SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
1
Security Issues in Cloud Computing
B. S. PANDA1*
, Rahul Abhishek2
, Pratik3
, Binay Ranjan4
1
Asst. Professor, MITS Engineering College, Rayagada, Orissa.
2
Student, Dept. of Information Technology. MITS, Rayagada, Orissa.
3
Student, Dept. of Information Technology. MITS, Rayagada, Orissa.
4
Student, Dept. of Computer Science & Engg. MITS, Rayagada, Orissa.
E-mail: bspanda@sify.com
E-mail: rahulmithu.abhishek@gmail.com
Abstract:
In this paper, we discuss cloud computing security and its security issues. In particular, we discuss a
scheme for secure publications of documents in a cloud. It will converse secure federated query
processing, and discuss the use of secure co-processors for cloud computing. Cloud computing is a
general term for anything that involves delivering hosted services over the Internet. These services are
broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and
Software-as-a-Service (SaaS). The name cloud computing was inspired by the cloud symbol that's often
used to represent the Internet in flowcharts and diagrams. There is a critical need to securely store,
manage, share and analyze massive amounts of complex(e.g., semi-structured and unstructured) data to
determine patterns and trends in order to improve the quality of healthcare, better safeguard the nation
and explore alternative energy. Because of the critical nature of the applications, it is important that
clouds be secure. The emerging cloud computing model attempts to address the explosive growth of web-
connected devices, and handle massive amount of data.
Key Words: IaaS, PaaS, SaaS , Cloud Module ,Data Encryption ,security concerns , Data security.
1. Introduction
As a metaphor for the Internet, "the cloud" is a
familiar cliché, but when combined with
"computing," the meaning gets bigger and fuzzier.
Some analysts and vendors define cloud
computing narrowly as an updated version of
utility computing: basically virtual servers
available over the Internet (figure 1). Others go
very broad, arguing anything you consume outside
the firewall is "in the cloud," including
conventional outsourcing.
Cloud computing is a new consumption and
delivery model for IT services. The concept of
cloud computing represents a shift in thought, in
those end users need not know the details of a
specific technology. The service is fully managed
by the provider. Users can consume services at a
rate that is set by their particular needs. This on-
demand service can be provided at any time.
Fig1. Cloud Computing
Data security involves encrypting the data as well
as ensuring that appropriate policies are enforced
for data sharing. In addition, resource allocation
and memory management algorithms have to be
secure. Finally, data mining techniques may be
applicable to malware detection in clouds. We
have extended the technologies and concepts we
2
have developed for secure grid to a secure cloud.
We have defined a layered framework for assured
cloud computing consisting of the secure virtual
machine layer, secure cloud storage layer, secure
cloud data layer, and the secure virtual network
monitor layer (Figure 2). Cross cutting services
are provided by the policy layer, the cloud
monitoring layer, the reliability layer and the risk
analysis layer. For the Secure Virtual Machine
(VM) Monitor we are combining both hardware
and software solutions in virtual machines to
handle problems such as key logger examining
XEN developed at the University of Cambridge
and exploring security to meet the needs of our
applications (e.g., secure distributed storage and
data management). For Secure Cloud Storage
Management, we are developing a storage
infrastructure which integrates resources from
multiple providers to form a massive virtual
storage system.
Figure2. Layered framework for assured cloud
2. Cloud Computing Models
Cloud computing models can be broken into three
basic designs, which are shown here and
described below(Figure 3).
Figure3. Cloud Computing Models
2.1 Infrastructure-as-a-Service (IaaS) – As the
name implies, you are buying infrastructure. You
own the software and are purchasing virtual power
to execute as needed. This is much like running a
virtual server on your own equipment, except you
are now running a virtual server on a virtual disk.
This model is similar to a utility company model,
as you pay for what you use. An example is
Amazon Web Services at http://aws.amazon.com.
2.2 Platform-as-a-Service (PaaS) – In this model
of cloud computing, the provider provides a
platform for your use. Services provided by this
model include all phases of the system
development life cycle (SDLC) and can use
application program interface (APIs), website
portals, or gateway software. Buyers do need to
look closely at specific solutions, because some
providers do not allow software created by their
customers to be moved off the provider’s
platform. An example of PaaS is GoogleApps.
2.3 Software-as-a-Service (SaaS) – This model is
designed to provide everything and simply rent
out the software to the user. The service is usually
provided through some type of front end or web
portal. While the end user is free to use the service
from anywhere, the company pays a per use fee.
Salesforce.com offers this type of service.
3. Cloud Computing Attacks
As more companies move to cloud computing,
look for hackers to follow. Some of the potential
attack vectors criminals may attempt include:
3.1 Denial of Service (DoS) attacks - Some
security professionals have argued that the cloud
is more vulnerable to DoS attacks, because it is
shared by many users, which makes DoS attacks
much more damaging. Twitter suffered a
devastating DoS attack during 2009.
