Security Issues in Cloud Computing
Introduction
The first computer ENIAC was invented by Charles Babbage in 18th century. But the real technological advancement of the computers came with the invention of the first four bit microprocessor in 1971. From 1971 till date, in the span of these 40+ years many operating systems came into existence (such as Windows 95, Windows 98, Windows 2000, Windows NT, Windows XP, Windows 7, Fedora, Mac, Redhat, Ubuntu, Kubuntu, Solaris etc.), many programming languages and web languages came into existence ( such as C, CPP, JAVA, .NET, HTML, XML, DHTML, SQL, PLSQL etc.), and many Multi-National Companies came into existence(such as Wipro, Genpact, Apple, Google, Tech Mahindra, Xerox, Oracle, SUN, Adobe, Microsoft and many more). But Internet is one of the key for the growth of each and every thing mentioned above. Cloud Computing is an emerging concept in which resources of computer infrastructure are provided over the Internet [1]. Cloud computing is a concept in which every device gets connected to the cloud which contains application, platform or Infrastructure or a mixture of them. People of 21st century are more familiar with smart phones rather than anything else. With the advent of phones such as IPhone and Android smartphones, the numbers of people using cloud are increasing substantially. Millions of people are using cloud in the present day scenario and it is equally important to provide the security to all the users who are using it. Cloud computing can be used as a utility to attract many people which can make software attractive as a service [2]. There are several security related issues with cloud which can be discussed in this paper.
Service Models of Cloud Computing
The p...
... middle of paper ...
....N.; Bamiah, M.A.; Chuprat, S.; Ab Manan, J.-L., "Towards an Efficient and Secure Educational Platform on cloud infrastructure," Cloud Computing Technologies, Applications and Management (ICCCTAM), 2012 International Conference on , vol., no., pp.145,150, 8-10 Dec. 2012
doi: 10.1109/ICCCTAM.2012.6488088
keywords: {cloud computing;educational computing;security of data;trusted computing;EEP;ESEP;ICT;SECaaS;TVD;cloud computing;cloud infrastructure;efficient educational platform;intrusion detection tool;open access global technology;secure educational platform;security as a service;security tool;trusted platform module;trusted virtual domain;vTPM;virtual TPM;Cloud Computing;Efficient and Secure Educational Platform;SECaaS;Security and Trust Issues;TPM;TVD;vTPM},
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6488088&isnumber=6488050
Cloud is the result of a decade research in the field of distributing computing , utility computing, virtualization , grid computing and more recently software, network services and web technology which is changeable evolution on demanding technology and services also as looking to the rapid growth of cloud computing which have changed the global computing infrastructure as well as the concept of computing resources toward cloud infrastructure. The important and interest of cloud computing increasing day by day and this technology receives more and more attention in the world (Jain, 2014) the mostly widely used definition of cloud computing is introduced by NIST “as a model for enabling a convenient on demand network access
Progressive technological development has paved the way for the ever increasing addition of multiple disparate devices. Devices which have the capability to connect to each other over a network affording them the ability to communicate with ease. Unfortunately the improved proficiency for communication carries with it a negative impact on information security. This detriment comes through the increased possibility of data loss and vulnerability exploitation. In this paper, we will seek to define one such measure to ensure security; by utilizing the Trusted Platform Module (TPM). We will also explore the strengths and vulnerabilities of the Trusted Platform Module as well as attacks against the TPM both in terms of hardware and software.
Delivering computer solutions has changed radically over the past thirty years from centralised mainframe computing to distributed client-server solutions. The consumption of Information Technology and Services (IT&S) has been accelerated by advances in network performance and facilities, consumerisation, and most notably through the adoption of Internet services. Business applications have also gone through a similar change from bespoke in-house mainframe systems to packaged products, and more recently, to distributed application frameworks (as seen on the iPhone).
Public cloud computing reduces infrastructure requirements for small business customers and creates a smaller technology profile which reduces maintenance requirements for the small business while simultaneously giving hackers less targets to hit. Software,...
Cloud computing is a way to increase the capabilities of a device or add new capabilities or services without making any hardware changes to the device. An example is if you are traveling and along the way you stop and power on your laptop to check your email. Some of the key cloud computing services being offered today address data storage. Storing important information and files in the cloud can ensure that they are available for years to come and can be accessed globally wherever Internet connectivity is available. Through cloud computing a handheld device, such as a table computer, can access the Internet, check email, purchase concert tickets or monitor a webcam on another continent. Computation and software are also two other key areas of cloud computing.
