How secured and safe is Cloud?

IRJET Journal
IRJET JournalFast Track Publications

https://www.irjet.net/archives/V9/i4/IRJET-V9I438.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 197
How secured and safe is Cloud?
Menon Sanoop Govindankutty
Student, M. Sc IT, Keraleeya Samajam(Regd.) Dombivli’s Model College, Maharashtra
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Cloud Computing is the one of the hot and high
value topic in the IT industry. Cloud computing provide a new
method of delivering computing resources. Cloud computing
resources includes data storage, processing to software,
customer relationship management etc. The goal of cloud
computing for private or public is to provide easy andscalable
services to the IT industry. In simple words the delivery of
software, storage, network, analytics and intelligenceoverthe
internet to provide faster, economic and flexible service to the
client. Amazon rollout the first kind of cloud in 2006 afterthat
many companies like Google, Oracle, Azure, IBM any many
provide the cloud services. Services provided by cloud
providers are Paas (Platform as a Service), Saas(Softwareasa
Service), Iaas (Infrastructure as a Service). Virtualization is
the one of the main keyword found in the cloud world.
Virtualization is creation of virtual servers, infrastructureand
computing. Virtualization is the one of the foundational
element in the cloud computing. As all industries are moving
into cloud the security is also as important and this research
paper is going to check how safe is cloud?
Key Words: Cloud computing, Virtualization, Security,
AWS, AZURE, IAAS, PAAS, SAAS.
1.INTRODUCTION
Cloud computing is a general term for anythingthatinvolves
providing the on demand services to end users over the
internet. If a individual starts a business at early stage the
resources used will be less as the number of employees are
hand countable, but as the business grow the need of
resources and count of employees increases. For that the
system, network, data storage and servers will also be
needed for the business. The resources to maintain,
planning, security need to be paidsotheexpenseofcompany
will also increase as per growth. There will be many un
wanted expenses due to resource wastages etc. To solvethis
problem cloud computing play a major role.
A cloud can be private or public. A public cloud sells services
to anyone on the internet. A private cloud is a proprietary
network or a data center that supplies hosted services to a
limited number of people, with certain access and
permissions settings. Private or public, the goal of cloud
computing is to provide easy, scalable access to computing
resources and IT services[1].
Cloud computing allows you to pay only for how much you
use with much faster provision.CloudComputingsystem are
maintained by the cloud providers so the user doesn’t have
to worry about the maintenance
1.1 How Cloud Computing works?
Cloud computing heavily depends on Virtualization and
automation. This helps users to utilize the services from any
where in the world on their system over the internet. The
users have to pay only to the services they are using instead
of spending a large amount of money in the implementation
and maintaining thesetupbythemselves.Theycanaccessthe
data, servers sitting anywhere in the world.
2. TYPES OF CLOUD COMPUTING SERVICES.
Cloud computing services are divided in to three categories
Iaas- It stands for Infrastructure as a Service. Iaas provides
computing architecture and infrastructure. Data storage,
virtualization, servers and networking are taken care by the
providers and is managed by the user application,
middleware and data. Vendors manageaboveresources.Iaas
is used by system administrators. Pros of Iaas is cloud
provides the infrastructure,enhancedscalabilityandflexible.
But the issue faced for the Iaas is service delays, network
delays and security delays.
Paas- It stands for Platform as a service. In Pass the services
provided are Programming language, Operating system,
Server and Database. It provides with encapsulation.Andthe
user can build, compile and run programs. This services are
managed by the users they manage data and application
resources. This service is used by the developers. Common
PaaS products include Salesforce's Lightning Platform, AWS
Elastic Beanstalk and Google App Engine. It is faster market
fordevelopers, easy deployment of web application. It iscost
effective and scalable. The issues faced for these services are
developers limited, migration issue and vendor lock-in.
Saas- Saas stands for Software as a service. In Saas cloud
providers provide the software as a service to the end users.
It is based on demand services, the service are provided to
Cloud computing works by enabling the services through
a remotephysical servers, database and computers to access
data and cloud applicationoverinternet.Aninternetnetwork
connection provide the front end, which includes the
accessingclient device, browser,networkandcloudsoftware
applications, with the back end, which consists of databases,
servers and computers. The back end functions provide
repository, storing data that is accessed by the front end.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 198
customer on demand for the software. The user do not need
to install the software on personal system. The user does not
have to worry about the OS the user is using because it is
universally accessible from any platform. Vendors Provide
the modest and latest tools and allow multi-tenancy. The
issue faced by user for this services can be portability,
