SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 4 (Mar. - Apr. 2013), PP 33-37
www.iosrjournals.org
www.iosrjournals.org 33 | Page
Security and Privacy Issues of Cloud Computing; Solutions and
Secure Framework
Sherin Sreedharan
(Dr. MGR Educational and Research Institute, Chennai)
Abstract :The National Institute of Standards and Technology (NIST) defined cloud computing as a model for
enabling convenient, on-demand network access to a shared pool of configurable computing resources that can
be rapidly provisioned and released with minimal management effort or cloud provider interaction [Def:1].
Cloud computing has the potential to change how organizations manage information technology and
transform the economics of hardware and software at the same time. Cloud computing promised to bring a
new set of entrepreneurs who could start their venture with zero investment on IT infrastructure. How ever this
captivating technology has security concerns which are formidable. The promises of cloud computing,
especially public cloud can be shadowed by security breaches which are inevitable. As an emerging information
technology area cloud computing should be approached carefully. In this article we will discuss the security
and privacy concerns of cloud computing and some possible solutions to enhance the security. Based on the
security solutions suggested i have come up with a secured framework for cloud computing.
Keywords: Cloud computing, Security and Privacy, Information Technology, IT, Software as a service,
Platform as a service
I. Introduction
Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the
Internet, extends Information technology‘s existing capabilities. Cloud computing promotes availability, zero
maintenance, subscription based service. There exist different service models of cloud computing namely
cloud software as a service which allows the consumers to use service providers‘ applications over the
network. Cloud platform as a service allows consumers to deploy applications on to providers‘ platform.
Consumers do not have to manage or control infrastructure including network servers, operating systems or
storages but has control over the deployed area. Cloud Infrastructure as a service is also referred as Hardware as
a service. This provides on demand storage on the cloud. It primarily focuses on providing IT resources,
processing power, storage, data centre space, services and compliance – on demand. Organizations should
have a well defined methodology before migrating to cloud computing. Moving the application to the cloud
depends on the security objectives of an organization, cloud computing should be approached carefully with due
consideration of the sensitivity of data that the organization is planning to move beyond their firewall. The less
control you have for your data means more you have to trust the providers‘ security policies. Security and
privacy issues have to be addressed from the initial phase, considering after the deployment will be more
complicated, expensive and risky. Every organization should thoroughly study the safety measures and policies
followed by the provider and should make sure that it is aligned with the privacy and security requirements of
the organization. In the past the cloud services that faced security breach was never expected to succumb to
vulnerabilities and it‘s evident that cloud providers also face the security concerns faced by other
organizations. The usual security norm in public cloud is service level agreements (SLAs) which talks about
the expected level of services provided by the cloud provider to the cloud consumer. Consumers should make
sure that the contract they sign have reference to the security measures that the provider have in mind and also
make sure that the contract meet the expected security norms from their business perspective. SLAs
are usually of two types, off-the-shelf non negotiable contracts and customized negotiable
agreements. Public clouds usually follow non negotiable SLA‘s which may not be acceptable for business
that have crucial data. Organizations who want to deploy critical applications can think about private clouds
over public clouds which offer better insight and control over security and privacy.
II. The Jeopardizes Of Cloud Computing
Cloud computing encompasses a client and a server .Client side security is always over looked. As first
step towards secure data management business should strengthen the client side security. To provide physical
and logical safety to client machine is a big challenge. Built in security measures can be eluded by an erudite
person with out much difficulty. To maintain secure client, organizations should review existing security
practices and employ additional ones to ensure the security of its data. Clients must consider secure VPN to
connect to the provider.Web browsers are majorly used in client side to access cloud computing services.
Security And Privacy Issues Of Cloud Computing; Solutions And Secure Framework
www.iosrjournals.org 34 | Page
Cloud providers usually provide the consumers with APIs which is used by the latter to control, monitor the
cloud services. It is vital to ensure the security of these APIs to protect against both accidental and
malicious attempts to evade the security. The various plug-ins and applications available in the web browsers
also causes a serious threat to the client systems used to access the provider. Many of the web browsers do not
allow automatic updates which will append to the security concerns. To ensure secure cloud organizations
should work on the existing internal policies and improvise its security strategies if necessary.
III. Security Concerns
` There exist many security concerns in server side. To adopt cloud computing it is necessary to ensure
providers security measures. To enhance the trust factor providers can get their system verified by external
organizations or by security auditors. Aside from the security factor other issues that needs attention is about
the data in the cloud, if at the provider goes bankrupt or being acquired by another business. Traditional data
centers used to have regular security audit and mandatory security certifications which ensure the data security.
Cloud providers should also incorporate these measures to assure secure transaction among its customers. Issues
concerning data ownership is an on going debate and it is a crucial aspect in cloud computing. When consumers
migrate critical company data to the cloud they are not giving the data tenure to the providers. Providers
