Security in Cloud Computing

1196 Words3 Pages

Security in Cloud Computing

Table of Contents

Introduction to cloud

The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

This cloud service is offered in many models.

Infrastructure as Service(Iaas): The cloud servicers provide the infrastructure as service on demand through internet like Virtual Machine,servers,storage,network,load balancers etc

Platform as Service(Paas): Cloud Service providers provide computing platform like database,operating system , programming language execution environment and web server.

Software as Service(Saas): The client use the software installed in the cloud.The vendor updates the software automatically. Moreover, they provide the maintenance and support.

Examples: Salesforce CRM, Workday etc

Security issues in cloud is different from services from cloud as security as Service.The security as service offers authentication,, anti-malware/spyware, security event management, anti-virus and intrusion detection

We now discuss about Security issues in cloud computing.

Multi Tenancy: It is the situation where different clients or customers share the same application running on same hardware or operating system or data-storage mechanism.The uniqueness occurs from the design which is unique for each organisation.Cost Saving,data aggregation and data mining are considered to be economical in Multi Tenancy.

There is a threat of data being exposed in a multi-tenant environment.It allows other tenants or attackers to know the information or assume the identity of others.for example, one tenant was able to acquire other tenant computing resources by predicting MAC or IP a...

... middle of paper ...

...ing attacks mainly involves in the hardware manipulation. The hypervisor that attacks the system mainly operates underneath the system in stealth mode (secret) this causes main problem as the user cannot identify the hacker.If the hacker gets control over the main system then it is difficult to know from where the system got hacked as the OS will not be

aware of the operating systems that the hacker system comprises . If the hyper-jacking attacks are more then that leads to the guest hopping attacks. In order to perform the hyper-jacking attacks one should have the processor which supports hardware support virtualization. This has no solution as per the present knowledge and Microsoft is the leading organization that is performing the research on this Hyper-jacking attacks

More about Security in Cloud Computing

Open Document