3.2 Side Channel attacks – An attacker could
attempt to compromise the cloud by placing a
malicious virtual machine in close proximity to a
target cloud server and then launching a side
channel attack.
3.3 Authentication attacks – Authentication is a
weak point in hosted and virtual services and is
frequently targeted. There are many different
ways to authenticate users; for example, based on
3
what a person knows, has, or is. The mechanisms
used to secure the authentication process and the
methods used are a frequent target of attackers.
3.4 Man-in-the-middle cryptographic attacks –
This attack is carried out when an attacker places
himself between two users. Anytime attackers can
place themselves in the communication’s path,
there is the possibility that they can intercept and
modify communications.
4. Security Concerns of Cloud Computing
While cost and ease of use are two great benefits
of cloud computing, there are significant security
concerns that need to be addressed when
considering moving critical applications and
sensitive data to public and shared cloud
environments. To address these concerns, the
cloud provider must develop sufficient controls to
provide the same or a greater level of security than
the organization would have if the cloud were not
used. Listed here are ten items to review when
considering cloud computing.
5. Secure Data Publication Applied To Cloud
Cloud computing facilitates storage of data at a
remote site to maximize resource utilization.
As a result, it is critical that this data be protected
and only given to authorized individuals. This
essentially amounts to secure publication of data
that is necessary for data outsourcing, as well as
external publications. We have developed
techniques for publication of data in a secure
manner. We assume that the data is represented as
an XML document. This is a valid assumption as
many of the documents on the web are now
represented as XML documents. In the access
control framework proposed in Bertino (2002),
security policy is specified depending on user
roles and credentials Users must possess the
credentials to access XML documents.
Security could improve due to centralization of
data, increased security-focused resources, etc.,
but concerns can persist about loss of control over
certain sensitive data, and the lack of security for
stored kernels. Security is often as good as or
better than under traditional systems, in part
because providers are able to devote resources to
solving security issues that many customers
cannot afford. However, the complexity of
security is greatly increased when data is
distributed over a wider area or greater number of
devices and in multi-tenant systems that are being
shared by unrelated users. In addition, user access
to security audit logs may be difficult or
impossible. Private cloud installations are in part
motivated by users' desire to retain control over
the infrastructure and avoid losing control of
information security. This essentially amounts to
secure publication of data that is necessary for
data outsourcing, as well as external publications.
Since data in the cloud will be placed anywhere, it
is important that the data is encrypted. We are
using secure co-processor as part of the cloud
infrastructure to enable efficient encrypted storage
of sensitive data.
Security is needed at server access internet access
database access data privacy program access.
Security concerns arising because both customer
data and program are residing in provider
premises.
Security is used to save data and program from
disrupts services, theft of information, loss of
privacy, hostile program, hostile people giving
instructions to good programs, bad guys
corrupting or eavesdropping on communications.
6. Summary and Conclusion
In this paper, we first discussed cloud computing
then cloud module and its expansion secondly
security issues for cloud. These issues include
storage security, middleware security, data
security, network security and application
security. The main goal is to securely store and
manage data that is not controlled by the owner of
the data. We discussed how we may secure
documents that may be published. There are
several other security challenges including
security aspects of virtualization. We believe that
due to the complexity of the cloud, it will be
difficult to achieve end-to-end security.
However, the challenge we have is to ensure more
secure operations even if some parts of the cloud
fail.
4
For many applications, we not only need
information assurance but also mission assurance.
Figure2. Case study of Worldwide Spending
Cloud
Reference
1. Andy BechtolsheimChairman & Co-
founder, Arista Networks.
November 12th, 2008
2. Encrypted Storage and Key Management
for the cloud. Cryptoclarity.com. 2009-
07-30.
3. http://www.cryptoclarity.com/CryptoClar
ityLLC/Welcome/Entries/2009/7/23_Enc
rypted_Storage_and_Key_Management_
for_the_cloud.html. Retrieved 2010-08-
22
4. Mills, Elinor (2009-01-27). "Cloud
computing security forecast: Clear
skies". CNET.
5. Michael Gregg, Global Knowledge
Instructor, CISA, CISSP, CISM, MCSE,
CTT+, CGEIT, A+, N+, Security+,
CNA, CCNA, CIW Security Analyst,
CEH, CHFI, CEI, DCNP, ES Dragon
IDS, ES Advanced Dragon IDS, and
SSCP.
6. Ashwin Alfred Pinto, Shvetank Verma,
Satyam Singh, Prashant Srivastava,
Rahul Gupta, and Vijay Chourasia.
Proceedings of the World Congress on
Engineering 2011
7. Vol I WCE 2011, July 6 - 8, 2011,
London, U.K.
8. www.cloudbook.net/resources.
9. "Service-Oriented Computing and Cloud
Computing: Challenges and
Opportunities". IEEE Internet
Computing. Retrieved 2010-12-04.
10. "The NIST Definition of Cloud
Computing (Draft)". National Institute of
Science and Technology. Retrieved 24
July 2011.

