SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 1 (July-Aug. 2012), PP 40-43
www.iosrjournals.org
www.iosrjournals.org 40 | Page
An Overview on Security Issues in Cloud Computing
Dr. Balachandra1
, D N Kartheek2
1
(Dept of I&CT, MIT, Manipal University, INDIA,
2
(Dept of CSE, SVEC, INDIA,
Abstract : Cloud Computing, a rapidly developing information technology has aroused the concern of the
whole world. Cloud Computing is Internet-based computing, whereby shared resources, software and
information are provided to computers and devices on-demand, like the electricity grid [1]. Cloud Computing is
the product of the fusion of traditional computing technology and network technology like grid computing,
distributed computing parallel computing and so on. It aims to construct a perfect system with powerful
computing capability through a large number of relatively low-cost computing entity, and using the advanced
business models like SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a
Service) to distribute the powerful computing capability to end the users’ hands. This paper introduces the
background and service model of cloud computing. This paper also introduces the existing issues in cloud
computing such as security, privacy, reliability and so on.
Keywords:- Cloud Computing, Service Models, Security, Privacy.
I. INTRODUCTION
Cloud Computing is not a total new concept; it is originated from the earlier large-scale distributed
computing technology. However, it will be a subversion technology and cloud computing will be the third
revolution in the IT industry, which represent the development trend of the IT industry from hardware to
software, software to services, distributed services to centralized service. The core concept of cloud computing
is reducing the processing burden on the users‟ terminal by constantly improving the handling ability of the
cloud, eventually simplify the users‟ terminal to a simple input and output devices and busk in the powerful
computing capacity of the cloud on-demand. All of this is available through a simple internet connection using a
standard browser or other connection [2].
Cloud computing is a model for enabling convenient and on demand network access to a shared group
of computing resources that can be rapidly released with minimal management effort or service provider
interaction. Cloud has advantages in offering more scalable, fault-tolerant services with even higher
performance. Also, Cloud computing can be referred to as a new kind of storage technology, by which we can
share software, data or documents to computers as well as other devices on demand.
Cloud Service providers (CSP) (e.g. Microsoft, Google, Amazon, Salesforce.com, GoGrid) are
leveraging virtualization technologies combined with self-service capabilities for computing resources via the
Internet. In these service provider environments, virtual machines from multiple organizations have to be co-
located on the same physical server in order to maximize the efficiencies of virtualization. Cloud service
providers must learn from the managed service provider (MSP) model and ensure that their customers‟
applications and data are secure if they hope to retain their customer base and competitiveness. Today,
enterprises are looking toward cloud computing horizons to expand their on-premises infrastructure, but most
cannot afford the risk of compromising the security of their applications and data.
International Data Corporation (IDC) conducted a survey (see Fig.1.) of 263 IT executives and their
line-of-business colleagues to gauge their opinions and understand their companies‟ use of IT cloud services.
Security ranked first as the greatest challenge or issue of cloud computing.
Fig.1. Results of IDC ranking security challenges.
An Overview on Security Issues in Cloud Computing
www.iosrjournals.org 41 | Page
Corporations and individuals are concerned about how security and compliance integrity can be
maintained in this new environment. Even more concerning, though, is the corporations that are jumping to the
cloud computing while being oblivious to the applications of putting critical applications and data in the cloud.
Moving critical applications and sensitive data to a public and shared cloud environment is a major concern for
corporations that are moving beyond their data centers‟ network perimeter defense. To alleviate these concerns,
a cloud solution provider must ensure that customers can continue to have the same security and privacy
controls over their applications and services, provide evidence to these customers that their organization and
customers are secure and they can meet their Service level agreements and show how can they prove
compliance to their auditors.
II. What Is Cloud Computing
A. Definition
“Cloud” is a virtualized pool of computing resources. It can:
 Manage a variety of different workloads, including the batch of back-end operations and user-oriented
interactive applications.
 Rapidly deploy and increase workload by speedy providing physical machines or virtual machines.
 Support for redundancy, self-healing and highly scalable programming model, so that workload can be
recover from a variety of inevitable hardware/software failure.
 Real-time monitor resources usage, rebalance the allocation of resources when needed [3].

