SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 15, No. 8, August 2017
Literature Review: Cloud Computing Security Issues and Techniques
Pawan Kumar
Research Scholar, Department of Computer Science and
Engineering
Institute of Technology
Gopeshwar, Uttarakhand, India
Pawankmrarya.2010@gmail.com
Dr Ashutosh Bhatt
Assistant Professor, Department of Computer Science and
Engineering
Birla Institute of Applied Science
Bhimtal, Uttarakhand, India
Ashutoshbhatt123@gmail.com
Abstract— Cloud computing environment is a new way in which
web base enable applications provide as a services for the users
with low computational cost through internet. As we store data
and it also provide services in distributed environment. Cloud
ease its users by providing virtualization technology of resources
through internet. Cloud computing is the emerging field, due to
this reason the various new techniques are still developing. At
current scenario new security challenges were increases for cloud
professionals. Due to lack of security in cloud computing
environment user of cloud lost it trust in cloud. Multi-tenancy,
elasticity, Security Performance and Optimization, etc are
various security issues in cloud computing. In this paper we will
discuss some of the issue in cloud. This paper also discuss some of
the existing security technique for securing a cloud and help
researchers and professionals to know about various security
threats.
Keywords- Cloud Computing, Security Issues, Security
Techniques.
I. INTRODUCTION
The computing undergoes many changes through grid
computing to cloud computing. A new computing model
proposed by the researchers in computer industry is known as
“cloud computing” [1], which commercialize its previous
models [2]. Cloud computing environment, is the major
achievement of computing, which can bring reform in IT
industry. This make the IT industry more attractive and useful
to the users and creating the way to designed and purchase in
the IT industry [3]. It would also changing the people
livelihood and work style. One of the definition of Cloud
computing is “a mix approach of grid and utility computing
which together form a collection of dynamically interconnected
computers. They presented as more unified computing
resources. Which is built on service-level agreements (SLA).
As cloud computing is still a new and evolving field it
provide new technology for industries. PAAS (platform as a
service) and IAAS (infrastructure as a service) types of
application are defined in cloud computing. Platform as a
service it’s provide servers configuration and reconfiguration.
Physical/virtual machine is use as a server. On the other side,
cloud computing describes application is accessible via internet
and for this reason very big data centers and powerful servers
are required. Major difference between Cloud computing from
tradition computing as it is elasticity, scalability and where the
resources are easily provisioned by its users for scaling. It’s
also provides various level of services to its users.
The paper concentrates on study of cloud computing with
several security risk, and its counter measure.
The rest of the paper is organized as follows: Section II
Cloud service Model. Section III Cloud deployment model.
Section IV Cloud security issues. Section V Technique to
secure data in cloud computing. Section VI. Risks and security
consideration. Finally, the paper was concluded in section VII
II. CLOUD SERVICE MODELS
A. Software as a Service
Software as a Service sometime referred as “on-demand”, is
software delivered model in which user can individually
provision its resources as requirement without any interaction
with cloud service provider. SaaS is typically accessed by
customer using a web browser. Saas application are often
updated more frequently as compare with traditional software.
SaaS has become delivery model for various business
applications, likes Payroll Processing, CRM (Customer
Relationship management), MIS (Management information
System), ERP (Enterprise resource planning) and HRM
(Human Resource management and Service).
B. Platform as a Service
Its provide a computing platform and a solution stack as a
service. In this service model, the costumer creates the
software using tools and libraries from the provider. The
service delivery model also provides virtualized servers and
associated services for running existing application. The
provider provides the server, hardware, storage and
networking. The main advantage of PaaS that it allows higher
level programming and multiple developers are work
simultaneously on a single project.
C. Infrastructure as a Service
Its provides virtualized computing resources over internet
and also provide capability to the consumer by which, it can
provision processing, storage, hardware, servers and network
and other fundamental computing resources where the
180 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 15, No. 8, August 2017
consumers can deploy and run the software(i.e. operating
systems, applications)
III. CLOUD DEPLOYMENT MODEL
A. Public Cloud
It is the computing model based on the standard computing
model in which utility computing is available to the general
public over internet in payment bases. The main benefits are
scalability, resources are properly utilize and inexpensive.