Contenu connexe

Tendances

A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingMonishaNehkal
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...iaemedu
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...iaemedu
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingIAEME Publication
 

Tendances (14)

A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computing
 

En vedette

Breaking evaluation
Breaking evaluationBreaking evaluation
Breaking evaluationSharonxxx56
 
Future aspects of ai by rahul abhishek
Future aspects of ai by rahul abhishekFuture aspects of ai by rahul abhishek
Future aspects of ai by rahul abhishekEr. rahul abhishek
 
Breaking evaluation final
Breaking evaluation finalBreaking evaluation final
Breaking evaluation finalSharonxxx56
 
Core rx presentation_2012
Core rx presentation_2012Core rx presentation_2012
Core rx presentation_2012jfd22222
 
Victorian era horseback_riding
Victorian era horseback_ridingVictorian era horseback_riding
Victorian era horseback_ridingmatt789
 
Diseases d co
Diseases d coDiseases d co
Diseases d co16sammyb
 
The principles of design
The principles of designThe principles of design
The principles of designcayleyblenner18
 
Las tendencias en el arte - BLURFAIR 2015
Las tendencias en el arte - BLURFAIR 2015 Las tendencias en el arte - BLURFAIR 2015
Las tendencias en el arte - BLURFAIR 2015 Paola Caballer
 
Pengantar Kecerdasan Buatan
Pengantar Kecerdasan BuatanPengantar Kecerdasan Buatan
Pengantar Kecerdasan BuatanHerman Tolle
 
Modul 1 pengenalan kecerdasan buatan
Modul 1   pengenalan kecerdasan buatanModul 1   pengenalan kecerdasan buatan
Modul 1 pengenalan kecerdasan buatanahmad haidaroh
 
Breaking evaluation final draft
Breaking evaluation final draftBreaking evaluation final draft
Breaking evaluation final draftSharonxxx56
 
Breaking Evaluation DRAFT
Breaking Evaluation DRAFTBreaking Evaluation DRAFT
Breaking Evaluation DRAFTSharonxxx56
 
Inteligent computing relating to cloud computing.final
Inteligent computing relating to cloud computing.finalInteligent computing relating to cloud computing.final
Inteligent computing relating to cloud computing.finalEr. rahul abhishek
 
Iii Representasi Pengetahuan
Iii   Representasi PengetahuanIii   Representasi Pengetahuan
Iii Representasi PengetahuanHerman Tolle
 
