SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 3, Issue 1, January -February 2013, pp.854-857

      Security Issue Analysis in Cloud Computing Environment
                          Vijay.G.R *, Dr.A.Rama Mohan Reddy**
           *(PhD scholar Department of Computer Science & Engg, JNTUA, Anantapur, A.P, India)
               ** (Professor, Dept. of CSE, SVU College of Engineering, Tirupati, A.P, India)



ABSTRACT
         The growth in field of cloud computing           are: (1) Private cloud: a cloud platform is dedicated
increases threat security aspects. Security has           for specific organization, (2) Public cloud available
remained a constant issue for Internet and                to public users to register and use the available
networking, when we are talking about security            infrastructure, and (3) Hybrid cloud: a private cloud
cloud really effects. Lack of security is the only a      that can extend to use resources in public clouds.
problem or difficulty that must be overcome in            Public cloud most vulnerable deployment model
wide adoption of cloud computing. Cloud                   because for public users to host their services who
computing is surrounded by many security issues           may be malicious users.
like securing data, and examining the utilization         In providing a secure Cloud computing solution, a
of cloud by the cloud computing vendors. Cloud            major decision is to decide on the type of cloud to be
computing has brought lots of security challenges         implemented. Currently there are three types of cloud
for the consumers and service providers. Our              deployment models offered, namely, a public, private
work mainly provides the basic idea on Cloud              and hybrid cloud.
Computing with the Security Issue mainly faced in         Public Cloud: A public cloud is a model which
both larger and smaller scale organizations where         allows users’ access to the cloud via interfaces using
Cloud Computing is implemented and necessary              mainstream web browsers. It’s typically based on a
steps which can solve these problems to certain           pay-per-use model, similar to a prepaid electricity
extent.                                                   metering system which is flexible enough to cater for
This will enable researchers and security                 spikes in demand for cloud optimization.
professionals to know about users and vendors             Private Cloud: A private cloud is set up within an
concerns and critical analysis about the different        organization’s internal enterprise datacenter. It is
research type proposed.                                   easier to align with security, compliance, and
                                                          regulatory requirements, and provides more
Keywords :Cloud Computing, Security Issues                enterprise control over deployment and use.
                                                          Hybrid Cloud: A hybrid cloud is a private cloud
I. INTRODUCTION                                           linked to one or more external cloud services,
          As more facets of work and personal life        centrally managed, provisioned as a single unit, and
move online and the Internet becomes a platform for       circumscribed by a secure network. It provides
virtual human society, a new paradigm of large-scale      virtual IT solutions through a mix of both public and
distributed computing has emerged. Web-based              private clouds.
companies, such as Google and Amazon, have built
web infrastructure to deal with the internet-scale data
storage and computation. If we consider such
infrastructure as a “virtual computer”, it demonstrates
a possibility of new computing model, i.e., centralize
the data and computation on the “super computer”
with unprecedented storage and computing
capability, which can be viewed as a simplest form of
cloud computing . Cloud Computing is a new term
for a long-held dream of computing as a utility ,
which has recently emerged as a commercial reality.
Cloud computing is a model for enabling on-demand
network access in order to share computing resources
such as network bandwidth, storage, applications, etc
that is able to be rapidly scalable with minimal
service provider management .
The Cloud Computing model has three service
delivery models and main three deployment models                     Fig 1: Cloud Computing Map


                                                                                                 854 | P a g e
Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and
                   Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.854-857