In the 1950s Cloud computing started with mainframe computing, where multiple users were able to access a central computer by using a dumb terminal, which had only one function, and that was to provide access to the mainframe. In the 1970s, the concept of virtual machines was created, by using the virtual machine technology it was possible to used more than one operating system simultaneously in a secluded environment. In 1993 cloud computing reached its first milestone with e-mail, which is a method of exchanging information/ data or digital messages through a computer network of the internet. Emails were originally a text based form of communication only, these days’ files like multimedia, images or PDFs can be attached. Today, cloud computing is a part of our everyday lives, we still use it to email, and now we use a more perfected cloud system to store applications or files and can access them anywhere and anytime.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
When they wanted to save photos online instead of on your personal computer, they are able to use “cloud computing” service. Cloud computing means that the transfer of computing data or information over the internet. Not just to keep data in your personal computer, they are able to save the data on internet server to open their data in any computer. In this report we will walk through about what is cloud computing, what kinds of model did cloud computing have, types of cloud computing, benefits of cloud computing, and security.
With the availability of good network infrastructure, many people are turning to the Internet to send and store their information. What is more, with the development and the emergence of cloud computing, it is imperative that both individuals and organizations are responsible for the safety and privacy of the data being transferred.
Institutions of higher learning are increasingly using Information and Communication systems in administration, teaching, learning and research. This infrastructure needs to be available, secure and well protected. It therefore becomes crucial for information security practitioners in public universities to implement effective information security programs. Information security focuses on technological issues and important elements of an organization such as people, process, business strategies etc., which also mandates the need for information security. A comprehensive security framework incorporates three basic components: people, technology, and process. When correctly assembled, the people, technology, and process elements of an information security framework work together to secure the environment and remain consistent with an institutions business objectives. (Mark, C.A. Wiley & A. John Wiley, 2011)
Students may study from this system to how to protect the system from different threats. Employs use this facility to keep the confidential things secure with high authentication access. • Businessman • Students • Lawyer • Police • Teacher • Doctor • Employ • STAKEHOLDERS: Professors use this system to keep his credentials safe and secure.
Cloud computing technology is a very known and popular paradigm in the field of Information technology. It is an incipient computing model which emanates from grid computing which is resulting into an emerging paramount concept in Information Technology. Vast number of operating systems and virtual servers are mutually dependent through the internet and allow sharable resources with each other. This generates expeditious and efficient computing speed. The concept of cloud computing is predicated on the time sharing of expensive resources and benefits of the providence of scale. The word Cloud originates from the well-known cloud shape which is expressed as a network in architectural system diagrams. Cloud computing applies traditional supercomputing to provide tremendous throughput computing power. Cloud computing allows user to execute simulated applications on a virtual server. In this report, we discuss about cloud computing technologies for example “Distributed File System (DFS), Map-Reduce, and Big tab”. [3] This cloud computing architecture is designed for, geographic information Services which contains functional utilization, perceptions, benefits, computing reserving data and infrastructure layers. We also discuss about software backdrops called as “D cloud”. D-Cloud provides a condition for analysis on the cloud elements using a particular structural configuration and implements large number of evaluations automatically as per the scenario. We also discuss about combining Peer to peer systems and technologies related cloud computing in order to construct a blueprint of the architecture and establish PC2, an open and free cloud computing platform. [4]
Virtualization-based security agent: Hypervisors in virtualized environment are widely used to enforce security policies transparently on enterprise and cloud applications in enterprise IT and cloud computing environments.
I have been interested in computer security for a while now. So that’s why I chose to research on some security and privacy issues that are challenging. For example using our cellular phones, playing games online, shopping online and even our private health data, can be invaded by unauthorized users. Therefore, in order to obtain personal data and information in which they can share to other unauthorized persons. These are threats and security issues that we face daily when using our devices and also using the internet.
Abstract: Fog computing extends cloud computing, cloud computing provide data, compute, storage, and application services to end-user, also the fog computing also provide the services like data, compute ,storage and application to end user. But in cloud the main problem that occurs is security and now a days security and privacy both are main concern that needed to be considered. Fog Computing is not a replacement of cloud it is just extends the cloud computing by providing security in the cloud environment. With Fog services we are able to enhance the cloud experience by isolating users’ data that need to live on the edge. The main aim of the fog computing is to place the data close to the end user.The securityissues are mentioned in this paper.