SlideShare une entreprise Scribd logo
1  sur  19
Technical Seminar
on
“Cloud Computing Security Issues in Infrastructure
as a Service”
By
Vivek Kumar Maurya (1JB10IS115)
Under the Guidance of
Asst. Prof Kiran Kumar V, Designation, Dept of ISE
Department of Information Science and
Engineering
CONTENTS
Abstract
Introduction
Literature Survey
Results
Conclusion
References
Abstract
 This paper presents an elaborated study of IaaS
components security and determines its drawbacks and
its countermeasures.
Cloud Infrastructure as a Service (IaaS) helps agencies
realize cost savings and efficiencies while modernizing
and expanding their IT capabilities.
Cloud-based infrastructure is rapidly scalable, secure, and
accessible over the Internet — you only pay for what you
use.
 Infrastructure as a Service (IaaS) serves as the foundation
layer for the other delivery models, and a lack of security
in this layer will certainly affect the other delivery models.
Introduction
Why CLOUD COMPUTING?
“In simple words, the Cloud refers to the process
of sharing resources (such as hardware,
development platforms and/or software) over the
internet. It enables On-Demand network access.
These resources are accessed mostly on a pay-per-
use or subscription basis.”
 Cloud computing is a technology that uses the
internet and central remote servers to maintain data
and applications.
Cloud computing is much more efficient computing
by centralizing storage, memory, and processing .
Data isn’t “chained” to one place; rather, it can be
accessed anywhere, from any medium.
Processor speed becomes less important then
internet connection speed.
Low maintenance.
Why do customers use the cloud?
Cloud computing allows consumers and businesses to
use applications without installation and access their
personal files at any computer with internet access.
Literature Survey
Authors &
Year
Paper Title Contribution Findings or
Drawbacks
G.
Frankova
-2008
“Service
Level
Agreements:
Web Services
and Security”
Web Service Level
Agreement (WSLA)
framework developed for
SLA monitoring
And enforcement in
SOA.
(service-oriented
architecture)
Cloud clients have
to trust providers ,
SLA monitoring until
standardizing.
W. Mao
-2012
“Virtual local
area network
technology
and
applications,
”
To strengthen network
isolation and
enhance systems
management capabilities.
Virtual networks
avoid wasting
bandwidth and offer
more flexibility,
performance, and
security.
Cloud Delivery Models
IaaS(Infrastructure – as- a- Service)
A. Iaas is a provision model in which an organization used to support
operations, including storage, hardware, servers and networking
components.
B. The service provider owns the equipment and is responsible for running
and maintaining it .
C. The client typically pays on a per-use basis.
PaaS(Platform –as- a- Service)
A. PaaS is a way to rent hardware, operating systems, storage and
network capacity over the Internet.
B. Operating system features can be changed and upgraded frequently.
C. Initial and ongoing costs can be reduced while developing a software.
SaaS(Software –as- a- Service)
A. SaaS sometimes referred to as "software on demand," is software that
is deployed over the internet .
B. It is deployed to run behind a firewall on a local area network or
personal computer.
C. With SaaS, a provider licenses an application to customers either as a
service on demand, through a subscription, in a "pay-as-you-go"
model.
D.This approach to application delivery is part of the utility computing
model.
SPI (SaaS, PaaS, IaaS)
Deployment models
Service models Deployment models
Software-As-A-Service (SaaS) Public
Platform-As-A-Service (PaaS) Private
Infrastructure-As-A-Service (IaaS) Hybrid
Structure of Deployment Model
Security- Who is in control ?
Understanding Security of Cloud
Security in cloud computing is a major concern. Data in
cloud should be stored in encrypted form.
Since all the data is transferred using Internet, data
security is of major concern in cloud. Here are key
mechanisms for protecting data mechanisms listed below:
Integrity
Accountability
Privacy
Access Control
Authentication
Authorization
RESULT
Conclusion
Each component in Cloud infrastructure has its
drawbacks which might impact the whole Cloud’s
Computing security.
Cloud is a tradeoff between cost, security and privacy.
Change in trust boundaries leads to security and
privacy challenges.
References
1. Pankaj Arora and Rubal Chaudhry Wadhawan ,”Cloud Computing
Security Issues in Infrastructure as a Service ”, Volume 2, Issue 1, January
2012
2. G. Frankova, Service Level Agreements: Web Services and Security, ser.
Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin
Heidelberg, 2007, vol. 4607.
3. S. Garg and H. Saran, “Anti-DDoS Virtualized Operating System,” ARES,
p. 7, 2008.
4. V. Rajaravivarma, “Virtual local area network technology and
applications,” Proceedings The Twenty-Ninth Southeastern Symposium
on System Theory, pp. 49–52, 1997.
Cloud Computing Security Issues in Infrastructure as a Service”