internet issue the size of software depends on its purpose so
some heavy software need strong internet.
Deployment Model- There are 3 type of deployment model
1. Public cloud- In public model the providers provide
the services like application, storage in general over
the internet. It is easy and inexpensive to setup. No
wasted resources as users have to pay as pertheuse
only. But as this is public cloud security and privacy
is a big concern if not managed properly.
2. Private cloud- In private cloud the resources are
accessible for only limited number of public behind
the firewall, so it minimizes the security concern. It
is mainly used by organizations and it gives direct
control over data.
3. Hybrid cloud- In Hybrid cloud it is amixofprivateas
well as public. And It helps toget bestofbothprivate
and public cloud.
3. SECURITY CONCERN IN CLOUD
 Virtualization is a technique in which a fully
functional image of an operating system can be
captured and run on the users physical machine.
Hypervisor is required to run a virtual operating
system in a virtual machine.And if the Hypervisor is
vulnerable then the whole system can be
compromised and hence the users data can be
breached.
Another risk involved with virtualization is with
allocation and de-allocation of resources. If the
memory is allocated to a user and after the use of
that client and the same memory is allocated to
another user without cleaning the memory then
there is a possibility of the data exposure so the
allocation and de-allocation is a big part of
virtualization.
So the proper planning of virtualization should be
done. Resources should be properly verified and
authenticated should be done before de-allocatedto
the users
 Storage in public cloud is another concern of
security in cloud. In public cloud storage facilities
are centralized and this attract hackers much often.
This is a combination of hardware and software
which make little complex design. A single loop hole
canlead to compromise the publiccloud.Suggestion
for this issue is to use Private cloud if the data is
highly sensitive.
 Multienancy is also considered as one the security
concern by experts. The main advantage of cloud is
that users can access or rent the resources when
they need and only pay for that after that if any
another user need the resource, then the
infrastructure is used by another user. And this also
led to a major security concern. The same storage,
CPU, memory are shared to different users which
make not only one but multiple users vulnerable.
To avoid such issue a highly strong authentication
should be done before sharing the resources to
another users.
4. DATA SECURITY
There are two states where data is vulnerable in cloud. They
are data at rest and data in transit. Data security is a big and
major concern. Confidentiality and Integrity of data is based
on mechanism such as encryption and decryption etc.
 Data at rest
Data at rest means data present in cloud. Data
present in cloud can be accessed through internet.
This data can be backup or live data. If the
functionality have any loop hole this data can be
breached easily. Theorganizationcannotcontrolthe
data physically so this is a big concern. This can be
counter by using privatecloud with morecontrolled
access.
 Data in Transit
Data in transit means data travelling in and out of
cloud. And it is more vulnerable than data at rest.
Data in transit can be files, username, password etc.
As the data is traveling from one place to other an
intervention can cause majorsecurityconcern.Data
in transit can be securedthroughdataencryption.So
that if the data is eavesdropped still the data cannot
be read by the intruder.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 199
5. SECURITY CHALLENGES
Securing cloud will be a big challenge for the organization.
Hence it is very important to mimic the securityvulnerability
and create a good strong security model to establish in safe
cloud environment. Major challenges involve:
 Lack of proper governance- Cloud providing
organization havethecompletecontrolonresources
but they have to provide the control to users once
the resources is shared this can cause a big security
gap. Google, Amazon and other cloud providers
states thattheydon’ttakeanyresponsibility,liability
or authority forcorruption,unauthorizedetc.Sothis
is a big major concern for the users.
 Malicious attack- Sometimes the architecture of
cloud computing environments poses risks to the
privacy and security of the customers [2]
 Insecureor incomplete data deletion- Ifclientwants
to deletethe data will it delete the dataaccuratelyor
it will just delete incompletely and which it will
make a big data security concern due to multi-
latency.
 Data interception- This treat poses more as more
third part software and malicious codes are
available for sniffing, spoofing etc.
6. CONCLUSION
Cloud computing are growing in faster rate. All type of
industries are accepting the cloud computing technology.
Data present in the cloud can be at high risk if the data is not
protected properly. This paper discuss about data security,
security concern and virtualization. This paper also
discussed about the two states data at rest and data in
transit.
REFERENCES
[1] https://www.techtarget.com/searchcloudcomputing/de
finition/cloudcomputing#:~:text=Cloud%20computing
%20is%20a%20general,as%20a%20service%20(SaaS).
[2] Wang, Y., Chandrasekhar, S., Singhal, M., & Ma, J. (2016).
A limited-trust capacity model for mitigating threats of
internal malicious services in cloud computing. Cluster
Computing,19(2), 647-662. doi:10.1007/s10586-016-
0560-2