should ensure that the business-data customers store on the cloud should not be compromised under any
circumstances. It is mere common sense that the right to use data, manipulate, modify and ownership of data
stored in the cloud is customers and there should be an agreement in place that prohibits the data usage by
providers. In traditional data centers business had the privilege to know about the data flow, exact data location,
precautions used to protect data from unauthorized access. In public cloud the idea of data storage is distinct;
business is unlikely to know where and how the data is stored, when data is moved, and what particular
security measures are in place. The ‗physical location‘ raises the question of legal governance over the data.
Another impediment issue is incase of disputes arises between the provider and the customer, which
country‘s court system will settle the issue. [Def 2]. Another confront of cloud computing is the privacy
breach. In case of privacy infringement due to providers fault the confusion still exist on who will take
the responsibility and will compensate to the affected people. Lack of common security standards also adds
to the concern of data storage over cloud.
IV. Lack Of Control Over The Data
Two recent events have exposed the dark sides of cloud computing for both businesses and consumers.
These incidents—the partial outage of Amazon‘s EC2 cloud service and the security breach of Sony‘s
PlayStation Network and Qriocity music service—underscore a key issue of the cloud computing model:
customers‘ lack of control over their data.[Def 4]. Non cloud services also have security concerns but cloud has
additional risk of external party involvement and exposure of critical and confidential data outside organizations
control. Modifying security measures or introducing pristine best practices relevant to one particular
organization is also unattainable. Cloud provider stores the data in providers side and maintenance is
exclusively done by the providers hence clients have no means to check on the providers security practices,
providers employees, their skills specializations etc. Insider threats go beyond those posed by former employees
to include contractors, organizational affiliates, and other parties that have received access to an organization‘s
networks, systems, and data to carry out or facilitate operations [Def 5]
Many incidents can occur like sabotage of information, theft of confidential information. Incidents may
also be caused unintentionally where employees mistakenly send across the sensitive data to wrong recipient.
V. Network Security
Public cloud services are delivered over the internet, exposing the data which were previously secured
in the internal firewalls. Applications which people used to access within organizations intranet are hence
exposed to networking threats and internet vulnerabilities which includes distributed denial of service attacks,
phishing, malwares and Trojan horses. If an attacker gains access to client credentials, they can eavesdrop on all
activities and transactions, manipulate data, return falsified information, and redirect clients to illegitimate sites.
Your account or service instances may become a new base for the attacker. From here, they may leverage the
power of your reputation to launch subsequent attacks. [Def 7].
VI. Securing Data In The Cloud
A secure infrastructure ensures and builds confidence that the data stored is secure in providers‘ side.
Proper implementation of security measures is mandatory in cloud computing. The fact that application is
launched over the internet makes it susceptible for security risks. Cloud providers should think beyond the
customary security practices like restricted user access, password protection etc. Physical location of stored data
Security And Privacy Issues Of Cloud Computing; Solutions And Secure Framework
www.iosrjournals.org 35 | Page
is also vital and it‘s the responsibility of the provider to choose the right location of storage. Restricted user
access can vary from simple user name / password protection to CAPTCHA log in forms. When an employee
no longer has a business need to access datacenter his privileges to access datacenter should be immediately
revoked. Cloud Providers can also consider one time password authentication where the clients will get one time
temporary password from SSN /mobile device which helps in data security even if password is compromised.
VII. Installation And Maintenance Of Firewall
Installation of firewall and its maintenance is mandatory to ensure the protection. A firewall should be
present in all external interfaces. A list of necessary port and services should be maintained. Assessment of
firewall policies and rule sets and reconfiguration of router should be done in regular intervals. Build and
deploy a firewall that denies access from ―untrusted‖ sources or applications, and adequately logs these events.
Build and deploy a firewall that restricts access from systems that have direct external connection and those
which contain confidential data or configuration data. [Def 13].
VIII. Data Encryption
In public cloud the resources are shared by multiple cloud consumers and hence its providers
responsibility to bestow data separation among their clients. Data encryption is one common approach the
providers follow to safe guard their clients data but the question is whether the data is getting stored in
encrypted format or not. Many providers follow private/public key encryption to ensure data security. To store
crucial data organizations can think of private or hybrid cloud where the data will be in secure corporate
firewall. Providers should allow the customers to determine the security measures followed, data storage
details so that the customer can ensure data security.
Data access to the cloud by the employees should be monitored and recorded so that the
providers will be able to furnish the detailed report of who has accessed what data at a given point of time.
IX. Back Up And Recovery
In cloud computing data is stored in distributed location. The cloud customers will never be able to
make out the exact storage location of their records and there comes the importance of data back up and
recovery. Backup software should include public cloud APIs, enabling simple backup and recovery across
major cloud storage vendors, such as Amazon S3, Nirvanix Storage Delivery Network, Rackspace and others,
and giving consumers flexibility in choosing a cloud storage vendor to host their data vault. [Def 8] One
