Data Security Issues in Cloud Computing
|
|
- Richard Haynes
- 8 years ago
- Views:
Transcription
1 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 1, August 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Data Security Issues in Cloud Computing Neha Rawat*, Ratnesh Srivastava, Binay Kumar Pandey, Poonam Rawat, Shikha Singh and Awantika Sharma Department of Information Technology, Govind Ballabh Pant University of Agriculture and Technology, India *Corresponding author: Abstract: Cloud computing is an enticing technology which is a combination of many existing technologies such as parallel computing, grid computing, distributed computing and others. It offers services like data storage, computing power, shared resources at low cost to its users over internet at anytime from anywhere. Costing model on cloud computing is based on pay as you go method, hence companies are saving millions by adopting this technology. As more and more individuals and companies are relying on cloud for their data, the question arises here is how secure cloud environment is? Though cloud computing has many advantages, it also have some security problems. Data security issue is the major concern in cloud computing because after shifting clients data to cloud, service provider is responsible for the security and privacy of data. Hence data security issue is the major challenge which is hampering the growth of cloud computing and therefore it is needed to be resolved in order to make it widely acceptable and to accelerate its growth. In this paper data security problems of cloud are discussed. Here we presented an overview of cloud computing, its benefits and data security challenges in cloud computing model. Keywords: Cloud Computing; Data Security Issues 1. INTRODUCTION Cloud computing has given a new dimension to internet. It has changed internet into a computing platform where computing power, storage, network etc. are provided to users. Cloud computing has transformed IT industry completely. It has a great impact on the development of IT by enhancing its existing capabilities and increasing flexibility. In the recent years, cloud computing has made significant changes in IT industry and has become a promising part of IT world. Being a promising business model it provides on demand provisioning of resources to its consumers. It attracts not only large enterprises but also medium and small size companies. Clients can access service provided by cloud only through internet and can also scale up and down resources according to their need, hence it is a cost effective, efficient and flexible alternative. Thus by adopting cloud computing companies can achieve more by paying less. There are many cloud providers such as Google, Amazon, Microsoft, IBM, and Rackspace. Cloud computing is a technology which saves user data on remote location (i.e. at data center) rather 9
2 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Figure 1. NIST model of Cloud Computing than saving it locally [1]. So users do not have to worry about managing hardware and software but at the same time cloud computing increases the responsibility of cloud vendors because now users totally depends on cloud for their data. To ensure access to cloud anytime from anywhere cloud should provide several features like availability, data integrity, accessibility etc. Since data is shifted outside the control of data owner and is maintained by third party, it invites security issues too, so cloud computing must ensure security. There are many issues in cloud computing that should be addressed by cloud provider to convince individuals or companies to use this technology. The most important concern is to guarantee that user data integrity and confidentiality is attained while data is stored in the cloud system. Therefore data security issue is the major concern in cloud computing. 2. CLOUD COMPUTING Cloud computing is about the delivery of computing to users from a remote location. Using cloud computing a user can store his data on cloud, which get centrally stored in the cloud and can be accessed anytime from anywhere through internet. National Institute of Standards and Technology (NIST) defines cloud computing as a model for enabling ubiquitous, convenient, on demand network access to shared pool of resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models and five deployment models [2]. 10
3 Data Security Issues in Cloud Computing 3. CLOUD COMPUTING DEPLOYMENT MODELS Cloud computing service models are classified as: A. Private Cloud Private clouds are built specifically for a single organization. It is owned and operated by specific organization and all cloud resources are also dedicated to that organization only. It offers greater control on data security, which lacks in public cloud. Organizations build private cloud to deal with their business critical applications. B. Public Cloud Public cloud is a cloud environment which is made available to public users by a service provider. It is owned and operated by cloud service providers. Resources in this cloud are available to public users on demand over the internet. User can rent resources and can scale resources up or down on the basis of their need. Examples of public cloud providers are Google, Amazon, Microsoft and Rackspace. C. Community Cloud It is analogous to private cloud. A private cloud is dedicated for a particular group, while community cloud is dedicated to a closed community which includes people of similar interest. With community cloud, organization having similar objectives can work together. Example of community cloud is Media Cloud. D. Hybrid Cloud Hybrid clouds are combination of two or more clouds (private, public or community cloud). With hybrid cloud, organizations can realize the benefit of multiple cloud deployment models. It provides augmentation of private cloud with resources of public cloud in order to handle any unexpected surges in workload. 