Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Security issues with cloud computing
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Security issues with cloud computing
Security is a top most issue in cloud computing busi-ness model followed by privacy, availability and compli-ance. Data security is the main concern among organiza-tions, especially in shared, multi-tenant environment. In a shared environment, technologies are needed to effi-ciently isolate data and workload. We present different security issues in table no 1.
Description Issues No
Use elastic to prevent DDos attacks Availability of service 1
Protect data by encryption Data confi-dentiality 2
Improve virtual machine supports, flash disk and virtual unit scheduling support HPC application Performance 3
Data backup/achieve, rapid hard disk, higher bandwidth LAN switch, Data transfer bottlenecks 4
Research and develop scalable stor-age system Scalability storage 5
Provide reputation protected service like Email Reputation fate sharing 6
Use paid patterns license Software licensing 7
Table 1. Problems in Cloud computing
2.1 Data Security:
The top most concern of security in the cloud is data security. The customer does not have any idea about how service provider process, store customer data. In public cloud environment, responsibility of service provider how he implements efficient security controls and safeguards the critical assets. Cloud computing has three different definitions such as Infrastructure as a service (IaaS), Platform as a service (PaaS) and Software as a service(SaaS).All three definitions have different security issues. Network storage, virtualization and fundamental processing resources are provided by the service provider to customers in IaaS model where the customer deploy and run the software. With IaaS, cloud users have better control over the security com-pared to the other models as long there is no security hole in the virtual machine monitor [4].With PaaS, customers can deploy their application onto the cloud infrastructure without installation any tools. PaaS service provider needs to secure software platform stack. With SaaS, customer may use service provider software through a web browser. In SaaS model, overall security burden lies with cloud provider and data security is a major challenge when a customer uses SaaS model. Cloud computing is distributed system having multiple interconnected computers in virtualized form. Data centers supply computational power of cloud computing, which consist of thousands of servers. Customer data is stored on these servers and of security of these data is a serious issue. Figure 1 shows layered architecture of data centers.
.
Cloud Applications
Virtual Machines
Application Server
Storage Server
Table 2. Layered architecture of data centers
In layered architecture of data centers, lowest layer rep-resents a massive physical resource, for example servers and application servers and these servers is maintained a virtualization layer. Cloud application, for example busi-ness application, gaming, social networking, and scien-tific work operate at higher layer architecture.
In a cloud environment, customer data are processed and store in plain text form and data backup is also critical concern.
The first cloud infrastructure that I would like to describe is the Platform as a Service model, also known as PaaS. The platform in PaaS describes the fact that it provides the computers operating system and hardware for the use of applications. To expand on the platform description it easier to say that a company can use this cloud infrastructure in order to run their software rather than having to buy each computer and software to run a program for each computer. A plus side of using PaaS is that new developers are able to test applications in the cloud without crashing their own computer. It is also capable of storing information on the cloud which frees up hardware storage space. The traditional type of networking where you every computer had to be networked and hardwired to each of the
As its core essences cloud computing is nothing but a specialized form of grid computing and distributing computing’s which various in terms of infrastructure , deployment, service and Geographic’s dispersion (Veeramachanenin, Sepetember 2015) the cloud enhance scalability, collaboration, availability , ability to adapt to fluctuation according to demand accelerate development work and provide optional for cost reduction and through efficient and optimized computing. (BH kawljeet, June 2015) cloud computing (CC) recently become as a new paradigm for the delivery and hosting of services our the internet. There are mainly three service delivery model Software as Service (SaaS) required software, operating system and network is provided or we can say in SaaS the customer can access the hosted software instead of installing it in local computer and the user can access these software through local computer internet browser (e.g web enabled E-mail ) the user only pay and the cloud service provider is responsible for management or control of mobile cloud infrastructure some of the company which provide such service are Google, Microsoft , Salesforce ,Facebook, etc…..Infrastructure as Service(IaaS)the cloud provider only provide some hardware resources such as network and virtualization is
...common risks and their mitigating techniques are: Unauthorized access to data centers, computer rooms, and wiring closets – this risk can be mitigated by applying policies, standards, procedures, and guidelines for staff and visitors to secure facilities. Servers must sometimes be shut down to perform maintenance – this can be mitigated by creating a system to tie servers, storage devices, and the network together and created redundancy to prevent down time on mission critical services. Server operating systems vulnerability – this can be mitigated by ensuring all server operating system environments are defined with the proper patches and updates. And lastly cloud computing virtual environments are not secure by default configurations – can be mitigated with setting up virtual firewalls and server segments on separate VLANs to help prevent failure in the network.