Recommandé

Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp... par
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
245 vues11 diapositives
Security Issues’ in Cloud Computing and its Solutions. par
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
353 vues6 diapositives
A Comparative Review on Data Security Challenges in Cloud Computing par
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
90 vues6 diapositives
IRJET - Multitenancy using Cloud Computing Features par
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
18 vues4 diapositives
improve cloud security par
improve cloud securityimprove cloud security
improve cloud securityBalkees Shereek
370 vues8 diapositives
Ad4502189193 par
Ad4502189193Ad4502189193
Ad4502189193IJERA Editor
224 vues5 diapositives

Contenu connexe

Similaire à How secured and safe is Cloud?

Cloud Data Protection for the Masses par
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
29 vues5 diapositives
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities par
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET Journal
16 vues4 diapositives
Fog computing document par
Fog computing documentFog computing document
Fog computing documentsravya raju
3.4K vues32 diapositives
Fog doc par
Fog doc Fog doc
Fog doc priyanka reddy
546 vues37 diapositives
fog computing provide security to the data in cloud par
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
10.7K vues37 diapositives
IRJET- Single to Multi Cloud Data Security in Cloud Computing par
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
44 vues5 diapositives

Similaire à How secured and safe is Cloud?(20)

Cloud Data Protection for the Masses par IRJET Journal
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET Journal29 vues
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities par IRJET Journal
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET Journal16 vues
Fog computing document par sravya raju
Fog computing documentFog computing document
Fog computing document
sravya raju3.4K vues
fog computing provide security to the data in cloud par priyanka reddy
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy10.7K vues
IRJET- Single to Multi Cloud Data Security in Cloud Computing par IRJET Journal
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal44 vues
Enhanced security framework to ensure data security in cloud using security b... par eSAT Journals
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals137 vues
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble... par IRJET Journal
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal32 vues
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse par IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal24 vues
Splendens Project Proposal by Slidesgo.pptx par ssuserea0dfe
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
ssuserea0dfe3 vues
Security of Data in Cloud Environment Using DPaaS par IJMER
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER636 vues
IRJET- A Survey on SaaS-Attacks and Digital Forensic par IRJET Journal
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal45 vues
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage par IRJET Journal
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal38 vues
An efficient and secure data storage in cloud computing using modified RSA pu... par IJECEIAES
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES22 vues
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ... par IRJET Journal
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal93 vues
IRJET- Survey on Security Threats and Remedies in Cloud Computing par IRJET Journal
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET Journal24 vues
Security threat issues and countermeasures in cloud computing par Jahangeer Qadiree
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat... par IRJET Journal
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal22 vues
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ... par IIJSRJournal
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
IIJSRJournal12 vues