4. CLOUD COMPUTING SERVICE MODELS Cloud computing service models are classified as: A. Software as a Service (SaaS) It is the delivery of application. In SaaS a complete application is provided to user which is running on cloud infrastructure. As software is hosted by provider, users do not need to buy, install or manage hardware for it. In SaaS instances of a software application are shared as a service. Examples of SaaS are Google Docs, Cloud Drive, and Salesforce.com CRM application. B. Platform as a Service (PaaS) PaaS enables developers to deploy their application on the cloud. The consumer can control their application but do not have any control over underlying infrastructure. It provides user an integrated set of software through the internet. PaaS is a delivery of computing platform as a service. Examples of PaaS are Google App Engine, Amazon Web Services, and Microsoft Azure. C. Infrastructure as a Service (IaaS) Using IaaS user get access to resources like storage, server, networks, data center space. It shares pool 11
4 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Figure 2. Cloud Deployment Models [3] of computing resources. User can deploy and run both application and operating system on IaaS. It frees user from buying or managing underlying software and hardware. Example of IaaS is Amazon EC2. 5. CLOUD SECURITY STANDARD ORGANIZATIONS Many standard bodies are developing standards for cloud environment. Users want the freedom to move between cloud providers for many reasons. For example, other vendors offer better prices, relationship with a provider may not be working. The community of cloud computing has already developed many standards by various forums. These standards are developed to provide interoperatibility between clouds and to develop a healthy environment in cloud computing industry [4]. Some cloud security standard organizations are: National Institute of Standards and Technology (NIST) Open Cloud Consortium (OCC) 12 Open Grid Forum (OGF)
5 Data Security Issues in Cloud Computing The Object Management Group (OMG) Storage Networking Industry Association (SNIA) Cloud Computing Interoperability Forum (CCIF) Distributed Management Task Force (DMTF) Cloud Security Alliance (CSA) 6. RELATED WORK Several researches have been done in the literature for cloud computing and its security issues. Here we presented a brief review of some recent researches. Harauz et al. [5] discuss the regulatory and legal concerns associated with security issues. Encryption schema, scheduled data backups and strict access control mechanism should be offered by storage provider in order to avoid unauthorized access and to ensure data integrity, confidentiality and availability of the data. For interoperability among service providers, adaptation of a universal standard is recommended. Data Availability, Data Location and Data Transmission, and Data Security are the major issues related to data security in the cloud computing environment, identified by Z. Mahmood [6]. Data Location and Data Transmission cloud customers may wish that data should reside on a specific location based on data polices and legislations of country. Similarly, cross country transition of data may cause potential risks due to varying policies and regulations. Data Availability - the unavailability of data may lead to service outages. Data Security- security risks become the major concern, particularly, when data is transferred to another country, because different countries may have different regulatory frameworks. In his paper, Wentao Liu [7] illustrates cloud concepts and security problems in the cloud system. The key security problems in cloud computing are data privacy and service availability and single security method cannot solve the cloud computing security problem. He recommends many traditional and new technologies must be used together for protecting the total cloud computing system. Jinguang Han et al. [8] proposed an identity-based proxy re-encryption scheme to outsource sensitive data from owner to an external party. This scheme supports both inter-domain and intra-domain queries, therefore it is suitable for cloud computing scenario. In the proposed scheme, the access key can be computed by the owner independently without using private key generator (PKG), and is bound not only to the requesters identity but also to the requested cipher text. This scheme is also secured against collusion attacks. In the past few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. Security is the major issue, as it has lot of loose ends which scares a lot of cloud users. Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment. S. Subashini et al. [9] presents a survey of the different security issues in service delivery models that pose a threat to the cloud. Sandeep K. Sood [10] proposed a framework that can efficiently protect the data from beginning to end, i.e., from the owner to the cloud and then to the user. The strategy used to protect the data utilizes various cryptographic measures such as Message Authentication Code (MAC) is used for integrity check of data, Secure Socket Layer (SSL) 128 bit or 256 bit encryption, searchable encryption and division of data into three different sections in cloud for storage. Proposed scheme achieves the integrity, availability 13