Modul 4 representasi pengetahuan
Modul 4   representasi pengetahuanModul 4   representasi pengetahuan
Modul 4 representasi pengetahuanahmad haidaroh
 
1996-reynolds-wrap
1996-reynolds-wrap1996-reynolds-wrap
1996-reynolds-wrapBrett Rudy
 
Facebook Fundamentals for Business
Facebook Fundamentals for BusinessFacebook Fundamentals for Business
Facebook Fundamentals for BusinessFulcrumTech
 
toysrus2002-holiday-mailing
toysrus2002-holiday-mailingtoysrus2002-holiday-mailing
toysrus2002-holiday-mailingBrett Rudy
 
Charity Hop Sports Marketing Capabilities
Charity Hop Sports Marketing CapabilitiesCharity Hop Sports Marketing Capabilities
Charity Hop Sports Marketing CapabilitiesBrett Rudy
 
CAN-SPAM Act of 2003: Email Marketing and SPAM - What you need to know
CAN-SPAM Act of 2003: Email Marketing and SPAM - What you need to knowCAN-SPAM Act of 2003: Email Marketing and SPAM - What you need to know
CAN-SPAM Act of 2003: Email Marketing and SPAM - What you need to knowFulcrumTech
 

En vedette (20)

Breaking evaluation
Breaking evaluationBreaking evaluation
Breaking evaluation
 
Future aspects of ai by rahul abhishek
Future aspects of ai by rahul abhishekFuture aspects of ai by rahul abhishek
Future aspects of ai by rahul abhishek
 
Breaking evaluation final
Breaking evaluation finalBreaking evaluation final
Breaking evaluation final
 
Core rx presentation_2012
Core rx presentation_2012Core rx presentation_2012
Core rx presentation_2012
 
Victorian era horseback_riding
Victorian era horseback_ridingVictorian era horseback_riding
Victorian era horseback_riding
 
Diseases d co
Diseases d coDiseases d co
Diseases d co
 
The principles of design
The principles of designThe principles of design
The principles of design
 
Las tendencias en el arte - BLURFAIR 2015
Las tendencias en el arte - BLURFAIR 2015 Las tendencias en el arte - BLURFAIR 2015
Las tendencias en el arte - BLURFAIR 2015
 
Pengantar Kecerdasan Buatan
Pengantar Kecerdasan BuatanPengantar Kecerdasan Buatan
Pengantar Kecerdasan Buatan
 
Modul 1 pengenalan kecerdasan buatan
Modul 1   pengenalan kecerdasan buatanModul 1   pengenalan kecerdasan buatan
Modul 1 pengenalan kecerdasan buatan
 
Breaking evaluation final draft
Breaking evaluation final draftBreaking evaluation final draft
Breaking evaluation final draft
 
Breaking Evaluation DRAFT
Breaking Evaluation DRAFTBreaking Evaluation DRAFT
Breaking Evaluation DRAFT
 
Inteligent computing relating to cloud computing.final
Inteligent computing relating to cloud computing.finalInteligent computing relating to cloud computing.final
Inteligent computing relating to cloud computing.final
 
Iii Representasi Pengetahuan
Iii   Representasi PengetahuanIii   Representasi Pengetahuan
Iii Representasi Pengetahuan
 
Modul 4 representasi pengetahuan
Modul 4   representasi pengetahuanModul 4   representasi pengetahuan
Modul 4 representasi pengetahuan
 
1996-reynolds-wrap
1996-reynolds-wrap1996-reynolds-wrap
1996-reynolds-wrap
 
Facebook Fundamentals for Business
Facebook Fundamentals for BusinessFacebook Fundamentals for Business
Facebook Fundamentals for Business
 
toysrus2002-holiday-mailing
toysrus2002-holiday-mailingtoysrus2002-holiday-mailing
toysrus2002-holiday-mailing
 
Charity Hop Sports Marketing Capabilities
Charity Hop Sports Marketing CapabilitiesCharity Hop Sports Marketing Capabilities
Charity Hop Sports Marketing Capabilities
 
