OVERVIEW OF CLOUD COMPUTING WITH SECURITY ISSUES, CHALLENGES & COUNTERMEASURES

Size: px
Start display at page:

Download "OVERVIEW OF CLOUD COMPUTING WITH SECURITY ISSUES, CHALLENGES & COUNTERMEASURES"

Transcription

1 OVERVIEW OF CLOUD COMPUTING WITH SECURITY ISSUES, CHALLENGES & COUNTERMEASURES Aaditya Jain 1, Chanderpratap Singh Hada 2, Dr. Bala Buksh 3 1 M.Tech Scholar, Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical University, Kota, Rajasthan, (India) 2 Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical University, Kota, Rajasthan, (India) 3 Professor, Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical University, Kota, Rajasthan, (India) ABSTRACT Cloud computing is the delivery of computing as a service rather than a product, whereby IT resources, software, shared resources, and information are provided to computers as well as other devices on demand, like the electricity grid. Cloud computing is also an Internet based computing where a large pool of systems are connected in private or public networks, and provide dynamically scalable infrastructure for application data as well as file storage. Security of Cloud computing is an evolving sub-domain of network security, computer security and information security. In spite of its vitality, it exhibits many security flaws such as loss of important data, data leakage and something related to cloning, resource pooling etc. Security of Cloud Computing is emerging area for study and this paper presents an overview and characteristics of cloud computing. Also include the several security and privacy issues with challenges and includes solution of security issues of cloud computing. The aim of this paper is to show important aspect of security, privacy concerned challenges which the authors and researchers are facing in the security of cloud computing. Keywords Cloud Computing, Security Issues, Cloud Services, Challenges And Security Solutions. I. INTRODUCTION Internet has been a driving force towards the various technologies that have been developed. Arguably, one of the most discussed among all of these is Cloud Computing. Cloud computing is seen as a trend in the present day scenario with almost all the organizations trying to make an entry into it. The cloud is emerging as the latest way to approach alternative delivery models for IT capabilities. It is a way of delivering IT enabled services in the form of 601 P a g e

2 software, infrastructure and more. This research examines the definition of cloud computing and how it will evolve. Cloud computing can be defined as A computing Cloud is a set of network enabled services, providing scalable, QoS guaranteed, normally personalized, inexpensive computing platforms on demand, which could be accessed in a simple and pervasive way [1]. In simple words, Cloud computing is the combination of a technology, platform that provides hosting and storage service on the Internet. Aim behind the cloud computing is to provide scalable and inexpensive on demand computing infrastructures with good quality of service levels. Cloud Computing is the implementation of engineering principals to obtain high quality applications through Internet. Main goal of the cloud computing is to provide scalable and inexpensive on-demand computing infrastructures with good quality of service levels [2]. Cloud computing provides the internet based, highly scalable distributed computing systems in which computational resources are offered 'as a service'. The most widely used definition of the cloud computing model is introduced by NIST [3] as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. The advantages of using cloud computing are: i) reduced hardware and maintenance cost, ii) accessibility around the globe, and iii) flexibility and the highly automated process wherein the customer need not worry about software up-gradation which tends to be a daily matter [4]. II. OVERVIEW OF CLOUD COMPUTING The cloud is a term that refers to the web and cloud formation is used to represent the Internet in computer network diagrams as well [5]. The reason of Likened the Internet to the cloud is that the Internet as a cloud hides its technical details from the user's view and it creates a layer of abstraction between the user and technical details. For example, what is provided by a software service provider of cloud computing is online business applications that are provided to users through a web browser or other software. Applications and data are stored on servers and are available to users on demand. Details remain hidden from the user's view and the user needs no expertise or control over the used cloud infrastructure technology. Generally, consumers of cloud computing are not owner of cloud physical infrastructure but they rent it from a third party to avoid the cost of capital. They consume the resources as a service and pay only the cost of the resources used. 602 P a g e