Plus de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL par
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
20 vues7 diapositives
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... par
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 vues7 diapositives
Identification, Discrimination and Classification of Cotton Crop by Using Mul... par
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
7 vues5 diapositives
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... par
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 vues11 diapositives
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... par
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 vues6 diapositives
Performance Analysis of Aerodynamic Design for Wind Turbine Blade par
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 vues5 diapositives

Plus de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL par IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal20 vues
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... par IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 vues
Identification, Discrimination and Classification of Cotton Crop by Using Mul... par IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal7 vues
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... par IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 vues
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... par IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 vues
Performance Analysis of Aerodynamic Design for Wind Turbine Blade par IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 vues
Heart Failure Prediction using Different Machine Learning Techniques par IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 vues
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel par IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 vues
Metro Development and Pedestrian Concerns par IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 vues
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... par IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 vues
Data Analytics and Artificial Intelligence in Healthcare Industry par IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 vues
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... par IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal44 vues
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... par IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal10 vues
Development of Effective Tomato Package for Post-Harvest Preservation par IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 vues
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” par IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 vues
Understanding the Nature of Consciousness with AI par IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 vues
Augmented Reality App for Location based Exploration at JNTUK Kakinada par IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 vues
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... par IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 vues
Enhancing Real Time Communication and Efficiency With Websocket par IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal4 vues
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... par IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 vues

Dernier

SWM L1-L14_drhasan (Part 1).pdf par
SWM L1-L14_drhasan (Part 1).pdfSWM L1-L14_drhasan (Part 1).pdf
SWM L1-L14_drhasan (Part 1).pdfMahmudHasan747870
48 vues150 diapositives
Plumbing par
PlumbingPlumbing
PlumbingIwiss Tools Co.,Ltd
15 vues14 diapositives
DESIGN OF SPRINGS-UNIT4.pptx par
DESIGN OF SPRINGS-UNIT4.pptxDESIGN OF SPRINGS-UNIT4.pptx
DESIGN OF SPRINGS-UNIT4.pptxgopinathcreddy
18 vues47 diapositives
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th... par
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...ahmedmesaiaoun
12 vues84 diapositives
CHEMICAL KINETICS.pdf par
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdfAguedaGutirrez
8 vues337 diapositives
SEMI CONDUCTORS par
SEMI CONDUCTORSSEMI CONDUCTORS
SEMI CONDUCTORSpavaniaalla2005
20 vues8 diapositives

Dernier(20)

Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th... par ahmedmesaiaoun
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
ahmedmesaiaoun12 vues
Design of machine elements-UNIT 3.pptx par gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy29 vues
MSA Website Slideshow (16).pdf par msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla58 vues
NEW SUPPLIERS SUPPLIES (copie).pdf par georgesradjou
NEW SUPPLIERS SUPPLIES (copie).pdfNEW SUPPLIERS SUPPLIES (copie).pdf
NEW SUPPLIERS SUPPLIES (copie).pdf
georgesradjou14 vues
fakenews_DBDA_Mar23.pptx par deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra812 vues
SUMIT SQL PROJECT SUPERSTORE 1.pptx par Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 11 vues

How secured and safe is Cloud?

