processes for implementing a security program. To
maintain a secure environment, that provides privacy and security some specific steps are
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
131
performed by applying cloud related activities by these standards. A concept called “Defence in
Depth” is used in cloud to provide security [3]. This concept has some layers of defence. In this
way, if one of the systems fails, overlapping technique can be used to provide security as it has no
single point of failure. Traditionally, endpoints have the technique to maintain security, where
access is controlled by user.
4.1 Security Assertion Markup Language (SAML)
SAML is basically used in business deals for secure communication between online partners. It is
an XML based standard used for authentication, authorization among the partners. SAML defines
three roles: the principal (a user), a service provider (SP) and an identity provider (IDP) [3].
SAML provides queries and responses to specify user attributes, authorization and authentication
information in XML format. The requesting party is an online site that receives security
information.
4.2 Open Authentication (OAuth)
It is a method used for interacting with protected data. It is basically used to provide data access
to developers. Users can grant access to information to developers and consumers without sharing
of their identity [3]. OAuth does not provide any security by itself in fact it depends on other
protocols like SSL to provide security.
4.3 OpenID
OpenID is a single-sign-on (SSO) method. It is a common login process that allows user to login
once and then use all the participating systems [3]. It does not based on central authorization for
authentication of users.
4.4 SSL/TLS
TLS is used to provide secure communication over TCP/IP. TLS works in basically three phases:
In first phase, negotiation is done between clients to identify which ciphers are used. In second
phase, key exchange algorithm is used for authentication [3]. These key exchange algorithms are
public key algorithm. The final and third phase involves message encryption and cipher
encryption.
5. Conclusion
Although there are various security challenges in cloud computing but in this paper we
have discussed some of them and also the techniques to prevent them .This research is basically
done to study all the problems like attacks, data loss and unauthenticated access to data and also
the methods to remove those problems. For best utilization of cloud computing model, there is a
need to block the already existing security issues like confidentiality and integrity loss and
address the security concerns. As the cloud computing is complex and dynamic, the traditional
security solutions provided by cloud environment do not map well to its virtualized environments.
Organization such as Cloud Security Alliance(CSA) and NIST are working on cloud computing
security[2].In this paper we have discussed a few security approaches but several other
approaches are also there that are in the process.
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
132
5. References
[1] Akhil Behl (2011), Emerging Security Challenges in Cloud Computing (An insight to Cloud security
challenges and their mitigation).
[2] Akhil Behl & Kanika Behl (2012), An Analysis of Cloud Computing Security Issues.
[3] L. Ertaul, S. Singhal & G. Saldamli, Security Challenges In Cloud computing.
[4] Peter Mell, Tim Grance, The NIST Definition of Cloud Computing, Version 15, October
7, 2009,
[5] Cloud Computing: Benefits, Risks and Recommendations for Information Security. ENISA(European
Network and Information Security Agency), Crete, 2009.
[6] Cloud computing security forum http://cloudsecurity.org/
[7] Cloud Computing – A Practical Approach by Velte, Tata McGraw- Hill Edition (ISBN-13:978-0-07-
068351-8)
[8] Yashpalsinh jadeja & kirti modi cloud computing- concepts, architecture and challenges
[9] Satyendra singh rawat & Mr. Alpesh Soni ,A Survey of Various Techniques to Secure Cloud Storage
[10] R. Balasubramanian, Dr.M.Aramuthan Security Problems and Possible Security Approaches In
Cloud Computing
Authors
Garima Gupta Completed B.Tech in CSE From GVSET Jaipur in 2011 from RTU. Currently
pursuing M.Tech from Govt Engg. College Ajmer.Area of research is Networking(Cloud
Computing,Green Cloud)
P.R.Laxmi Completed B.Tech in CSE From Govt Women Engg. College Ajmer in 2011 from
RTU. Currently pursuing M.Tech from Govt Engg. College Ajmer. Area of research is
Networking(Cloud Computing,Green Cloud)
Shubhanjali Sharma Completed B.Tech in IT From Govt Women Engg. Colllege Ajmer in
2011 from RTU. Currently pursuing M.Tech from Govt Engg. College Ajmer. Area of
research is Networking (Cloud computing,Green Cloud)

Contenu connexe

Tendances

A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosDeepak Bagga
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computingijtsrd
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106IJRAT
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 

Tendances (19)

A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using Kerberos
 
489 493
489 493489 493
489 493
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 

En vedette

The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...Brian Solis
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016Andrew Chen
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
 

En vedette (6)

