SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 305 
ISSUES OF CLOUD SECURITY AND ITS IMPLICATIONS Sandeep.B1, Sachin Hebbar2, Deepak.N.K3, Manjunatha Hegde.Y.A4 1Student, Computer Science and Engineering, Bangalore Institute of Technology, Karnataka, India 2Student, Computer Science and Engineering, Bangalore Institute of Technology, Karnataka, India 3Student, Computer Science and Engineering, Bangalore Institute of Technology, Karnataka, India 4Student, Computer Science and Engineering, Bangalore Institute of Technology, Karnataka, India Abstract Cloud computing provides an effective computing model for institutions to access information technology and related functions with minimal investment and makes use of the resources to the maximum extent. The reduced complexity and cost of Cloud computing has attributed to it’s popularity and success. The users of this phenomenon range from an individual customer to huge organizations. Though there has been major advances in cloud computing, the security concerns surrounding it cannot be ignored and remedial measures has to be taken to ensure the confidentiality and the integrity of data stored in the cloud. Hence, it is inevitable to obtain a thorough understanding of the risks and threats involved in cloud computing along with the possible remedies before it is implemented by any stake holder. In this paper the authors have provided a comprehensive understanding of the issues in cloud security, it’s implications and the various remedial measures to address the same. A critical observation of the security of cloud is undertaken from the perspective of the cloud architecture, cloud stakeholder and cloud characteristics. The prime security issues that have been scrutinized in this paper include the security with respect to cloud carrier, malware injection problem, accountability problems in cloud, challenges in cloud integrity, securing data transmission in cloud, elasticity, cloud multi-tenancy, service level agreement and compromise on the integrity of the information in cloud. The possible counter measures to these issues have also been highlighted in this paper. There are number of unresolved issues that need to be dealt with respect to security and privacy in a cloud computing environment. This paper aims to elaborate and analyze the numerous threats faced and also provide solutions for most of the mentioned problems. Key Words: Cloud computing, Security, Privacy, Trust, Confidentiality, Integrity, Accountability, Availability, Elasticity. 
-----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Cloud computing provides a whole new dimension in distributed computing environment for stake holders to access information technology with reduced total cost of ownership. A model for delivering information, here resources are extracted from the Internet through tools rather than a server connection. It is a type of computing that relies on computing resources other than using personal mobile applications or devices. The cloud computing model has a number of issues such as: 1. Cloud security 2. Loss of control over data 3. Dependent on cloud service provider 4. Programmatic security data issues. 1.1 Cloud Architecture A. IaaS (Infrastructure-as-a-Service): The infrastructure-as-a- service (IaaS) layer provides on-demand virtual infrastructures to third parties using physical resources such as memory, storage, and processors. 
B. PaaS (Platform-as-a-Service): PaaS is a tool used for developing websites and can be executed without any administrative expertise. 
Fig -1: Architecture of cloud computing [1]
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 306 
C. SaaS (Software-as-a-Service): SaaS is run by a cloud service provider and available to the users through internet. Fig. 1 depicts the general architecture of a cloud platform It is usually supported by modern data centers and offers services and various forms from the bottom layer to top layer. In this platform each layer represents one service model. Infrastructure-as-a-Service (IaaS) is offered in the bottom layer, where resources are aggregated and managed physically or virtually and services are delivered in forms of storage. . The middle layer delivers Platform-as a-Service (PaaS), in which services are provided as an environment for programming the top layer being software as-a- service in which services are offered by a vendor and user can avail it over the internet 1.2 Types of Cloud Computing [2] A. Public Cloud: A Public cloud is a set of computers based on the main cloud model. Here a service provider provides a set of resources for general public