6 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING and reliability of data. In addition to this it also enable to retrieve files from cloud by searching over an encrypted data. 7. CRITICAL REVIEW Table 1. Summary of surveyed literature Author Harauz et al. [5] Problem discussed/ Proposed Method Different regulatory and legal concerns associated with data security issues Z. Mahmood [6] Outlined the major security issues in cloud computing Wentao Liu [7] Jinguang Han et al. [8] Illustrates cloud concepts and security problems in the cloud system Proposed identity based proxy re-encryption scheme S. Subashini et al. [9] Security issues in service delivery models that pose a threat to the cloud. Sandeep K. Sood [10] Proposed a framework utilizing various cryptographic measures that can efficiently protect the data from beginning to end. 8. DATA SECURITY ISSUES IN CLOUD Cloud computing provides efficient, flexible and cost effective services. However this model is not 100% secure. The major concerns in cloud computing are privacy and security. There are various security issues in cloud computing. Of many security issues, data security seems to be the major obstacle towards the adaption of cloud computing. Data security in cloud is must, in order to ensure that the data has not been accessed by any unauthorized person. The different key data security issues of cloud computing are discussed as follows. A. Data Integrity It is one of the most critical issues in cloud security. Data integrity describes the wholeness or completeness of dat. It can easily be achieved in standalone system by using ACID properties. But it is not easy to achieve data integrity in cloud environment because transaction management is the biggest problem with web services. Although standards like WS-Reliability and WS-Transaction are available to manage data integrity with web services but these are not matured yet [9]. Damage to the data stored in cloud may occur during transaction as a result of lack of integrity control in cloud. Cachin et al. [11] suggests to use Byzantine fault-tolerant replication protocol as a solution. B. Data Location Consumers store their data on cloud without knowing where their data is getting stored. Data locality is of utmost importance because some enterprises do not want to get stored their data at the location outside of their country. In this case an agreement is signed between the cloud provider and the consumer who want to store data at a particular location or server. Cloud model should ensure security and reliability of the location of the data. Data location of stored data on cloud is a very big issue from the point of view of clients trust and security of data. Location of data stored in cloud can be prioritized according to users wish or requirement. It will be defined by user which data of user is sensitive and non-sensitive. An interface should be 14
7 Data Security Issues in Cloud Computing provided to user during the data storage which contains the checks of data sensitivity level and store the data according to users data sensitivity wish [12]. C. Data Confidentiality Cloud provides an environment to users where they can host their data. Unauthorized access to critical data of an enterprise can cause disaster. Therefore it is cloud providers responsibility to guarantee that data can be accessed by only legitimate user. Data confidentiality is achieved by encryption. Cloud provider should implement suitable authentication and accounting mechanism to achieve confidentiality and should assure cloud user that their data is safe and confidential. In june 2009 IBM proposed a fully homomorphic encryption scheme that supports arbitrary computations on encrypted data [13]. In his paper Krishna P. N. Puttaswamy et al. [14] proposed a data confidentiality solution silverline, a set of techniques that calls for end-to-end encryption of data by its owner (the organization) and its consumers (the users). D. Data Leakage Although adoption of cloud computing is providing significant benefits to enterprises, but because of data leakage fear, they are holding back. Data leakage has become one of the major concerns from security standpoint. Cloud is an outside party where customers data is hosted, and it has potential to access customers data. Cloud environment provides resource sharing, so it seems to be risky to move data in hands of cloud provider. Data in cloud stored in a shared environment, so it could be hacked easily either due to malicious hacker attack or accidentally. To mitigate the effects of this problem a sensible data encryption technique should be used. Encryption should be performed at client side and user should have control over the keys used for decryption. Furthermore, encryption should not be performed at any intermediary place before transmission to cloud. E. Data Availability Another important concern of the cloud computing is availability of services. Data availability is a term used by some computer storage manufacturers and storage service providers (SSPs) to describe products and services that ensure that data continues to be available at a required level of performance in situations ranging from normal through disastrous. In general, data availability is achieved through redundancy involving where the data is stored and how it can be reached [15]. The unavailability of data may lead to service outages. Incidents of such cloud outages include Amazon S3 (over seven-hour downtime on July 20, 2008) [16], Gmail (services unavailable for almost 1 hour on April 2012). Thus strong data recovery policies are required. Two increasingly popular approaches to providing data availability are the storage area network (SAN) and network-attached storage (NAS) [15]. F. Backup Cloud provider should ensure that all of its clients data is backed up across multiple servers in multiple copies regularly to provide recovery in case of disaster like hardware failure. And to prevent accidental leakage of backed up data, a strong encryption scheme should be used. High Security Distribution and Rake Technology (HS-DRT), Parity Cloud Service Technique (PCS), and Cold and Hot Backup Service Replacement Strategy (CBSRS) are some backup and recovery techniques that have been developed in cloud domain [17]. 15