The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Similaire à A Survey on Cloud Security Issues and Techniques

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4sophiabelthome
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implicationseSAT Publishing House
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspectseSAT Publishing House
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 

Similaire à A Survey on Cloud Security Issues and Techniques (20)

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
G033030035
G033030035G033030035
G033030035
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
Cloud security
Cloud securityCloud security
Cloud security
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implications
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 

Dernier

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Dernier (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

A Survey on Cloud Security Issues and Techniques

  • 1. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014 DOI:10.5121/ijcsa.2014.4112 125 A Survey on Cloud Security Issues and Techniques Garima Gupta1 , P.R.Laxmi2 and Shubhanjali Sharma3 1,2,3 Department of Computer Engineering, Government Engineering College, Ajmer Abstract: Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed computing. Today cloud computing is used in both industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust. In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy, elasticity, availability etc. the paper also discuss existing security techniques and approaches for a secure cloud. This paper will enable researchers and professionals to know about different security threats and models and tools proposed. Keywords: Cloud Computing, Cloud Security, Security Threats, Security Techniques. 1. Introduction Cloud computing is another name for Internet computing. The definition of cloud computing provided by National Institute of Standards and Technology (NIST) says that: "Cloud computing is a model for enabling on-demand and convenient network access to a shared pool of configurable computing resources (e.g., networks, servers, storage applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction[9]. For some it is a paradigm that provides computing resources and storage while for others it is just a way to access software and data from the cloud. Cloud computing is popular in organization and academic today because it provides its users scalability, flexibility and availability of data. Also cloud computing reduces the cost by enabling the sharing of data to the organization. Organization can port their data on the cloud so that their shareholders can use their data. Google apps is an example of cloud computing. However Cloud provides various facility and benefits but still it has some issues regarding safe access and storage of data. Several issues are there related to cloud security as: vendor lock-in, multi-tenancy, loss of control, service disruption, data loss etc. are some of the research problems in cloud computing [2]. In this paper we analyze the security issues related to cloud computing model. The main goal is to study different types of attacks and techniques to secure the cloud model.
  • 2. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014 126 d Figure 1. Layers of Cloud Computing 2. Cloud security issues Organization uses various cloud services as IaaS, PaaS, SaaS and the models like public, private, hybrid. These models and services has various cloud security issues. Each service model is associated with some issues. Security issues are considered in two views first in the view of service provider who insures that services provided by them should be secure and also manages the customer’s identity management. Other view is customer view that ensures that service that they are using is secure enough. 2.1 Multi-tenancy A cloud model is built for reasons like sharing of resources, memory, storage and shared computing [2]. Multi-tenancy provides efficient utilization of resources, keeping cost lower. It implies sharing of computational resources, services storage and application with other tenants residing on same physical/logical platform at provider’s premises. Thus it violates the confidentiality of data and results in leakage of information and encryption and increase the possibility of attacks. 2.2 Elasticity Elasticity is defined as the degree to which a system is able to adapt to workload changes by provisioning and deranged resources in an autonomic manner, such that the available resources match the current demand at any time as closely as possible .Elasticity implies scalability. It says that consumers are able to scale up and down as needed. This scaling enables tenants to use a resource that is assigned previously to other tenant. However this may lead to confidentiality issues. 2.3 Insider attacks Cloud model is a multitenant based model that is under the provider’s single management domain. This is a threat that arises within the organization. There are no hiring standards and SaaS Software as a Service: Complete applications, customizable within limits, solving specific business needs, with focus on end-users requirements PaaS Platform as a Services: No need to directly manage OS, databases, etc. API’s for building higher level applications. Pre-built applications components. IaaS Infrastructure as a service: No need to purchase or manage physical data center equipment(servers, storage, networking, etc.) manage