Hybrid Clouds provide more secure control of the            In their mechanism, numbers of intrusion detectors
data and applications and allows various parties to         were dispatched on the whole topology of the
access information over the Internet. Figure1 explains      networking system through multi-layers and multi-
about different cloud models and services also, there       stages deployment. Those information security issues
are 5 major technical characteristics of cloud              related with the application and service of cloud
computing: (i) large scale computing resources (ii)         computing would be experimented and discussed.
high scalability & elastic (iii) shared resource pool       The experiments included the equipment security of
(virtualized and physical resource) (iv) dynamic            the client side termination, the threats of web site and
resource scheduling and (v) general purpose.                webpage, the detection and diagnosis and
Specifically, cloud computing provides computing            surveillance of intrusion, the access and security of
resources as on demand services that are hosted             database in the cloud side, the detection of system
remotely, accessed over the Internet, and generally         leakage and the monitor of real-time repairing
billed on a per-use basis.                                  process, the management of server system, the
                                                            management of mobile e-commerce processing, and
II. LITERATURE REVIEW                                       the integrated analysis of associated security
          A numerous researches have been presented         information and issues. Chang-Lung Tsai et al. [2]
in the literature for cloud computing and its security      proposed a mechanism that was not only focused on
issues. A brief review of some recent researches is         find out some solutions, but also focused on develop
presented here. In the last few years, cloud                some feasible information security techniques or
computing has grown from being a promising                  products for the application and service of cloud
business concept to one of the fast growing segments        computing.
of the IT industry. But as more and more information        Cloud computing technology was a new concept of
on individuals and companies are placed in the cloud,       providing dramatically scalable and virtualized
concerns were beginning to grow about just how safe         resources, bandwidth, software and hardware on
an environment it was. Despite of all the hype              demand to consumers. Consumers could typically
surrounding the cloud, enterprise customers were still      requests cloud services via a web browser or web
reluctant to deploy their business in the cloud.            service. Using cloud computing, consumers could
Security was one of the major issues which reduces          safe cost of hardware deployment, software licenses
the growth of cloud computing and complications             and system maintenance. On the other hand, it also
with data privacy and data protection continue to           has a few security issues. Danish Jamil et al. [3]
plague the market. The advent of an advanced model          introduced four cloud security problems, which are
should not negotiate with the required functionalities      XML Signature Element Wrapping, Browser
and capabilities present in the current model. A new        Security, Cloud Malware Injection Attack and
model targeting at improving features of an existing        Flooding Attacks, and also gives the possible
model must not risk or threaten other important             countermeasures.
features of the current model. The architecture of          Cloud computing moved away from personal
cloud poses such a threat to the security of the            computers and the individual enterprise application
existing technologies when deployed in a cloud              server to services provided by the cloud of
environment. Cloud service users need to be vigilant        computers. The emergence of cloud computing has
in understanding the risks of data breaches in that         made a tremendous impact on the Information
new environment. S. Subashini et al. [1] proposed a         Technology (IT) industry over the past few years.
survey of the different security risks that pose a threat   Currently IT industry needs Cloud computing
to the cloud.                                               services to provide best opportunities to real world.
Cloud computing has become one of the most                  Cloud computing was in initial stages, with many
significant information security issues in recent years.    issues still to be addressed. The objective of that was
That was due to the dramatically emerging                   to explore the different issues of cloud computing
applications and required services of cloud                 and identify important research opportunities in this
computing. However, in order to safely utilize and          increasingly important area. V. Krishna Reddy et al.
enjoy the benefit of cloud computing through                [4] presented different design challenges categorized
wired/wireless networking, sufficient assurance of          under security challenges, Data Challenges,
information security such as confidentiality,               Performance challenges and other Design
authentication, non repudiation, and integrity was the      Challenges. The figure 2 explains the cloud
most critical factor for adoption. In order to well         computing architectures, which contains
understand the security of cloud computing,                 (i) Five Different Characteristics - On demand self
experimental platform based on kernel-based virtual         service, Broad network access, Resource pooling,
machine has established. Besides, a dynamic                 Rapid Elasticity and Measure Service.
intrusion detection system for strengthening the            (ii) Three Delivery Models- IaaS, PaaS and SaaS.
security application of cloud computing was                 (iii)Four Deployment Models- Public, Private,
implemented.                                                Community and Hybrid.

                                                                                                    855 | P a g e
Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 3, Issue 1, January -February 2013, pp.854-857