Fig: Visual Model of Cloud Computing Definition.
B. Service Models
Three types of models exist for providing services of cloud. These three models are often referred to as
the SPI Model (Software, Platform and Infrastructure) [4].
 Software as a Service (SaaS): Customers obtain the facility to access and use an application or service that
is hosted in the cloud. As an example „Salesforce.com‟, where necessary information for the interaction
between the customer and the service is hosted as part of the service in the cloud.
 Platform as a Service (PaaS): Customers obtain access to the platforms by enabling them to organize their
own software and applications in the cloud.
 Infrastructure as a Service (IaaS): The facility provided to the customer is to lease processing, storage
and other fundamental computing resources. The customer does not manage or control the basic cloud
infrastructure but has control over operating systems, storage, deployed applications.
C. Deployment Models
In spite of the delivery models utilized, there are three primary ways in which cloud services can also
deployed and are described.
 Public Cloud: In public cloud, customers can access web applications and services over the internet. Each
individual customer has its own resources which are dynamically provided by a third party vendor (cloud
providers). These providers facilitate multiple customers from multiple data centers, manage all the security
measures and provide hardware and infrastructure for the cloud customers to operate. The customer has no
idea about how the cloud is managed or what infrastructure is available. Customers of public cloud services
are considered to be untrusted.
 Private Cloud: In private clouds customers has complete control over that how data is managed and what
security measures are in place while data processing in cloud.
 Hybrid Cloud: Hybrid Clouds are a combination of public and private clouds within the same network.
Private cloud customers can store personal information over their private cloud and use the public cloud for
handling large amount of processing demands.
 Community Cloud: Several organizations jointly construct and share the same cloud infrastructure as well
as policies, requirements, values and concerns. The cloud community forms into a degree of economic
An Overview on Security Issues in Cloud Computing
www.iosrjournals.org 42 | Page
scalability and democratic equilibrium. The cloud infrastructure could be hosted by a third-party vendor or
within one of the organizations in the community.
D. Characteristics
Cloud Computing has a wide range of characteristics some of which are as follows:
 Shared Infrastructure: Cloud environment uses an effective software model that allows sharing of
physical services, storage and networking capabilities among users. The cloud infrastructure is to find out
most of the available infrastructure across multiple users.
 Network Access: Cloud Services are accesses over a network from a wide range of devices such as PCs,
laptops and mobile devices by using standards based APIs.
 Handle Metering: Cloud service providers store information of their clients for managing and optimizing
the service and to provide reporting and billing information. Due to this, customers are payable for services
according to how much have actually used during the billing period.
E. Architecture
Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud
computing, typically involves multiple cloud components communicating with each other over a loose coupling
mechanism such as a messaging queue. Elastic provision implies intelligence in the use of tight or loose
coupling as applied to mechanisms such as these and others.
III. Security Issues In Cloud Computing
Cloud Computing is a model for information and services by using existing technologies. It uses the
internet infrastructure to allow communication between client side and server side services/applications [5].
Cloud Service Providers (CSP‟s) exist between clients that offer cloud platforms for their customers to use and
create their own web services.
When making decisions to adopt cloud services, privacy or security has always been a major issue. To
deal with these issues, the cloud provider must build up sufficient controls to provide such level of security than
the organization would have if the cloud were not used. The majoy security challenge is that the owner of the
data has no control on their data processing. Due to involvement of many technologies including networks,
databases, operating systems, resource scheduling, transaction management, concurrency control and memory
management [6], various security issues arises in cloud computing.
A. Security
Where is your data more secure, on your local hard drive or on high security servers in the cloud? Some
argue that customer data is more secure when managed internally, while others argue that cloud providers have a
