Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Cloud Computing Cloud computing means storing and accessing data and programs over
Cloud Computing Cloud computing means storing and accessing data and programs over
Cloud computing
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Security in Cloud Computing
Table of Contents
Introduction to cloud
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
This cloud service is offered in many models.
Infrastructure as Service(Iaas): The cloud servicers provide the infrastructure as service on demand through internet like Virtual Machine,servers,storage,network,load balancers etc
Platform as Service(Paas): Cloud Service providers provide computing platform like database,operating system , programming language execution environment and web server.
Software as Service(Saas): The client use the software installed in the cloud.The vendor updates the software automatically. Moreover, they provide the maintenance and support.
Examples: Salesforce CRM, Workday etc
Security issues in cloud is different from services from cloud as security as Service.The security as service offers authentication,, anti-malware/spyware, security event management, anti-virus and intrusion detection
We now discuss about Security issues in cloud computing.
Multi Tenancy: It is the situation where different clients or customers share the same application running on same hardware or operating system or data-storage mechanism.The uniqueness occurs from the design which is unique for each organisation.Cost Saving,data aggregation and data mining are considered to be economical in Multi Tenancy.
There is a threat of data being exposed in a multi-tenant environment.It allows other tenants or attackers to know the information or assume the identity of others.for example, one tenant was able to acquire other tenant computing resources by predicting MAC or IP a...
... middle of paper ...
...ing attacks mainly involves in the hardware manipulation. The hypervisor that attacks the system mainly operates underneath the system in stealth mode (secret) this causes main problem as the user cannot identify the hacker.If the hacker gets control over the main system then it is difficult to know from where the system got hacked as the OS will not be
aware of the operating systems that the hacker system comprises . If the hyper-jacking attacks are more then that leads to the guest hopping attacks. In order to perform the hyper-jacking attacks one should have the processor which supports hardware support virtualization. This has no solution as per the present knowledge and Microsoft is the leading organization that is performing the research on this Hyper-jacking attacks
The second cloud infrastructure that I would like to describe is the Software as a Service model, which is also known as SaaS. The SaaS model provides a broad scope of devices that are able to access software programs from one company’s applications. System as a service was developed to run applications from any device or user that has permission from the host. The book states, “Online email services, such as Gmail and Yahoo!, are good examples of SaaS” (Jill West, 2016). Cengage Learning made the Software as a
As its core essences cloud computing is nothing but a specialized form of grid computing and distributing computing’s which various in terms of infrastructure , deployment, service and Geographic’s dispersion (Veeramachanenin, Sepetember 2015) the cloud enhance scalability, collaboration, availability , ability to adapt to fluctuation according to demand accelerate development work and provide optional for cost reduction and through efficient and optimized computing. (BH kawljeet, June 2015) cloud computing (CC) recently become as a new paradigm for the delivery and hosting of services our the internet. There are mainly three service delivery model Software as Service (SaaS) required software, operating system and network is provided or we can say in SaaS the customer can access the hosted software instead of installing it in local computer and the user can access these software through local computer internet browser (e.g web enabled E-mail ) the user only pay and the cloud service provider is responsible for management or control of mobile cloud infrastructure some of the company which provide such service are Google, Microsoft , Salesforce ,Facebook, etc…..Infrastructure as Service(IaaS)the cloud provider only provide some hardware resources such as network and virtualization is
Virtual machines operate based on the computer architecture and functions of a real or hypothetical computer, and their implementations may involve specialized hardware, software, or a combination of both.
Adopting a Platform as a Service delivery model which entails managing different cloud environments with a consistent management framework.
With the increasing of scanning tool all over the Internet, it becomes easy to scan and analyze the system. Hackers and attacker always find the way to access systems if they find any chance, there are many way of attacking systems, such as Dos, and social engineering.
Cloud computing is the transfer of computing data or information into Internet. Cloud computing services allows individuals and businesses to
Usually, hackers access the operating system or machine memory, like the 2017 "Wanna Cry" attack which exploited older versions of Windows and affected some 300,000 users in over 150 countries with devastating effect especially on businesses and organizations. The Spectre and Meltdown flaws are more dangerous as they can allow hackers to access the computer chip that makes the computer do what it has to do and, without which the computer would be nothing as it is considered to be the heart of the computer. Affected devices are from Apple iPhones to MacBooks, Android devices to large desktop personal computers, as well as internet servers. The process is to be so fundamental so that no log of the activity is created and no one would know if he or she has been hacked.
The cloud computing is the practice that enables access to the shared pool of configurable computing resources which can be dynamically provisioned. It refers to both the applications delivered as service as well as hardware and system software in the data centres that provide those services. The attractive features of cloud computing such as on-demand access, high scalability, reliability, cost savings, low maintenance and energy efficiency bring benefits to both cloud service consumers and providers.
Technology continues to evolve exponentially. However, these technological advancements continue to pose a threat to both individuals and information resources of companies and governments. There is therefore the need to protect one’s data and information, due to the emerging threats and risks. Hacking is where third parties create a backdoor version of a hardware and software so as to manipulate or unlock hidden functionalities on a machine. Most of these hacks are open source and free software.
Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.
Virtualization technologies provide isolation of operating systems from hardware. This separation enables hardware resource sharing. With virtualization, a system pretends to be two or more of the same system [23]. Most modern operating systems contain a simplified system of virtualization. Each running process is able to act as if it is the only thing running. The CPUs and memory are virtualized. If a process tries to consume all of the CPU, a modern operating system will pre-empt it and allow others their fair share. Similarly, a running process typically has its own virtual address space that the operating system maps to physical memory to give the process the illusion that it is the only user of RAM.
The Internet is a global network connecting millions of personal, institutional and company computers. The number of computers used by the internet is growing rapidly. The United States is connected with over 100 countries worldwide and linked together to exchange of data, news and opinions. The Internet is decentralized design. This means that there isn't just one computer that stores all of the information from the Internet. There are many independent host servers located throughout the US and the world that store the information made available to the global Internet community.
In cloud computing, the word cloud is used as a metaphor for “the internet”. So the cloud computing means “a type of internet-based computing”, where different services such as servers, storage and applications are delivered to an organization’s computers and devices through the internet.
A cyber crime called 'Bot Networks', wherein spamsters and other perpetrators of cyber crimes remotely take control of computers without the users realizing it, is increasing at an alarming rate. Computers get linked to Bot Networks when users unknowingly download malicious codes such as Trojan horse sent as e-mail attachments. Such affected computers, known as zombies, can work together whenever the malicious code within them get activated, and those who are behind the Bot Networks attacks get the computing powers of thousands of systems at their disposal.
The Internet is a network of networks, linking computers to computers sharing the TCP/IP protocols. Each runs software to provide or "serve" information and/or to access and view information. The Internet is the transport vehicle for the information stored in files or documents on another computer. It can be compared to an international communications utility servicing computers. It is sometimes compared to a giant international plumbing system.