Krishna Chaitanya et al. [5] provided the basic idea     III.CRITICAL EVALUATION
on Cloud Computing. It also deals with the Security
Issue mainly faced in the Industry where Cloud           R    Context of       Problem          Research Type
Computing is implemented and necessary steps             ef   Research         Discussed
which could solve these problems to certain extent.
The prominence of the place of cloud computing in        1    Service          Different        Theoretical
future converged networks was incontestable.                  delivery         Security risks   study
That was due to the obvious advantages of the cloud           models survey    that pose a
as a medium of storage with ubiquity of access                in Cloud         threat to the
platforms and minimal hardware requirements on the            Computing        cloud.
user end. Secure delivery of data to and from the
cloud is however a serious issue that needs to be        2.   Security in      Security         Theoretical
addressed.                                                    Enterprise       Techniques       study
                                                              Cloud            for
                                                                               applications
                                                                               in cloud
                                                         3.   Web Security     Cloud            Theoretical
                                                              issues in        Security         study
                                                              cloud            problems,
                                                              computing.
                                                         4.   Research         Security         Theoretical
                                                              Issues in        Challenge,       study
                                                              Cloud            Data
                                                              Computing        Challenges
                                                                               Performance
                                                                               Challenges
                                                         5.   Study of         Security         Theoretical
                                                              Security         Issue mainly     study
                                                              Issues in        faced in the
                                                              Cloud            Industry.
                                                              Computing
                                                         6.   The Potential    Security         Theoretical
                                                              of               issues           study
                                                              Homeomorphi      affecting and
                                                              c Encryption     proposed
     Fig 2: Cloud Environment Architecture                    in cloud         homomorphi
                                                                               sm
Aderemi A. Atayero et al. [6] presented the security                           encryption.
issues affecting cloud computing and proposed the        7.   Challenges       Focusing on      Theoretical
use of homomorphic encryption as a panacea for                and Security     the types of     study
dealing with these serious security concerns vis-à-vis        Issues in        Cloud
the access to cloud data.                                     Cloud            Computing
Cloud computing was a set of IT services that were            Computing        and service
provided to a customer over a network on a leased                              service
basis and with the ability to scale up or down their                           deliveries.
service requirements. Usually cloud computing
services were delivered by a third party provider who
owns the infrastructure. It advantages to mention but    IV. CONCLUSION
a few include scalability, resilience, flexibility,               In this study different security issues
efficiency and outsourcing non-core activities.          research papers were studied briefly. In both larger
Despite the potential gains achieved from the cloud      and smaller scale organizations they are using cloud
computing, the organizations were slow in accepting      computing environment because of large advantage
it due to security issues and challenges associated      of cloud computing. The cloud computing has
with it Security was one of the major issues which       different security issues in threats in user view, one
hamper the growth of cloud. Kuyoro S. O et al. [7]       can say that lack of security is the only worth
introduced a detailed analysis of the cloud computing    mentioning disadvantage of cloud computing. The
security issues and challenges focusing on the cloud     bond between service providers and users is
computing types and the service delivery types.          necessary for providing better cloud security.


                                                                                                856 | P a g e
Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and
                   Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.854-857

In this paper we analyse the security issues, threats
and challenges in wide acceptance of cloud
computing, because there may be loss of data and
privacy. Researchers Scholars and IT security
professionals must press forward towards practical
achievements in security and privacy to users. Our
study identifies top security concerns of cloud
computing, these concerns are security risks,
techniques, problems, challenges and security issues
of cloud computing and its services.

REFERENCES
[1].   S. Subashini and V. Kavitha ,A survey on
       security issues in service delivery models of
       cloud computing., Journal of Network and
       Computer Applications, Vol. 34, No. 1, Jul,
       2010
[2].   Chang-Lung Tsai and Uei-Chin Li,
       Information Security of Cloud Computing for
       Enterprises, Advances on Information Sciences
       and Service Sciences. Vol. 3, No. 1, pp. 132-
       142, Feb 2011
[3].   Danish Jamil, Hassan Zaki, Security Issues In
       Cloud Computing And Countermeasures,
       International Journal of Engineering Science
       and Technology, Vol. 3 No. 4, pp. 2672-2676,
       April 2011
[4].   V. Krishna Reddy, B. Thirumala Rao, Dr.
       L.S.S. Reddy and P. Sai Kiran , Research
       Issues in Cloud Computing, Global Journal of
       Computer Science and Technology, Vol. 11
       No. 11 July 2011
[5].   Krishna Chaitanya.Y, Bhavani Shankar.Y,
       Kali Rama Krishna.V andV Srinivasa Rao,
       Study of security issues in Cloud Computing,
       International Journal of Computer Science
       and Technology ,Vol. 2, No. 3, Sept 2011
[6].   Aderemi A. Atayero, Oluwaseyi Feyisetan ,
       Security Issues in Cloud Computing: The
       Potentials of Homomorphic Encryption,
       Journal of Emerging Trends in Computing and
       Information Sciences, Vol. 2, No. 10, October
       2011
[7].   Kuyoro S. O, Ibikunle.F and Awodele O,
       Challenges and Security Issues in Cloud
       Computing       International    Journal   of
       Computer Networks, Vol. 3, No. 5, pp. 247-
       255, 2011