  • 3. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014 127 providers for cloud employees [1]. So a third party vendor can easily hack the data of one organization and may corrupt or sell that data to other organization. 2.4 Outsider attacks This is the one of the major concerning issue in an organization because it releases the confidential information of an organization in open. Clouds are not like a private network, they have more interfaces than private network. So hackers and attackers have advantage of exploiting the API, weakness and may do a connection breaking [1] .These attacks are less harmful than the insider attacks because in the later we sometimes unable to identify the attack. Figure 2. Percentage of Insiders versus Outsiders [1] 2.5 Loss of control Cloud uses a location transparency model by which it enable organizations to unaware about the location of their services and data. Hence provider can host their services from anywhere in the cloud. In this case organization may lose their data and possibly they are not aware about security mechanism put in place of the provider. Figure 3. Loss of Control over Data [1]
  • 4. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014 128 2.6 Data Loss As in cloud, there are multiple tenants, data integrity and safety could not be provided. Data loss can results in financial, customer count loss for an organization. An important example of this can be updating and deletion of data without having any backup of that data. 2.7 Network security 2.7.1 Man in middle attack:- In this attack, attacker makes an independent connection and communicates with the cloud user on its private network where all control is in the hand of attacker. 2.7.2 Distributed denial of service attacks: - In DDOS attack, servers and networks are brought down by a huge amount of network traffic and users are denied the access to a certain Internet based Service.[3] 2.7.3 Port scanning:- Port is a place from where information exchange takes place. Port scanning is taking place when subscriber configures the group. Port scanning is done automatically when you configure the internet so this violates the security concerns [3]. 2.8 Malware Injection Attack Problem In cloud computing, a lot of data is transferred between cloud provider and consumer, there is a need of user authentication and authorization [10]. When the data is transferred between cloud provider and user, attacker can introduce malicious code into it. As a result, the original user may have to wait until the completion of the job that was maliciously introduced. 2.9 Flooding Attack Problem In cloud, there is a no. of servers that communicate with one another and transfer data. The requests is processed, the requested jobs are authenticated first, but this authentication requires a lot of CPU utilization, memory and finally due to these server is overloaded and it passes its offload to other server[10]. By all this the usual processing of system is interrupted, and the system is flooded. 3. Techniques to secure data in cloud 3.1 Authentication and Identity Authentication of users and even of communicating systems is performed by various methods, but the most common is cryptography [8]. Authentication of users takes place in various ways like in the form of passwords that is known individually, in the form of a security token, or in the form a measurable quantity like fingerprint. One problem with using traditional identity approaches in a cloud environment is faced when the enterprise uses multiple cloud service providers (CSPs)[8]. In such a use case, synchronizing identity information with the enterprise is not scalable. Other problems arise with traditional identity approaches when migrating infrastructure toward a cloud-based solution.
  • 5. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014 129 3.2 Data Encryption If you are planning to store sensitive information on a large data store than you need to use data encryption techniques. Having passwords and firewalls is good, but people can bypass them to access your data. When data is encrypted it is in a form that cannot be read without an encryption key. The data is totally useless to the intruder. It is a technique of translation of data into secret code. If you want to read the encrypted data, you should have the secret key or password that is also called encryption key. 3.3 Information integrity and Privacy Cloud computing provides information and resources to valid users. Resources can be accessed through web browsers and can also be accessed by malicious attackers [2]. A convenient solution to the problem of information integrity is to provide mutual trust between provider and user. Another solution can be providing proper authentication, authorization and accounting controls so the process of accessing information should go through various multi levels of checking to ensure authorized use of resources [2]. Some secured access mechanisms should be provided like RSA certificates, SSH based tunnels. 3.4 Availability of Information(SLA) Non availability of information or data is a major issue regarding cloud computing services. Service Level agreement is used to provide the information about whether the network resources are available for users or not. It is a trust bond between consumer and provider [2].An way to provide availability of resources is to have a backup plan for local resources as well as for most crucial information. This enables the user to have the information about the resources even after their unavailability. 3.5 Secure Information Management It is a technique of information security for a collection of data into central repository. It is comprised of agents running on systems that are to be monitored and then sends information to a server that is called “Security Console”. The security console is managed by admin who is a human being who reviews the information and takes actions in response to any alerts. As the cloud user base, dependency stack increase, the cloud security mechanisms to solve security issues also increase, this makes cloud security management much more complicated. It is also referred as a Log Management. Cloud providers also provide some security standards like PCI DSS, SAS 70[2]. Information Security Management Maturity is another model of Information Security Management System. 3.6 Malware-injection attack solution This solution creates a no. of client virtual machines and stores all of them in a central storage. It utilizes FAT (File Allocation Table) consisting of virtual operating systems[10]. The application that is run by a client can be found in FAT table. All the instances are managed and scheduled by Hypervisor. IDT (Interrupt Descriptor Table) is used for integrity checking.