strong incentive to maintain trust and as such employ a higher level of security. However, in the cloud, your data
will be distributed over these individual computers regardless of where your base repository of data is ultimately
stored. Industrious hackers can invade virtually any server, and there are the statistics that show that one-third of
breaches result from stolen or lost laptops and other devices and from employees‟ accidentally exposing data on
the internet, with nearly 16 percent due to inside theft [7].
B. Privacy
Different from the traditional computing model, cloud computing utilizes the virtual computing
technology, users‟ personal data may be scattered in various virtual data center rather than stay in the same
physical location, even across the national borders, at this time, data privacy protection will face the controversy
of different legal systems. On the other hand, users may leak hidden information when they accessing cloud
computing services. Attackers can analyze the critical task depending on the computing task submitted by the
users [8].
C. Reliability
Servers in the cloud have the same problem as your own resident servers. The cloud servers also
experience downtimes and slowdowns, what the difference is that users have a higher dependent on cloud service
provider (CSP) in the model of cloud computing. There is abig difference in the CSP‟s service model, once you
select a particular CSP, you may be locked-in, thus bring a potential business secure risk.
D. Open Standard
Open Standard are critical to the growth of cloud computing. Most cloud prividers expose APIs which
are typically well-documented but also unique to their implementation and thus not interoperable. Some vendors
have adopted others APIs [9] and there are a number of open standards under development, including the OGF‟s
An Overview on Security Issues in Cloud Computing
www.iosrjournals.org 43 | Page
Open Cloud Computing Interface. The Open Cloud Consortium (OCC) [10] is working to develop consensus on
early cloud computing standards and practices.
E. Compliance
Numerous regulations pertain to the storage and use of data require regular reporting and audit trails,
cloud providers must enable their customers to comply appropiately with these regulations. Managing complaince
and security for cloud computing, provides insight on how a top-down view of all IT resources within a cloud-
based location can deliver a stronger management and enforcement of complaince policies. In addition to the
requirements to which customers are subject, the data centers maintained by cloud providers may also be subject
to complaince requirements [11].
F. Long-term Viability
You should be sure that the data you put into the cloud will never become invalid even your cloud
computing provider go broke or get acquired and swallowed up by a larger company [12].
IV. Conclusion
Cloud Computing became a buzzword nowadays. More and more companies step into cloud and
provide services above on it. However, security and privacy issues impose strong barrier for users‟ adoption of
cloud systems and cloud services. There is no doubt that the cloud computing is the development trend in the
future. Cloud computing brings us the approximately infinite computing capabilities, good scalability, service
on-demand and so on, also challenges at security, privacy, reliability and so on. More security strategies should
be deployed in the cloud environment to achieve the 5 goals i.e. availability, confidentiality, data integrity,
control and audit, as well as privacy acts should be changed to adapt a new relationship between users and
providers in the cloud literature. We claim that prosperity in Cloud Computing literature is to be coming after
those security and privacy issues are resolved.
References
[1] http://en.wikipedia.org/wiki/Cloud_computing.
[2] Rich Maggiani, solari communication, “Cloud computing is changing how we communicate”.
[3] GregBoss,PadmaMalladi,DennisQuan,LindsLegregni,
HoroldHall,HiPODS,www.ibm.com/developerworks/websphere/zones/hipods/
[4] “Security Guidance for critical areas of Focus in Cloud Computing”, April 2009, presented by Cloud Security Alliance (CSA).
[5] Kevin Curran, Sean Carlin and Mervyn Adams “Security issues in Cloud Computing”, published in August 2011, Elixir Network
Engg. (www.elixirjournal.org).
[6] Kevin Hemalen, Murat Kantarciouglu, Latifur Khan and Bhavani Thuraisingham, The University of Texas at Dallas, USA,
“Security Issues for cloud computing”, April-June 2010, international journal of information security and privacy.
[7] Elinor Mills, January 27,2009. “Cloud computing security forecast: clear skies”.
[8] Jianchun jiang, Weiping Wen, “Information Seucirty issues in cloud computing environment”, Netinfo
security,doi:10.3969/j.issn.1671-1122.2010.02.026.
[9] Eucalyptus Completes Amazon Web Services Specs with Latest Release.
[10] OpenCloudComputing.org.
[11] http://fx.caixum.com/.
[12] Gartner, “Seven cloud-computing security risks”. http://www.infoworld.com.