Cloud computing is a relatively new technology that allows data to be stored, distributed and manipulated with greater ease than ever. As described by Gurjar and Rathore (2013), the “Cloud is a large pool of easily usable and accessible virtualized resources. These resources can be dynamically reconfigured to adjust to a variable load, allowing also for an optimum resource utilization” (p. 1). By moving data, documents and media to the Cloud, the potential for business efficiency and productivity increases and anyone with internet can take advantage of the benefits. As with anything, it is important to understand the risks and benefits in order to weigh whether or not moving to the Cloud is the best move for the business. Some companies, like Lavu, an iPad based point of sale system, operate solely on the Cloud. Without Cloud computing capability, some organizations would not exist.
There are many options that are provided by Amazon Elastic Compute Cloud (Amazon EC2) like as follows: preconfigured software, complete environments, processors, and memory. Scalability is also offered on a pay as you go basis. The time required to implement a new server takes mire minutes, capacity can be scaled with ease. You will only have to pay for whatever you use when it comes to Amazon EC2. Application with fail proof safeguards can be developed with the use of Amazon EC2. (Amazon Web Services, 2012)
More firms and industries are adopting cloud computing because of its flexibility as well as convenience. The health care industry on the other hand has been very slow when it comes to the adoption of this new trend. However, gradually many hospitals as well as clinics have been able to recognize the benefits of cloud computing and most of them have embraced this new technology to revolutionize their procedures. In the 21st century, it is extremely hard and challenging for physicians to keep track of all the data that exists from the patient records to insurance information. The traditional system is often a burden as one has to transfer physical files from one facility to another. This process is tiresome and cumbersome; it also wastes time and money that could have otherwise been put into other productive uses (Spagnoletti 12). The cloud storage systems often allow organizations to place data on each and every centralized electronic system that can be accessed anytime from anywhere and anytime. The healthcare industry often has to deal with large amounts of data, and the cloud services often help them to manage as well as access health records effectively in order to provide patient care in an effective and efficient manner.
Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
The first computer ENIAC was invented by Charles Babbage in 18th century. But the real technological advancement of the computers came with the invention of the first four bit microprocessor in 1971. From 1971 till date, in the span of these 40+ years many operating systems came into existence (such as Windows 95, Windows 98, Windows 2000, Windows NT, Windows XP, Windows 7, Fedora, Mac, Redhat, Ubuntu, Kubuntu, Solaris etc.), many programming languages and web languages came into existence ( such as C, CPP, JAVA, .NET, HTML, XML, DHTML, SQL, PLSQL etc.), and many Multi-National Companies came into existence(such as Wipro, Genpact, Apple, Google, Tech Mahindra, Xerox, Oracle, SUN, Adobe, Microsoft and many more). But Internet is one of the key for the growth of each and every thing mentioned above. Cloud Computing is an emerging concept in which resources of computer infrastructure are provided over the Internet [1]. Cloud computing is a concept in which every device gets connected to the cloud which contains application, platform or Infrastructure or a mixture of them. People of 21st century are more familiar with smart phones rather than anything else. With the advent of phones such as IPhone and Android smartphones, the numbers of people using cloud are increasing substantially. Millions of people are using cloud in the present day scenario and it is equally important to provide the security to all the users who are using it. Cloud computing can be used as a utility to attract many people which can make software attractive as a service [2]. There are several security related issues with cloud which can be discussed in this paper.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
capacity and performance. However, as networks enable more and more applications and are available to more and more users, they become ever more vulnerable to a wider range of security threats. To combat those threats and ensure that e-business transactions are not compromised, security technology must play a major role in today's networks.
...s and end nodes change their behavior. Distributed in many cloud services application logic, allowing more centralized automation applications and smart. The rear end of the cloud computing system, a variety of computers, servers and data storage system to create the cloud computing services. I start reading those articles one by one. This article taught basics of cloud computing to the user who is not familiar with cloud computing system. The writer of this article tries to cover all the aspects of the cloud computing. Author tries to discuss all the logical, Front end and back end aspects of this latest technology in an innovative manner.
It simplifies the storage and processing of large amounts of data, eases the deployment and operation of large-scale global products and services, and automates much of the administration of large-scale clusters of computers.
Saas is the model in which an application is hosted as a service to customers who access it via the internet. E.g. Google docs, salesforce.com, CRM, ERP, email, social networking.
Fog computing also known as fogging is a distributed computing infrastructure in which some application services are handled at the network edge in a smart device. Fog computing is a new standard that exploits the profits of virtualized IT infrastructures closer to end users Fog computing offers an attractive mixture of computational power, storage capability, and networking facilities at the edge of the networks. The infrastructure of this new scattered computing allows
System design in a data center network provides the tools for addressing the challenges that occur with expansion of data center infrastructure. This includes support for the rapid growth of applications and their data and storage bandwidth, managing and modifying data storage requirements, optimize server-processing resources and access information