for their usage on the internet. They may be pay-per use or for free. B. Private Cloud: A Private cloud is implemented within a corporate firewall and under the control of the IT department of the organization. Fig -2: Types of Cloud Computing C. Community Cloud: This cloud is a mixture of one or more public, private or hybrid clouds, and is shared by many organizations to ensure security of data .It is managed by a third party. The price of a community cloud is lesser than a public cloud but greater than private cloud. D. Hybrid Cloud: It is a combination of public, private and community clouds .Hence it serves as a breeding ground for internal or external suppliers of cloud services and is used by most of the organizations. 
2. ISSUES IN CLOUD SECURITY 
Security is a primary concern of cloud computing as the cloud gives access to data but does not ensure the integrity of data. cloud computing offers amazing benefits in communication such as a number of applications, high processing speed and unlimited storage , but the compromise on the integrity and confidentiality of the data stored on cloud is an important shortcoming of cloud computing and can’t be ignored. 2.1 Cloud Carrier Security Normally the cloud users do not have control over the cloud carrier which is present between the cloud user and cloud provider. It forms a intermediate layer between the two .The data being transferred between these two is seldom safe as its security depends on availability of a secure carrier. Other than the firewall of present there is no other mechanism to protect the transfer of data .This results in the compromising of the integrity and security of the network. This results in breach of the uses privacy and leaves the user dissatisfied. To overcome this a service level agreement (SLA) can be agreed between the cloud provider and cloud user. Fig -3: Cloud Carrier 2.2 Malware Injection Problem The main idea of this problem is to create a new copy of the state instance of the user and allow the services of the user to run in this malicious instance. Using any of the attacks like Denial-Of-Service the hacker gains access of the victim's data in the cloud. Here a new malicious adversary of the SaaS or PaaS or IaaS is created and introduced into the cloud. Now this is used to trick the cloud that the malicious instance is a valid instance of the cloud state If the hacker succeeds in gaining access, the cloud redirects all user requests to this malicious service implementation. An appropriate counter measure would be for the cloud to perform service integrity checks before servicing any user requests.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 307 
Fig -4: Malware Protection 2.3 Problems in Accountability The method of payment in a cloud computing system is based on the user’s amount of data transfer in the network and the number of CPU cycles. When an attacker successfully intrudes the cloud by running a malicious code which consumes lot of storage from the cloud, the user is charged illegitimately. This results in a dispute and hence an important challenge to the cloud security. A solution to such kind of disputes would be to place effective authentication mechanism. Fig -5: Accountability in cloud 
2.4 Challenges in cloud integrity 
A. Data loss/manipulation: In cloud computing servers store large amounts of data and these servers may not be secure or reliable which may result in the data being attacked on purpose or lost accidentally [5]. Data loss or manipulation can also occur due to the errors on the part of the administrator during data migration and changing memberships. B. Dishonest computation in remote servers: The computational details in cloud are not directly available to cloud customers and also the cloud server may not behave properly and not return the expected output. 2.5 Securing Data Transmission Securing data is a main concern because the users are anxious about their data being lost on the cloud. Many encryption protocols are used. SSL(Secure Socket Layer) is the widely used protocol. Here it creates a channel between two systems connected over the internet.SSL ensures secure connection to the web server.SSL is a good experience for end users. We know that many applications use cloud. Here are a few examples of SSL being employed: 
 To secure online credit card transactions. 
 To secure system logins and any sensitive information exchanged online. 
Fig-6: Encryption Technique [3] 2.6 Elasticity 
This refers to the fact that the consumers can expand the network or downsize the network based on the demand. So when the users expand the network it provides a chance for other users .to join the network this results in the compromising of the integrity of the network. To remediate
