A Survey on Security Issues in Cloud Services
|
|
- Jeffery Parsons
- 8 years ago
- Views:
Transcription
1 A Survey on Security Issues in Cloud Services Ms. Menaka.C 1,R.S Ponmagal 2 1 Reasearch Scholar, Bharathiyar University,Department of Computer Science St. Claret College,Jalahalli, Bangalore, Karnataka 2 Professor, Department of Computer Science & Engineering, Dr.M.G.R.Educational & Research Institute University,Chennai, Tamilnadu menu_mca_03@yahoo.co.in, rsponmagal@gmail.com Abstract:-The day to day developments in the information technology enables people to lead a comfortable life. Cloud computing is one of the latest developments in the IT industry also known as ondemand computing. Cloud offers scalability, reliability, high performance and relatively low cost feasible solution. It is the application provided in the form of service over the Internet and system hardware in the data centers that gives these services. Having many advantages for IT organizations cloud has some issues that must be considered during its deployment. The main concern is security, privacy and trust. Data that was once housed under the security domain of the service user has been placed under the protection of the service provider. Users will lose control over the protection of their data. No longer had the data kept under owner. It is argued that hiding of data is not enough when seeking to protect data. The control of how one's data is used and the trust afforded to service providers is important. This paper, attempts to combine the various security threats and to demonstrate how cloud and virtualization vulnerabilities affect the different cloud service models. Community Cloud is the one which is shared by two or more organizations. A Hybrid Cloud is the one that contains two or more private, public or community clouds. Although cloud has many pros, the most cons are security, privacy and trust. Although cloud has many pros, the most cons are security, privacy and trust. The overall framework of cloud computing is shown in (fig.1). This paper includes the discussion about cloud service models and threats with their types. Keywords Cloud, Reliability, Service, Security, Trust, Virtualization. I. Introduction In the present day scenario Cloud computing is seen as a trend with almost all the organizations trying to make on entry into it. The main pros of cloud computing are cost saving, high availability and easy scalability. It provides an application in the form of service over the internet and system hardware in the data centres that gives these services. A Public Cloud is the one which is available for use by the general public. A Private Cloud is the one which is owned by a specific entity and normally used only by that entity or one of its customers. A Fig.1 Overall framework of cloud computing II.Cloud Service Models The cloud service model can be explained by (fig.2 & fig.3) Page No: 43
2 Menaka.C,Ponmagal. R.S The Iaas provide a data centre called Virtual data centre within the cloud. Within Iaas developers can install their own operating system, database management software, and support software. Both the hardware and software can be managed by the developers. Amazon EC2 is a well-known Iaas solution provider. D. Identification as a Service (IDaaS) Fig.2 Cloud Service Models Over past few years, companies have begun to emerge to provide identity (or identification) as a service, or cloud based ID management. A. Software as a Service (SaaS) The SaaS model provides a cloudbased foundation for software on demand. It is web-delivered content that users access through web browser. Simplicity of Integration, cost and scalability are the advantages of SaaS solutions. The security is the major disadvantage of SaaS solutions. Wellknown SaaS solution providers are salesforce.com, Google Apps, Turbo Tax, and QuickBooks. B. Platform as a service (PaaS) The PaaS provides a platform to the customers for their applications to run. It provides a hardware technology, like one or more servers, Operating systems, database solutions, developer tools, and network support, for developers to run their own solutions. It gives a platform called Application Programming Interface (API), therefore customers can run their own applications without administration skills. Well-known PaaS solution providers include Windows Azure and Google App Engine. C. Infrastructure as a Service(Iaas) Fig.3 Cloud Service Models III. Cloud-Based Data Storage The advantages of data storage in the cloud are scalability, pay for use, reliability, ease of access and ease of use. At the same time it should also be ensured that the performance, security threats and data orphans are avoided in the cloud. IV. Virtualization Virtualization means creation of virtual machine. This concept is not new, it is similar to multiprogramming- virtual memory, CPU sharing. More than 30 years ago, IBM had a virtual operating system that allowed a mainframe Page No: 44
