Cloud Computing is one of the predominant and emerging technologies. It provides easy access to the resources from all around the world remotely through internet access .As a result of this all the organizations/business enterprises are looking to take advantage of the cloud technology to make efficient use of resources and minimizing the storage cost. Cloud technology is designed with different type of services like IaaS (Infrastructure as a service),SaaS (Software as a Service),and PaaS (Platform as a Service) for the different type of business /users. Cloud computing is all about storing the files at third party. So, in that terms cloud environment is very unsafe. In spite of weak security measures that are maintained using standard authentication methods, this type of access will be vulnerable and easy for the intruders to breach out the data from the cloud.
“A major goal of hackers is to have control over system with ability to monitor, intercept, and modify system events and activities” (Rahman, 2011). And “All the sensitive data is received from the organization is processed by SaaS application and stored at the SaaS vendor end” (Goyal & Supriya, 2013). describes about how cloud architecture was designed .In addition to it “Many organizations are legally required to protect their data because organization don’t have any control over the sensitive information.” (Kuyoro Shade O, Chigozirim, Omotunde Ayokunle A, & Ibikunle Frank A, 2012). So, we need a secure mechanisms to deliver the data integrity and reliability for the cloud.
Figure1. Cloud Architecture Source : Google
Addressing the above issues I did a research on the security mechanisms that enhance and improve the security in cloud. And I found Trusted Com...
... middle of paper ...
...cutes the boot loader, which in turn does the same with the OS kernel, and so forth”(Chen & Lee, 2014) and next the ”TPM processor saves the system hardware and software configuration and delivers it to the cloud server ,it will directly process the request using the master private key from the TPM processor which serves as authentication for the client”(Sandhya, 2011). This technology was earlier implemented in conventional pc’s figure 4 describes the difference between conventional pc and TPM embedded pc.
Figure 4 Conventional PC vs TPM embedded PC.
In addition to this we can also monitor user behavior in the cloud “because user’s identity is proved by user’s personal key and this mechanism is integrated in the hardware, such as the BIOS and TPM, so it is very hard to the user to make deceiving for their identity information”(Dawson, 2010).using this mechanism
.
When the key is in the "on" position the Electronic Control Module (ECM), the main computer that controls all sensors and engine functions, powers up and readies the engine for start-up. When the starter is engaged and the coolant temperature is less than 100 degrees Fahrenheit, determined by the Coolant Temperature Sensor (CTS), the Cold Start Injector provides a spray of fuel to each cylinder via an air distribution system built into the intake manifold. If the engine temperature is greater than 100 degrees Fahrenheit, the Cold Start Injector is disabled by the cold start switch. Upon startup the ECM utilizes information in the Erasable Programmable Read Only Memory (EPROM) to establish the initial pulse rate for the fuel injectors. The ECM pulses, or opens and closes, the remaining 8 fuel injectors in sequence and the engine starts. During this, the Idle Air Control (IAC) valve is com...
...common risks and their mitigating techniques are: Unauthorized access to data centers, computer rooms, and wiring closets – this risk can be mitigated by applying policies, standards, procedures, and guidelines for staff and visitors to secure facilities. Servers must sometimes be shut down to perform maintenance – this can be mitigated by creating a system to tie servers, storage devices, and the network together and created redundancy to prevent down time on mission critical services. Server operating systems vulnerability – this can be mitigated by ensuring all server operating system environments are defined with the proper patches and updates. And lastly cloud computing virtual environments are not secure by default configurations – can be mitigated with setting up virtual firewalls and server segments on separate VLANs to help prevent failure in the network.
To secure the network setup, WPA2 can be used along with the optional Pre-Shared Key (PSK) for authentication. To encrypt the network with WPA2-PSK, the router is configured not with an encryption key but rather plain paraphrase. TKIP(for Temporal Key Integrity Protocol) is used along with the network SSID for generating unique encryption key for the wireless clients.