debatable question is whether to back up the entire data or to backup critical and vital data. If provider agrees to
backup crucial data then the question arises on how to determine the priority of data. The easiest and least
complicated way is to protect the entire workstation or the server.
It is critical for the backup application to encrypt confidential data before sending it offsite to the
cloud, protecting both data-in-transit over a WAN to a cloud storage vault and data-at-rest at the cloud storage
site. Consumers need to verify that the cloud backup software they choose is certified and compliant with the
Federal Information Processing Standards (FIPS) 140 requirements issued by the National Institute of
Standards and Technology. FIPS 140 certification is required for government agencies as well as for
regulated financial, healthcare and other industries for compliance with data retention and security regulations
such as HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley and other legal requirements. [Def 6]
A growing number of cloud providers support the SAML standard and use it to administer users and
authenticate them before providing access to applications and data. SAML provides a means to exchange
information, such as assertions related to a subject or authentication information, between cooperating domains.
SAML request and response messages are typically mapped over the Simple Object Access Protocol (SOAP),
which relies on the eXtensible Markup Language (XML) for its format. SOAP messages are digitally signed.
For example, once a user has established a public key certificate for a public cloud, the private key can be used
to sign SOAP requests.
SOAP message security validation is complicated and must be carried out carefully to prevent attacks.
For example, XML wrapping attacks have been successfully demonstrated against a public IaaS cloud [Gaj09,
Gru09]. XML wrapping involves manipulation of SOAP messages. A new element (i.e., the wrapper) is
introduced into the SOAP Security header; the original message body is then moved under the wrapper and
replaced by a bogus body containing an operation defined by the attacker [Def 10, Def 11]. The original body
can still be referenced and its signature verified, but the operation in the replacement body is executed instead.
SAML alone is not sufficient to provide cloud-based identity and access management services. The
capability to adapt cloud subscriber privileges and maintain control over access to resources is also needed. As
part of identity management, standards like the eXtensible Access Control Markup Language (XACML) can be
used by a cloud provider to control access to cloud resources, instead of using a proprietary interface. XACML
focuses on the mechanism for arriving at authorization decisions, which complements SAML‘s focus on the
Security And Privacy Issues Of Cloud Computing; Solutions And Secure Framework
www.iosrjournals.org 36 | Page
means for transferring authentication and authorization decisions between cooperating entities. XACML is
capable of controlling the proprietary service interfaces of most providers, and some cloud providers already
have it in place. Messages transmitted between XACML entities are susceptible to attack by
malicious third parties, making it important to have safeguards in place to protect decision requests and
authorization decisions from possible attacks, including unauthorized disclosure, replay, deletion and
modification [Def 9].
X. Security Enhancements For Cloud Computing
The Following Practices Can Be Followed To Improvise The Security Of Cloud Computing
 Implement security practices at organizational level and make sure that the providers security plans are
in alignment with the business.
 Employ and maintain secure Infrastructure in client side (secure VPN , changing default vendor provided
passwords ) and host side (firewalls , patch managements ,anti-virus updates )
 Ensure accurate user permissions and restricted access at both sides
Data sanitizations at the right time
The above deployed frame work offers a secured environment in which the clients need to access the providers‘
network using secured VPN.
Cloud Providers have number of clients and they may offer any of the services namely Iaas, Paas, Saas.
In this framework the providers check for user authentication, make sure that the clients approaching them are
authorized and genuine. Once the providers are confident about the clients‘ credentials their data will be
encrypted and stored.
Steps involved in security framework are explained below:
Cloud Computing: A Secure Framework
Security And Privacy Issues Of Cloud Computing; Solutions And Secure Framework
www.iosrjournals.org 37 | Page
Security Policies
 Providers should come up with a formal plan to ensure security
 Employees should be given training on related technologies
 Background check of employees.
 Access restrictions / privilege setting to staff
 Obligatory password change within stipulated time.
 Supplier provided password of Server / hardware should not be used.
Data Backup, Recovery, Sanitization, Patch Updates And Logs
 Data backup should be carried out in regular intervals.
 Alternate plans should be ready to meet unexpected disasters.
 Providers should be equipped with data recovery plans in all emergencies.
 Deleting data from servers, backup devices when the service is removed or server is removed
from the cloud.
 Patch updates and system files updates have to be conducted accurately.
 System logs must be maintained with the following details users accessed the data, when, how much
time was spend , and modifications made.
Penetration Test
 To ensure providers system is not affected by any vulnerabilities, testing has to be done in regular
intervals.
Firewalls And Network Security
 Firewalls must be installed and its policies , configurations , rules must be revised in habitual basis
 Antivirus updates must be done with out fail.
Secure Physical Infrastructure
 Physical Location of server is vital; cloud providers should keep the storage devices in secured places
with proper physical protection.
XI. Conclusion
Cloud computing provides scalable and efficient means to manage IT resources in organizations. The
flexibility the cloud brings in has some disadvantages over privacy and security. If the providers and consumers
follow the security measures discussed above cloud computing will be more secure. As and when the issues
around security and privacy are elucidated cloud computing will be accepted widely.

