Security Issues in Cloud Computing
Introduction
The first computer ENIAC was invented by Charles Babbage in 18th century. But the real technological advancement of the computers came with the invention of the first four bit microprocessor in 1971. From 1971 till date, in the span of these 40+ years many operating systems came into existence (such as Windows 95, Windows 98, Windows 2000, Windows NT, Windows XP, Windows 7, Fedora, Mac, Redhat, Ubuntu, Kubuntu, Solaris etc.), many programming languages and web languages came into existence ( such as C, CPP, JAVA, .NET, HTML, XML, DHTML, SQL, PLSQL etc.), and many Multi-National Companies came into existence(such as Wipro, Genpact, Apple, Google, Tech Mahindra, Xerox, Oracle, SUN, Adobe, Microsoft and many more). But Internet is one of the key for the growth of each and every thing mentioned above. Cloud Computing is an emerging concept in which resources of computer infrastructure are provided over the Internet [1]. Cloud computing is a concept in which every device gets connected to the cloud which contains application, platform or Infrastructure or a mixture of them. People of 21st century are more familiar with smart phones rather than anything else. With the advent of phones such as IPhone and Android smartphones, the numbers of people using cloud are increasing substantially. Millions of people are using cloud in the present day scenario and it is equally important to provide the security to all the users who are using it. Cloud computing can be used as a utility to attract many people which can make software attractive as a service [2]. There are several security related issues with cloud which can be discussed in this paper.
Service Models of Cloud Computing
The p...
... middle of paper ...
....N.; Bamiah, M.A.; Chuprat, S.; Ab Manan, J.-L., "Towards an Efficient and Secure Educational Platform on cloud infrastructure," Cloud Computing Technologies, Applications and Management (ICCCTAM), 2012 International Conference on , vol., no., pp.145,150, 8-10 Dec. 2012
doi: 10.1109/ICCCTAM.2012.6488088
keywords: {cloud computing;educational computing;security of data;trusted computing;EEP;ESEP;ICT;SECaaS;TVD;cloud computing;cloud infrastructure;efficient educational platform;intrusion detection tool;open access global technology;secure educational platform;security as a service;security tool;trusted platform module;trusted virtual domain;vTPM;virtual TPM;Cloud Computing;Efficient and Secure Educational Platform;SECaaS;Security and Trust Issues;TPM;TVD;vTPM},
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6488088&isnumber=6488050
Cloud is the result of a decade research in the field of distributing computing , utility computing, virtualization , grid computing and more recently software, network services and web technology which is changeable evolution on demanding technology and services also as looking to the rapid growth of cloud computing which have changed the global computing infrastructure as well as the concept of computing resources toward cloud infrastructure. The important and interest of cloud computing increasing day by day and this technology receives more and more attention in the world (Jain, 2014) the mostly widely used definition of cloud computing is introduced by NIST “as a model for enabling a convenient on demand network access
Progressive technological development has paved the way for the ever increasing addition of multiple disparate devices. Devices which have the capability to connect to each other over a network affording them the ability to communicate with ease. Unfortunately the improved proficiency for communication carries with it a negative impact on information security. This detriment comes through the increased possibility of data loss and vulnerability exploitation. In this paper, we will seek to define one such measure to ensure security; by utilizing the Trusted Platform Module (TPM). We will also explore the strengths and vulnerabilities of the Trusted Platform Module as well as attacks against the TPM both in terms of hardware and software.
At the World Congress on Engineering 2011 conference in London, U.K., it was noted that the issue of security matters for cloud computing requires revising (Pinto et al., 2011). As mentioned earlier, when going to a cloud network any internal control system is essentially transferred to the service provider. As such, Pinto et al. (2011) explains about the “existence of a new entity called a cloud security manager” whose responsibility it is to keep documentation of client access to the cloud as well as third party processing. To put it differently, the duties of the cloud security manager will be to manage the overall cloud system by instituting an internal control matrix.
Public cloud computing reduces infrastructure requirements for small business customers and creates a smaller technology profile which reduces maintenance requirements for the small business while simultaneously giving hackers less targets to hit. Software,...
When they wanted to save photos online instead of on your personal computer, they are able to use “cloud computing” service. Cloud computing means that the transfer of computing data or information over the internet. Not just to keep data in your personal computer, they are able to save the data on internet server to open their data in any computer. In this report we will walk through about what is cloud computing, what kinds of model did cloud computing have, types of cloud computing, benefits of cloud computing, and security.