CAN-SPAM Act of 2003: Email Marketing and SPAM - What you need to know
CAN-SPAM Act of 2003: Email Marketing and SPAM - What you need to knowCAN-SPAM Act of 2003: Email Marketing and SPAM - What you need to know
CAN-SPAM Act of 2003: Email Marketing and SPAM - What you need to know
 

Similaire à Security Issues in Cloud Computing by rahul abhishek

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 

Similaire à Security Issues in Cloud Computing by rahul abhishek (20)

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
G033030035
G033030035G033030035
G033030035
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 

Plus de Er. rahul abhishek

The relationship between artificial intelligence and psychological theories
The relationship between artificial intelligence and psychological theoriesThe relationship between artificial intelligence and psychological theories
The relationship between artificial intelligence and psychological theoriesEr. rahul abhishek
 
The technologies of ai used in different corporate world
The technologies of ai used in different  corporate worldThe technologies of ai used in different  corporate world
The technologies of ai used in different corporate worldEr. rahul abhishek
 
Learning of robots by using & sharing the cloud computing techniques
Learning of robots by using & sharing the cloud computing techniquesLearning of robots by using & sharing the cloud computing techniques
Learning of robots by using & sharing the cloud computing techniquesEr. rahul abhishek
 
Artificial intelligence apporoach to robotics
Artificial intelligence apporoach to roboticsArtificial intelligence apporoach to robotics
Artificial intelligence apporoach to roboticsEr. rahul abhishek
 
Artificial intelligence approaches to thermal imaging
Artificial intelligence approaches to thermal imagingArtificial intelligence approaches to thermal imaging
Artificial intelligence approaches to thermal imagingEr. rahul abhishek
 
intelligent computing relating to cloud computing
intelligent computing relating to cloud computingintelligent computing relating to cloud computing
intelligent computing relating to cloud computingEr. rahul abhishek
 
Design a rule based expert system for eia
Design a rule based expert system for eiaDesign a rule based expert system for eia
Design a rule based expert system for eiaEr. rahul abhishek
 
Uncertainty classification of expert systems a rough set approach
Uncertainty classification of expert systems   a rough set approachUncertainty classification of expert systems   a rough set approach
Uncertainty classification of expert systems a rough set approachEr. rahul abhishek
 

Plus de Er. rahul abhishek (9)

The relationship between artificial intelligence and psychological theories
The relationship between artificial intelligence and psychological theoriesThe relationship between artificial intelligence and psychological theories
The relationship between artificial intelligence and psychological theories
 
The technologies of ai used in different corporate world
The technologies of ai used in different  corporate worldThe technologies of ai used in different  corporate world
The technologies of ai used in different corporate world
 
Learning of robots by using & sharing the cloud computing techniques
Learning of robots by using & sharing the cloud computing techniquesLearning of robots by using & sharing the cloud computing techniques
Learning of robots by using & sharing the cloud computing techniques
 
Artificial intelligence apporoach to robotics
Artificial intelligence apporoach to roboticsArtificial intelligence apporoach to robotics
Artificial intelligence apporoach to robotics
 
Quality Analyst related job
Quality Analyst related job Quality Analyst related job
Quality Analyst related job
 
Artificial intelligence approaches to thermal imaging
Artificial intelligence approaches to thermal imagingArtificial intelligence approaches to thermal imaging
Artificial intelligence approaches to thermal imaging
 
intelligent computing relating to cloud computing
intelligent computing relating to cloud computingintelligent computing relating to cloud computing
intelligent computing relating to cloud computing
 
Design a rule based expert system for eia
Design a rule based expert system for eiaDesign a rule based expert system for eia
Design a rule based expert system for eia
 
Uncertainty classification of expert systems a rough set approach
Uncertainty classification of expert systems   a rough set approachUncertainty classification of expert systems   a rough set approach
Uncertainty classification of expert systems a rough set approach
 

Dernier

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 

Dernier (20)