Weitere Àhnliche Inhalte

Was ist angesagt?

The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Cloud computing & IAAS  The Dual Edged Sword of New Technology Cloud computing & IAAS  The Dual Edged Sword of New Technology
Cloud computing & IAAS The Dual Edged Sword of New Technology Mekhi Da ‘Quay Daniels
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataEMC
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...IJERA Editor
 
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET Journal
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykEryk Budi Pratama
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityEryk Budi Pratama
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET Journal
 
J3602068071
J3602068071J3602068071
J3602068071ijceronline
 
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! EMC
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Unisys Corporation
 

Was ist angesagt? (20)

The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Cloud computing & IAAS  The Dual Edged Sword of New Technology Cloud computing & IAAS  The Dual Edged Sword of New Technology
Cloud computing & IAAS The Dual Edged Sword of New Technology
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
 
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
Identity Management In Cloud Computing
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
 
B018211016
B018211016B018211016
B018211016
 
J3602068071
J3602068071J3602068071
J3602068071
 
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore!
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Term assignment
Term assignmentTerm assignment
Term assignment
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 

Andere mochten auch

Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...North Texas Chapter of the ISSA
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudChris Swan
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsAntigone Peyton
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computingsaurabh soni
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloudsornalathaNatarajan
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computingragibhasan
 