3 Fig. 1 Classification of cloud system [5] Cloud computing can be divided into two sections, the user and the cloud. In most scenarios, the user is connected to the cloud via the internet. It is also possible for an organization to have a private cloud in which a user is connected via a intranet. However, both scenarios are identical other than the use of a private and public network or cloud [6]. The user sends requests to the cloud and the cloud provides the service. Cloud computing products, also called cloud service delivery models, as in Fig. 2, which are often roughly classified into a hierarchy of -as a service terms, presented here in order of increasing specialization: Infrastructure-as-a-service (IaaS): where cloud providers deliver computation resources, storage and network as an internet-based services. This service model is based on the virtualization technology. Amazon EC2 is the most IaaS provider. Platform-as-a-service (PaaS): where cloud providers deliver platforms, tools and other business services that enable customers to develop, deploy, and manage their own applications, without installing any of these platforms or support tools on their local be hosted on top of IaaS model or on top of the cloud infrastructures directly. Google Apps and Microsoft Windows Azure are the most known. Software-as-a-service (SaaS): where applications hosted on the cloud infrastructure as internet based service for end users, applications on the customers computers be hosted on top of PaaS, IaaS or directly hosted on cloud infrastructure. SalesForce CRM is an example of the provider. Each service delivery model has different possible implementations, as in Fig 2, which complicates development of standard security model for each service delivery model. 603 P a g e

4 Fig. 2 Cloud service delivery models Irrespective of the above mentioned service models, cloud services can be deployed in four ways depending upon the customer s requirements: Public Cloud: A cloud infrastructure is provided to many customers and is managed by a third party [7]. Multiple enterprises can work on the infrastructure provided, at the same time. Users can dynamically provision resources through the internet from an off-site service provider. Wastage of resources is checked as the user pays for whatever they use. Private Cloud: Cloud infrastructure, made available only to a specific customer and managed either by the organization itself or third party service provider. This uses the concept of virtualization of machines, and is a proprietary network [7]. Community Cloud: Infrastructure shared by several organizations for a shared cause and may be managed by them or a third party service provider. Hybrid Cloud: A composition of two or more cloud deployment models, linked in a way that data transfer takes place between them without affecting each other [8]. III. CHARACTERISTICS OF CLOUD COMPUTING The main characteristics of cloud computing [9] include on-demand self-service, broad network access, resource pooling, rapid elasticity, measured service and multi tenacity [10], [11]. On demand self-service characteristics 604 P a g e

5 means that customers or usually organizations can request as well as manage their own computing resources. Broad network access provides services to be offered over the Internet. Resource pooling characteristics means that customers draw from a pool of computing resources, usually in remote data centers. Services can be scaled larger and smaller; as well as use of a service is measured and also customers are billed accordingly. Cloud computing resource usage can be measured and controlled providing transparency for both the consumer and provider of the utilized service [12]. Multi-tenancy and elasticity are two key characteristics of the cloud model. Multi-Tenancy enables sharing the same service instance among different tenants [13]. Elasticity enables scaling up and down resources allocated to a service based on the current service demands. Both characteristics focus on improving resource utilization, cost and service availability. Some benefits of cloud computing are pointed by authors of [12], [14], [15]. Flexibility, dynamic scalability, competitiveness, location and device independence. Achieve economies of scale, helps in disaster recovery. Automatic software updates, increased collaboration minimize licensing new software. Reduce spending on technology infrastructure, having streamline processes with reduced cost. Projects monitor more effectively, business continuity, and increased storage. Minimized capital expenditure, having high computing power. Optimized server utilization, Shortened development life cycle. IV. SECURITY ISSUES OF CLOUD COMPUTING Cloud Computing leverages many existing technologies such as web services, web browsers, and virtualization, which contributes to the evolution of cloud environments. Therefore, any vulnerability associated to these technologies also affects the cloud, and it can even have a significant impact. Rapid cloud adoption has however, introduced unique and complex security considerations for users. Now organizations must consider how adopting a cloud-computing model will affect their risk profile related to data security, privacy and availability. The vendor for Cloud must make sure that customer does not face any problem like loss of data, data theft or more. Here we discussed, major issues with cloud computing that are faced by various authors in their research [14], [16]-[20]. 4.1 Data Loss If the vendor closes due to financial problems there will be a loss of data for the customers, so it is a serious problem in Cloud computing, as well as customers won t be access those data s because data is no more available for the customer as the vendor shut down. 4.2 Data Location Location of any data nothing is transparent even the customer don t know where his own data s are located. Vendor does not reveal where all the data s are stored and data s won t even be in the same country of customer, it might be located anywhere in the world. 605 P a g e

