Security issues and Cryptographic techniques in Cloud Computing
|
|
|
- Cleopatra Johnston
- 10 years ago
- Views:
Transcription
1 ISSN: Contents lists available at International Journal of Innovative Computer Science & Engineering Volume 2 Issue 4; September-October-2015; Page No Security issues and Cryptographic techniques in Cloud Computing Radhika Patwari 1, Sarita Choudhary 2 1 Systems Engineer, Infosys JVWU 2 M.Tech (Dept. of CS), JVWU ARTICLE INFO Received: 01 September 2015 Accepted 19 September 2015 Corresponding Author: Radhika Patwari 1 M.Tech (CSE) student, Jayoti Vidyapeeth Women s University, Jaipur, Rajasthan ABSTRACT Cloud computing is an emerging paradigm that provides cheap, on demand resources and services over a network. It has become primary distributed computing platform. It eliminates the need of maintaining costly computing facilities by companies and institutes. One of the barriers for cloud adoption is security. There are no proper laws which govern who own responsibility as data flows across cloud. This article gives a quick introduction to cloud computing. Then it covers various threats and security issues in today s cloud and cryptographic ways for maintaining security in cloud. Keywords: cloud computing, security threat, multi-tenant behavior, cryptographic techniques, standards and policies IJICSE, All Right Reserved. I. Introduction to cloud The concept of cloud is not new. Network based computing is evolving for more than 50 years. But the term 'cloud' originated in 1990s. Many believe the first use of cloud computing in its modern context occurred in 2006, when then Google CEO Eric Schmidt introduced the term to an industry conference. It is a virtual environment that provides resources to users and charges only for services they consumed. Most of the things we see and use on internet are cloud, for example services, google map, online file viewers, online file converter. In brief 'Cloud is metaphor for internet'. Its use is spreading rapidly because it captures a historic shift in the IT industry as more computer memory, processing power, and apps are hosted in remote data centers, or the cloud. NIST (National Institute of Standards and Technology) has given official definition for cloud computing according to which a cloud should have these characteristics: a) Resource pooling - In cloud computing, resources are pooled to serve a large number of customers. Cloud computing uses multi-tenancy where different resources are dynamically allocated and de-allocated according to demand. The resource allocation should be elastic, in the sense that it should change appropriately and quickly with the demand. Sometimes, the terms elastic or utility computing are used to describe this ability of a cloud to provide additional resources when required. b) Self service and on-demand service - The user should be able to access computing capabilities as and when they are needed and without any interaction from the cloud-service provider. c) Broad network access - Capabilities are available over the network and accessed through standard mechanisms d) Rapid elasticity - Capabilities can be elastically provisioned and released, in some cases automatically. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time. e) Measured service - Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service. One more important feature of cloud is 'Pay as you go' - The user is billed only for the amount of resources they use. Amazon's EC2 is one of the best examples. Amazon Elastic Compute Cloud (EC2) allows users to rent virtual computers on which to run their own computer applications. EC2 allows scalable deployment of applications. Each virtual machine, called an "instance", functions as a virtual private server. One EC2 Compute Unit provides the equivalent CPU capacity of a Page1
2 GHz 2007 Opteron or 2007 Xeon processor. Amazon charges about $0.013/hour ($9.7/month) for the smallest "Micro Instance" (t2.micro) virtual machine running Linux or Windows. AT&T also entered the cloud computing realm when it acquired USinternetworking (USi) in2006. USi was an application service provider for more than 30 countries. In 2008, AT&T introduced Synaptic, which combined USi s five Internet data centers in the US, Europe, and Asia to serve as regional gateways within its cloud. Today, the latest example of cloud computing is Web 2.0; Google, Yahoo, Microsoft, and other service providers now offer browser-based enterprise service applications (such as webmail and remote data backup). Advantages - First, expenses are lowered too much for companies. Now companies don't need to purchase computers or hire personnel for maintenance. Every computing facility (softwares), platforms, even whole infrastructure is provided as service virtually. This is especially useful for small startups which don't have much capital to invest. Second, cloud architecture is very scalable. For example cloud storages can easily manage thousands of GBs of data due to its distributed architecture whereas this task is problematic locally. Finally, there is cloud for everything, storage cloud for storage services, data cloud for data management services and compute cloud for computational services. Disadvantages - First, Cloud faces latency and bandwidth related issues because of being remotely hosted. Denial of service is also a threat to cloud computing. DOS has been an Internet threat for years, but it becomes more problematic in the age of cloud computing when organizations are dependent on the 24/7 availability of one or more services. DOS outages can cost service providers customers and prove pricey to customers who are billed based on compute cycles and disk space consumed. Then comes the problem of interoperability among cloud services. Finally security issues are there such as data being accessible to third parties. Possibility of security leakage due to multi-tenancy nature. II. Interoperability in cloud Frameworks are yet to be developed that would enable interoperability in cloud. Porting of applications from one cloud to another and interoperating between different cloud services is still a challenge. Users also don't want to get confined to a single cloud provider. Users want