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 308 
the above threats, resources must be placed with in the boundary of the network. There can also be a inclusion of a migration policy which to make use the resources of the other cloud providers which helps to meet the demand of the expanding network. Fig-7: Cloud Resource Elasticity 2.7 Cloud Multi-tenancy Multi tenancy is a main feature in cloud computing. Basically a single architecture caters to various users. This results in proper use of resources provided with cloud. Consumers need to use most resources which multi tenancy fulfils. But this compromises the cloud security[4]. Also using multi tenancy will lead to inflexibility. Multi tenancy is very costly to implement. This will lead to problems in budget since putting up the cloud also takes lot of budget. Fig-8: Cloud Multi-tenancy Model 
2.8 Service Level Agreement 
When a service provider ports its services to cloud, risk is taken in terms of non-availability of critical information in when needed the most due to a number of factors which range from provider’s resources going offline to attacks on provider’s storage. These issues should not be neglected and compromised. Fig-9: Cloud Service Level Agreement (SLA) There is a two-fold remedy to this attack as described below in the following: A. Service Level Agreement which is a trust between the cloud provider and consumer and defines the time limit for which the resources can be used by the user. B. A back up plan to cover an outage event as well as resources for the critical information. This enables the user to avail the critical data off-hand whenever needed, even when the resources of the provider are not available. The provider also makes use of a notification system to notify the user of the imminent down time. 2.9. Information Integrity and Privacy [6] 
When data is uploaded onto the cloud it is obvious that the data will be visible to hackers and invalid users alike. To avoid any loss of data a simple trust between the service provider and consumer has to be established. The provider has to make sure that the data the consumer provides should go through various stages of authorization and authentication and only then it has to be uploaded onto the cloud. RSA and SSH can be used for this purposes. The many levels of authorization make sure that only legal users gain access to “their” data. Also encryption and encryption can be used for providing integrity and privacy of information. The keys will have to be handled by the service provider. The protocols that may be used to access the user’s resources like VPN, SOAP,
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 309 
RTC, CML and so on. Since there is no authentication and poor infrastructure of cloud the integrity is compromised hence the above methods are used. 3. CONCLUSIONS From this paper we can conclude that cloud is a vibrant tool which has many faces and uses. But along with advantages there come disadvantages. The main concern is of security of data uploaded on the cloud. The most serious issues are illustrated in this paper. At Least integrity and confidentiality has to be maintained for the data on the cloud. Also many newer technologies are coming up which will result in making our lives easier ,however this will result in more security challenges like achieving end-to-end security. Also providers have to make sure they are adaptive in nature to cope up with the environmental changes. Sufficient amount of API’s have to be provided by the cloud to ensure security. All types of cloud computing have threats and have to be kept in check. Remedial actions for most of the issues have been highlighted. REFERENCES [1]. A. Lenk, M. Klems, J. Nimis, S. Tai, and T. Sandholm, “What’s inside the Cloud? An architectural map of the Cloud landscape,” Software Engineering Challenges of Cloud Computing, 2009. CLOUD’09. ICSE Workshop on, 2009, pp. 23-31. [2]. Cloud Computing- A Practical Approach by Velte Tata McGraw-Hill Edition [3]. Meiko Jenson, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacono. On Technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing 2009. [4]. Users Demand More From Cloud Providers. 
http://meship.com/Blog/2011/01/18/users-demand-more- from-cloud-providers [5]. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” [6]. D. Kormann and A. Rubin, ―Risks of the passport single sign on protocol, no. 1–6, pp. 51–58, 2000. [7]. Cloud Computing Bible-by Barrie Soinsky,Wiley Publishing Inc.