8 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING 9. CONCLUSION In this paper we elucidate cloud computing and major security issues of cloud computing. By utilizing various facilities and services provided by cloud one can increase performance, agility and efficiency in addition to reduce cost and management responsibilities of an enterprise. Though there are lots of advantages of cloud, there are yet numerous challenges to be faced by cloud computing such as privacy issues and data security. In this paper we have tried to address most critical data security challenges of cloud. Many standard organizations such as National Institute of Standards and Technology (NIST), Cloud Security Alliance (CSA) and Cloud Computing Interoperability Forum (CCIF) are trying to develop standards to resolve various security issues of cloud. Cloud computing has the potential to provide a secure and economically viable IT solution in the future. References 16 [1] K. R. C. Wang, Q. Wang and W. Lou, Ensuring data storage security in cloud computing, in Proc. 17th International Workshop on Quality of Service (IWQoS 09), pp. 1 9, [2] N. I. of Standards and Technology(NIST). [3] A. Reed, C. Rezek, and P. Simmonds, Security guidance for critical areas of focus in cloud computing v3. 0, Cloud Security Alliance, [4] M. K. F. H. Judith Hurwitz, Robin Bloor, Cloud computing for dummies, cloud-computing-standards-organizations.html. [5] J. Han, W. Susilo, and Y. Mu, Identity-based data storage in cloud computing, Future Generation Computer Systems, vol. 29, no. 3, pp , [6] Z. Mahmood, Data location and security issues in cloud computing, in Emerging Intelligent Data and Web Technologies (EIDWT), 2011 International Conference on, pp , IEEE, [7] W. Liu, Research on cloud computing security problem and strategy, in Consumer Electronics, Communications and Networks (CECNet), nd International Conference on, pp , IEEE, [8] L. M. Kaufman, Data security in the world of cloud computing, Security & Privacy, IEEE, vol. 7, no. 4, pp , [9] S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1 11, [10] S. K. Sood, A combined approach to ensure data security in cloud computing, Journal of Network and Computer Applications, vol. 35, no. 6, pp , [11] C. Cachin, I. Keidar, and A. Shraer, Trusting the cloud, Acm Sigact News, vol. 40, no. 2, pp , [12] P. Kumar and H. S. Arri, Data location in cloud computing, International Journal for Science and Emerging Technologies with Latest Trends, vol. 5, no. 1, pp , [13] IBM-Uncovers-Encryption-Scheme-That-Could-Improve-Cloud-Security, http: // That-Could-Improve-Cloud-Security-Spam-Filtering [14] K. P. Puttaswamy, C. Kruegel, and B. Y. Zhao, Silverline: toward data confidentiality in storageintensive cloud applications, in Proceedings of the 2nd ACM Symposium on Cloud Computing, p. 10, 2011.
9 Data Security Issues in Cloud Computing [15] [16] A. S. Team et al., Amazon s3 availability event: July 20, 2008, See: aws. amazon. com/s html, [17] K. Sharma and K. R. Singh, Online data back-up and disaster recovery techniques in cloud computing: A review, International Journal of Engineering and Innovative Technology (IJEIT), vol. 2, no. 5, pp ,
10 About This Journal MCCC is an open access journal published by Scientific Online Publishing. This journal focus on the following scopes (but not limited to): Autonomic Business Process and Workflow Management in Clouds Cloud Composition, Federation, Bridging and Bursting Cloud Computing Consulting Cloud Configuration, Performance and Capacity Management Cloud DevOps Cloud Game Design Cloud Migration Cloud Programming Models and Paradigms Cloud Provisioning Orchestration Cloud Quality Management and Service Level Agreement (SLA) Cloud Resource Virtualization and Composition Cloud Software Patch and License Management Cloud Workload Profiling and Deployment Control Cloud Video and Audio Applications Economic, Business and ROI Models for Cloud Computing Green Cloud Computing High Performance Cloud Computing Infrastructure, Platform, Application, Business, Social and Mobile Clouds Innovative Cloud Applications and Experiences Security, Privacy and Compliance Management for Public, Private and Hybrid Clouds Self-service Cloud Portal, Dashboard and Analytics Storage, Data and Analytics Clouds Welcome to submit your original manuscripts to us. For more information, please visit our website: You can click the bellows to follow us: Facebook: Twitter: LinkedIn: Google+:
11 SOP welcomes authors to contribute their research outcomes under the following rules: Although glad to publish all original and new research achievements, SOP can t bear any misbehavior: plagiarism, forgery or manipulation of experimental data. As an international publisher, SOP highly values different cultures and adopts cautious attitude towards religion, politics, race, war and ethics. SOP helps to propagate scientific results but shares no responsibility of any legal risks or harmful effects caused by article along with the authors. SOP maintains the strictest peer review, but holds a neutral attitude for all the published articles. SOP is an open platform, waiting for senior experts serving on the editorial boards to advance the progress of research together.
