Security Issues in Cloud Computing
Introduction
The first computer ENIAC was invented by Charles Babbage in 18th century. But the real technological advancement of the computers came with the invention of the first four bit microprocessor in 1971. From 1971 till date, in the span of these 40+ years many operating systems came into existence (such as Windows 95, Windows 98, Windows 2000, Windows NT, Windows XP, Windows 7, Fedora, Mac, Redhat, Ubuntu, Kubuntu, Solaris etc.), many programming languages and web languages came into existence ( such as C, CPP, JAVA, .NET, HTML, XML, DHTML, SQL, PLSQL etc.), and many Multi-National Companies came into existence(such as Wipro, Genpact, Apple, Google, Tech Mahindra, Xerox, Oracle, SUN, Adobe, Microsoft and many more). But Internet is one of the key for the growth of each and every thing mentioned above. Cloud Computing is an emerging concept in which resources of computer infrastructure are provided over the Internet [1]. Cloud computing is a concept in which every device gets connected to the cloud which contains application, platform or Infrastructure or a mixture of them. People of 21st century are more familiar with smart phones rather than anything else. With the advent of phones such as IPhone and Android smartphones, the numbers of people using cloud are increasing substantially. Millions of people are using cloud in the present day scenario and it is equally important to provide the security to all the users who are using it. Cloud computing can be used as a utility to attract many people which can make software attractive as a service [2]. There are several security related issues with cloud which can be discussed in this paper.
Service Models of Cloud Computing
The p...
... middle of paper ...
....N.; Bamiah, M.A.; Chuprat, S.; Ab Manan, J.-L., "Towards an Efficient and Secure Educational Platform on cloud infrastructure," Cloud Computing Technologies, Applications and Management (ICCCTAM), 2012 International Conference on , vol., no., pp.145,150, 8-10 Dec. 2012
doi: 10.1109/ICCCTAM.2012.6488088
keywords: {cloud computing;educational computing;security of data;trusted computing;EEP;ESEP;ICT;SECaaS;TVD;cloud computing;cloud infrastructure;efficient educational platform;intrusion detection tool;open access global technology;secure educational platform;security as a service;security tool;trusted platform module;trusted virtual domain;vTPM;virtual TPM;Cloud Computing;Efficient and Secure Educational Platform;SECaaS;Security and Trust Issues;TPM;TVD;vTPM},
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6488088&isnumber=6488050
This essay discusses regulation that rules cloud provider to protect privacy of data citizens within country. This essay will describe about what cloud services and its wide range of service In the second section, it will explain more about the security threat of cloud services and going more specific into privacy issue. The next section, I will discuss about the extent of technical regulation that porposed from case given by taking model from exist country regulation. In the Fourth section, this essay will discuss about evaluation and another policy as alternative of the previous policy. Finally, this essay will be closed by suggestion and conclusion about what regulation that should be purposed regarding to protect privacy citizens’ data stored in cloud.
Cloud Security Alliance CLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013, [online]. Available: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
The main aim of this paper is to study the concept of cloud computing through virtualization, how security is compromised in cloud computing and how we can secure the system from security breach in case of virtualization.
From our research we can describe Cloud computing as both a platform and a type of application. The Cloud computing platform offers, configures, reconfigures and provisions hardware and software services as needed. Server equipment in the cloud can be physical or virtual machines. Clouds in actuality also offer storage area networks (SANs), network equipment, firewall and other security devices. Cloud computing refers to applications that are not stored or ran from the local systems, but that exist on the cloud and are accessed remotely. Any user with suitable internet connection and standard browser can access a pool of virtualized computer resources in the cloud.
Cloud is the result of a decade research in the field of distributing computing , utility computing, virtualization , grid computing and more recently software, network services and web technology which is changeable evolution on demanding technology and services also as looking to the rapid growth of cloud computing which have changed the global computing infrastructure as well as the concept of computing resources toward cloud infrastructure. The important and interest of cloud computing increasing day by day and this technology receives more and more attention in the world (Jain, 2014) the mostly widely used definition of cloud computing is introduced by NIST “as a model for enabling a convenient on demand network access
At the World Congress on Engineering 2011 conference in London, U.K., it was noted that the issue of security matters for cloud computing requires revising (Pinto et al., 2011). As mentioned earlier, when going to a cloud network any internal control system is essentially transferred to the service provider. As such, Pinto et al. (2011) explains about the “existence of a new entity called a cloud security manager” whose responsibility it is to keep documentation of client access to the cloud as well as third party processing. To put it differently, the duties of the cloud security manager will be to manage the overall cloud system by instituting an internal control matrix.
Discription: Services of cloud are used by both larger and smaller scale organizations.Cloud computing has huge advantages but it is a global phenomenon therefore it has some disadvantages. Both the Service providers and the consumers must work together to ensure safety and security of data on clouds. Customers of cloud services are in fear of data loss and privacy.This paper propose to use The Cloud Security Alliance (CSA) release of a new governance, risk management, and compliance stack for cloud computing. The cloud security tools are available for free download, is meant to help organizations create public and private clouds that act accordingly with industry standards for accepted governance, risk, and compliance (GRC) best practices. The GRC stack has three components: a controls framework, a technical foundation and a questionnaire for assessing what the CSA (cloud security alliance) calls for platform-, infrastructure- and software-as-a-service
Cloud computing is being heralded as the onrushing future of computing. In fact, in many ways, cloud computing is already here, and has been for some time. The most obvious example of cloud computing is Google Mail. Cloud computing, simply defined, is the implementation of computing services using shared hardware, shared software and in many cases even shared information. Google Mail, for example, makes e-mail services available using a widespread, highly redundant network of systems that remove that same functionality and data from the user’s computer, putting it “in the cloud” where it can be plucked back out as needed – from any capable device such as a smart phone, computer or internet kiosk.
Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.
When they wanted to save photos online instead of on your personal computer, they are able to use “cloud computing” service. Cloud computing means that the transfer of computing data or information over the internet. Not just to keep data in your personal computer, they are able to save the data on internet server to open their data in any computer. In this report we will walk through about what is cloud computing, what kinds of model did cloud computing have, types of cloud computing, benefits of cloud computing, and security.
The cloud computing security is not monitored by the school or the school district but by...
Safety of information is the most valuable asset in any organization particular those who provide financial service to others. Threats can come from a variety of sources such as human threats, natural disasters and technical threats. By identifying the potential threats to the network, security measure can be taken to combat these threats, eliminate them or reduce the likelihood and impact if they should occur.
Throughout the year’s technology have been modernized and so as the security systems must be well updated in the computer world to protect against cyber-attacks. In addition, in this modernized era of technology
Computer security in the early stages mainly focused on the protection of the physical computer. The next major security development was encryption. Computer malware then became common and additional security measures were developed. The Internet prompted the need for network security. The development of cloud storage is the latest technological development that is in desperate need of protection from hackers. All components of computers are affected by technological developments as are the security measures necessary to protect
Abstract: Fog computing extends cloud computing, cloud computing provide data, compute, storage, and application services to end-user, also the fog computing also provide the services like data, compute ,storage and application to end user. But in cloud the main problem that occurs is security and now a days security and privacy both are main concern that needed to be considered. Fog Computing is not a replacement of cloud it is just extends the cloud computing by providing security in the cloud environment. With Fog services we are able to enhance the cloud experience by isolating users’ data that need to live on the edge. The main aim of the fog computing is to place the data close to the end user.The securityissues are mentioned in this paper.