More Related Content

What's hot

Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environmentsmlaij
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Journals
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Publishing House
 
Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing IJECEIAES
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...iosrjce
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...ijcncs
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET Journal
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmijcncs
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture serviceeSAT Publishing House
 

What's hot (20)

Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithm
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture service
 

Viewers also liked

ви наші найкращі №4
ви наші найкращі №4ви наші найкращі №4
ви наші найкращі №4NathalieLi
 
Ilma making prediction
Ilma making predictionIlma making prediction
Ilma making predictionTri Ilma
 
Seafod restaurents in kolkat
Seafod restaurents in kolkatSeafod restaurents in kolkat
Seafod restaurents in kolkatvikram kumar
 
Sueños en trastornos del animo
Sueños en trastornos del animoSueños en trastornos del animo
Sueños en trastornos del animoGerardo Méndez
 
ABC SEALANTS /TURKEY CATALOGUE
ABC SEALANTS /TURKEY CATALOGUE ABC SEALANTS /TURKEY CATALOGUE
ABC SEALANTS /TURKEY CATALOGUE MURAT KARADAYI
 
Determining the rheological properties of asphalt
Determining the rheological properties of asphaltDetermining the rheological properties of asphalt
Determining the rheological properties of asphalteSAT Publishing House
 
Measurement of energy loss of light ions using silicon surface barrier detector
Measurement of energy loss of light ions using silicon surface barrier detectorMeasurement of energy loss of light ions using silicon surface barrier detector
Measurement of energy loss of light ions using silicon surface barrier detectoreSAT Publishing House
 
Modelling study of jet metal interaction in ld process
Modelling study of jet  metal interaction in ld processModelling study of jet  metal interaction in ld process
Modelling study of jet metal interaction in ld processeSAT Publishing House
 
MentalHealthBooklet-ForEmail
MentalHealthBooklet-ForEmailMentalHealthBooklet-ForEmail
MentalHealthBooklet-ForEmailcheryl lynne
 
Design and optimization of microstrip patch antenna with
Design and optimization of microstrip patch antenna withDesign and optimization of microstrip patch antenna with
Design and optimization of microstrip patch antenna witheSAT Publishing House
 
Art bank presentation-deposits
Art bank presentation-depositsArt bank presentation-deposits
Art bank presentation-depositsART BANK
 
Development services by goigi
Development services  by goigiDevelopment services  by goigi
Development services by goigigoiginivedita
 
Wipo.36 Patent Data Services
Wipo.36 Patent Data ServicesWipo.36 Patent Data Services
Wipo.36 Patent Data ServicesLihua Gao
 
Online assignment
Online assignmentOnline assignment
Online assignmentashaarun
 
10 säästövinkkiä arkeen
10 säästövinkkiä arkeen10 säästövinkkiä arkeen
10 säästövinkkiä arkeencredit24finland
 

Viewers also liked (19)

Ensayo alejooooooooooooo
Ensayo alejoooooooooooooEnsayo alejooooooooooooo
Ensayo alejooooooooooooo
 
ви наші найкращі №4
ви наші найкращі №4ви наші найкращі №4
ви наші найкращі №4
 
Ilma making prediction
Ilma making predictionIlma making prediction
Ilma making prediction
 
Seafod restaurents in kolkat
Seafod restaurents in kolkatSeafod restaurents in kolkat
Seafod restaurents in kolkat
 
Sueños en trastornos del animo
Sueños en trastornos del animoSueños en trastornos del animo
Sueños en trastornos del animo
 
ABC SEALANTS /TURKEY CATALOGUE
ABC SEALANTS /TURKEY CATALOGUE ABC SEALANTS /TURKEY CATALOGUE
ABC SEALANTS /TURKEY CATALOGUE
 
Determining the rheological properties of asphalt
Determining the rheological properties of asphaltDetermining the rheological properties of asphalt
Determining the rheological properties of asphalt
 
Measurement of energy loss of light ions using silicon surface barrier detector
Measurement of energy loss of light ions using silicon surface barrier detectorMeasurement of energy loss of light ions using silicon surface barrier detector
Measurement of energy loss of light ions using silicon surface barrier detector
 
Modelling study of jet metal interaction in ld process
Modelling study of jet  metal interaction in ld processModelling study of jet  metal interaction in ld process
Modelling study of jet metal interaction in ld process
 
MentalHealthBooklet-ForEmail
MentalHealthBooklet-ForEmailMentalHealthBooklet-ForEmail
MentalHealthBooklet-ForEmail
 
Design and optimization of microstrip patch antenna with
Design and optimization of microstrip patch antenna withDesign and optimization of microstrip patch antenna with
Design and optimization of microstrip patch antenna with
 
Art bank presentation-deposits
Art bank presentation-depositsArt bank presentation-deposits
Art bank presentation-deposits
 