B. Private Cloud
This type of the cloud is dedicated to a single organization.
It also provide scalability and self-service.
C. Community Cloud
Community cloud is a multi-tenant infrastructure. In which,
the infrastructure of the cloud is shared among several
organizations and supports a specific community with common
computing concerns.
D. Community Cloud
The cloud infrastructure that is a composition of at least one
public and one private cloud.
IV. CLOUD SECURITY ISSUES
Above models and services has various cloud security
issue. In most applications, confidential data is stored at
servers. Securing data is always vital importance. So many
challenges regarding security. Leakage of confidential data
fatal many computing systems today. For example, last year
marks a peak in data breaches about 740 million records were
exposed, the largest number till now.
Fig 1. Distribution of data breaches types reported in 2014
A. Multi Tenancy
Multi tenancy is built for reasons like allocation of
resources, sharing of memory, storage and distributed
computing. It’s provide effective utilization [9] of hardware
components, and maintain cost is very low. It gives distribution
of resources, services and application with other components
residing on same physical/logical platform at service providers.
Thus it breaches the confidentiality of data and leakage of
information and this causes the possibility of attacks.
B. Insider Attacks
Cloud computing is a multitenant based model that is
provided by the service provider. So the threat of leakage of
information arises within the organization. There is no rules for
hiring cloud employees. So an organization can easily hack by
the third party vendor, due to this the data of one organization
cannot be safe. It’s leads loss of information of user,
confidentiality, integrity and security. This attack is difficult to
defend and the solution of this attack is no found yet [17].
C. Outsider Attacks
This is also one of the major issue in an organization. Data
are resided in server and this confidential data of an
organization in open to other. In Clouds there many interfaces,
so cloud is differ from a private network. One of the
disadvantage is that hackers and attackers to exploiting the
API, weakness and this result breaking in connection.
D. Elasticity
When a system is adaptable to changing environment. In
this resources are provisioned by the user as there requirement.
In this synchronization of available resources and current
demand occurs. It implies scalability, and users are able to
scale up and down as requirement. Due this scaling tenants use
a reusable resource.
E. Security Performance and Optimization
The system adopt Security Measures which may affect the
performance of underlying services badly. So while applying
this security measures we should have check the system
performance parameter also. So we should try to make a proper
balance between both.
F. Information Integrity and Privacy
In a cloud environment, various organizations put their data
on server but some flaws in the security of cloud infrastructure
occurs. There is breaches of information privacy, integrity and
authentication issues come up.
G. Network level attacks
During resource pooling process all data or services flow
over the network needs to be secured from attacker to prevent
the breaching of sensitive information or other susceptibilities
[10].
a) Man in the Middle attack: It is also a category of
eavesdropping. The attacker set up the connection between
both victims and makes conversation. Attacker making believe
that they talk directly but infect the conversation between them
is controlled by attack.
b) Brute force attack: In this attack when attacker want
to find the password it will try all possible combination of
password until correct password not found.
181 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 15, No. 8, August 2017
c) Reply attack: In this attack valid data transmission is
repeated or delayed due to malicious or fraudulent activity.
d) Distributed denial of service attack: In this attack,
servers is down due to huge amount of network traffic. This
attack is classified into two broad categories based on protocol
level which they targeted one is Network level attack and
another is application level attack.
e) Byzantine failure: It is a malicious activity which
done at a server or a set of server to degrade the performance
of cloud.
f) Network probe: It is used to find out the possible
topology of the network which contain IPs and server. Its used
to attack for a sub group in the network.
H. Hardware Based Attack
It is one of the most frequently discovered vulnerabilities in
cloud which direct result of language and programmes that are
as follows.
a) Trojan horses/Malware: They are the unauthorized
program that are contained or injected by malicious user
within valid program to perform unknown and unwanted
function. Unlike viruses it does not replicate themselves.
b) XML Signature wrapping Attack: Protocol like SOAP
that use XML format to transfer the request for services are
attack by this types of attacks. In this, attack moves the
original body of SOAP message to newly inserted wrapping
element writing within SOAP header attack perform in new
body.