Contenu connexe

Tendances

Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingRitesh Dwivedi
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityPiyush Mittal
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Raj Sarode
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstractelysiumtechnologies
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwaribhanu krishna
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsKannan Subbiah
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
 
Cloud Computing security issues
Cloud Computing security issuesCloud Computing security issues
Cloud Computing security issuesPradeepti Kamble
 

Tendances (20)

Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Chap 5 software as a service (saass)
Chap 5 software as a service (saass)
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
Cloud Computing security issues
Cloud Computing security issuesCloud Computing security issues
Cloud Computing security issues
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 

Similaire à Cloud Computing Security Issues in Infrastructure as a Service”

Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...IJIR JOURNALS IJIRUSA
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud ComputingMervat Bamiah
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingcloudresearcher
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingEr. Saba karim
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...James Heller
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 

Similaire à Cloud Computing Security Issues in Infrastructure as a Service” (20)

Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Sem rep edited
Sem rep editedSem rep edited
Sem rep edited
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computing
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Rp059 Icect2012 E694
Rp059 Icect2012 E694Rp059 Icect2012 E694
Rp059 Icect2012 E694
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...A Modified Things Role Based Access Control Model For Securing Utilities In C...
A Modified Things Role Based Access Control Model For Securing Utilities In C...
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 

Plus de Vivek Maurya

System%20 modelling%20and%20simulation
System%20 modelling%20and%20simulationSystem%20 modelling%20and%20simulation
System%20 modelling%20and%20simulationVivek Maurya
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Vivek Maurya
 
System modeling and simulation full notes by sushma shetty (www.vtulife.com)
System modeling and simulation full notes by sushma shetty (www.vtulife.com)System modeling and simulation full notes by sushma shetty (www.vtulife.com)
System modeling and simulation full notes by sushma shetty (www.vtulife.com)Vivek Maurya
 
Ise viii-system modeling and simulation [10 cs82]-solution
Ise viii-system modeling and simulation [10 cs82]-solutionIse viii-system modeling and simulation [10 cs82]-solution
Ise viii-system modeling and simulation [10 cs82]-solutionVivek Maurya
 
Ise viii-system modeling and simulation [10 cs82]-question paper
Ise viii-system modeling and simulation [10 cs82]-question paperIse viii-system modeling and simulation [10 cs82]-question paper
Ise viii-system modeling and simulation [10 cs82]-question paperVivek Maurya
 
Ise viii-system modeling and simulation [10 cs82]-notes
Ise viii-system modeling and simulation [10 cs82]-notesIse viii-system modeling and simulation [10 cs82]-notes
Ise viii-system modeling and simulation [10 cs82]-notesVivek Maurya
 
Ise viii-system modeling and simulation [10 cs82]-assignment
Ise viii-system modeling and simulation [10 cs82]-assignmentIse viii-system modeling and simulation [10 cs82]-assignment
Ise viii-system modeling and simulation [10 cs82]-assignmentVivek Maurya
 
Ise viii-software architectures [10 is81]-solution
Ise viii-software  architectures [10 is81]-solutionIse viii-software  architectures [10 is81]-solution
Ise viii-software architectures [10 is81]-solutionVivek Maurya
 
Ise viii-software architectures [10 is81]-notes
Ise viii-software  architectures [10 is81]-notesIse viii-software  architectures [10 is81]-notes
Ise viii-software architectures [10 is81]-notesVivek Maurya
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solutionVivek Maurya
 
Ise viii-software architectures [10 is81]-assignment
Ise viii-software  architectures [10 is81]-assignmentIse viii-software  architectures [10 is81]-assignment
Ise viii-software architectures [10 is81]-assignmentVivek Maurya
 
Ise viii-information and network security [10 is835]-question paper
Ise viii-information and network  security [10 is835]-question paperIse viii-information and network  security [10 is835]-question paper
Ise viii-information and network security [10 is835]-question paperVivek Maurya
 