freedom to move from private to public cloud and back again. When you decide to move an application between clouds, several challenges occur: a) Rebuilding the application in the target cloud. b) Setting up the network in the target cloud to give the application the support that it had in its original cloud. c) Setting up security to match the capabilities provided by the source cloud. d) Managing the application running in the target cloud. e) Handling data movement and the encryption of data while it is in transit and when it gets to the target cloud. All this is due to lack of standards for clouds. Every provider implements its own proprietary enhancements to differentiate its wares from other providers. Adoption of universal standards(such as open source) should be there. Amazon s APIs ( have become the de facto standard for clouds that provide ondemand instances. Cloud-based applications that use this API enjoy portability and interoperability for example, Eucalyptus uses these APIs, and applications that run on Amazon s EC2 service can in turn run on a Eucalyptus cloud. III. Security issues in Cloud With growing cloud capabilities, security is becoming a major challenge in wide adoption of cloud. Can users fully trust cloud? Is their data safe on cloud? These questions are emerging with no reliable solutions yet. Moreover cloud is becoming particularly attractive to cyber crooks. The cloud faces both internal and external security threats like media failures, software bugs, malware, administrator errors and malicious insiders. Cloud services hold user's personal data and identity information such as photographs, calendars, address books, medical records, social security numbers, tax documents, financial transactions etc. These data if analyzed properly can tell every aspect of user's life. So significant safeguard is required to protect user's privacy. Consider banks and other financial institutions which process highly sensitive data, if they use cloud high degree of security is required for their data. For hosted clouds, third party is responsible for storing and securing data. But are third parties trust worthy? Handing over sensitive data to other party is a serious concern. Trusting a third party requires taking the risk of assuming that the trusted third party will act as it is expected (which may not be true all the time). Data exposure risk stays from the level of one individual's data to the whole cloud level. Data loss is also possible in cloud. The prospect of seeing your valuable data disappear into the ether without a trace. A malicious hacker might delete a Page2
3 target's data out of spite or data can be lost because of a careless cloud service provider. The scalable nature of cloud has posed another threat. Cloud service providers share infrastructure, platforms, and applications to provide services. There is no strong isolation. Two companies might be using same piece of hardware without knowledge. If an integral component gets compromised, a shared platform component, or an application, it can expose the entire environment to a potential of compromise and breach to malicious users. Google was forced to make an embarrassing apology in February when its Gmail service collapsed in Europe, while Salesforce.com is still smarting from a phishing attack in 2007 which duped a staff member into revealing passwords. Still Google and Amazon have infrastructure to deflect a cyber-attack but every cloud doesn't have. When these tech-giants can face security breaches, it is difficult for users to have full confidence in cloud that there data is safe. Another question comes who is responsible for security of data? Is it only cloud service providers duty or stake holders, business entities are also responsible for maintaining safeguards. Legal decisions will ultimately determine who owns the responsibility for securing information shared within clouds. IV. Privacy Policies The cloud is still very much a new frontier with very little in the way of specific standards for security or data privacy. In terms of legislation there is nothing. Although it might be too early yet for standards to fully emerge, several organizations are attempting them, including an effort by the Cloud Computing Interoperability Forum ( and by the Open Cloud Consortium ( IBM, Cisco, SAP, EMC and several other leading technology companies announced that they had created an 'Open Cloud Manifesto' calling for more consistent security and monitoring of cloud services. But the fact that neither Amazon.com, Google nor Salesforce.com agreed to take part suggests that broad industry consensus may be some way off. Microsoft also abstained, charging that IBM was forcing its agenda. Nevertheless till standards for cloud come into force, several measures can be taken by companies and cloud users on their part- Service Providers: a) Companies need to be vigilant, for instance about how passwords are assigned, protected and changed. Cloud Users: a) Cloud service providers typically work with numbers of third parties, and customers are advised to gain information about those companies which could potentially access their data. b) Companies should ask to see service provider s reliability reports to determine whether these meet the requirements of the business. c) Find out about the hosting company used by the provider and if possible seek an independent audit of their security status. Also there are a handful of existing web standards which companies in the cloud should know about. Chief among these is ISO27001, which is designed to provide the foundations for third party audit, and implements OECD principles governing security of information and network systems. It provides requirements for an information security management system (ISMS). An ISMS is a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process. It can help small, medium and large businesses in any sector keep information assets secure. The SAS70 auditing standard is also used by cloud service providers. A service auditor's examination performed in accordance with SAS No. 70 represents that a service organization has been through an indepth examination of their control objectives and control activities, which often