V. TECHNIQUE TO SECURE DATA IN CLOUD COMPUTING
A. Encryption Algorithm
We that cloud service provider encrypt user’s data using a
strong encryption technique [11] but in some circumstances
encryption accidents can make data completely useless and on
the other side encryption it also complicated. As this task is
challenging cloud provider must provide proof that encryption
technique were design and properly tested by knowledgeable
and experience authority.
B. Authentication and Identity
The most common method of authentication of users is
cryptography. Through cryptography, authentication is provide
between communicating systems [13]. Passwords is one of
most common form of authentication of users individually.
Other form authentication is security token, or in the form a
biometric like fingerprint etc. This traditional identity
approaches is not sufficient respect to cloud environment.
When the enterprise uses multiple cloud service providers
(CSPs). In this synchronizing of identity information not
scalable. Infrastructure is also one of major concern when we
shifting toward traditional approach to cloud-based.
C. Scrutinize Support
Checking of illegitimate activities is a difficult task. When
users store their data in the provided cloud they store data in
server and they don’t have the information where the data is
stored. Therefore cloud service provider must provide
inspection tools to the users to scrutinize and control various
policy implementation.
VI. RISKS AND SECURITY COSIDERATION
As the IT industry more attractive and useful to the users, if
implementation of a cloud computing is not managed properly,
can present a number of risks to the enterprise. Many of these
risks can have a direct impact on business operations, so it is
important to take appropriate mitigating in this process. Figure
1 provides a list of the operational risks related to the
implementation of Cloud computing.
. Table 1. A comprehensive study on cloud threats and its solutions
Threats Effects Affected
Cloud
Services
Mitigation
Strategy
Insecure API
and interfaces
Improper
authentication and
authorization, wrong
transmission of
content.
SaaS,
PaaS and
Iaas
Data transmission
is in encrypted
form, Strong
access control and
authentication
mechanism.
Insider Intruder Penetrate
organizations
resources, damage
assets, loss of
productivity, affect an
operation.
SaaS,
PaaS and
Iaas
Use agreement
reporting and
breaching
notification,
security and
management
process
transparency.
Data loss and
leakage
Personal sensitive data
can be deleted,
destructed and
corrupted.
SaaS,
PaaS and
Iaas
Provide data
storage and
backup
mechanism.
Identity theft Intruder get identity of
valid user to access the
resources and other
benefits of user
SaaS,
PaaS and
Iaas
Use strong multi-
tier passwords and
authentication
mechanisms
Risk profiling Internal security
operations, security
policies, configuration
breach, patching,
auditing and logging
SaaS,
PaaS and
Iaas
Acknowledge
partial logs, data
and infrastructure
aspect, to secure
data use
monitoring and
altering system
Shared
technology
issues
Interfere one user
services to other user
services by
compromising
hypervisor
Iaas Audit
configuration and
vulnerability, for
administrative
task
use strong
authentication and
access control
mechanisms
Abusive use of
cloud
computing
Loss of validation,
service fraud, stronger
attack due to
unidentified sign-up
PaaS and
IaaS
Observe the
network status,
provide robust
registration and
authentication
technique
182 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 15, No. 8, August 2017
VII. CONCLUSION
Cloud computing is the effective technology which
depend on cost, time and performance. It gives benefit to
the users of cloud and of course the practice of cloud
computing will surely will increase more in next few
years. In this paper we have discussed and examine the
basic of cloud computing and issues regarding securities in
the cloud computing. Some security issues are the very
crucial in the cloud computing. Privacy and integrity of
data are the especially key concern security issues. In the
cloud as data is stored in server and we don’t know the
exact location of the data resided, due to this data stored in
the cloud has a threat of being accessed or theft by
unauthorized person during transmission.
REFERENCES
[1] I. Foster, Y Zhao, I. Raicu, and S. Lu, “Cloud Computing and Grid
Computing 360-degreecompared[C]”, in Grid Computing Environments
Workshop, 2008, pp. 1-10.
[2] Rich Wolski, Daniel Nurmi, Chris Grzegorczyk, Graziano
Obertelli, Sunil Soman,Lamia Youseff, Dmitrii Zagorodnov, “The
Eucalyptus Open-source Cloudcomputing System ”, 2009 9th
IEEE/ACM International Symposium on Cluster Computing and the
Grid, CCGRID 2009, pp: 124-131.
[3] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D.