Ise viii-information and network security [10 is835]-assignment
Ise viii-information and network  security [10 is835]-assignmentIse viii-information and network  security [10 is835]-assignment
Ise viii-information and network security [10 is835]-assignmentVivek Maurya
 
Ise viii-ad-hoc networks [10 is841]-notes
Ise viii-ad-hoc  networks [10 is841]-notesIse viii-ad-hoc  networks [10 is841]-notes
Ise viii-ad-hoc networks [10 is841]-notesVivek Maurya
 
Ise viii-ad-hoc networks [10 is841]-assignment
Ise viii-ad-hoc  networks [10 is841]-assignmentIse viii-ad-hoc  networks [10 is841]-assignment
Ise viii-ad-hoc networks [10 is841]-assignmentVivek Maurya
 
Adhoc notes by ashok kumar.pdf
Adhoc notes by ashok kumar.pdfAdhoc notes by ashok kumar.pdf
Adhoc notes by ashok kumar.pdfVivek Maurya
 
VTU 8th Sem Notes Simulation
VTU 8th Sem Notes SimulationVTU 8th Sem Notes Simulation
VTU 8th Sem Notes SimulationVivek Maurya
 

Plus de Vivek Maurya (18)

Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
System%20 modelling%20and%20simulation
System%20 modelling%20and%20simulationSystem%20 modelling%20and%20simulation
System%20 modelling%20and%20simulation
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
System modeling and simulation full notes by sushma shetty (www.vtulife.com)
System modeling and simulation full notes by sushma shetty (www.vtulife.com)System modeling and simulation full notes by sushma shetty (www.vtulife.com)
System modeling and simulation full notes by sushma shetty (www.vtulife.com)
 
Ise viii-system modeling and simulation [10 cs82]-solution
Ise viii-system modeling and simulation [10 cs82]-solutionIse viii-system modeling and simulation [10 cs82]-solution
Ise viii-system modeling and simulation [10 cs82]-solution
 
Ise viii-system modeling and simulation [10 cs82]-question paper
Ise viii-system modeling and simulation [10 cs82]-question paperIse viii-system modeling and simulation [10 cs82]-question paper
Ise viii-system modeling and simulation [10 cs82]-question paper
 
Ise viii-system modeling and simulation [10 cs82]-notes
Ise viii-system modeling and simulation [10 cs82]-notesIse viii-system modeling and simulation [10 cs82]-notes
Ise viii-system modeling and simulation [10 cs82]-notes
 
Ise viii-system modeling and simulation [10 cs82]-assignment
Ise viii-system modeling and simulation [10 cs82]-assignmentIse viii-system modeling and simulation [10 cs82]-assignment
Ise viii-system modeling and simulation [10 cs82]-assignment
 
Ise viii-software architectures [10 is81]-solution
Ise viii-software  architectures [10 is81]-solutionIse viii-software  architectures [10 is81]-solution
Ise viii-software architectures [10 is81]-solution
 
Ise viii-software architectures [10 is81]-notes
Ise viii-software  architectures [10 is81]-notesIse viii-software  architectures [10 is81]-notes
Ise viii-software architectures [10 is81]-notes
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
Ise viii-software architectures [10 is81]-assignment
Ise viii-software  architectures [10 is81]-assignmentIse viii-software  architectures [10 is81]-assignment
Ise viii-software architectures [10 is81]-assignment
 
Ise viii-information and network security [10 is835]-question paper
Ise viii-information and network  security [10 is835]-question paperIse viii-information and network  security [10 is835]-question paper
Ise viii-information and network security [10 is835]-question paper
 
Ise viii-information and network security [10 is835]-assignment
Ise viii-information and network  security [10 is835]-assignmentIse viii-information and network  security [10 is835]-assignment
Ise viii-information and network security [10 is835]-assignment
 
Ise viii-ad-hoc networks [10 is841]-notes
Ise viii-ad-hoc  networks [10 is841]-notesIse viii-ad-hoc  networks [10 is841]-notes
Ise viii-ad-hoc networks [10 is841]-notes
 
Ise viii-ad-hoc networks [10 is841]-assignment
Ise viii-ad-hoc  networks [10 is841]-assignmentIse viii-ad-hoc  networks [10 is841]-assignment
Ise viii-ad-hoc networks [10 is841]-assignment
 
Adhoc notes by ashok kumar.pdf
Adhoc notes by ashok kumar.pdfAdhoc notes by ashok kumar.pdf
Adhoc notes by ashok kumar.pdf
 