6 4.3 Data Theft Many cloud Vendors instead of acquiring a server tries to lease a server from another service providers because they are cost affective. The customer doesn t know any things, so there is a possibility that the sensitive data can be stolen from external server by a malicious user. 4.4 Data Integrity Data is store on a cloud, then anyone from any location can access those data s from the cloud and also Cloud does not differentiate between a sensitive data from a common data so enabling anyone to access those sensitive data s, Thus it is a lack of data integrity. 4.5 Privacy Issues Most of the servers are external, so vendor should make sure who is accessing the data as well as who is maintaining the server so enabling the vendor to protect the customer s information. 4.6 Security on User Level Vendor has provided a very good security layer for the customer, and customer should make sure that because of its own action, there shouldn t be any loss of data for other users who are using the same Cloud. 4.7 Security on Vendor Level A Cloud is good if when there is a very good security provided by the vendor to the customers. Server is much secured from all the external threats, this all things vendor should make sure. 4.8 Infected Application Vendor should have the full access to the server for monitoring as well as maintenance, so preventing any malicious user from uploading any infected application onto Cloud which will severely affect the customer. V. CHALLENGES IN CLOUD COMMUNICATION SECURITY The communication process results in transmission of either data/information or applications between the customer and the cloud. Moreover, there exists communication within cloud between VMs. This communication generates cloud specific challenges because of cloud specific characteristics and technologies. 5.1 Shared Communication Infrastructure Resource pooling not only results in sharing of computational and storage resources but also sanctions the sharing of network infrastructure components. The sharing of network components provides attacker the window of cross tenant attack [18], [20]. The vulnerability stems from the resource pooling characteristic of the cloud computing and affects the IaaS service model of the cloud. Due to the fact that it is hard to distinguish between a legal vulnerability scan of network and attacker activity, usually such scans are not allowed by the service providers. Similarly, the IPbased segregation of network portions are not applied as network resources are dynamically provisioned and released and cannot be associated to particular set of users. The users on the cloud are usually granted with the super-user access for the purpose of managing their VMs. The access capability empowers the malicious user to 606 P a g e

7 acquire system IP or MAC addresses and make malicious use of IaaS network interfaces. The malicious user with super-user access to the real network components may launch attacks, such as, sniffing and spoofing over the real network. 5.2 Virtual Network In cloud computing systems, the communication takes place not only on real networks but virtualized networks also play an important role in communication. Virtual network is a logical network built over a physical network. The virtual networks are responsible for communication between VMs. The software-based network components, such as bridges, routers, and software-based network configurations, support the networking of VMs over the same host. The virtualized networks are able to generate the following security challenges in the cloud environment. Security and protection mechanisms over the physical network are not able to monitor the traffic over virtualized network. This becomes a serious challenge as malicious activities of the VMs go beyond the monitoring of security tools. Intrusion detection and prevention mechanisms usually depend on the traffic patterns and activities to judge the anomalies and detect the possibility of the attack. Virtualized network poses a hindrance to the goal of such preventive measures [21]. The virtualized network is shared among multiple VMs that causes the possibility of certain attacks, such as, Denial of Service (DoS), spoofing and sniffing of virtual network. The traffic rates can be monitored for malicious purposes. The cryptographic keys become vulnerable to leakage, in case of malicious sniffing and spoofing of virtual network [17]. The data in transit belonging to users can suffer from costly breaches. 5.3 Security Misconfigurations Security configurations of the cloud network infrastructure are of significant importance in providing secure cloud services to the user [16], [22]. Misconfigurations can radically compromise the security of customers, applications, and the whole system. Customers outsource their applications and data to the cloud with the trust that their assets are secure within the cloud environment. A small misconfiguration can breach the security of the system. The configurations need to be well in place not only at the time of cloud infrastructure development, deployment, and operations but subsequent changes in the cloud network should also keep the configuration consistent with the security policies. One of the most common misconfiguration occur when administrators select such a configuration tool that they are familiar with but not necessarily covers all the security requirements. The migration of VMs, data, and applications across multiple physical nodes, changes in traffic patterns, and topology can generate the requirement of varied security policies. In such a scenario, the configuration of the cloud should dynamically be managed to ensure the security of the cloud. Likewise, any weakness in session configurations and protocol configurations can be exploited for session hijacking and to gain user sensitive data. VI. SOLUTIONS FOR SECURITY ISSUES OF CLOUD COMPUTING Small and large Businesses are realizing the benefits that come with cloud computing technology [24]. The scalability which allows you to easily shrink your operation, agility that enables you to make quick changes, cost- 607 P a g e