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

Security Issues in Cloud Computing by rahul abhishek

  • 1. 1 Security Issues in Cloud Computing B. S. PANDA1* , Rahul Abhishek2 , Pratik3 , Binay Ranjan4 1 Asst. Professor, MITS Engineering College, Rayagada, Orissa. 2 Student, Dept. of Information Technology. MITS, Rayagada, Orissa. 3 Student, Dept. of Information Technology. MITS, Rayagada, Orissa. 4 Student, Dept. of Computer Science & Engg. MITS, Rayagada, Orissa. E-mail: bspanda@sify.com E-mail: rahulmithu.abhishek@gmail.com Abstract: In this paper, we discuss cloud computing security and its security issues. In particular, we discuss a scheme for secure publications of documents in a cloud. It will converse secure federated query processing, and discuss the use of secure co-processors for cloud computing. Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). The name cloud computing was inspired by the cloud symbol that's often used to represent the Internet in flowcharts and diagrams. There is a critical need to securely store, manage, share and analyze massive amounts of complex(e.g., semi-structured and unstructured) data to determine patterns and trends in order to improve the quality of healthcare, better safeguard the nation and explore alternative energy. Because of the critical nature of the applications, it is important that clouds be secure. The emerging cloud computing model attempts to address the explosive growth of web- connected devices, and handle massive amount of data. Key Words: IaaS, PaaS, SaaS , Cloud Module ,Data Encryption ,security concerns , Data security. 1. Introduction As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing," the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers available over the Internet (figure 1). Others go very broad, arguing anything you consume outside the firewall is "in the cloud," including conventional outsourcing. Cloud computing is a new consumption and delivery model for IT services. The concept of cloud computing represents a shift in thought, in those end users need not know the details of a specific technology. The service is fully managed by the provider. Users can consume services at a rate that is set by their particular needs. This on- demand service can be provided at any time. Fig1. Cloud Computing Data security involves encrypting the data as well as ensuring that appropriate policies are enforced for data sharing. In addition, resource allocation and memory management algorithms have to be secure. Finally, data mining techniques may be applicable to malware detection in clouds. We have extended the technologies and concepts we
  • 2. 2 have developed for secure grid to a secure cloud. We have defined a layered framework for assured cloud computing consisting of the secure virtual machine layer, secure cloud storage layer, secure cloud data layer, and the secure virtual network monitor layer (Figure 2). Cross cutting services are provided by the policy layer, the cloud monitoring layer, the reliability layer and the risk analysis layer. For the Secure Virtual Machine (VM) Monitor we are combining both hardware and software solutions in virtual machines to handle problems such as key logger examining XEN developed at the University of Cambridge and exploring security to meet the needs of our applications (e.g., secure distributed storage and data management). For Secure Cloud Storage Management, we are developing a storage infrastructure which integrates resources from multiple providers to form a massive virtual storage system. Figure2. Layered framework for assured cloud 2. Cloud Computing Models Cloud computing models can be broken into three basic designs, which are shown here and described below(Figure 3). Figure3. Cloud Computing Models 2.1 Infrastructure-as-a-Service (IaaS) – As the name implies, you are buying infrastructure. You own the software and are purchasing virtual power to execute as needed. This is much like running a virtual server on your own equipment, except you are now running a virtual server on a virtual disk. This model is similar to a utility company model, as you pay for what you use. An example is Amazon Web Services at http://aws.amazon.com. 2.2 Platform-as-a-Service (PaaS) – In this model of cloud computing, the provider provides a platform for your use. Services provided by this model include all phases of the system development life cycle (SDLC) and can use application program interface (APIs), website portals, or gateway software. Buyers do need to look closely at specific solutions, because some providers do not allow software created by their customers to be moved off the provider’s platform. An example of PaaS is GoogleApps. 2.3 Software-as-a-Service (SaaS) – This model is designed to provide everything and simply rent out the software to the user. The service is usually provided through some type of front end or web portal. While the end user is free to use the service from anywhere, the company pays a per use fee. Salesforce.com offers this type of service. 3. Cloud Computing Attacks As more companies move to cloud computing, look for hackers to follow. Some of the potential attack vectors criminals may attempt include: 3.1 Denial of Service (DoS) attacks - Some security professionals have argued that the cloud is more vulnerable to DoS attacks, because it is shared by many users, which makes DoS attacks much more damaging. Twitter suffered a devastating DoS attack during 2009. 3.2 Side Channel attacks – An attacker could attempt to compromise the cloud by placing a malicious virtual machine in close proximity to a target cloud server and then launching a side channel attack. 3.3 Authentication attacks – Authentication is a weak point in hosted and virtual services and is frequently targeted. There are many different ways to authenticate users; for example, based on