Almentariak hodei ehiztari
Almentariak hodei ehiztariAlmentariak hodei ehiztari
Almentariak hodei ehiztariAlmentariak
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
Virus Informaticos
Virus InformaticosVirus Informaticos
Virus InformaticosHernancho0207
 
Improving Web Image Search Re-ranking
Improving Web Image Search Re-rankingImproving Web Image Search Re-ranking
Improving Web Image Search Re-rankingIOSR Journals
 
Diabetes - How sweet are you
Diabetes - How sweet are youDiabetes - How sweet are you
Diabetes - How sweet are youVASS Yukon
 

Andere mochten auch (20)

Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
Luncheon 2016-04-21- Data Security and Privacy Issues in Cloud Contracts by R...
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloud
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy Implications
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloud
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
H0413437
H0413437H0413437
H0413437
 
Almentariak hodei ehiztari
Almentariak hodei ehiztariAlmentariak hodei ehiztari
Almentariak hodei ehiztari
 
F0513644
F0513644F0513644
F0513644
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
Virus Informaticos
Virus InformaticosVirus Informaticos
Virus Informaticos
 
J0166875
J0166875J0166875
J0166875
 
Improving Web Image Search Re-ranking
Improving Web Image Search Re-rankingImproving Web Image Search Re-ranking
Improving Web Image Search Re-ranking
 
H0365158
H0365158H0365158
H0365158
 
F0443041
F0443041F0443041
F0443041
 
Diabetes - How sweet are you
Diabetes - How sweet are youDiabetes - How sweet are you
Diabetes - How sweet are you
 
A0350104
A0350104A0350104
A0350104
 
Jclic pre
Jclic preJclic pre
Jclic pre
 

Ähnlich wie Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework

Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfCiente
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4sophiabelthome
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contractsMeera Kaul
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudIOSR Journals
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?Mohammad Mydul Islam
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAccenture
 

Ähnlich wie Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework (20)

Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdf
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contracts
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in Cloud
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_security
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

KĂŒrzlich hochgeladen

Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 

KĂŒrzlich hochgeladen (20)

Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 

Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 4 (Mar. - Apr. 2013), PP 33-37 www.iosrjournals.org www.iosrjournals.org 33 | Page Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework Sherin Sreedharan (Dr. MGR Educational and Research Institute, Chennai) Abstract :The National Institute of Standards and Technology (NIST) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction [Def:1]. Cloud computing has the potential to change how organizations manage information technology and transform the economics of hardware and software at the same time. Cloud computing promised to bring a new set of entrepreneurs who could start their venture with zero investment on IT infrastructure. How ever this captivating technology has security concerns which are formidable. The promises of cloud computing, especially public cloud can be shadowed by security breaches which are inevitable. As an emerging information technology area cloud computing should be approached carefully. In this article we will discuss the security and privacy concerns of cloud computing and some possible solutions to enhance the security. Based on the security solutions suggested i have come up with a secured framework for cloud computing. Keywords: Cloud computing, Security and Privacy, Information Technology, IT, Software as a service, Platform as a service I. Introduction Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends Information technology‘s existing capabilities. Cloud computing promotes availability, zero maintenance, subscription based service. There exist different service models of cloud computing namely cloud software as a service which allows the consumers to use service providers‘ applications over the network. Cloud platform as a service allows consumers to deploy applications on to providers‘ platform. Consumers do not have to manage or control infrastructure including network servers, operating systems or storages but has control over the deployed area. Cloud Infrastructure as a service is also referred as Hardware as a service. This provides on demand storage on the cloud. It primarily focuses on providing IT resources, processing power, storage, data centre space, services and compliance – on demand. Organizations should have a well defined methodology before migrating to cloud computing. Moving the application to the cloud depends on the security objectives of an organization, cloud computing should be approached carefully with due consideration of the sensitivity of data that the organization is planning to move beyond their firewall. The less control you have for your data means more you have to trust the providers‘ security policies. Security and privacy issues have to be addressed from the initial phase, considering after the deployment will be more complicated, expensive and risky. Every organization should thoroughly study the safety measures and policies followed by the provider and should make sure that it is aligned with the privacy and security requirements of the organization. In the past the cloud services that faced security breach was never expected to succumb to vulnerabilities and it‘s evident that cloud providers also face the security concerns faced by other organizations. The usual security norm in public cloud is service level agreements (SLAs) which talks about the expected level of services provided by the cloud provider to the cloud consumer. Consumers should make sure that the contract they sign have reference to the security measures that the provider have in mind and also make sure that the contract meet the expected security norms from their business perspective. SLAs are usually of two types, off-the-shelf non negotiable contracts and customized negotiable agreements. Public clouds usually follow non negotiable SLA‘s which may not be acceptable for business that have crucial data. Organizations who want to deploy critical applications can think about private clouds over public clouds which offer better insight and control over security and privacy. II. The Jeopardizes Of Cloud Computing Cloud computing encompasses a client and a server .Client side security is always over looked. As first step towards secure data management business should strengthen the client side security. To provide physical and logical safety to client machine is a big challenge. Built in security measures can be eluded by an erudite person with out much difficulty. To maintain secure client, organizations should review existing security practices and employ additional ones to ensure the security of its data. Clients must consider secure VPN to connect to the provider.Web browsers are majorly used in client side to access cloud computing services.
  • 2. Security And Privacy Issues Of Cloud Computing; Solutions And Secure Framework www.iosrjournals.org 34 | Page Cloud providers usually provide the consumers with APIs which is used by the latter to control, monitor the cloud services. It is vital to ensure the security of these APIs to protect against both accidental and malicious attempts to evade the security. The various plug-ins and applications available in the web browsers also causes a serious threat to the client systems used to access the provider. Many of the web browsers do not allow automatic updates which will append to the security concerns. To ensure secure cloud organizations should work on the existing internal policies and improvise its security strategies if necessary. III. Security Concerns ` There exist many security concerns in server side. To adopt cloud computing it is necessary to ensure providers security measures. To enhance the trust factor providers can get their system verified by external organizations or by security auditors. Aside from the security factor other issues that needs attention is about the data in the cloud, if at the provider goes bankrupt or being acquired by another business. Traditional data centers used to have regular security audit and mandatory security certifications which ensure the data security. Cloud providers should also incorporate these measures to assure secure transaction among its customers. Issues concerning data ownership is an on going debate and it is a crucial aspect in cloud computing. When consumers migrate critical company data to the cloud they are not giving the data tenure to the providers. Providers should ensure that the business-data customers store on the cloud should not be compromised under