                                                                             857 | P a g e

Más contenido relacionado

La actualidad más candente

A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Taxonomy of cloud security
Taxonomy of cloud securityTaxonomy of cloud security
Taxonomy of cloud securityIJCSEA Journal
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGijitcs
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in theIJNSA Journal
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computingijtsrd
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 

La actualidad más candente (19)

G033030035
G033030035G033030035
G033030035
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Taxonomy of cloud security
Taxonomy of cloud securityTaxonomy of cloud security
Taxonomy of cloud security
 
Ms3422732277
Ms3422732277Ms3422732277
Ms3422732277
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
70 74
70 7470 74
70 74
 
Outsourcing control
Outsourcing controlOutsourcing control
Outsourcing control
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in the
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computing
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
B1802041217
B1802041217B1802041217
B1802041217
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 

Similar a Eb31854857

A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...Claire Webber
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGijccsa
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr_editor
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms IJECEIAES
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...AJASTJournal
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Associate Professor in VSB Coimbatore
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingingenioustech
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 

Similar a Eb31854857 (19)

G0314043
G0314043G0314043
G0314043
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTING
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 

Eb31854857

  • 1. Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.854-857 Security Issue Analysis in Cloud Computing Environment Vijay.G.R *, Dr.A.Rama Mohan Reddy** *(PhD scholar Department of Computer Science & Engg, JNTUA, Anantapur, A.P, India) ** (Professor, Dept. of CSE, SVU College of Engineering, Tirupati, A.P, India) ABSTRACT The growth in field of cloud computing are: (1) Private cloud: a cloud platform is dedicated increases threat security aspects. Security has for specific organization, (2) Public cloud available remained a constant issue for Internet and to public users to register and use the available networking, when we are talking about security infrastructure, and (3) Hybrid cloud: a private cloud cloud really effects. Lack of security is the only a that can extend to use resources in public clouds. problem or difficulty that must be overcome in Public cloud most vulnerable deployment model wide adoption of cloud computing. Cloud because for public users to host their services who computing is surrounded by many security issues may be malicious users. like securing data, and examining the utilization In providing a secure Cloud computing solution, a of cloud by the cloud computing vendors. Cloud major decision is to decide on the type of cloud to be computing has brought lots of security challenges implemented. Currently there are three types of cloud for the consumers and service providers. Our deployment models offered, namely, a public, private work mainly provides the basic idea on Cloud and hybrid cloud. Computing with the Security Issue mainly faced in Public Cloud: A public cloud is a model which both larger and smaller scale organizations where allows users’ access to the cloud via interfaces using Cloud Computing is implemented and necessary mainstream web browsers. It’s typically based on a steps which can solve these problems to certain pay-per-use model, similar to a prepaid electricity extent. metering system which is flexible enough to cater for This will enable researchers and security spikes in demand for cloud optimization. professionals to know about users and vendors Private Cloud: A private cloud is set up within an concerns and critical analysis about the different organization’s internal enterprise datacenter. It is research type proposed. easier to align with security, compliance, and regulatory requirements, and provides more Keywords :Cloud Computing, Security Issues enterprise control over deployment and use. Hybrid Cloud: A hybrid cloud is a private cloud I. INTRODUCTION linked to one or more external cloud services, As more facets of work and personal life centrally managed, provisioned as a single unit, and move online and the Internet becomes a platform for circumscribed by a secure network. It provides virtual human society, a new paradigm of large-scale virtual IT solutions through a mix of both public and distributed computing has emerged. Web-based private clouds. companies, such as Google and Amazon, have built web infrastructure to deal with the internet-scale data storage and computation. If we consider such infrastructure as a “virtual computer”, it demonstrates a possibility of new computing model, i.e., centralize the data and computation on the “super computer” with unprecedented storage and computing capability, which can be viewed as a simplest form of cloud computing . Cloud Computing is a new term for a long-held dream of computing as a utility , which has recently emerged as a commercial reality. Cloud computing is a model for enabling on-demand network access in order to share computing resources such as network bandwidth, storage, applications, etc that is able to be rapidly scalable with minimal service provider management . The Cloud Computing model has three service delivery models and main three deployment models Fig 1: Cloud Computing Map 854 | P a g e