50 2015-tt-bct
 50 2015-tt-bct 50 2015-tt-bct
50 2015-tt-bct
 
trabajo de ingles
trabajo de ingles trabajo de ingles
trabajo de ingles
 
Development services by goigi
Development services  by goigiDevelopment services  by goigi
Development services by goigi
 
Wipo.36 Patent Data Services
Wipo.36 Patent Data ServicesWipo.36 Patent Data Services
Wipo.36 Patent Data Services
 
Online assignment
Online assignmentOnline assignment
Online assignment
 
10 säästövinkkiä arkeen
10 säästövinkkiä arkeen10 säästövinkkiä arkeen
10 säästövinkkiä arkeen
 
CIP Report Deepesh
CIP Report DeepeshCIP Report Deepesh
CIP Report Deepesh
 

Similar to Issues of cloud security and its implications

Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspectseSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Journals
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud ComputingIRJET Journal
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewEswar Publications
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architectureeSAT Journals
 

Similar to Issues of cloud security and its implications (20)

Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
 
G033030035
G033030035G033030035
G033030035
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxachiever3003
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 

Issues of cloud security and its implications

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 305 ISSUES OF CLOUD SECURITY AND ITS IMPLICATIONS Sandeep.B1, Sachin Hebbar2, Deepak.N.K3, Manjunatha Hegde.Y.A4 1Student, Computer Science and Engineering, Bangalore Institute of Technology, Karnataka, India 2Student, Computer Science and Engineering, Bangalore Institute of Technology, Karnataka, India 3Student, Computer Science and Engineering, Bangalore Institute of Technology, Karnataka, India 4Student, Computer Science and Engineering, Bangalore Institute of Technology, Karnataka, India Abstract Cloud computing provides an effective computing model for institutions to access information technology and related functions with minimal investment and makes use of the resources to the maximum extent. The reduced complexity and cost of Cloud computing has attributed to it’s popularity and success. The users of this phenomenon range from an individual customer to huge organizations. Though there has been major advances in cloud computing, the security concerns surrounding it cannot be ignored and remedial measures has to be taken to ensure the confidentiality and the integrity of data stored in the cloud. Hence, it is inevitable to obtain a thorough understanding of the risks and threats involved in cloud computing along with the possible remedies before it is implemented by any stake holder. In this paper the authors have provided a comprehensive understanding of the issues in cloud security, it’s implications and the various remedial measures to address the same. A critical observation of the security of cloud is undertaken from the perspective of the cloud architecture, cloud stakeholder and cloud characteristics. The prime security issues that have been scrutinized in this paper include the security with respect to cloud carrier, malware injection problem, accountability problems in cloud, challenges in cloud integrity, securing data transmission in cloud, elasticity, cloud multi-tenancy, service level agreement and compromise on the integrity of the information in cloud. The possible counter measures to these issues have also been highlighted in this paper. There are number of unresolved issues that need to be dealt with respect to security and privacy in a cloud computing environment. This paper aims to elaborate and analyze the numerous threats faced and also provide solutions for most of the mentioned problems. Key Words: Cloud computing, Security, Privacy, Trust, Confidentiality, Integrity, Accountability, Availability, Elasticity. -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Cloud computing provides a whole new dimension in distributed computing environment for stake holders to access information technology with reduced total cost of ownership. A model for delivering information, here resources are extracted from the Internet through tools rather than a server connection. It is a type of computing that relies on computing resources other than using personal mobile applications or devices. The cloud computing model has a number of issues such as: 1. Cloud security 2. Loss of control over data 3. Dependent on cloud service provider 4. Programmatic security data issues. 1.1 Cloud Architecture A. IaaS (Infrastructure-as-a-Service): The infrastructure-as-a- service (IaaS) layer provides on-demand virtual infrastructures to third parties using physical resources such as memory, storage, and processors. B. PaaS (Platform-as-a-Service): PaaS is a tool used for developing websites and can be executed without any administrative expertise. Fig -1: Architecture of cloud computing [1]