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 197 How secured and safe is Cloud? Menon Sanoop Govindankutty Student, M. Sc IT, Keraleeya Samajam(Regd.) Dombivli’s Model College, Maharashtra ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Cloud Computing is the one of the hot and high value topic in the IT industry. Cloud computing provide a new method of delivering computing resources. Cloud computing resources includes data storage, processing to software, customer relationship management etc. The goal of cloud computing for private or public is to provide easy andscalable services to the IT industry. In simple words the delivery of software, storage, network, analytics and intelligenceoverthe internet to provide faster, economic and flexible service to the client. Amazon rollout the first kind of cloud in 2006 afterthat many companies like Google, Oracle, Azure, IBM any many provide the cloud services. Services provided by cloud providers are Paas (Platform as a Service), Saas(Softwareasa Service), Iaas (Infrastructure as a Service). Virtualization is the one of the main keyword found in the cloud world. Virtualization is creation of virtual servers, infrastructureand computing. Virtualization is the one of the foundational element in the cloud computing. As all industries are moving into cloud the security is also as important and this research paper is going to check how safe is cloud? Key Words: Cloud computing, Virtualization, Security, AWS, AZURE, IAAS, PAAS, SAAS. 1.INTRODUCTION Cloud computing is a general term for anythingthatinvolves providing the on demand services to end users over the internet. If a individual starts a business at early stage the resources used will be less as the number of employees are hand countable, but as the business grow the need of resources and count of employees increases. For that the system, network, data storage and servers will also be needed for the business. The resources to maintain, planning, security need to be paidsotheexpenseofcompany will also increase as per growth. There will be many un wanted expenses due to resource wastages etc. To solvethis problem cloud computing play a major role. A cloud can be private or public. A public cloud sells services to anyone on the internet. A private cloud is a proprietary network or a data center that supplies hosted services to a limited number of people, with certain access and permissions settings. Private or public, the goal of cloud computing is to provide easy, scalable access to computing resources and IT services[1]. Cloud computing allows you to pay only for how much you use with much faster provision.CloudComputingsystem are maintained by the cloud providers so the user doesn’t have to worry about the maintenance 1.1 How Cloud Computing works? Cloud computing heavily depends on Virtualization and automation. This helps users to utilize the services from any where in the world on their system over the internet. The users have to pay only to the services they are using instead of spending a large amount of money in the implementation and maintaining thesetupbythemselves.Theycanaccessthe data, servers sitting anywhere in the world. 2. TYPES OF CLOUD COMPUTING SERVICES. Cloud computing services are divided in to three categories Iaas- It stands for Infrastructure as a Service. Iaas provides computing architecture and infrastructure. Data storage, virtualization, servers and networking are taken care by the providers and is managed by the user application, middleware and data. Vendors manageaboveresources.Iaas is used by system administrators. Pros of Iaas is cloud provides the infrastructure,enhancedscalabilityandflexible. But the issue faced for the Iaas is service delays, network delays and security delays. Paas- It stands for Platform as a service. In Pass the services provided are Programming language, Operating system, Server and Database. It provides with encapsulation.Andthe user can build, compile and run programs. This services are managed by the users they manage data and application resources. This service is used by the developers. Common PaaS products include Salesforce's Lightning Platform, AWS Elastic Beanstalk and Google App Engine. It is faster market fordevelopers, easy deployment of web application. It iscost effective and scalable. The issues faced for these services are developers limited, migration issue and vendor lock-in. Saas- Saas stands for Software as a service. In Saas cloud providers provide the software as a service to the end users. It is based on demand services, the service are provided to Cloud computing works by enabling the services through a remotephysical servers, database and computers to access data and cloud applicationoverinternet.Aninternetnetwork connection provide the front end, which includes the accessingclient device, browser,networkandcloudsoftware applications, with the back end, which consists of databases, servers and computers. The back end functions provide repository, storing data that is accessed by the front end.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 198 customer on demand for the software. The user do not need to install the software on personal system. The user does not have to worry about the OS the user is using because it is universally accessible from any platform. Vendors Provide the modest and latest tools and allow multi-tenancy. The issue faced by user for this services can be portability, internet issue the size of software depends on its purpose so some heavy software need strong internet. Deployment Model- There are 3 type of deployment model 1. Public cloud- In public model the providers provide the services like application, storage in general over the internet. It is easy and inexpensive to setup. No wasted resources as users have to pay as pertheuse only. But as this is public cloud security and privacy is a big concern if not managed properly. 