Weitere ähnliche Inhalte

Was ist angesagt?

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Hoang Nguyen
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Rohit Buddabathina
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
 

Was ist angesagt? (19)

DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
 
CloudSecurity
CloudSecurityCloudSecurity
CloudSecurity
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 

Andere mochten auch

Effects of Psychological Training on Mental Skills with Female Basketball Pla...
Effects of Psychological Training on Mental Skills with Female Basketball Pla...Effects of Psychological Training on Mental Skills with Female Basketball Pla...
Effects of Psychological Training on Mental Skills with Female Basketball Pla...
IOSR Journals
 
An efficient incentive of Nitrate and Fluoride on Organic highland cropping s...
An efficient incentive of Nitrate and Fluoride on Organic highland cropping s...An efficient incentive of Nitrate and Fluoride on Organic highland cropping s...
An efficient incentive of Nitrate and Fluoride on Organic highland cropping s...
IOSR Journals
 
Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...
Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...
Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...
IOSR Journals
 

Andere mochten auch (20)

Effects of Psychological Training on Mental Skills with Female Basketball Pla...
Effects of Psychological Training on Mental Skills with Female Basketball Pla...Effects of Psychological Training on Mental Skills with Female Basketball Pla...
Effects of Psychological Training on Mental Skills with Female Basketball Pla...
 
D0452428
D0452428D0452428
D0452428
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
An efficient incentive of Nitrate and Fluoride on Organic highland cropping s...
An efficient incentive of Nitrate and Fluoride on Organic highland cropping s...An efficient incentive of Nitrate and Fluoride on Organic highland cropping s...
An efficient incentive of Nitrate and Fluoride on Organic highland cropping s...
 
Synthesis, Physicochemical Characterization and Structure Determination of So...
Synthesis, Physicochemical Characterization and Structure Determination of So...Synthesis, Physicochemical Characterization and Structure Determination of So...
Synthesis, Physicochemical Characterization and Structure Determination of So...
 
H01044657
H01044657H01044657
H01044657
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
B0460612
B0460612B0460612
B0460612
 
I0557277
I0557277I0557277
I0557277
 
A0340107
A0340107A0340107
A0340107
 
F0522833
F0522833F0522833
F0522833
 
E0943744
E0943744E0943744
E0943744
 
Estimating the Statistical Significance of Classifiers used in the Predictio...
Estimating the Statistical Significance of Classifiers used in the  Predictio...Estimating the Statistical Significance of Classifiers used in the  Predictio...
Estimating the Statistical Significance of Classifiers used in the Predictio...
 
Strongly Unique Best Simultaneous Coapproximation in Linear 2-Normed Spaces
Strongly Unique Best Simultaneous Coapproximation in Linear 2-Normed SpacesStrongly Unique Best Simultaneous Coapproximation in Linear 2-Normed Spaces
Strongly Unique Best Simultaneous Coapproximation in Linear 2-Normed Spaces
 
Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...
Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...
Ultimate Behavior of Lightweight High Strength Concrete Filled Steel Tube (LW...
 
F0533134
F0533134F0533134
F0533134
 
Simulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerSimulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical Layer
 
An Analysis of Wushu's Theoretical Concept and its Reflection in Wushu's Prac...
An Analysis of Wushu's Theoretical Concept and its Reflection in Wushu's Prac...An Analysis of Wushu's Theoretical Concept and its Reflection in Wushu's Prac...
An Analysis of Wushu's Theoretical Concept and its Reflection in Wushu's Prac...
 
FPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe LockFPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe Lock
 
Characterizing Erythrophleum Suaveolens Charcoal as a Viable Alternative Fuel...
Characterizing Erythrophleum Suaveolens Charcoal as a Viable Alternative Fuel...Characterizing Erythrophleum Suaveolens Charcoal as a Viable Alternative Fuel...
Characterizing Erythrophleum Suaveolens Charcoal as a Viable Alternative Fuel...
 