8 effectiveness so can save you money, cloud seems such as a no-brainer [28], [56]. When increased cloud adoption rates come increased cloud computing security issues also. Here we discussed about some solution of security issues in cloud computing: 6.1 Vulnerability Shielding When waterhole attacks occurs, and then solution is Vulnerability shielding [18] that update and patches all software regularly to limit possible access points. The water hole attack contains 3-step process, first, the attacker does some reconnaissance and research on its target, in which they find, trusted websites often visited by employees of the target company. Then, attackers insert an exploit into the trusted sites, and finally, when your employees visit the trusted site, the exploit takes advantage of their system vulnerabilities. 6.2 Find Right Cloud Provider Another solution of security issues in cloud computing is find right cloud provider (well established, experience, standards and regulation), because different vendors have different cloud data management [42]. 6.3 Data Storage Regulation The architecture of cloud environment is key and you must understand concept of the respective data storage regulations in the countries you operate in. You must look for cloud security solutions which are compliant with regulations such as HIPAA, PCI DSS, and EU data protection laws and EU s very restrictive regulations, accept that this is a very good solution [18]. 6.4 Facility for Recovery The Cloud vendors should be responsible for recovery the date. If any data is lost due to certain issues, they can be recovered as well as continuity of data can be managed [42]. 6.5 Enterprise Infrastructure Amazon Web Service s has their own security center explains that so cloud provider has secured the underlying infrastructure and you, also the client, must secure anything you put on the infrastructure [18]. Enterprise must have infrastructure which give you facilitates for installation as well as configuration of hardware components like firewalls, routers, servers, proxy servers, and software etc. [42], [48]. 6.6 Use Split Key Encryption Techniques You should use split-key encryption technologies [18] to ensure that only you control your sensitive data and also your cloud provider shares responsibility for the infrastructure, therefore you are still responsible for your apps and data [42]. At least not in a readable form you also Use a cloud encryption solution to show that your data never left home. 608 P a g e

9 6.7 Access Control Access control [4], [47] is a key concern, and Cloud requires also a user centric access control where user request to any service provider is bundled with the user identity as well as entitlement information. User identity [4] will have identifiers which identity and define the user. This approach leaves the user with the ultimate control of their digital identities and implies that the system maintains a context of information for every user. 6.8 ID Management and Authentication When access monitoring is to implement of Key Management for both cloud service provider and client and Key must be known for both entities as well as will be remotely monitored [4]. When clients access the cloud computing services, it must be first authenticated, not only using username and password but a digital ID s also [4]. Find solutions which require no hardware that is the best fit for cloud environments. In short, a solution should give all the benefits as well as up in minutes too, so, make sure you limit your vulnerabilities, do not let anyone have access to your own encryption keys, comply with all required laws as well as regulations, use encryption technology to make your life easier, and understand that you share responsibility for liability. VII. CONCLUSION Cloud computing is a promising and emerging technology for the next generation of IT applications. Although cloud computing has many advantages, there are still many actual problems that need to be solved. The revenue estimation implies that cloud computing is a promising industry. But from another perspective, existing vulnerabilities in the cloud model will increase the threats from hackers. According to service delivery models, deployment models and essential features of the cloud computing, data security and privacy protection issues are the primary problems that need to be solved as soon as possible. The challenges in privacy protection are sharing data while protecting personal information. The typical systems that require privacy protection are e-commerce systems that store credit cards and health care systems with health data. The ability to control what information to reveal and who can access that information over the Internet has become a growing concern. This research paper analyzed what exactly cloud computing security related issues are, and discussed some solutions to overcome them. Authorization and access control mechanisms will need to achieve a unified, reusable and scalable access control model and meet the need of fine grained access authorization. REFERENCES [1] L. Wang, G. Laszewski, M. Kunze and J. Tao, Cloud computing: a perspective study, J New Generation Computing, pp 1-11, [2] Harjit Singh Lamba and Gurdev Singh, Cloud Computing-Future Framework for e-management of NGO's, IJoAT, ISSN , Vol 2, No 3, July P a g e