any circumstances. It is mere common sense that the right to use data, manipulate, modify and ownership of data stored in the cloud is customers and there should be an agreement in place that prohibits the data usage by providers. In traditional data centers business had the privilege to know about the data flow, exact data location, precautions used to protect data from unauthorized access. In public cloud the idea of data storage is distinct; business is unlikely to know where and how the data is stored, when data is moved, and what particular security measures are in place. The ‗physical location‘ raises the question of legal governance over the data. Another impediment issue is incase of disputes arises between the provider and the customer, which country‘s court system will settle the issue. [Def 2]. Another confront of cloud computing is the privacy breach. In case of privacy infringement due to providers fault the confusion still exist on who will take the responsibility and will compensate to the affected people. Lack of common security standards also adds to the concern of data storage over cloud. IV. Lack Of Control Over The Data Two recent events have exposed the dark sides of cloud computing for both businesses and consumers. These incidents—the partial outage of Amazon‘s EC2 cloud service and the security breach of Sony‘s PlayStation Network and Qriocity music service—underscore a key issue of the cloud computing model: customers‘ lack of control over their data.[Def 4]. Non cloud services also have security concerns but cloud has additional risk of external party involvement and exposure of critical and confidential data outside organizations control. Modifying security measures or introducing pristine best practices relevant to one particular organization is also unattainable. Cloud provider stores the data in providers side and maintenance is exclusively done by the providers hence clients have no means to check on the providers security practices, providers employees, their skills specializations etc. Insider threats go beyond those posed by former employees to include contractors, organizational affiliates, and other parties that have received access to an organization‘s networks, systems, and data to carry out or facilitate operations [Def 5] Many incidents can occur like sabotage of information, theft of confidential information. Incidents may also be caused unintentionally where employees mistakenly send across the sensitive data to wrong recipient. V. Network Security Public cloud services are delivered over the internet, exposing the data which were previously secured in the internal firewalls. Applications which people used to access within organizations intranet are hence exposed to networking threats and internet vulnerabilities which includes distributed denial of service attacks, phishing, malwares and Trojan horses. If an attacker gains access to client credentials, they can eavesdrop on all activities and transactions, manipulate data, return falsified information, and redirect clients to illegitimate sites. Your account or service instances may become a new base for the attacker. From here, they may leverage the power of your reputation to launch subsequent attacks. [Def 7]. VI. Securing Data In The Cloud A secure infrastructure ensures and builds confidence that the data stored is secure in providers‘ side. Proper implementation of security measures is mandatory in cloud computing. The fact that application is launched over the internet makes it susceptible for security risks. Cloud providers should think beyond the customary security practices like restricted user access, password protection etc. Physical location of stored data
  • 3. Security And Privacy Issues Of Cloud Computing; Solutions And Secure Framework www.iosrjournals.org 35 | Page is also vital and it‘s the responsibility of the provider to choose the right location of storage. Restricted user access can vary from simple user name / password protection to CAPTCHA log in forms. When an employee no longer has a business need to access datacenter his privileges to access datacenter should be immediately revoked. Cloud Providers can also consider one time password authentication where the clients will get one time temporary password from SSN /mobile device which helps in data security even if password is compromised. VII. Installation And Maintenance Of Firewall Installation of firewall and its maintenance is mandatory to ensure the protection. A firewall should be present in all external interfaces. A list of necessary port and services should be maintained. Assessment of firewall policies and rule sets and reconfiguration of router should be done in regular intervals. Build and deploy a firewall that denies access from ―untrusted‖ sources or applications, and adequately logs these events. Build and deploy a firewall that restricts access from systems that have direct external connection and those which contain confidential data or configuration data. [Def 13]. VIII. Data Encryption In public cloud the resources are shared by multiple cloud consumers and hence its providers responsibility to bestow data separation among their clients. Data encryption is one common approach the providers follow to safe guard their clients data but the question is whether the data is getting stored in encrypted format or not. Many providers follow private/public key encryption to ensure data security. To store crucial data organizations can think of private or hybrid cloud where the data will be in secure corporate firewall. Providers should allow the customers to determine the security measures followed, data storage details so that the customer can ensure data security. Data access to the cloud by the employees should be monitored and recorded so that the providers will be able to furnish the detailed report of who has accessed what data at a given point of time. IX. Back Up And Recovery In cloud computing data is stored in distributed location. The cloud customers will never be able to make out the exact storage location of their records and there comes the importance of data back up and recovery. Backup software should include public cloud APIs, enabling simple backup and recovery across major cloud storage vendors, such as Amazon S3, Nirvanix Storage Delivery Network, Rackspace and others, and giving consumers flexibility in choosing a cloud storage vendor to host their data vault. [Def 8] One debatable question is whether to back up