include controls over information technology and related processes. National Institute of Standards and Technology (NIST) has taken step in standardization of cloud related policies. It has given official definition, characteristics of cloud to some extent. NIST aims to foster cloud computing systems and practices that support interoperability, portability, and security requirements that are appropriate and achievable for important usage scenarios. NIST scientists are involved in cloudrelated international standards committees and lead a number of public working groups to solve cloud-related challenges. For further information on security standards by NIST see ( twiki-cloudcomputing/pub/cloudcomputing/cloudsecurity/nist_s ecurity_reference_architecture_ _v1.0.pdf) V. Cryptographic techniques for security in cloud Many security methods for cloud use various cryptographic techniques. Cryptographic techniques have become essential for security in cloud. A key is used for data encryption and decryption. This helps in protecting confidentiality and integrity of data. It ensures security of data being shared in cloud and also allows data to be stored securely. Cryptography refers to the science of designing ciphers. Encryption refers to the method of converting plain text to secret text (cipher text) which can only be read by owner of secret key. At present various cryptographic algorithms are there which belong to two major categories - Page3
4 a) Symmetric algorithms such as DES, AES, Triple DES b) Asymmetric or public-key encryption algorithms such as RSA, Diffie-Hellman, ECC, etc. The difference is in the way the keys are used. In symmetric key encryption, the person who is sending the data and the person who is receiving the data share a key which is kept secret. This is then used to encrypt and decrypt the messages. In asymmetric key encryption, two keys are involved wherein one is used for encryption (this is publicly available) and the other is used for decryption (this is kept secret). Identity based encryption - Identity-based encryption (IBE), is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user (e.g. a user's address). It allows any party to generate a public key from a known identity value such as an ASCII string. A trusted third party, called the Private Key Generator (PKG), generates the corresponding private keys. This kind of encryption reduces the complexity of the encryption process for both users and administrators. Figure 1: Identity based Encryption Attribute based encryption - It is a type of public-key encryption in which the secret key of a user and the ciphertext are dependent upon attributes (e.g. the country he lives, or the kind of subscription he has). A user can encrypt a message under a public key and a policy. Decryption will only work if the attributes associated with the decryption key match the policy used to encrypt the message. Fully Homomorphic Encryption - Homomorphic encryption ensures privacy of data in communication, storage or in use with tools similar to conventional cryptography, but with extra features of computing over encrypted data, searching an encrypted data, etc. Search and manipulation of cipher text was difficult with traditional encryption techniques. Intelligent Encryption - Conventional public-key and shared-key encryption systems rely on standard protocols and a preestablished public key certification infrastructure (public key infrastructure), allowing people all over the world to use encryption according to standard methods. But in conventional cryptographic methods only one person, i.e., owner of the key can view original data. This creates problem in case of cloud where number of users are there to access same data. Intelligent encryption works on basis of various conditions. It allows various users to view encrypted data based on certain conditions rather than only single authorized user. It is similar to attribute based encryption but conditions are extended for multiple users. Consider a situation where access to confidential information is managed within a company. Conditions for viewing the information are incorporated into the cipher text, and attribute information is applied to the decryption key so that decryption is possible only with a Page4
5 key that matches these conditions. If the data is encrypted with embedded conditions such as [Director] OR [Personnel department AND Section manager], then it can be decrypted with a key containing the attributes [Personnel department, Section manager], but not by a key containing the attributes [Personnel department, Section #1, Employee]. In this way number of users satisfying condition can get view original text. Figure 2: Intelligent Encryption Cloud-managed-key - The one more possible threat with conventional cryptographic methods can be letting users manage their decryption keys themselves. Further if a user has no longer permissions to access data, he still can decrypt data if he has key. A possible solution for this problem can be a cryptographic scheme where key is managed by cloud. It solves the issue of key management in public key cryptography. In this scheme decryption keys for public key cryptography are managed in the cloud and the decryption processing is securely outsourced to the key management cloud. This allows users to make use of encrypted data without having to manage the decryption keys. Since the decryption processes can be enabled or disabled on the basis of authentication by the key management cloud, it is also possible to enable or disable the reading of a previously distributed cipher text at a later time. Benefits of cryptographic cloud storage and security - a) In a cryptographic service, the data is encrypted on premise by the data processor(s). This way, customers can be assured that the confidentiality of their data is preserved irrespective of the actions of the cloud storage provider. b) It can be difficult to ascertain exactly where one s data is being stored once it is sent to the cloud (i.e., many service providers have data centers deployed throughout the world). So some customers may be reluctant to use a public cloud for fear of increasing legal exposure for their data. In a cryptographic storage service data is only stored in encrypted form so any law that pertains to the stored data has little to no effect on the customer. VI. Conclusion Privacy and security in cloud can be said to be achieved when users have control over information they want to reveal to cloud and who can access their information. Without guarantee of security and privacy users can't make shift to cloud only on the basis of lower cost and faster computing. Certain cloud related standards and cryptographic methods for security are coming to Page5