2. Private cloud- In private cloud the resources are accessible for only limited number of public behind the firewall, so it minimizes the security concern. It is mainly used by organizations and it gives direct control over data. 3. Hybrid cloud- In Hybrid cloud it is amixofprivateas well as public. And It helps toget bestofbothprivate and public cloud. 3. SECURITY CONCERN IN CLOUD  Virtualization is a technique in which a fully functional image of an operating system can be captured and run on the users physical machine. Hypervisor is required to run a virtual operating system in a virtual machine.And if the Hypervisor is vulnerable then the whole system can be compromised and hence the users data can be breached. Another risk involved with virtualization is with allocation and de-allocation of resources. If the memory is allocated to a user and after the use of that client and the same memory is allocated to another user without cleaning the memory then there is a possibility of the data exposure so the allocation and de-allocation is a big part of virtualization. So the proper planning of virtualization should be done. Resources should be properly verified and authenticated should be done before de-allocatedto the users  Storage in public cloud is another concern of security in cloud. In public cloud storage facilities are centralized and this attract hackers much often. This is a combination of hardware and software which make little complex design. A single loop hole canlead to compromise the publiccloud.Suggestion for this issue is to use Private cloud if the data is highly sensitive.  Multienancy is also considered as one the security concern by experts. The main advantage of cloud is that users can access or rent the resources when they need and only pay for that after that if any another user need the resource, then the infrastructure is used by another user. And this also led to a major security concern. The same storage, CPU, memory are shared to different users which make not only one but multiple users vulnerable. To avoid such issue a highly strong authentication should be done before sharing the resources to another users. 4. DATA SECURITY There are two states where data is vulnerable in cloud. They are data at rest and data in transit. Data security is a big and major concern. Confidentiality and Integrity of data is based on mechanism such as encryption and decryption etc.  Data at rest Data at rest means data present in cloud. Data present in cloud can be accessed through internet. This data can be backup or live data. If the functionality have any loop hole this data can be breached easily. Theorganizationcannotcontrolthe data physically so this is a big concern. This can be counter by using privatecloud with morecontrolled access.  Data in Transit Data in transit means data travelling in and out of cloud. And it is more vulnerable than data at rest. Data in transit can be files, username, password etc. As the data is traveling from one place to other an intervention can cause majorsecurityconcern.Data in transit can be securedthroughdataencryption.So that if the data is eavesdropped still the data cannot be read by the intruder.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 199 5. SECURITY CHALLENGES Securing cloud will be a big challenge for the organization. Hence it is very important to mimic the securityvulnerability and create a good strong security model to establish in safe cloud environment. Major challenges involve:  Lack of proper governance- Cloud providing organization havethecompletecontrolonresources but they have to provide the control to users once the resources is shared this can cause a big security gap. Google, Amazon and other cloud providers states thattheydon’ttakeanyresponsibility,liability or authority forcorruption,unauthorizedetc.Sothis is a big major concern for the users.  Malicious attack- Sometimes the architecture of cloud computing environments poses risks to the privacy and security of the customers [2]  Insecureor incomplete data deletion- Ifclientwants to deletethe data will it delete the dataaccuratelyor it will just delete incompletely and which it will make a big data security concern due to multi- latency.  Data interception- This treat poses more as more third part software and malicious codes are available for sniffing, spoofing etc. 6. CONCLUSION Cloud computing are growing in faster rate. All type of industries are accepting the cloud computing technology. Data present in the cloud can be at high risk if the data is not protected properly. This paper discuss about data security, security concern and virtualization. This paper also discussed about the two states data at rest and data in transit. REFERENCES [1] https://www.techtarget.com/searchcloudcomputing/de finition/cloudcomputing#:~:text=Cloud%20computing %20is%20a%20general,as%20a%20service%20(SaaS). [2] Wang, Y., Chandrasekhar, S., Singhal, M., & Ma, J. (2016). A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. Cluster Computing,19(2), 647-662. doi:10.1007/s10586-016- 0560-2