10 [3] Peter Mell, and Tim Grance, "The NIST Definition of Cloud Computing,"2009, media /faq-files/clouddef- v15.pdf, Accessed April [4] R. Maggiani, Communication Consultant, Solari Communication, Cloud Computing is Changing How we Communicate, 2009 IEEE International Professional Conference, IPCC, pp. 1-4, Waikiki, HI, USA, July 19-22, ISBN: [5] Gupta P. cloudsim & cloud setup [OnLine], Access in January [6] Ertaul, L. and Singhal, S. Security Challenges in Cloud Computing, California State University, East Bay, [7] R. L Grossman, The Case for Cloud Computing, IT Professional, vol. 11(2), pp , ISSN: , [8] Rohit Bhadauria et. al. paper on A Survey on Security Issues in Cloud Computing, International Journal of Computer Application, Vol 15, Issue 2, [9] Wayne Jansen, Timothy Grance, Guidelines on Security and Privacy in Public Cloud Computing, Draft Special Publication , Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD , [10] Christopher Olive, Cloud Computing Characteristics Are Key, White Paper, [11] Peter Mell, Timothy Grance, The NIST Definition of Cloud Computing, Recommendations of the National Institute of Standards and Technology, Special Publication , [12] Viswa prakash babu, Banda Sreenivas, Thota Praveen Kumar, R.Jawahar Lal, Cracking Bluetooth security Int. Journal of Applied Sciences and Engineering Research, Vol. 3, No. 2, ISSN , [13] Robert Gellman, Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, February 23, [14] Dr. David Turahi, Security and Privacy: Can we trust the cloud?, East African Information Conference 13-14thAugust, 2013, Kampala, Uganda. [15] Anthony Bisong and Syed (Shawon) M. Rahman An Overview of The Security Concerns In Enterprise Cloud Computing ; International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, DOI: /ijnsa , [16] Nir Kshetri, Associate Professor, The University of North Carolina-Greensboro, Usa Privacy And Security Issues In Cloud Computing, PTC 11 Proceedings [17] Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull, Security Issues with Possible Solutions in Cloud Computing-A Survey, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 2, Issue 2, ISSN: , February P a g e

11 [18] N. Gonzalez, C. Miers, F. Redgolo, M. Simplcio, T. Carvalho, M. Nslund, M. Pourzandi, A quantitative analysis of current security concerns and solutions for cloud computing, Cloud Computing conference, USA, 1 (1) (2012) [19] Vahid Ashktorab, Seyed Reza Taghizadeh, Security Threats and Countermeasures in Cloud Computing, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 1, Issue 2, ISSN , October [20] Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy; Cloud Computing: Security Issues and Research Challenges, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 1, No. 2,,ISSN: , December [21] D. AB. Fernandes, L. FB. Soares, J.V. Gomes, M.M. Freire, P. RM Inácio, Security issues in cloud environments: a survey, Int. J. Inform. Sec. 13 (2) , August [22] K. Hashizume, D.G. Rosado, E. Fernndez-Medina, E.B. Fernandez, An analysis of security issues for cloud computing, J. Internet Services Appl. 4 (1)-1 13, [23] W.A. Jansen, Cloud hooks: Security and privacy issues in cloud computing, in: 44th Hawaii International Conference on System Sciences (HICSS), 2011, pp [24] Allan A. Friedman and Darrell M. West Privacy and Security in Cloud Computing, 1026_cloud_computing_friedman_west.pdf. [25] Issa M. Khalil, Abdallah Khreishah and Muhammad Azeem; Cloud Computing Security: A Survey ; Computers 2014, 3, 1-35; doi: /computers ; ISSN X. [26] Anitha Y, Security Issues in Cloud Computing - A Review, International Journal of Thesis Projects and Dissertations (IJTPD), Vol. 1, Issue 1, PP: (1-6), Month: October-December 2013, Research Publish Journals. [27] Pradeep Kumar Tiwari, Dr. Bharat Mishra, Cloud Computing Security Issues, Challenges and Solution, International Journal of Emerging Technology and Advanced Engineering, ISSN , Volume 2, Issue 8, August P a g e