  • 6. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014 130 Figure 4. Malware-Injection attack solution [10] 3.7 Flooding Attack Solution All the servers in cloud are considered as a fleet of servers. One fleet of server is considered for system type requests, one for memory management and last one for core computation related jobs. All the servers in fleet can communicate with one another. When one of the server is overloaded, a new server is brought and used in the place of that server and an another server that is called name server has all the record of current states of servers and will be used to update destinations and states. Hypervisor can be used for managing jobs[10]. Hypervisor also do the authorization and authentication of jobs. An authorized customer’s request can be identified by PID. RSA can also be used to encrypt the PID. Figure 5. Flooding Attack solution [10] 4. Cloud computing Security Standards Standards for security define procedure and processes for implementing a security program. To maintain a secure environment, that provides privacy and security some specific steps are
  • 7. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014 131 performed by applying cloud related activities by these standards. A concept called “Defence in Depth” is used in cloud to provide security [3]. This concept has some layers of defence. In this way, if one of the systems fails, overlapping technique can be used to provide security as it has no single point of failure. Traditionally, endpoints have the technique to maintain security, where access is controlled by user. 4.1 Security Assertion Markup Language (SAML) SAML is basically used in business deals for secure communication between online partners. It is an XML based standard used for authentication, authorization among the partners. SAML defines three roles: the principal (a user), a service provider (SP) and an identity provider (IDP) [3]. SAML provides queries and responses to specify user attributes, authorization and authentication information in XML format. The requesting party is an online site that receives security information. 4.2 Open Authentication (OAuth) It is a method used for interacting with protected data. It is basically used to provide data access to developers. Users can grant access to information to developers and consumers without sharing of their identity [3]. OAuth does not provide any security by itself in fact it depends on other protocols like SSL to provide security. 4.3 OpenID OpenID is a single-sign-on (SSO) method. It is a common login process that allows user to login once and then use all the participating systems [3]. It does not based on central authorization for authentication of users. 4.4 SSL/TLS TLS is used to provide secure communication over TCP/IP. TLS works in basically three phases: In first phase, negotiation is done between clients to identify which ciphers are used. In second phase, key exchange algorithm is used for authentication [3]. These key exchange algorithms are public key algorithm. The final and third phase involves message encryption and cipher encryption. 5. Conclusion Although there are various security challenges in cloud computing but in this paper we have discussed some of them and also the techniques to prevent them .This research is basically done to study all the problems like attacks, data loss and unauthenticated access to data and also the methods to remove those problems. For best utilization of cloud computing model, there is a need to block the already existing security issues like confidentiality and integrity loss and address the security concerns. As the cloud computing is complex and dynamic, the traditional security solutions provided by cloud environment do not map well to its virtualized environments. Organization such as Cloud Security Alliance(CSA) and NIST are working on cloud computing security[2].In this paper we have discussed a few security approaches but several other approaches are also there that are in the process.
  • 8. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014 132 5. References [1] Akhil Behl (2011), Emerging Security Challenges in Cloud Computing (An insight to Cloud security challenges and their mitigation). [2] Akhil Behl & Kanika Behl (2012), An Analysis of Cloud Computing Security Issues. [3] L. Ertaul, S. Singhal & G. Saldamli, Security Challenges In Cloud computing. [4] Peter Mell, Tim Grance, The NIST Definition of Cloud Computing, Version 15, October 7, 2009, [5] Cloud Computing: Benefits, Risks and Recommendations for Information Security. ENISA(European Network and Information Security Agency), Crete, 2009. [6] Cloud computing security forum http://cloudsecurity.org/ [7] Cloud Computing – A Practical Approach by Velte, Tata McGraw- Hill Edition (ISBN-13:978-0-07- 068351-8) [8] Yashpalsinh jadeja & kirti modi cloud computing- concepts, architecture and challenges [9] Satyendra singh rawat & Mr. Alpesh Soni ,A Survey of Various Techniques to Secure Cloud Storage [10] R. Balasubramanian, Dr.M.Aramuthan Security Problems and Possible Security Approaches In Cloud Computing Authors Garima Gupta Completed B.Tech in CSE From GVSET Jaipur in 2011 from RTU. Currently pursuing M.Tech from Govt Engg. College Ajmer.Area of research is Networking(Cloud Computing,Green Cloud) P.R.Laxmi Completed B.Tech in CSE From Govt Women Engg. College Ajmer in 2011 from RTU. Currently pursuing M.Tech from Govt Engg. College Ajmer. Area of research is Networking(Cloud Computing,Green Cloud) Shubhanjali Sharma Completed B.Tech in IT From Govt Women Engg. Colllege Ajmer in 2011 from RTU. Currently pursuing M.Tech from Govt Engg. College Ajmer. Area of research is Networking (Cloud computing,Green Cloud)