Cloud computing is a way to increase the capabilities of a device or add new capabilities or services without making any hardware changes to the device. An example is if you are traveling and along the way you stop and power on your laptop to check your email. Some of the key cloud computing services being offered today address data storage. Storing important information and files in the cloud can ensure that they are available for years to come and can be accessed globally wherever Internet connectivity is available. Through cloud computing a handheld device, such as a table computer, can access the Internet, check email, purchase concert tickets or monitor a webcam on another continent. Computation and software are also two other key areas of cloud computing.
Students may study from this system to how to protect the system from different threats. Employs use this facility to keep the confidential things secure with high authentication access. • Businessman • Students • Lawyer • Police • Teacher • Doctor • Employ • STAKEHOLDERS: Professors use this system to keep his credentials safe and secure.
Based on the payment system, cloud computing is defined as a pay-per-user or subscription based service that broadens its current capabilities and structures. In the networking field, cloud computing is comparable to grid computing, where computers in a network with idle processing cycles are harnessed to work out problems or issues that are too exhaustive for accomplishment by a single machine (Knorr and Gruman, 2011). In cloud computing, the shared IT infrastructure involves a network of servers that operate through virtualization to perform high quality and highly intensive computing processes and tasks. Using web terminology, cloud computing is the storage and data processing via the use of a web browser, rather than the direct use of the personal computer or office server. Therefore, it can be described as the provision and acquisition of information, ...
The Cloud is the inclusive term for a virtualized information technology computing environment, it began in the 1950s and has evolved itself into every organization. Cloud computing is very effect with individuals and businesses work, whether it be for data maintained or stored. The web-based environment make it more effective, rather than physically located in a user’s location. Whether it be infrastructure as a service, platform as a service, or software as a service, the cloud does have its benefits, just as well as its risks. Educating and understanding the possibilities and threats that comes with the power of this technology is important. Cloud computing is a representation convenient, on-demand network access to a shared computing resources. The possibilities are endless!
Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.
Cloud computing technology is a very known and popular paradigm in the field of Information technology. It is an incipient computing model which emanates from grid computing which is resulting into an emerging paramount concept in Information Technology. Vast number of operating systems and virtual servers are mutually dependent through the internet and allow sharable resources with each other. This generates expeditious and efficient computing speed. The concept of cloud computing is predicated on the time sharing of expensive resources and benefits of the providence of scale. The word Cloud originates from the well-known cloud shape which is expressed as a network in architectural system diagrams. Cloud computing applies traditional supercomputing to provide tremendous throughput computing power. Cloud computing allows user to execute simulated applications on a virtual server. In this report, we discuss about cloud computing technologies for example “Distributed File System (DFS), Map-Reduce, and Big tab”. [3] This cloud computing architecture is designed for, geographic information Services which contains functional utilization, perceptions, benefits, computing reserving data and infrastructure layers. We also discuss about software backdrops called as “D cloud”. D-Cloud provides a condition for analysis on the cloud elements using a particular structural configuration and implements large number of evaluations automatically as per the scenario. We also discuss about combining Peer to peer systems and technologies related cloud computing in order to construct a blueprint of the architecture and establish PC2, an open and free cloud computing platform. [4]
I have been interested in computer security for a while now. So that’s why I chose to research on some security and privacy issues that are challenging. For example using our cellular phones, playing games online, shopping online and even our private health data, can be invaded by unauthorized users. Therefore, in order to obtain personal data and information in which they can share to other unauthorized persons. These are threats and security issues that we face daily when using our devices and also using the internet.
With the availability of good network infrastructure, many people are turning to the Internet to send and store their information. What is more, with the development and the emergence of cloud computing, it is imperative that both individuals and organizations are responsible for the safety and privacy of the data being transferred.
Abstract: Fog computing extends cloud computing, cloud computing provide data, compute, storage, and application services to end-user, also the fog computing also provide the services like data, compute ,storage and application to end user. But in cloud the main problem that occurs is security and now a days security and privacy both are main concern that needed to be considered. Fog Computing is not a replacement of cloud it is just extends the cloud computing by providing security in the cloud environment. With Fog services we are able to enhance the cloud experience by isolating users’ data that need to live on the edge. The main aim of the fog computing is to place the data close to the end user.The securityissues are mentioned in this paper.
Institutions of higher learning are increasingly using Information and Communication systems in administration, teaching, learning and research. This infrastructure needs to be available, secure and well protected. It therefore becomes crucial for information security practitioners in public universities to implement effective information security programs. Information security focuses on technological issues and important elements of an organization such as people, process, business strategies etc., which also mandates the need for information security. A comprehensive security framework incorporates three basic components: people, technology, and process. When correctly assembled, the people, technology, and process elements of an information security framework work together to secure the environment and remain consistent with an institutions business objectives. (Mark, C.A. Wiley & A. John Wiley, 2011)