Ähnlich wie An Overview on Security Issues in Cloud Computing

Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
A220113
A220113A220113
A220113
irjes
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 

Ähnlich wie An Overview on Security Issues in Cloud Computing (20)

G0314043
G0314043G0314043
G0314043
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
H046053944
H046053944H046053944
H046053944
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
G017324043
G017324043G017324043
G017324043
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A220113
A220113A220113
A220113
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
D045031724
D045031724D045031724
D045031724
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 

Mehr von IOSR Journals

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

An Overview on Security Issues in Cloud Computing

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 1 (July-Aug. 2012), PP 40-43 www.iosrjournals.org www.iosrjournals.org 40 | Page An Overview on Security Issues in Cloud Computing Dr. Balachandra1 , D N Kartheek2 1 (Dept of I&CT, MIT, Manipal University, INDIA, 2 (Dept of CSE, SVEC, INDIA, Abstract : Cloud Computing, a rapidly developing information technology has aroused the concern of the whole world. Cloud Computing is Internet-based computing, whereby shared resources, software and information are provided to computers and devices on-demand, like the electricity grid [1]. Cloud Computing is the product of the fusion of traditional computing technology and network technology like grid computing, distributed computing parallel computing and so on. It aims to construct a perfect system with powerful computing capability through a large number of relatively low-cost computing entity, and using the advanced business models like SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) to distribute the powerful computing capability to end the users’ hands. This paper introduces the background and service model of cloud computing. This paper also introduces the existing issues in cloud computing such as security, privacy, reliability and so on. Keywords:- Cloud Computing, Service Models, Security, Privacy. I. INTRODUCTION Cloud Computing is not a total new concept; it is originated from the earlier large-scale distributed computing technology. However, it will be a subversion technology and cloud computing will be the third revolution in the IT industry, which represent the development trend of the IT industry from hardware to software, software to services, distributed services to centralized service. The core concept of cloud computing is reducing the processing burden on the users‟ terminal by constantly improving the handling ability of the cloud, eventually simplify the users‟ terminal to a simple input and output devices and busk in the powerful computing capacity of the cloud on-demand. All of this is available through a simple internet connection using a standard browser or other connection [2]. Cloud computing is a model for enabling convenient and on demand network access to a shared group of computing resources that can be rapidly released with minimal management effort or service provider interaction. Cloud has advantages in offering more scalable, fault-tolerant services with even higher performance. Also, Cloud computing can be referred to as a new kind of storage technology, by which we can share software, data or documents to computers as well as other devices on demand. Cloud Service providers (CSP) (e.g. Microsoft, Google, Amazon, Salesforce.com, GoGrid) are leveraging virtualization technologies combined with self-service capabilities for computing resources via the Internet. In these service provider environments, virtual machines from multiple organizations have to be co- located on the same physical server in order to maximize the efficiencies of virtualization. Cloud service providers must learn from the managed service provider (MSP) model and ensure that their customers‟ applications and data are secure if they hope to retain their customer base and competitiveness. Today, enterprises are looking toward cloud computing horizons to expand their on-premises infrastructure, but most cannot afford the risk of compromising the security of their applications and data. International Data Corporation (IDC) conducted a survey (see Fig.1.) of 263 IT executives and their line-of-business colleagues to gauge their opinions and understand their companies‟ use of IT cloud services. Security ranked first as the greatest challenge or issue of cloud computing. Fig.1. Results of IDC ranking security challenges.