the entire data or to backup critical and vital data. If provider agrees to backup crucial data then the question arises on how to determine the priority of data. The easiest and least complicated way is to protect the entire workstation or the server. It is critical for the backup application to encrypt confidential data before sending it offsite to the cloud, protecting both data-in-transit over a WAN to a cloud storage vault and data-at-rest at the cloud storage site. Consumers need to verify that the cloud backup software they choose is certified and compliant with the Federal Information Processing Standards (FIPS) 140 requirements issued by the National Institute of Standards and Technology. FIPS 140 certification is required for government agencies as well as for regulated financial, healthcare and other industries for compliance with data retention and security regulations such as HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley and other legal requirements. [Def 6] A growing number of cloud providers support the SAML standard and use it to administer users and authenticate them before providing access to applications and data. SAML provides a means to exchange information, such as assertions related to a subject or authentication information, between cooperating domains. SAML request and response messages are typically mapped over the Simple Object Access Protocol (SOAP), which relies on the eXtensible Markup Language (XML) for its format. SOAP messages are digitally signed. For example, once a user has established a public key certificate for a public cloud, the private key can be used to sign SOAP requests. SOAP message security validation is complicated and must be carried out carefully to prevent attacks. For example, XML wrapping attacks have been successfully demonstrated against a public IaaS cloud [Gaj09, Gru09]. XML wrapping involves manipulation of SOAP messages. A new element (i.e., the wrapper) is introduced into the SOAP Security header; the original message body is then moved under the wrapper and replaced by a bogus body containing an operation defined by the attacker [Def 10, Def 11]. The original body can still be referenced and its signature verified, but the operation in the replacement body is executed instead. SAML alone is not sufficient to provide cloud-based identity and access management services. The capability to adapt cloud subscriber privileges and maintain control over access to resources is also needed. As part of identity management, standards like the eXtensible Access Control Markup Language (XACML) can be used by a cloud provider to control access to cloud resources, instead of using a proprietary interface. XACML focuses on the mechanism for arriving at authorization decisions, which complements SAML‘s focus on the
  • 4. Security And Privacy Issues Of Cloud Computing; Solutions And Secure Framework www.iosrjournals.org 36 | Page means for transferring authentication and authorization decisions between cooperating entities. XACML is capable of controlling the proprietary service interfaces of most providers, and some cloud providers already have it in place. Messages transmitted between XACML entities are susceptible to attack by malicious third parties, making it important to have safeguards in place to protect decision requests and authorization decisions from possible attacks, including unauthorized disclosure, replay, deletion and modification [Def 9]. X. Security Enhancements For Cloud Computing The Following Practices Can Be Followed To Improvise The Security Of Cloud Computing  Implement security practices at organizational level and make sure that the providers security plans are in alignment with the business.  Employ and maintain secure Infrastructure in client side (secure VPN , changing default vendor provided passwords ) and host side (firewalls , patch managements ,anti-virus updates )  Ensure accurate user permissions and restricted access at both sides Data sanitizations at the right time The above deployed frame work offers a secured environment in which the clients need to access the providers‘ network using secured VPN. Cloud Providers have number of clients and they may offer any of the services namely Iaas, Paas, Saas. In this framework the providers check for user authentication, make sure that the clients approaching them are authorized and genuine. Once the providers are confident about the clients‘ credentials their data will be encrypted and stored. Steps involved in security framework are explained below: Cloud Computing: A Secure Framework
  • 5. Security And Privacy Issues Of Cloud Computing; Solutions And Secure Framework www.iosrjournals.org 37 | Page Security Policies  Providers should come up with a formal plan to ensure security  Employees should be given training on related technologies  Background check of employees.  Access restrictions / privilege setting to staff  Obligatory password change within stipulated time.  Supplier provided password of Server / hardware should not be used. Data Backup, Recovery, Sanitization, Patch Updates And Logs  Data backup should be carried out in regular intervals.  Alternate plans should be ready to meet unexpected disasters.  Providers should be equipped with data recovery plans in all emergencies.  Deleting data from servers, backup devices when the service is removed or server is removed from the cloud.  Patch updates and system files updates have to be conducted accurately.  System logs must be maintained with the following details users accessed the data, when, how much time was spend , and modifications made. Penetration Test  To ensure providers system is not affected by any vulnerabilities, testing has to be done in regular intervals. Firewalls And Network Security  Firewalls must be installed and its policies , configurations , rules must be revised in habitual basis  Antivirus updates must be done with out fail. Secure Physical Infrastructure  Physical Location of server is vital; cloud providers should keep the storage devices in secured places with proper physical protection. XI. Conclusion Cloud computing provides scalable and efficient means to manage IT resources in organizations. The flexibility the cloud brings in has some disadvantages over privacy and security. If the providers and consumers follow the security measures discussed above cloud computing will be more secure. As and when the issues around security and privacy are elucidated cloud computing will be accepted widely.