Joseph, Randy H. Katz, Andrew Konwinski, Gunho Lee, David A.
Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia, “Above the Clouds:
A Berkeley View of Cloud Computing”, Technical Report No.
UCB/EECS-2009-28, 2009.
[4] "NIST Cloud Computing Definition", NIST SP 800- 145.
[5] Enrique Jimenez Domingo and Minguel Lagares Lemos,
CLOUDIO: A Cloud Computing-oriented Multi-Tenant Architecture for
Business Information Systems In Proc. of the 23rdInternational
Conference on Cloud Computing pages 532-533.IEEE, 2010.
[6] D.G. Cameron, R. Carvajal-Schiaffino, A.P. Millar, C. Nicholson,
K.Stockinger, F. Zini, Evaluating scheduling and replica optimisation
strategies in OptorSim, in:Proceedings of the Fourth International
Workshop on Grid Computing (Grid2003), IEEE CS Press, Los
Alamitos,CA, USA, Phoenix, AZ, USA, 2003.
[7] Rajkumar Buyya, Rajiv Ranjan, Rodrigo N. Calheiros, “Modeling
and Simulation of Scalable Cloud Computing Environments and the
CloudSim Toolkit: Challenges and Opportunities”, in The 2009
International Conference on High Performance Computing and
Simulation, HPCS 2009, pp:1-11.
[8] Juefu Liu, Peng Liu, “Status and Key Techniques in Cloud
Computing”, in Proceedings of 2010 3rd International Conference on
Advanced Computer Theory and Engineering (ICACTE) , pp: V4-285–
V4-288.
[9] Chang Jie Guo, Wei Sun, Ying Huang, Zhi Hu Wang, Bo Gao , “A
Framework for Native Multi-Tenancy Application Development and
Management’’2007 9th IEEE International Conference on Ecommerce
Technology and The 4th IEEE International Conference on Enterprise
Computing, E-Commerce and E-Services..
[10] C. Hong, M. Zhang, and D. Feng, AB-ACCS: A cryptographic
access control scheme for cloud storage, (in Chinese), Journal of
Computer Research and Development, vol. 47, no. 1, pp. 259–265, 2010.
[11] William Stallings, Cryptography and Network Security Principles
and Practice, fifth Edition, Pearson Publication
[12] Enrique Jimenez Domingo and Minguel Lagares Lemos,
CLOUDIO: A Cloud Computing-oriented Multi-Tenant Architecture for
Business Information Systems In Proc. of the 23rdInternational
Conference on Cloud Computing pages 532-533.IEEE, 2010.
[13] D. Feng, Y. Qin, D.Wang, and X. Chu, Research on trusted
computing technology, (in Chinese), Journal of Computer Research and
Development, vol. 48, no. 8, pp. 1332–1349, 2011.
[14] H. Zhang, L. Chen, and L. Zhang, Research on trusted network
connection, (in Chinese), Chinese Journal of Computers, vol. 33, no. 4,
pp. 706–717, 2010.
[15] G. Wang, F. Yue, and Q. Liu, A secure self-destructing scheme for
electronic data, Journal of Computer and System Sciences, vol. 79, no.
2, pp. 279–290, 2013.
[16] S. Qamar, N. Lal and M. Singh. Deelman, G Singh (2010). Internet
Ware Cloud Computing: Challenges. (IJCSIS) International Journal of
Computer Science and security, Vol. 7, No. 3, March 2010.
[17] Naresh vurukonda and B.Thirumala Rao, in 2nd International
Conference on Intelligent Computing, Communication & Convergence,
ICCC 2016,
AUTHORS PROFILE
Pawan Kumar is an assistant professor in deptt. of Computer Science
Engg. Institute of Technology at Gopeshwar (India). He received his B.
Tech. and M. Tech degrees from Kumaon Engg. College Dwarahat (
India) 2010 and 2012, respectively and pursuing Phd from UTU. He
once worked as teaching person in Department of IT in Pantnagar
University. His research interests include network architecture, computer
security, and data analysis.
Dr Ashutosh Bhatt is an assistant professor in deptt. of Computer
Science Engg. Birla institute of applied science (India). He completed
his Phd in 2009. His work area reasearch was artificial neural network.