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security
More informationEnhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud
OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure
More informationWhite Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
More informationSecurity Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of
More informationA Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
More informationCLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
More informationA SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com
More informationQuick guide: Using the Cloud to support your business
Quick guide: Using the Cloud to support your business This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help businesses
More informationAn Intelligent Approach for Data Fortification in Cloud Computing
An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,
More informationNCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
More informationCloud Computing Security Issues and Controls
Cloud Computing Security Issues and Controls ACC 626 Information System Assurance & Computer-Assisted Auditing Peter Shih-Hsien Chen June 30th, 2013 Table of Contents Introduction... 1 History of Cloud
More informationA Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
More informationEnabling Public Accountability and Data Sharing for Storage Security in Cloud Computing
VOLUME 1, NUMBER 1, JUNE 2014 OPEN JOURNAL OF INFORMATION SECURITY AND APPLICATIONS Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing K. Mohammed Aaqib Ameen, A. Anny
More informationCloud Computing & Collaboration
Sponsored by Cloud Computing & Collaboration The security implications for this new Web paradigm Please note the audio line will remain silent until 5 minutes before broadcast Sponsored by Event Housekeeping
More informationSecurity Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
More informationCloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationCloud Computing Attacks: A Discussion With Solutions
OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 1, August 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Cloud Computing Attacks: A Discussion With Solutions Shikha Singh
More informationResearch Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD
More informationCloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
More information10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
More informationA Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com
More informationCloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
More informationSurvey On Security Threats In Data Storing & Sharing In Cloud Environment
Survey On Security Threats In Data Storing & Sharing In Cloud Environment Seema Tahalyani 1 and Dr. S.M Ghosh 2 1 CSE Department, Rungta College of Engineering & Technology, Bhilai, Chhattisgarh, India
More informationParametric Analysis of Various Cloud Computing Security Models
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1499-1506 International Research Publications House http://www. irphouse.com Parametric Analysis
More informationFEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS
International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.
More informationINTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
More informationCloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
More informationMobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
More informationCloud Computing Phillip Hampton LogicForce Consulting, LLC
Phillip Hampton LogicForce Consulting, LLC New IT Paradigm What is? Benefits of Risks of 5 What the Future Holds 7 Defined...model for enabling ubiquitous, it convenient, ondemand network access to a shared
More informationSecurity issues for Cloud Computing
274 Security issues for Cloud Computing Vikas Goyal [1], Dr. Chander Kant [2] [1] Research Scholar, [2] Assistant Professor Deptt. of Comp. Sc. & Appl., Kurukshetra University, Kurukshetra, India. vikas.goyal_85@yahoo.co.in,
More informationInformation Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University.
Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University P a g e 1 P a g e 2 Table of Contents Abstract... 3 Introduction... 3 Previous
More informationCustomer Security Issues in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
More informationSECURITY THREATS TO CLOUD COMPUTING
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD
More informationOutline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
More informationCloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
More informationDaren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National
More informationCLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas
CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas PART 1 A brief Concept of cloud Issues in cloud Security Issues A BRIEF The Evolution Super
More informationCLOUD COMPUTING IN HIGHER EDUCATION
Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,
More informationA Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS
A Guide to Common Cloud Security Concerns Why You Can Stop Worrying and Start Benefiting from SaaS T he headlines read like a spy novel: Russian hackers access the President s email. A cyber attack on
More informationCloud Computing An Elephant In The Dark
Cloud Computing An Elephant In The Dark Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir
More informationCloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
More informationTufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:
More informationCHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
More informationRunning head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
More informationThe Magazine for IT Security. May 2010. issue 3. sör alex / photocase.com
The Magazine for IT Security May 2010 sör alex / photocase.com free digital version made in Germany issue 3 Luiz Fotolia.com Clouds or storm clouds? Cloud Computing Security by Javier Moreno Molinero Gradually,
More informationPrivacy Preserving Public Auditing for Data in Cloud Storage
Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of
More informationImplementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
More informationA Survey on Security Issues in Service Delivery Models of Cloud Computing
A Survey on Security Issues in Service Delivery Models of Cloud Computing { S. Subashini and V. Kavitha (2011) Presented by: Anthony Postiglione Outline Introduction What is Cloud Computing Pros/Cons of
More informationCloud Computing. Cloud computing:
Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:
More informationPerspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009
Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of
More informationCloud Computing Service Models, Types of Clouds and their Architectures, Challenges.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
More informationAnalysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT
Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT Abstract Cloud computing is a method to enhance the capacity dynamically without investing in
More informationData Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
More informationDigital Forensics. Lab 10: Cloud Computing & the Future of Digital Forensics
Digital Forensics Lab 10: Cloud Computing & the Future of Digital Forensics Today's Topics Cloud Computing Overview Applications of Cloud Computing Impact of CC to Digital Forensics Future of Digital Forensics
More informationCloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, marchany@vt.edu Something Old, Something New New: Cloud describes the use of a collection of services, applications,
More informationCloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:
More informationWhat Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationTamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
More informationModule 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
More informationSecurity Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
More informationThe Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
More informationSecure Framework for Data Storage from Single to Multi clouds in Cloud Networking
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking B.Sujana 1, P.Tejaswini 2, G.Srinivasulu 3, Sk.Karimulla 4 1,2,3,4 QUBA COLLEGE OF ENGINEERING & TECH, NELLORE Abstract:
More informationFully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach
More informationThe Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management
The Cloud at Crawford Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Wikipedia defines cloud computing as Internet-based computing, whereby shared
More informationEnterprise Cloud Computing Standards, Innovation & Shifts
Enterprise Cloud Computing Standards, Innovation & Shifts Anubrata Chakrabarti Director, Technology Integration July 29, 2011 Standards - the need & the way forward Hybrid Cloud Community Cloud Does every
More informationCloud Computing For Distributed University Campus: A Prototype Suggestion
Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert mferkoc@yildiz.edu.tr, sbkert@yildiz.edu.tr Yildiz Technical University (Turkey) Abstract
More informationISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationSecurity Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
More informationSecuring and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
More informationNETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
More informationCloud Computing in Banking
Financial Services the way we see it Cloud Computing in Banking What banks need to know when considering a move to the cloud Contents 1 Overview 3 2 Why Cloud Computing for Banks? 4 2.1 Cost Savings and
More informationCourse 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationOverview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud
Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities
More informationWhitePaper. Private Cloud Computing Essentials
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
More informationSECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING
SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING Ali Newaz Bahar 1*, Md. Ahsan Habib 2, Md. Manowarul Islam 3 1, 2, 3 Department of Information and Communication Technology, Mawlana Bhashani Science and
More informationA Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
More informationA SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING
A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING Yogita gangboir 1, Praveen Shende 2, Tushar Kumar Vaidya 3 1,3 Department of Computer Science and Engineering, CSIT, Durg, (India) 2 Assoistant Professor
More informationAuthentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
More informationSRG Security Services Technology Report Cloud Computing and Drop Box April 2013
SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 1 Cloud Computing In the Industry Introduction to Cloud Computing The term cloud computing is simply the use of computing
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
More informationEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud Computing What Every Business Owner Should Consider When Choosing Cloud Hosted Versus Internally Hosted Software 1 INTRODUCTION Cloud computing is the current information
More informationCloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
More informationHexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed
More informationCloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
More informationRole of Cloud Computing in Education
Role of Cloud Computing in Education Kiran Yadav Assistant Professor, Dept. of Computer Science. Govt. College for Girls, Gurgaon, India ABSTRACT: Education plays an important role in maintaining the economic
More informationISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous
More informationInternational Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology Cloud Security Issues, Challenges And Their Optimal Solutions Vinay Kumar Pant M.Tech. (CSE) Subharti Institute of Technology and Engineering
More informationStudent's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen
Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen Samah Sadeq Ahmed Bagish Department of Information Technology, Faculty of Engineering, Aden University,
More informationThe cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
More informationShaping Your IT. Cloud
Shaping Your IT Cloud Hybrid Cloud Models Enable Organizations to Leverage Existing Resources and Augment IT Services As dynamic business demands continue to place unprecedented burden on technology infrastructure,
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing
More informationCloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
More informationSecurity & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
More information