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 306 C. SaaS (Software-as-a-Service): SaaS is run by a cloud service provider and available to the users through internet. Fig. 1 depicts the general architecture of a cloud platform It is usually supported by modern data centers and offers services and various forms from the bottom layer to top layer. In this platform each layer represents one service model. Infrastructure-as-a-Service (IaaS) is offered in the bottom layer, where resources are aggregated and managed physically or virtually and services are delivered in forms of storage. . The middle layer delivers Platform-as a-Service (PaaS), in which services are provided as an environment for programming the top layer being software as-a- service in which services are offered by a vendor and user can avail it over the internet 1.2 Types of Cloud Computing [2] A. Public Cloud: A Public cloud is a set of computers based on the main cloud model. Here a service provider provides a set of resources for general public for their usage on the internet. They may be pay-per use or for free. B. Private Cloud: A Private cloud is implemented within a corporate firewall and under the control of the IT department of the organization. Fig -2: Types of Cloud Computing C. Community Cloud: This cloud is a mixture of one or more public, private or hybrid clouds, and is shared by many organizations to ensure security of data .It is managed by a third party. The price of a community cloud is lesser than a public cloud but greater than private cloud. D. Hybrid Cloud: It is a combination of public, private and community clouds .Hence it serves as a breeding ground for internal or external suppliers of cloud services and is used by most of the organizations. 2. ISSUES IN CLOUD SECURITY Security is a primary concern of cloud computing as the cloud gives access to data but does not ensure the integrity of data. cloud computing offers amazing benefits in communication such as a number of applications, high processing speed and unlimited storage , but the compromise on the integrity and confidentiality of the data stored on cloud is an important shortcoming of cloud computing and can’t be ignored. 2.1 Cloud Carrier Security Normally the cloud users do not have control over the cloud carrier which is present between the cloud user and cloud provider. It forms a intermediate layer between the two .The data being transferred between these two is seldom safe as its security depends on availability of a secure carrier. Other than the firewall of present there is no other mechanism to protect the transfer of data .This results in the compromising of the integrity and security of the network. This results in breach of the uses privacy and leaves the user dissatisfied. To overcome this a service level agreement (SLA) can be agreed between the cloud provider and cloud user. Fig -3: Cloud Carrier 2.2 Malware Injection Problem The main idea of this problem is to create a new copy of the state instance of the user and allow the services of the user to run in this malicious instance. Using any of the attacks like Denial-Of-Service the hacker gains access of the victim's data in the cloud. Here a new malicious adversary of the SaaS or PaaS or IaaS is created and introduced into the cloud. Now this is used to trick the cloud that the malicious instance is a valid instance of the cloud state If the hacker succeeds in gaining access, the cloud redirects all user requests to this malicious service implementation. An appropriate counter measure would be for the cloud to perform service integrity checks before servicing any user requests.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 307 Fig -4: Malware Protection 2.3 Problems in Accountability The method of payment in a cloud computing system is based on the user’s amount of data transfer in the network and the number of CPU cycles. When an attacker successfully intrudes the cloud by running a malicious code which consumes lot of storage from the cloud, the user is charged illegitimately. This results in a dispute and hence an important challenge to the cloud security. A solution to such kind of disputes would be to place effective authentication mechanism. Fig -5: Accountability in cloud 2.4 Challenges in cloud integrity A. Data loss/manipulation: In cloud computing servers store large amounts of data and these servers may not be secure or reliable which may result in the data being attacked on purpose or lost accidentally [5]. Data loss or manipulation can also occur due to the errors on the part of the administrator during data migration and changing memberships. B. Dishonest computation in remote servers: The computational details in cloud are not directly available to cloud customers and also the cloud server may not behave properly and not return the expected output. 2.5 Securing Data Transmission Securing data is a main concern because the users are anxious about their data being lost on the cloud. Many encryption protocols are used. SSL(Secure Socket Layer) is the widely used protocol. Here it creates a channel between two systems connected over the internet.SSL ensures secure connection to the web server.SSL is a good experience for end users. We know that many applications use cloud. Here are a few examples of SSL being employed:  To secure online credit card transactions.  To secure system logins and any sensitive information exchanged online. Fig-6: Encryption Technique [3] 2.6 Elasticity This refers to the fact that the consumers can expand the network or downsize the network based on the demand. So when the users expand the network it provides a chance for other users .to join the network this results in the compromising of the integrity of the network. To remediate