He has more fourteen year teaching and research experience in various
organisations of repute for PG and UG courses of Computer Science and
IT. He also associated with many renowed national/international
publication as reviewer/editorial board member. More than 22 research
publication credited to him.
.
183 https://sites.google.com/site/ijcsis/
ISSN 1947-5500

Contenu connexe

Tendances

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr_editor
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computingijsrd.com
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Zuhair Haroon khan
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security IssuesIJERA Editor
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING IAEME Publication
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosDeepak Bagga
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCholavaram Sai
 

Tendances (19)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
H046053944
H046053944H046053944
H046053944
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
Aj04602248254
Aj04602248254Aj04602248254
Aj04602248254
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Ijetcas14 424
Ijetcas14 424Ijetcas14 424
Ijetcas14 424
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using Kerberos
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi clouds
 

Similaire à Literature Review: Cloud Computing Security Issues and Techniques

Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...Claire Webber
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...Amber Wheeler
 

Similaire à Literature Review: Cloud Computing Security Issues and Techniques (20)

Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
G0314043
G0314043G0314043
G0314043
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
B1802041217
B1802041217B1802041217
B1802041217
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...
 

Dernier

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 

Dernier (20)

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 

Literature Review: Cloud Computing Security Issues and Techniques

  • 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15, No. 8, August 2017 Literature Review: Cloud Computing Security Issues and Techniques Pawan Kumar Research Scholar, Department of Computer Science and Engineering Institute of Technology Gopeshwar, Uttarakhand, India Pawankmrarya.2010@gmail.com Dr Ashutosh Bhatt Assistant Professor, Department of Computer Science and Engineering Birla Institute of Applied Science Bhimtal, Uttarakhand, India Ashutoshbhatt123@gmail.com Abstract— Cloud computing environment is a new way in which web base enable applications provide as a services for the users with low computational cost through internet. As we store data and it also provide services in distributed environment. Cloud ease its users by providing virtualization technology of resources through internet. Cloud computing is the emerging field, due to this reason the various new techniques are still developing. At current scenario new security challenges were increases for cloud professionals. Due to lack of security in cloud computing environment user of cloud lost it trust in cloud. Multi-tenancy, elasticity, Security Performance and Optimization, etc are various security issues in cloud computing. In this paper we will discuss some of the issue in cloud. This paper also discuss some of the existing security technique for securing a cloud and help researchers and professionals to know about various security threats. Keywords- Cloud Computing, Security Issues, Security Techniques. I. INTRODUCTION The computing undergoes many changes through grid computing to cloud computing. A new computing model proposed by the researchers in computer industry is known as “cloud computing” [1], which commercialize its previous models [2]. Cloud computing environment, is the major achievement of computing, which can bring reform in IT industry. This make the IT industry more attractive and useful to the users and creating the way to designed and purchase in the IT industry [3]. It would also changing the people livelihood and work style. One of the definition of Cloud computing is “a mix approach of grid and utility computing which together form a collection of dynamically interconnected computers. They presented as more unified computing resources. Which is built on service-level agreements (SLA). As cloud computing is still a new and evolving field it provide new technology for industries. PAAS (platform as a service) and IAAS (infrastructure as a service) types of application are defined in cloud computing. Platform as a service it’s provide servers configuration and reconfiguration. Physical/virtual machine is use as a server. On the other side, cloud computing describes application is accessible via internet and for this reason very big data centers and powerful servers are required. Major difference between Cloud computing from tradition computing as it is elasticity, scalability and where the resources are easily provisioned by its users for scaling. It’s also provides various level of services to its users. The paper concentrates on study of cloud computing with several security risk, and its counter measure. The rest of the paper is organized as follows: Section II Cloud service Model. Section III Cloud