  • 3. 3 what a person knows, has, or is. The mechanisms used to secure the authentication process and the methods used are a frequent target of attackers. 3.4 Man-in-the-middle cryptographic attacks – This attack is carried out when an attacker places himself between two users. Anytime attackers can place themselves in the communication’s path, there is the possibility that they can intercept and modify communications. 4. Security Concerns of Cloud Computing While cost and ease of use are two great benefits of cloud computing, there are significant security concerns that need to be addressed when considering moving critical applications and sensitive data to public and shared cloud environments. To address these concerns, the cloud provider must develop sufficient controls to provide the same or a greater level of security than the organization would have if the cloud were not used. Listed here are ten items to review when considering cloud computing. 5. Secure Data Publication Applied To Cloud Cloud computing facilitates storage of data at a remote site to maximize resource utilization. As a result, it is critical that this data be protected and only given to authorized individuals. This essentially amounts to secure publication of data that is necessary for data outsourcing, as well as external publications. We have developed techniques for publication of data in a secure manner. We assume that the data is represented as an XML document. This is a valid assumption as many of the documents on the web are now represented as XML documents. In the access control framework proposed in Bertino (2002), security policy is specified depending on user roles and credentials Users must possess the credentials to access XML documents. Security could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than under traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security. This essentially amounts to secure publication of data that is necessary for data outsourcing, as well as external publications. Since data in the cloud will be placed anywhere, it is important that the data is encrypted. We are using secure co-processor as part of the cloud infrastructure to enable efficient encrypted storage of sensitive data. Security is needed at server access internet access database access data privacy program access. Security concerns arising because both customer data and program are residing in provider premises. Security is used to save data and program from disrupts services, theft of information, loss of privacy, hostile program, hostile people giving instructions to good programs, bad guys corrupting or eavesdropping on communications. 6. Summary and Conclusion In this paper, we first discussed cloud computing then cloud module and its expansion secondly security issues for cloud. These issues include storage security, middleware security, data security, network security and application security. The main goal is to securely store and manage data that is not controlled by the owner of the data. We discussed how we may secure documents that may be published. There are several other security challenges including security aspects of virtualization. We believe that due to the complexity of the cloud, it will be difficult to achieve end-to-end security. However, the challenge we have is to ensure more secure operations even if some parts of the cloud fail.
  • 4. 4 For many applications, we not only need information assurance but also mission assurance. Figure2. Case study of Worldwide Spending Cloud Reference 1. Andy BechtolsheimChairman & Co- founder, Arista Networks. November 12th, 2008 2. Encrypted Storage and Key Management for the cloud. Cryptoclarity.com. 2009- 07-30. 3. http://www.cryptoclarity.com/CryptoClar ityLLC/Welcome/Entries/2009/7/23_Enc rypted_Storage_and_Key_Management_ for_the_cloud.html. Retrieved 2010-08- 22 4. Mills, Elinor (2009-01-27). "Cloud computing security forecast: Clear skies". CNET. 5. Michael Gregg, Global Knowledge Instructor, CISA, CISSP, CISM, MCSE, CTT+, CGEIT, A+, N+, Security+, CNA, CCNA, CIW Security Analyst, CEH, CHFI, CEI, DCNP, ES Dragon IDS, ES Advanced Dragon IDS, and SSCP. 6. Ashwin Alfred Pinto, Shvetank Verma, Satyam Singh, Prashant Srivastava, Rahul Gupta, and Vijay Chourasia. Proceedings of the World Congress on Engineering 2011 7. Vol I WCE 2011, July 6 - 8, 2011, London, U.K. 8. www.cloudbook.net/resources. 9. "Service-Oriented Computing and Cloud Computing: Challenges and Opportunities". IEEE Internet Computing. Retrieved 2010-12-04. 10. "The NIST Definition of Cloud Computing (Draft)". National Institute of Science and Technology. Retrieved 24 July 2011.