  • 2. Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.854-857 Hybrid Clouds provide more secure control of the In their mechanism, numbers of intrusion detectors data and applications and allows various parties to were dispatched on the whole topology of the access information over the Internet. Figure1 explains networking system through multi-layers and multi- about different cloud models and services also, there stages deployment. Those information security issues are 5 major technical characteristics of cloud related with the application and service of cloud computing: (i) large scale computing resources (ii) computing would be experimented and discussed. high scalability & elastic (iii) shared resource pool The experiments included the equipment security of (virtualized and physical resource) (iv) dynamic the client side termination, the threats of web site and resource scheduling and (v) general purpose. webpage, the detection and diagnosis and Specifically, cloud computing provides computing surveillance of intrusion, the access and security of resources as on demand services that are hosted database in the cloud side, the detection of system remotely, accessed over the Internet, and generally leakage and the monitor of real-time repairing billed on a per-use basis. process, the management of server system, the management of mobile e-commerce processing, and II. LITERATURE REVIEW the integrated analysis of associated security A numerous researches have been presented information and issues. Chang-Lung Tsai et al. [2] in the literature for cloud computing and its security proposed a mechanism that was not only focused on issues. A brief review of some recent researches is find out some solutions, but also focused on develop presented here. In the last few years, cloud some feasible information security techniques or computing has grown from being a promising products for the application and service of cloud business concept to one of the fast growing segments computing. of the IT industry. But as more and more information Cloud computing technology was a new concept of on individuals and companies are placed in the cloud, providing dramatically scalable and virtualized concerns were beginning to grow about just how safe resources, bandwidth, software and hardware on an environment it was. Despite of all the hype demand to consumers. Consumers could typically surrounding the cloud, enterprise customers were still requests cloud services via a web browser or web reluctant to deploy their business in the cloud. service. Using cloud computing, consumers could Security was one of the major issues which reduces safe cost of hardware deployment, software licenses the growth of cloud computing and complications and system maintenance. On the other hand, it also with data privacy and data protection continue to has a few security issues. Danish Jamil et al. [3] plague the market. The advent of an advanced model introduced four cloud security problems, which are should not negotiate with the required functionalities XML Signature Element Wrapping, Browser and capabilities present in the current model. A new Security, Cloud Malware Injection Attack and model targeting at improving features of an existing Flooding Attacks, and also gives the possible model must not risk or threaten other important countermeasures. features of the current model. The architecture of Cloud computing moved away from personal cloud poses such a threat to the security of the computers and the individual enterprise application existing technologies when deployed in a cloud server to services provided by the cloud of environment. Cloud service users need to be vigilant computers. The emergence of cloud computing has in understanding the risks of data breaches in that made a tremendous impact on the Information new environment. S. Subashini et al. [1] proposed a Technology (IT) industry over the past few years. survey of the different security risks that pose a threat Currently IT industry needs Cloud computing to the cloud. services to provide best opportunities to real world. Cloud computing has become one of the most Cloud computing was in initial stages, with many significant information security issues in recent years. issues still to be addressed. The objective of that was That was due to the dramatically emerging to explore the different issues of cloud computing applications and required services of cloud and identify important research opportunities in this computing. However, in order to safely utilize and increasingly important area. V. Krishna Reddy et al. enjoy the benefit of cloud computing through [4] presented different design challenges categorized wired/wireless networking, sufficient assurance of under security challenges, Data Challenges, information security such as confidentiality, Performance challenges and other Design authentication, non repudiation, and integrity was the Challenges. The figure 2 explains the cloud most critical factor for adoption. In order to well computing architectures, which contains understand the security of cloud computing, (i) Five Different Characteristics - On demand self experimental platform based on kernel-based virtual service, Broad network access, Resource pooling, machine has established. Besides, a dynamic Rapid Elasticity and Measure Service. intrusion detection system for strengthening the (ii) Three Delivery Models- IaaS, PaaS and SaaS. security application of cloud computing was (iii)Four Deployment Models- Public, Private, implemented. Community and Hybrid. 855 | P a g e