CLOUD COMPUTING IN RURAL EDUCATIONAL SECTOR:ENLIGHTENING BENEFITS AND CHALLENGES

CLOUD COMPUTING IN RURAL EDUCATIONAL SECTOR:ENLIGHTENING BENEFITS AND CHALLENGES International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN 2249-6831 Vol. 3, Issue 2, Jun 2013, 317-322 TJPRC Pvt. Ltd. CLOUD COMPUTING IN RURAL EDUCATIONAL

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous

More information

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE H.Madhusudhana Rao* Md. Rahmathulla** Dr. B Rambhupal Reddy*** Abstract: This paper targets on the productivity of cloud computing technology in healthcare

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com

More information

1.1.1 Introduction to Cloud Computing

1.1.1 Introduction to Cloud Computing 1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING

A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING Yogita gangboir 1, Praveen Shende 2, Tushar Kumar Vaidya 3 1,3 Department of Computer Science and Engineering, CSIT, Durg, (India) 2 Assoistant Professor

More information

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com

More information

International Journal of Engineering Research & Management Technology

International Journal of Engineering Research & Management Technology International Journal of Engineering Research & Management Technology Cloud Security Issues, Challenges And Their Optimal Solutions Vinay Kumar Pant M.Tech. (CSE) Subharti Institute of Technology and Engineering

More information

Security Issues In Cloud Computing and Countermeasures

Security Issues In Cloud Computing and Countermeasures Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department

More information

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer Problems Faced by Cloud Computing tyuiopasdfghjklzxcvbnmqwertyuiopas

More information

A Study of Infrastructure Clouds

A Study of Infrastructure Clouds A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,

More information

Cloud Computing and Security

Cloud Computing and Security Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2014 Cloud Computing and Security David B. Brogan Seidenberg School of CSIS, Pace University, White Plains, New York Abstract

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD

More information

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud? East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

An Intelligent Approach for Data Fortification in Cloud Computing

An Intelligent Approach for Data Fortification in Cloud Computing An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,

More information

How To Understand Cloud Usability

How To Understand Cloud Usability Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,

More information

Security Issues In Cloud Computing And Their Solutions

Security Issues In Cloud Computing And Their Solutions Security Issues In Cloud Computing And Their Solutions Mr. Vinod K. Lalbeg Lecturer (Management), NWIMSR, Pune-1 & Ms. Anjali S. Mulik Lecturer (Management), NWIMSR, Pune-1 ABSTRACT Cloud Computing offers

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of

More information

Addressing Cloud Computing Security Concerns

Addressing Cloud Computing Security Concerns pp. 196-200 Krishi Sanskriti Publications http://www.krishisanskriti.org/acsit.html Addressing Cloud Computing Security Concerns Vasundhara Bhatia 1, NehaPrabhakar 2 and SumatiManchanda 3 1,2,3 Amity School

More information

THE CLOUD- CHANGING THE INDIAN HEALTHCARE SYSTEM

THE CLOUD- CHANGING THE INDIAN HEALTHCARE SYSTEM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 5, May 2013, pg.238

More information

ABSTRACT: [Type text] Page 2109

ABSTRACT: [Type text] Page 2109 International Journal Of Scientific Research And Education Volume 2 Issue 10 Pages-2109-2115 October-2014 ISSN (e): 2321-7545 Website: http://ijsae.in ABSTRACT: Database Management System as a Cloud Computing