deployment model. Section IV Cloud security issues. Section V Technique to secure data in cloud computing. Section VI. Risks and security consideration. Finally, the paper was concluded in section VII II. CLOUD SERVICE MODELS A. Software as a Service Software as a Service sometime referred as “on-demand”, is software delivered model in which user can individually provision its resources as requirement without any interaction with cloud service provider. SaaS is typically accessed by customer using a web browser. Saas application are often updated more frequently as compare with traditional software. SaaS has become delivery model for various business applications, likes Payroll Processing, CRM (Customer Relationship management), MIS (Management information System), ERP (Enterprise resource planning) and HRM (Human Resource management and Service). B. Platform as a Service Its provide a computing platform and a solution stack as a service. In this service model, the costumer creates the software using tools and libraries from the provider. The service delivery model also provides virtualized servers and associated services for running existing application. The provider provides the server, hardware, storage and networking. The main advantage of PaaS that it allows higher level programming and multiple developers are work simultaneously on a single project. C. Infrastructure as a Service Its provides virtualized computing resources over internet and also provide capability to the consumer by which, it can provision processing, storage, hardware, servers and network and other fundamental computing resources where the 180 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 2. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15, No. 8, August 2017 consumers can deploy and run the software(i.e. operating systems, applications) III. CLOUD DEPLOYMENT MODEL A. Public Cloud It is the computing model based on the standard computing model in which utility computing is available to the general public over internet in payment bases. The main benefits are scalability, resources are properly utilize and inexpensive. B. Private Cloud This type of the cloud is dedicated to a single organization. It also provide scalability and self-service. C. Community Cloud Community cloud is a multi-tenant infrastructure. In which, the infrastructure of the cloud is shared among several organizations and supports a specific community with common computing concerns. D. Community Cloud The cloud infrastructure that is a composition of at least one public and one private cloud. IV. CLOUD SECURITY ISSUES Above models and services has various cloud security issue. In most applications, confidential data is stored at servers. Securing data is always vital importance. So many challenges regarding security. Leakage of confidential data fatal many computing systems today. For example, last year marks a peak in data breaches about 740 million records were exposed, the largest number till now. Fig 1. Distribution of data breaches types reported in 2014 A. Multi Tenancy Multi tenancy is built for reasons like allocation of resources, sharing of memory, storage and distributed computing. It’s provide effective utilization [9] of hardware components, and maintain cost is very low. It gives distribution of resources, services and application with other components residing on same physical/logical platform at service providers. Thus it breaches the confidentiality of data and leakage of information and this causes the possibility of attacks. B. Insider Attacks Cloud computing is a multitenant based model that is provided by the service provider. So the threat of leakage of information arises within the organization. There is no rules for hiring cloud employees. So an organization can easily hack by the third party vendor, due to this the data of one organization cannot be safe. It’s leads loss of information of user, confidentiality, integrity and security. This attack is difficult to defend and the solution of this attack is no found yet [17]. C. Outsider Attacks This is also one of the major issue in an organization. Data are resided in server and this confidential data of an organization in open to other. In Clouds there many interfaces, so cloud is differ from a private network. One of the disadvantage is that hackers and attackers to exploiting the API, weakness and this result breaking in connection. D. Elasticity When a system is adaptable to changing environment. In this resources are provisioned by the user as there requirement. In this synchronization of available resources and current demand occurs. It implies scalability, and users are able to scale up and down as requirement. Due this scaling tenants use a reusable resource. E. Security Performance and Optimization The system adopt Security Measures which may affect the performance of underlying services badly. So while applying this security measures we should have check the system performance parameter also. So we should try to make a proper balance between both. F. Information Integrity and Privacy In a cloud environment, various organizations put their data on server but some flaws in the security of cloud infrastructure occurs. There is breaches of information privacy, integrity and authentication issues come up. G. Network level attacks During resource pooling process all data or services flow over the network needs to be secured from attacker to prevent the breaching of sensitive information or other susceptibilities [10]. a) Man in the Middle attack: It is also a category of eavesdropping. The attacker set up the connection between both victims and makes conversation. Attacker making believe that they talk directly but infect the conversation between them is controlled by attack. b) Brute force attack: In this attack when attacker want to find the password it will try all possible combination of password until correct password not found. 