  • 3. Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.854-857 Krishna Chaitanya et al. [5] provided the basic idea III.CRITICAL EVALUATION on Cloud Computing. It also deals with the Security Issue mainly faced in the Industry where Cloud R Context of Problem Research Type Computing is implemented and necessary steps ef Research Discussed which could solve these problems to certain extent. The prominence of the place of cloud computing in 1 Service Different Theoretical future converged networks was incontestable. delivery Security risks study That was due to the obvious advantages of the cloud models survey that pose a as a medium of storage with ubiquity of access in Cloud threat to the platforms and minimal hardware requirements on the Computing cloud. user end. Secure delivery of data to and from the cloud is however a serious issue that needs to be 2. Security in Security Theoretical addressed. Enterprise Techniques study Cloud for applications in cloud 3. Web Security Cloud Theoretical issues in Security study cloud problems, computing. 4. Research Security Theoretical Issues in Challenge, study Cloud Data Computing Challenges Performance Challenges 5. Study of Security Theoretical Security Issue mainly study Issues in faced in the Cloud Industry. Computing 6. The Potential Security Theoretical of issues study Homeomorphi affecting and c Encryption proposed Fig 2: Cloud Environment Architecture in cloud homomorphi sm Aderemi A. Atayero et al. [6] presented the security encryption. issues affecting cloud computing and proposed the 7. Challenges Focusing on Theoretical use of homomorphic encryption as a panacea for and Security the types of study dealing with these serious security concerns vis-à-vis Issues in Cloud the access to cloud data. Cloud Computing Cloud computing was a set of IT services that were Computing and service provided to a customer over a network on a leased service basis and with the ability to scale up or down their deliveries. service requirements. Usually cloud computing services were delivered by a third party provider who owns the infrastructure. It advantages to mention but IV. CONCLUSION a few include scalability, resilience, flexibility, In this study different security issues efficiency and outsourcing non-core activities. research papers were studied briefly. In both larger Despite the potential gains achieved from the cloud and smaller scale organizations they are using cloud computing, the organizations were slow in accepting computing environment because of large advantage it due to security issues and challenges associated of cloud computing. The cloud computing has with it Security was one of the major issues which different security issues in threats in user view, one hamper the growth of cloud. Kuyoro S. O et al. [7] can say that lack of security is the only worth introduced a detailed analysis of the cloud computing mentioning disadvantage of cloud computing. The security issues and challenges focusing on the cloud bond between service providers and users is computing types and the service delivery types. necessary for providing better cloud security. 856 | P a g e
  • 4. Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.854-857 In this paper we analyse the security issues, threats and challenges in wide acceptance of cloud computing, because there may be loss of data and privacy. Researchers Scholars and IT security professionals must press forward towards practical achievements in security and privacy to users. Our study identifies top security concerns of cloud computing, these concerns are security risks, techniques, problems, challenges and security issues of cloud computing and its services. REFERENCES [1]. S. Subashini and V. Kavitha ,A survey on security issues in service delivery models of cloud computing., Journal of Network and Computer Applications, Vol. 34, No. 1, Jul, 2010 [2]. Chang-Lung Tsai and Uei-Chin Li, Information Security of Cloud Computing for Enterprises, Advances on Information Sciences and Service Sciences. Vol. 3, No. 1, pp. 132- 142, Feb 2011 [3]. Danish Jamil, Hassan Zaki, Security Issues In Cloud Computing And Countermeasures, International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp. 2672-2676, April 2011 [4]. V. Krishna Reddy, B. Thirumala Rao, Dr. L.S.S. Reddy and P. Sai Kiran , Research Issues in Cloud Computing, Global Journal of Computer Science and Technology, Vol. 11 No. 11 July 2011 [5]. Krishna Chaitanya.Y, Bhavani Shankar.Y, Kali Rama Krishna.V andV Srinivasa Rao, Study of security issues in Cloud Computing, International Journal of Computer Science and Technology ,Vol. 2, No. 3, Sept 2011 [6]. Aderemi A. Atayero, Oluwaseyi Feyisetan , Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption, Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No. 10, October 2011 [7]. Kuyoro S. O, Ibikunle.F and Awodele O, Challenges and Security Issues in Cloud Computing International Journal of Computer Networks, Vol. 3, No. 5, pp. 247- 255, 2011 857 | P a g e