TPM or Trusted Platform Module is a microprocessor that has the ability to store credentials or artifacts used to authenticate the platform.
Virtualization is a technology that creates an abstract version of a complete operating environment including a processor, memory, storage, network links, and a display entirely in software. Because the resulting runtime environment is completely software based, the software produces what’s called a virtual computer or a virtual machine (M.O., 2012). To simplify, virtualization is the process of running multiple virtual machines on a single physical machine. The virtual machines share the resources of one physical computer, and each virtual machine is its own environment.
As its core essences cloud computing is nothing but a specialized form of grid computing and distributing computing’s which various in terms of infrastructure , deployment, service and Geographic’s dispersion (Veeramachanenin, Sepetember 2015) the cloud enhance scalability, collaboration, availability , ability to adapt to fluctuation according to demand accelerate development work and provide optional for cost reduction and through efficient and optimized computing. (BH kawljeet, June 2015) cloud computing (CC) recently become as a new paradigm for the delivery and hosting of services our the internet. There are mainly three service delivery model Software as Service (SaaS) required software, operating system and network is provided or we can say in SaaS the customer can access the hosted software instead of installing it in local computer and the user can access these software through local computer internet browser (e.g web enabled E-mail ) the user only pay and the cloud service provider is responsible for management or control of mobile cloud infrastructure some of the company which provide such service are Google, Microsoft , Salesforce ,Facebook, etc…..Infrastructure as Service(IaaS)the cloud provider only provide some hardware resources such as network and virtualization is
Description: Generally default factory configurations for appliances and embedded systems contains simple and publicly open passwords and the vendor expect that user should change the password once they start using those systems for personal use. The alert is about the risk involved in keeping these factory default passwords when using the system for personal use.
However in both systems, the hardware cannot multitask without the software, which enables the OS to be used and updated. Kernel code is responsible to manage the work in both hardware and software for the OS, and it also transmits the information using the Input and Output system in OS X and it does a similar function in Windows10, but it is called device manager.
Public cloud computing reduces infrastructure requirements for small business customers and creates a smaller technology profile which reduces maintenance requirements for the small business while simultaneously giving hackers less targets to hit. Software,...
At the World Congress on Engineering 2011 conference in London, U.K., it was noted that the issue of security matters for cloud computing requires revising (Pinto et al., 2011). As mentioned earlier, when going to a cloud network any internal control system is essentially transferred to the service provider. As such, Pinto et al. (2011) explains about the “existence of a new entity called a cloud security manager” whose responsibility it is to keep documentation of client access to the cloud as well as third party processing. To put it differently, the duties of the cloud security manager will be to manage the overall cloud system by instituting an internal control matrix.
With Cloud Computing continue to gain popularity, client and user are showing sign of over reliance to it. Hence, it is important to know these concerns and the inherent risks associated with it. The underlying risks exist in the area of security and privacy are loss of control over data and dependency on the service providers. These can lead to many legal and security concerns related to access/account control, integrity control, risk management, infrastructures, standardisation, code of conduct, sustainability and service provider insolvencie...
The BIOS then looks for other devices' ROMs to see if any of them have BIOSes.
I marveled at the intricacies involved in making a laptop operate. It required the cohesive communication between the motherboard and hard drive, memory and keyboard. Exploring the Intel WLAN PA3375U Wireless card, I realized that the green piece of silicon was the reason I was able to connect to the internet and spend countless hours on Facebook and CNN. I continued to disassemble the laptop, exploring every corner of the ThinkPad. All the while, I pondered the uses and functionality of each part.
Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.
When they wanted to save photos online instead of on your personal computer, they are able to use “cloud computing” service. Cloud computing means that the transfer of computing data or information over the internet. Not just to keep data in your personal computer, they are able to save the data on internet server to open their data in any computer. In this report we will walk through about what is cloud computing, what kinds of model did cloud computing have, types of cloud computing, benefits of cloud computing, and security.