181 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 3. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15, No. 8, August 2017 c) Reply attack: In this attack valid data transmission is repeated or delayed due to malicious or fraudulent activity. d) Distributed denial of service attack: In this attack, servers is down due to huge amount of network traffic. This attack is classified into two broad categories based on protocol level which they targeted one is Network level attack and another is application level attack. e) Byzantine failure: It is a malicious activity which done at a server or a set of server to degrade the performance of cloud. f) Network probe: It is used to find out the possible topology of the network which contain IPs and server. Its used to attack for a sub group in the network. H. Hardware Based Attack It is one of the most frequently discovered vulnerabilities in cloud which direct result of language and programmes that are as follows. a) Trojan horses/Malware: They are the unauthorized program that are contained or injected by malicious user within valid program to perform unknown and unwanted function. Unlike viruses it does not replicate themselves. b) XML Signature wrapping Attack: Protocol like SOAP that use XML format to transfer the request for services are attack by this types of attacks. In this, attack moves the original body of SOAP message to newly inserted wrapping element writing within SOAP header attack perform in new body. V. TECHNIQUE TO SECURE DATA IN CLOUD COMPUTING A. Encryption Algorithm We that cloud service provider encrypt user’s data using a strong encryption technique [11] but in some circumstances encryption accidents can make data completely useless and on the other side encryption it also complicated. As this task is challenging cloud provider must provide proof that encryption technique were design and properly tested by knowledgeable and experience authority. B. Authentication and Identity The most common method of authentication of users is cryptography. Through cryptography, authentication is provide between communicating systems [13]. Passwords is one of most common form of authentication of users individually. Other form authentication is security token, or in the form a biometric like fingerprint etc. This traditional identity approaches is not sufficient respect to cloud environment. When the enterprise uses multiple cloud service providers (CSPs). In this synchronizing of identity information not scalable. Infrastructure is also one of major concern when we shifting toward traditional approach to cloud-based. C. Scrutinize Support Checking of illegitimate activities is a difficult task. When users store their data in the provided cloud they store data in server and they don’t have the information where the data is stored. Therefore cloud service provider must provide inspection tools to the users to scrutinize and control various policy implementation. VI. RISKS AND SECURITY COSIDERATION As the IT industry more attractive and useful to the users, if implementation of a cloud computing is not managed properly, can present a number of risks to the enterprise. Many of these risks can have a direct impact on business operations, so it is important to take appropriate mitigating in this process. Figure 1 provides a list of the operational risks related to the implementation of Cloud computing. . Table 1. A comprehensive study on cloud threats and its solutions Threats Effects Affected Cloud Services Mitigation Strategy Insecure API and interfaces Improper authentication and authorization, wrong transmission of content. SaaS, PaaS and Iaas Data transmission is in encrypted form, Strong access control and authentication mechanism. Insider Intruder Penetrate organizations resources, damage assets, loss of productivity, affect an operation. SaaS, PaaS and Iaas Use agreement reporting and breaching notification, security and management process transparency. Data loss and leakage Personal sensitive data can be deleted, destructed and corrupted. SaaS, PaaS and Iaas Provide data storage and backup mechanism. Identity theft Intruder get identity of valid user to access the resources and other benefits of user SaaS, PaaS and Iaas Use strong multi- tier passwords and authentication mechanisms Risk profiling Internal security operations, security policies, configuration breach, patching, auditing and logging SaaS, PaaS and Iaas Acknowledge partial logs, data and infrastructure aspect, to secure data use monitoring and altering system Shared technology issues Interfere one user services to other user services by compromising hypervisor Iaas Audit configuration and vulnerability, for administrative task use strong authentication and access control mechanisms Abusive use of cloud computing Loss of validation, service fraud, stronger attack due to unidentified sign-up PaaS and IaaS Observe the network status, provide robust registration and authentication technique 182 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 4. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 15, No. 8, August 2017 VII. CONCLUSION Cloud computing is the effective technology which depend on cost, time and performance. It gives benefit to the users of cloud and of course the practice of cloud computing will surely will increase more in next few years. In this paper we have discussed and examine the basic of cloud computing and issues regarding securities in the cloud computing. Some security issues are the very crucial in the cloud computing. Privacy and integrity of data are the especially key concern security issues. In the cloud as data is stored in server and we don’t know the exact location of the data resided, due to this data stored in the cloud has a threat of being accessed or theft by unauthorized person during transmission. REFERENCES [1] I. Foster, Y Zhao, I. Raicu, and S. Lu, “Cloud Computing and Grid Computing 360-degreecompared[C]”, in Grid Computing Environments Workshop, 2008, pp. 1-10. [2] Rich Wolski, Daniel Nurmi, Chris Grzegorczyk, Graziano Obertelli, Sunil Soman,Lamia Youseff, Dmitrii Zagorodnov, “The Eucalyptus Open-source Cloudcomputing System ”, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGRID 2009, pp: 124-131. [3] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andrew Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing”, Technical Report No. UCB/EECS-2009-28, 2009. [4] "NIST Cloud Computing Definition", NIST SP 800- 145. [5] Enrique Jimenez Domingo and Minguel Lagares Lemos, CLOUDIO: A Cloud Computing-oriented Multi-Tenant Architecture for Business Information Systems In Proc. of the 23rdInternational Conference on Cloud Computing pages 532-533.IEEE, 2010. [6] D.G. Cameron, R. Carvajal-Schiaffino, A.P. Millar, C. Nicholson, K.Stockinger, F. Zini, Evaluating scheduling and replica optimisation strategies in OptorSim, in:Proceedings of the Fourth International Workshop on Grid Computing (Grid2003), IEEE CS Press, Los Alamitos,CA, USA, Phoenix, AZ, USA, 2003. [7] Rajkumar Buyya, Rajiv Ranjan, Rodrigo N. Calheiros, “Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities”, in The 2009 International Conference on High Performance Computing and Simulation, HPCS 2009, pp:1-11. [8] Juefu Liu, Peng Liu, “Status and Key Techniques in Cloud Computing”, in Proceedings of 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) , pp: V4-285– V4-288. [9] Chang Jie Guo, Wei Sun, Ying Huang, Zhi Hu Wang, Bo Gao , “A Framework for Native Multi-Tenancy Application Development and Management’’2007 9th IEEE International Conference on Ecommerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services.. [10] C. Hong, M. Zhang, and D. Feng, AB-ACCS: A cryptographic access control scheme for cloud storage, (in Chinese), Journal of Computer Research and Development, vol. 47, no. 1, pp. 259–265, 2010. [11] William Stallings, Cryptography and Network Security Principles and Practice, fifth Edition, Pearson Publication [12] Enrique Jimenez Domingo and Minguel Lagares Lemos, CLOUDIO: A Cloud Computing-oriented Multi-Tenant Architecture for Business Information Systems In Proc. of the 23rdInternational Conference on Cloud Computing pages 532-533.IEEE, 2010. [13] D. Feng, Y. Qin, D.Wang, and X. Chu, Research on trusted computing technology, (in Chinese), Journal of Computer Research and Development, vol. 48, no. 8, pp. 1332–1349, 2011. [14] H. Zhang, L. Chen, and L. Zhang, Research on trusted network connection, (in Chinese), Chinese Journal of Computers, vol. 33, no. 4, pp. 706–717, 2010. [15] G. Wang, F. Yue, and Q. Liu, A secure self-destructing scheme for electronic data, Journal of Computer and System Sciences, vol. 79, no. 2, pp. 279–290, 2013. [16] S. Qamar, N. Lal and M. Singh. Deelman, G Singh (2010). Internet Ware Cloud Computing: Challenges. (IJCSIS) International Journal of Computer Science and security, Vol. 7, No. 3, March 2010. [17] Naresh vurukonda and B.Thirumala Rao, in 2nd International Conference on Intelligent Computing, Communication & Convergence, ICCC 2016, AUTHORS PROFILE Pawan Kumar is an assistant professor in deptt. of Computer Science Engg. Institute of Technology at Gopeshwar (India). He received his B. Tech. and M. Tech degrees from Kumaon Engg. College Dwarahat ( India) 2010 and 2012, respectively and pursuing Phd from UTU. He once worked as teaching person in Department of IT in Pantnagar University. His research interests include network architecture, computer security, and data analysis. Dr Ashutosh Bhatt is an assistant professor in deptt. of Computer Science Engg. Birla institute of applied science (India). He completed his Phd in 2009. His work area reasearch was artificial neural network. He has more fourteen year teaching and research experience in various organisations of repute for PG and UG courses of Computer Science and IT. He also associated with many renowed national/international publication as reviewer/editorial board member. More than 22 research publication credited to him. . 183 https://sites.google.com/site/ijcsis/ ISSN 1947-5500