  • 2. An Overview on Security Issues in Cloud Computing www.iosrjournals.org 41 | Page Corporations and individuals are concerned about how security and compliance integrity can be maintained in this new environment. Even more concerning, though, is the corporations that are jumping to the cloud computing while being oblivious to the applications of putting critical applications and data in the cloud. Moving critical applications and sensitive data to a public and shared cloud environment is a major concern for corporations that are moving beyond their data centers‟ network perimeter defense. To alleviate these concerns, a cloud solution provider must ensure that customers can continue to have the same security and privacy controls over their applications and services, provide evidence to these customers that their organization and customers are secure and they can meet their Service level agreements and show how can they prove compliance to their auditors. II. What Is Cloud Computing A. Definition “Cloud” is a virtualized pool of computing resources. It can:  Manage a variety of different workloads, including the batch of back-end operations and user-oriented interactive applications.  Rapidly deploy and increase workload by speedy providing physical machines or virtual machines.  Support for redundancy, self-healing and highly scalable programming model, so that workload can be recover from a variety of inevitable hardware/software failure.  Real-time monitor resources usage, rebalance the allocation of resources when needed [3].  Fig: Visual Model of Cloud Computing Definition. B. Service Models Three types of models exist for providing services of cloud. These three models are often referred to as the SPI Model (Software, Platform and Infrastructure) [4].  Software as a Service (SaaS): Customers obtain the facility to access and use an application or service that is hosted in the cloud. As an example „Salesforce.com‟, where necessary information for the interaction between the customer and the service is hosted as part of the service in the cloud.  Platform as a Service (PaaS): Customers obtain access to the platforms by enabling them to organize their own software and applications in the cloud.  Infrastructure as a Service (IaaS): The facility provided to the customer is to lease processing, storage and other fundamental computing resources. The customer does not manage or control the basic cloud infrastructure but has control over operating systems, storage, deployed applications. C. Deployment Models In spite of the delivery models utilized, there are three primary ways in which cloud services can also deployed and are described.  Public Cloud: In public cloud, customers can access web applications and services over the internet. Each individual customer has its own resources which are dynamically provided by a third party vendor (cloud providers). These providers facilitate multiple customers from multiple data centers, manage all the security measures and provide hardware and infrastructure for the cloud customers to operate. The customer has no idea about how the cloud is managed or what infrastructure is available. Customers of public cloud services are considered to be untrusted.  Private Cloud: In private clouds customers has complete control over that how data is managed and what security measures are in place while data processing in cloud.  Hybrid Cloud: Hybrid Clouds are a combination of public and private clouds within the same network. Private cloud customers can store personal information over their private cloud and use the public cloud for handling large amount of processing demands.  Community Cloud: Several organizations jointly construct and share the same cloud infrastructure as well as policies, requirements, values and concerns. The cloud community forms into a degree of economic
  • 3. An Overview on Security Issues in Cloud Computing www.iosrjournals.org 42 | Page scalability and democratic equilibrium. The cloud infrastructure could be hosted by a third-party vendor or within one of the organizations in the community. D. Characteristics Cloud Computing has a wide range of characteristics some of which are as follows:  Shared Infrastructure: Cloud environment uses an effective software model that allows sharing of physical services, storage and networking capabilities among users. The cloud infrastructure is to find out most of the available infrastructure across multiple users.  Network Access: Cloud Services are accesses over a network from a wide range of devices such as PCs, laptops and mobile devices by using standards based APIs.  Handle Metering: Cloud service providers store information of their clients for managing and optimizing the service and to provide reporting and billing information. Due to this, customers are payable for services according to how much have actually used during the billing period. E. Architecture Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components communicating with each other over a loose coupling mechanism such as a messaging queue. Elastic provision implies intelligence in the use of tight or loose coupling as applied to mechanisms such as these and others. III. Security Issues In Cloud Computing Cloud Computing is a model for information and services by using existing technologies. It uses the internet infrastructure to allow communication between client side and server side services/applications [5]. Cloud Service Providers (CSP‟s) exist between clients that offer cloud platforms for their customers to use and create their own web services. When making decisions to adopt cloud services, privacy or security has always been a major issue. To deal with these issues, the cloud provider must build up sufficient controls to provide such level of security than the organization would have if the cloud were not used. The majoy security challenge is that the owner of the data has no control on their data processing. Due to involvement of many technologies including networks, databases, operating systems, resource scheduling, transaction