VTU 8th Sem Notes Simulation
VTU 8th Sem Notes SimulationVTU 8th Sem Notes Simulation
VTU 8th Sem Notes Simulation
 

Dernier

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 

Dernier (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 

Cloud Computing Security Issues in Infrastructure as a Service”

  • 1. Technical Seminar on “Cloud Computing Security Issues in Infrastructure as a Service” By Vivek Kumar Maurya (1JB10IS115) Under the Guidance of Asst. Prof Kiran Kumar V, Designation, Dept of ISE Department of Information Science and Engineering
  • 3. Abstract  This paper presents an elaborated study of IaaS components security and determines its drawbacks and its countermeasures. Cloud Infrastructure as a Service (IaaS) helps agencies realize cost savings and efficiencies while modernizing and expanding their IT capabilities. Cloud-based infrastructure is rapidly scalable, secure, and accessible over the Internet — you only pay for what you use.  Infrastructure as a Service (IaaS) serves as the foundation layer for the other delivery models, and a lack of security in this layer will certainly affect the other delivery models.
  • 5. “In simple words, the Cloud refers to the process of sharing resources (such as hardware, development platforms and/or software) over the internet. It enables On-Demand network access. These resources are accessed mostly on a pay-per- use or subscription basis.”  Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications.
  • 6. Cloud computing is much more efficient computing by centralizing storage, memory, and processing . Data isn’t “chained” to one place; rather, it can be accessed anywhere, from any medium. Processor speed becomes less important then internet connection speed. Low maintenance.
  • 7. Why do customers use the cloud? Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access.
  • 8. Literature Survey Authors & Year Paper Title Contribution Findings or Drawbacks G. Frankova -2008 “Service Level Agreements: Web Services and Security” Web Service Level Agreement (WSLA) framework developed for SLA monitoring And enforcement in SOA. (service-oriented architecture) Cloud clients have to trust providers , SLA monitoring until standardizing. W. Mao -2012 “Virtual local area network technology and applications, ” To strengthen network isolation and enhance systems management capabilities. Virtual networks avoid wasting bandwidth and offer more flexibility, performance, and security.
  • 9. Cloud Delivery Models IaaS(Infrastructure – as- a- Service) A. Iaas is a provision model in which an organization used to support operations, including storage, hardware, servers and networking components. B. The service provider owns the equipment and is responsible for running and maintaining it . C. The client typically pays on a per-use basis.
  • 10. PaaS(Platform –as- a- Service) A. PaaS is a way to rent hardware, operating systems, storage and network capacity over the Internet. B. Operating system features can be changed and upgraded frequently. C. Initial and ongoing costs can be reduced while developing a software. SaaS(Software –as- a- Service) A. SaaS sometimes referred to as "software on demand," is software that is deployed over the internet . B. It is deployed to run behind a firewall on a local area network or personal computer. C. With SaaS, a provider licenses an application to customers either as a service on demand, through a subscription, in a "pay-as-you-go" model. D.This approach to application delivery is part of the utility computing model.
  • 12. Deployment models Service models Deployment models Software-As-A-Service (SaaS) Public Platform-As-A-Service (PaaS) Private Infrastructure-As-A-Service (IaaS) Hybrid
  • 14. Security- Who is in control ?
  • 15. Understanding Security of Cloud Security in cloud computing is a major concern. Data in cloud should be stored in encrypted form. Since all the data is transferred using Internet, data security is of major concern in cloud. Here are key mechanisms for protecting data mechanisms listed below: Integrity Accountability Privacy Access Control Authentication Authorization
  • 17. Conclusion Each component in Cloud infrastructure has its drawbacks which might impact the whole Cloud’s Computing security. Cloud is a tradeoff between cost, security and privacy. Change in trust boundaries leads to security and privacy challenges.
  • 18. References 1. Pankaj Arora and Rubal Chaudhry Wadhawan ,”Cloud Computing Security Issues in Infrastructure as a Service ”, Volume 2, Issue 1, January 2012 2. G. Frankova, Service Level Agreements: Web Services and Security, ser. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, vol. 4607. 3. S. Garg and H. Saran, “Anti-DDoS Virtualized Operating System,” ARES, p. 7, 2008. 4. V. Rajaravivarma, “Virtual local area network technology and applications,” Proceedings The Twenty-Ninth Southeastern Symposium on System Theory, pp. 49–52, 1997.