More information

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud 1 What is meant by Cloud Computing, or Going To The Cloud? A model

More information

Security Aspects of Cloud Computing

Security Aspects of Cloud Computing Security Aspects of Cloud Computing Kunal Chadha Scholar, CSE Department University of Southern California, USA Anvita Bajpai X-Scholar, CSE Department Marist College, NY, USA ABSTRACT Cloud Computing

More information

Cloud Computing-A Tool For Future

Cloud Computing-A Tool For Future [Volume 1 issue 1 Feb 2013] Page No.09-14 www.ijmcr.in [International Journal Of Mathematics And Computer Research] Cloud Computing-A Tool For Future 1 Dr D S Kushwaha 1 Ankit Maurya 2 Institute of Engineering

More information

VIRTUALIZATION IN CLOUD COMPUTING

VIRTUALIZATION IN CLOUD COMPUTING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.540

More information

Security & Trust in the Cloud

Security & Trust in the Cloud Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015 RESEARCH ARTICLE OPEN ACCESS A Survey on Cloud Computing Security and Solutions N. Sugavaneswaran, D.Saravanan Assistant Professor Department of Computer Science Srimad Andavan Arts and Science College

More information

Radware Cloud Solutions for Enterprises. How to Capitalize on Cloud-based Services in an Enterprise Environment - White Paper

Radware Cloud Solutions for Enterprises. How to Capitalize on Cloud-based Services in an Enterprise Environment - White Paper Radware Cloud Solutions for Enterprises How to Capitalize on Cloud-based Services in an Enterprise Environment - White Paper Table of Content Executive Summary...3 Introduction...3 The Range of Cloud Service

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

Study of Security Issues in Cloud Computing

Study of Security Issues in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.230

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

Security Model for VM in Cloud

Security Model for VM in Cloud Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,

More information

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government October 4, 2009 Prepared By: Robert Woolley and David Fletcher Introduction Provisioning Information Technology (IT) services to enterprises

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014 An Overview on Cloud Computing Services And Related Threats Bipasha Mallick Assistant Professor, Haldia Institute Of Technology bipasm@gmail.com Abstract. Cloud computing promises to increase the velocity

More information

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director

More information

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM. Agenda. Security Cases What is Cloud? Road Map Security Concerns

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM. Agenda. Security Cases What is Cloud? Road Map Security Concerns BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

Cloud Computing for SCADA

Cloud Computing for SCADA Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry

More information

Vormetric Data Security Securing and Controlling Data in the Cloud

Vormetric Data Security Securing and Controlling Data in the Cloud Vormetric Data Security Securing and Controlling Data in the Cloud Vormetric, Inc. Tel: 888.267.3732 Email: sales@vormetric.com www.vormetric.com Table of Contents Executive Summary.........................................................3

More information

Cloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer

Cloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer Cloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer Plan. Prepare. Protect. About Us Formed by a Group of DC Metro

More information

CLOUD COMPUTING SECURITY CONCERNS

CLOUD COMPUTING SECURITY CONCERNS CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.

More information

Private Vs Public Cloud

Private Vs Public Cloud Private Vs Public Cloud Solanke Vikas 1, Kulkarni Gurudatt 2, Maske Vishnu 3, Kumbharkar Prashant 4 1 Lecturer in Information Technology Department,MM Polytechnic Pune, India solankevs@mmpolytechnic.com

More information

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the

More information

Role of Cloud Computing in Education

Role of Cloud Computing in Education Role of Cloud Computing in Education Kiran Yadav Assistant Professor, Dept. of Computer Science. Govt. College for Girls, Gurgaon, India ABSTRACT: Education plays an important role in maintaining the economic

More information

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar

More information

SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN 2278 5973)

SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN 2278 5973) SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN 2278 5973) Cloud Computing: Security Issues In Infrastructure-As-A-Service Model