6 existence, still there is long way to go for public cloud to become a trustworthy computing environment. References fa3.html W. Sobel et al., Cloudstone: Multi-Platform Multi- Language Benchmark and Measurement Tools for Web 2.0, Proc. Cloud Computing and Its Applications, 2008; an_filename=crypto-cloud.pdf /ijcsit pdf 6. Page6
Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Mobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Cloud & Security. Dr Debabrata Nayak [email protected]
Cloud & Security Dr Debabrata Nayak [email protected] AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
An Efficient data storage security algorithm using RSA Algorithm
An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University,
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
Privacy Patterns in Public Clouds
Privacy Patterns in Public Clouds Sashank Dara Security Technologies Group, Cisco Systems, Bangalore email: [email protected] January 25, 2014 Abstract Internet users typically consume a wide range
Security Benefits of Cloud Computing
Security Benefits of Cloud Computing FELICIAN ALECU Economy Informatics Department Academy of Economic Studies Bucharest ROMANIA e-mail: [email protected] Abstract: The nature of the Internet is
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous
A Model for Data Protection Based on the Concept of Secure Cloud Computing
International Journal of Scientific and Research Publications, Volume 2, Issue 3, March 2012 1 A Model for Data Protection Based on the Concept of Secure Cloud Computing Gargee Sharma 1, Prakriti Trivedi
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Cloud computing doesn t yet have a
The Case for Cloud Computing Robert L. Grossman University of Illinois at Chicago and Open Data Group To understand clouds and cloud computing, we must first understand the two different types of clouds.
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
Survey on Data security Issues in Cloud Environment
Survey on Data security Issues in Cloud Environment Vasanth.C.Bhagawat Research Scholar/ Computer Science Bharathiar University, Coimbatore Dr. A.Arul L.S.Kumar Prof & Dean, Dept. of. CSE RGIT, Bangalore.
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072
Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
Cloud Computing Trends
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Tableau Online Security in the Cloud
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Arpitha.K 1,Aawini.T 2,Divya J. 3, Kalyani P 4, Prof. Sudhakar Avareddy 5 1,2,3,4 Department of CSE, BITM Bellary, Karnataka. 5 Department
CLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
How To Use Netbackup For Business
Enterprise Cloud Backup and Recovery with Symantec NetBackup Data Sheet: Backup and Disaster Recovery Overview of Symantec NetBackup As the established market leader, Symantec NetBackup delivers reliable
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Cloud Computing: The Next Computing Paradigm
Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea [email protected],
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Cloud Computing in Higher Education: A Guide to Evaluation and Adoption
Cloud Computing in Higher Education: A Guide to Evaluation and Adoption Executive Summary Public cloud computing delivering infrastructure, services, and software on demand through the network offers attractive
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
A Security Integrated Data Storage Model for Cloud Environment
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
Using WebSphere Application Server on Amazon EC2. Speaker(s): Ed McCabe, Arthur Meloy
Using WebSphere Application Server on Amazon EC2 Speaker(s): Ed McCabe, Arthur Meloy Cloud Computing for Developers Hosted by IBM and Amazon Web Services October 1, 2009 1 Agenda WebSphere Application
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds.
Cloud Computing: Public, Private, and Hybrid You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. And you ve got questions:» What are the differences between Public
Security Issues In Cloud Computing And Their Solutions
Security Issues In Cloud Computing And Their Solutions Mr. Vinod K. Lalbeg Lecturer (Management), NWIMSR, Pune-1 & Ms. Anjali S. Mulik Lecturer (Management), NWIMSR, Pune-1 ABSTRACT Cloud Computing offers
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Addressing Data Security Challenges in the Cloud
Addressing Data Security Challenges in the Cloud Coordinate Security. The Need for Cloud Computing Security A Trend Micro White Paper July 2010 I. INTRODUCTION Enterprises increasingly recognize cloud
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Survey paper on cloud computing with load balancing policy Anant Gaur, Kush Garg Department of CSE SRM
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
CLOUD COMPUTING GUIDELINES FOR LAWYERS
INTRODUCTION Legal practices are increasingly using cloud storage and software systems as an alternative to in-house data storage and IT programmes. The cloud has a number of advantages particularly flexibility
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Cloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment
Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Chandra Sekhar Murakonda M.Tech Student, Department of Computer Science Engineering, NRI Institute
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
How To Run A Cloud Computer System
Cloud Technologies and GIS Nathalie Smith [email protected] Agenda What is Cloud Computing? How does it work? Cloud and GIS applications Esri Offerings Lots of hype Cloud computing remains the latest, most
Cloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