management, concurrency control and memory management [6], various security issues arises in cloud computing. A. Security Where is your data more secure, on your local hard drive or on high security servers in the cloud? Some argue that customer data is more secure when managed internally, while others argue that cloud providers have a strong incentive to maintain trust and as such employ a higher level of security. However, in the cloud, your data will be distributed over these individual computers regardless of where your base repository of data is ultimately stored. Industrious hackers can invade virtually any server, and there are the statistics that show that one-third of breaches result from stolen or lost laptops and other devices and from employees‟ accidentally exposing data on the internet, with nearly 16 percent due to inside theft [7]. B. Privacy Different from the traditional computing model, cloud computing utilizes the virtual computing technology, users‟ personal data may be scattered in various virtual data center rather than stay in the same physical location, even across the national borders, at this time, data privacy protection will face the controversy of different legal systems. On the other hand, users may leak hidden information when they accessing cloud computing services. Attackers can analyze the critical task depending on the computing task submitted by the users [8]. C. Reliability Servers in the cloud have the same problem as your own resident servers. The cloud servers also experience downtimes and slowdowns, what the difference is that users have a higher dependent on cloud service provider (CSP) in the model of cloud computing. There is abig difference in the CSP‟s service model, once you select a particular CSP, you may be locked-in, thus bring a potential business secure risk. D. Open Standard Open Standard are critical to the growth of cloud computing. Most cloud prividers expose APIs which are typically well-documented but also unique to their implementation and thus not interoperable. Some vendors have adopted others APIs [9] and there are a number of open standards under development, including the OGF‟s
  • 4. An Overview on Security Issues in Cloud Computing www.iosrjournals.org 43 | Page Open Cloud Computing Interface. The Open Cloud Consortium (OCC) [10] is working to develop consensus on early cloud computing standards and practices. E. Compliance Numerous regulations pertain to the storage and use of data require regular reporting and audit trails, cloud providers must enable their customers to comply appropiately with these regulations. Managing complaince and security for cloud computing, provides insight on how a top-down view of all IT resources within a cloud- based location can deliver a stronger management and enforcement of complaince policies. In addition to the requirements to which customers are subject, the data centers maintained by cloud providers may also be subject to complaince requirements [11]. F. Long-term Viability You should be sure that the data you put into the cloud will never become invalid even your cloud computing provider go broke or get acquired and swallowed up by a larger company [12]. IV. Conclusion Cloud Computing became a buzzword nowadays. More and more companies step into cloud and provide services above on it. However, security and privacy issues impose strong barrier for users‟ adoption of cloud systems and cloud services. There is no doubt that the cloud computing is the development trend in the future. Cloud computing brings us the approximately infinite computing capabilities, good scalability, service on-demand and so on, also challenges at security, privacy, reliability and so on. More security strategies should be deployed in the cloud environment to achieve the 5 goals i.e. availability, confidentiality, data integrity, control and audit, as well as privacy acts should be changed to adapt a new relationship between users and providers in the cloud literature. We claim that prosperity in Cloud Computing literature is to be coming after those security and privacy issues are resolved. References [1] http://en.wikipedia.org/wiki/Cloud_computing. [2] Rich Maggiani, solari communication, “Cloud computing is changing how we communicate”. [3] GregBoss,PadmaMalladi,DennisQuan,LindsLegregni, HoroldHall,HiPODS,www.ibm.com/developerworks/websphere/zones/hipods/ [4] “Security Guidance for critical areas of Focus in Cloud Computing”, April 2009, presented by Cloud Security Alliance (CSA). [5] Kevin Curran, Sean Carlin and Mervyn Adams “Security issues in Cloud Computing”, published in August 2011, Elixir Network Engg. (www.elixirjournal.org). [6] Kevin Hemalen, Murat Kantarciouglu, Latifur Khan and Bhavani Thuraisingham, The University of Texas at Dallas, USA, “Security Issues for cloud computing”, April-June 2010, international journal of information security and privacy. [7] Elinor Mills, January 27,2009. “Cloud computing security forecast: clear skies”. [8] Jianchun jiang, Weiping Wen, “Information Seucirty issues in cloud computing environment”, Netinfo security,doi:10.3969/j.issn.1671-1122.2010.02.026. [9] Eucalyptus Completes Amazon Web Services Specs with Latest Release. [10] OpenCloudComputing.org. [11] http://fx.caixum.com/. [12] Gartner, “Seven cloud-computing security risks”. http://www.infoworld.com.