More information

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35

More information

Mobile and Personal Cloud Computing The Next Step in Cloud Computing

Mobile and Personal Cloud Computing The Next Step in Cloud Computing A Member of OneBeacon Insurance Group Mobile and Personal Cloud Computing The Next Step in Cloud Computing Author: Edgar Germer, Risk Control Specialist Published: November 2015 Executive Summary Cloud

More information

Cloud Based E-Government: Benefits and Challenges

Cloud Based E-Government: Benefits and Challenges Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North

More information

Cloud Computing: The Next Computing Paradigm

Cloud Computing: The Next Computing Paradigm Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea rdcaytiles@gmail.com,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Cloud Computing Security Issues And Methods to Overcome

Cloud Computing Security Issues And Methods to Overcome Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &

More information

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

Addressing Data Security Challenges in the Cloud

Addressing Data Security Challenges in the Cloud Addressing Data Security Challenges in the Cloud Coordinate Security. The Need for Cloud Computing Security A Trend Micro White Paper July 2010 I. INTRODUCTION Enterprises increasingly recognize cloud

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

AskAvanade: Answering the Burning Questions around Cloud Computing

AskAvanade: Answering the Burning Questions around Cloud Computing AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

Analysis of Cloud Computing Vulnerabilities

Analysis of Cloud Computing Vulnerabilities International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 308-312 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

The NIST Definition of Cloud Computing (Draft)

The NIST Definition of Cloud Computing (Draft) Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Secure Cloud Computing through IT Auditing

Secure Cloud Computing through IT Auditing Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: nvgrwl06@gmail.com ABSTRACT In this paper we discuss the

More information

Optimizing Service Levels in Public Cloud Deployments

Optimizing Service Levels in Public Cloud Deployments WHITE PAPER OCTOBER 2014 Optimizing Service Levels in Public Cloud Deployments Keys to Effective Service Management 2 WHITE PAPER: OPTIMIZING SERVICE LEVELS IN PUBLIC CLOUD DEPLOYMENTS ca.com Table of

More information

Intrusion Detection from Simple to Cloud

Intrusion Detection from Simple to Cloud Intrusion Detection from Simple to Cloud ICTN 6865 601 December 7, 2015 Abstract Intrusion detection was used to detect security vulnerabilities for a long time. The methods used in intrusion detection

More information

The Trend and Challenges of Cloud Computing: A Literature Review

The Trend and Challenges of Cloud Computing: A Literature Review The Trend and Challenges of Cloud Computing: A Literature Review Doi:10.5901/ajis.2013.v2n10p9 Abstract Evwiekpaefe, Abraham E. Department of Mathematics, Computer Science Nigerian Defence Academy, Kaduna,

More information

About me & Submission details

About me & Submission details About me & Submission details Parveen Yadav Security Researcher aka Ethical Hacker. Working as a Freelancer. White Hat Hacking work. Few Recognitions :- Got listed my name in Google Hall of fame,amazon,paypal,adobe

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: prashantpatil11@rediffmail.com ABSTRACT

More information

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos Research Challenges Overview May 3, 2010 Table of Contents I 1 What Is It? Related Technologies Grid Computing Virtualization Utility Computing Autonomic Computing Is It New? Definition 2 Business Business

More information

Cloud Computing - Architecture, Applications and Advantages

Cloud Computing - Architecture, Applications and Advantages Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral

More information

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National

More information

CLOUD COMPUTING. A Primer

CLOUD COMPUTING. A Primer CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to

More information

Cloud Computing Architecture: A Survey

Cloud Computing Architecture: A Survey Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and

More information

Cloud Computing. Karan Saxena * & Kritika Agarwal**

Cloud Computing. Karan Saxena * & Kritika Agarwal** Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

Capturing the New Frontier:

Capturing the New Frontier: Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings

More information

Cloud Computing. Bringing the Cloud into Focus

Cloud Computing. Bringing the Cloud into Focus Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice

More information

Implementing & Developing Cloud Computing on Web Application

Implementing & Developing Cloud Computing on Web Application Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

Review of Cloud Computing and future research

Review of Cloud Computing and future research Review of Cloud Computing and future research Computer Science, IIS University, India Abstract: Cloud computing is also referred to as the evolutionary offspring of distributed computing, parallel computing,

More information