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 308 the above threats, resources must be placed with in the boundary of the network. There can also be a inclusion of a migration policy which to make use the resources of the other cloud providers which helps to meet the demand of the expanding network. Fig-7: Cloud Resource Elasticity 2.7 Cloud Multi-tenancy Multi tenancy is a main feature in cloud computing. Basically a single architecture caters to various users. This results in proper use of resources provided with cloud. Consumers need to use most resources which multi tenancy fulfils. But this compromises the cloud security[4]. Also using multi tenancy will lead to inflexibility. Multi tenancy is very costly to implement. This will lead to problems in budget since putting up the cloud also takes lot of budget. Fig-8: Cloud Multi-tenancy Model 2.8 Service Level Agreement When a service provider ports its services to cloud, risk is taken in terms of non-availability of critical information in when needed the most due to a number of factors which range from provider’s resources going offline to attacks on provider’s storage. These issues should not be neglected and compromised. Fig-9: Cloud Service Level Agreement (SLA) There is a two-fold remedy to this attack as described below in the following: A. Service Level Agreement which is a trust between the cloud provider and consumer and defines the time limit for which the resources can be used by the user. B. A back up plan to cover an outage event as well as resources for the critical information. This enables the user to avail the critical data off-hand whenever needed, even when the resources of the provider are not available. The provider also makes use of a notification system to notify the user of the imminent down time. 2.9. Information Integrity and Privacy [6] When data is uploaded onto the cloud it is obvious that the data will be visible to hackers and invalid users alike. To avoid any loss of data a simple trust between the service provider and consumer has to be established. The provider has to make sure that the data the consumer provides should go through various stages of authorization and authentication and only then it has to be uploaded onto the cloud. RSA and SSH can be used for this purposes. The many levels of authorization make sure that only legal users gain access to “their” data. Also encryption and encryption can be used for providing integrity and privacy of information. The keys will have to be handled by the service provider. The protocols that may be used to access the user’s resources like VPN, SOAP,
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 309 RTC, CML and so on. Since there is no authentication and poor infrastructure of cloud the integrity is compromised hence the above methods are used. 3. CONCLUSIONS From this paper we can conclude that cloud is a vibrant tool which has many faces and uses. But along with advantages there come disadvantages. The main concern is of security of data uploaded on the cloud. The most serious issues are illustrated in this paper. At Least integrity and confidentiality has to be maintained for the data on the cloud. Also many newer technologies are coming up which will result in making our lives easier ,however this will result in more security challenges like achieving end-to-end security. Also providers have to make sure they are adaptive in nature to cope up with the environmental changes. Sufficient amount of API’s have to be provided by the cloud to ensure security. All types of cloud computing have threats and have to be kept in check. Remedial actions for most of the issues have been highlighted. REFERENCES [1]. A. Lenk, M. Klems, J. Nimis, S. Tai, and T. Sandholm, “What’s inside the Cloud? An architectural map of the Cloud landscape,” Software Engineering Challenges of Cloud Computing, 2009. CLOUD’09. ICSE Workshop on, 2009, pp. 23-31. [2]. Cloud Computing- A Practical Approach by Velte Tata McGraw-Hill Edition [3]. Meiko Jenson, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacono. On Technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing 2009. [4]. Users Demand More From Cloud Providers. http://meship.com/Blog/2011/01/18/users-demand-more- from-cloud-providers [5]. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” [6]. D. Kormann and A. Rubin, ―Risks of the passport single sign on protocol, no. 1–6, pp. 51–58, 2000. [7]. Cloud Computing Bible-by Barrie Soinsky,Wiley Publishing Inc.