3 computer to run many copies of the one or different operating systems. Common forms in virtualization are Server Virtualization, Desktop Virtualization, Virtual Networks and Virtual Storage. A. The Necessity of Virtualization in Cloud It increases utilization of devices. It decreases power consumption. It simplifies operating systems and application administration. It is easy for software provisioning and patches releases. Scalability of device and storage. It increases user access to key resources. It increases flexibility. overwriting the previous file space with a series of values. C..DDoS Attacks A Distributed Denial-of-Sevice Attack (DDoS) is a site hacker attack. The goal of DDoS is to consume system resources so that such resources cannot be used by the site s users. This attack uses multiple computers distributed across the internet to attack a target site. This will be shown in (fig.4) V. Security Issues in Cloud There are number of security issues for cloud computing as it includes many technologies like: A. Virtualization Although Virtualization is one of the main components of a cloud, virtual machines are dynamic in nature so that it is difficult to maintain security consistency. It is easy to generate vulnerabilities and configuration errors. The main issue in virtual machine is to keep maintaining the security state for a given time. B. Data Storage Wiping When a cloud-based data storage provider shares the storage device across multiple customers, it is possible for a customer to access another customer s previously deleted confidential document. To prevent such misuse of data access, many cloud-based data storage facilities will wipe a file s contents upon deletion. Data wiping is used when a cloud-based storage device overwrites (wipes) a file s contents when a file is deleted. It involves by D. Packet Sniffing Fig. 4 DDoS Attack Over the internet and cloud, applications communication is by exchange of data packets. A hacker can write code called packet sniffers which allow them to view, and in some cases change, a packet s contents. The best defence against a packet sniffing attack is to use secure (encrypted) connections. This is explained in (fig.5). Fig. 5 Packet Sniffing E. Man-in-the-Middle Attack A man-in-the-middle attack can be defined as a form of eavesdropping in Page No: 45
4 Menaka.C,Ponmagal. R.S which the attacker is able to read, insert and modify messages between the users in the remote system, without either party becoming aware that the link between them has been compromised. MITM attack is also known as monkey-in-themiddle attack or fire brigade attack. The best solution is to establish a secure (encrypted) connection with the remote server. F. Monitoring Device Screens. Few years ago, when employees access confidential data within their office, the physical data were protected from prying office. However cloud extends the delivery of such data to users at any place, at any time, and to any device. The best defence against screen monitoring is user training. G. Malicious Employees In cloud, companies move sensitive data away from own employees. However, the data are accessible to a staff of IT personnel that the company may not know. The cloud based solution providers are intensifying their recruitment and hiring process to overcome these concerns. H. Hypervisor Attack When a server is virtualized in the cloud, each server operating system runs on top of special virtualization software called the hypervisor. In the terms of hackers, the process of taking over the hypervisor is called hyper jacking attack. The best defence against this attack is by assigning state value like cyclic redundancy check (CRC) to the hypervisor. I. Guest-Hopping Attack The operating systems that execute in a virtualized server are called guest operating systems. A guest-hopping attack takes place when a hacker tries to attack one guest operating system from another. J. SQL-Injection Attack This attack occurs when a malicious user inserts one or more SQL queries within one or more of the fields. The developers prompt users to be aware of and test for such injections while they enter the data within forms. VI. Conclusion The past few years cloud computing has grown from being a promising business idea to one of the fastest growing parts of IT. There are various issues that need to be dealt with respect to security and privacy in a cloud computing. In other hand they are also risk of attacks like powerful DDoS. Cloud service provider should protect themselves from this type of attacks. In this paper various security issues in cloud computing and suitable solutions at the primary level are discussed. It is proposed to delve deep into any one threat in the cloud and model appropriate solution, which improves the performance in the cloud environment. Page No: 46
5 K.K. Ramkrishnan, Jacobus Van der Merwe, The Case for Enterprise-Ready Virtual Private Clouds, HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing, San Diego, CA, USA, ers/wood.pdf ACKNOWLEDGMENT This work was supported by my research guide Ms.R.S.Ponmagal and is contributed of our own work. I thank her for our development in research work. REFERENCES [1] Peter Mell, Timothy Grance, The NIST Definition of Cloud Computing, Jan, [2] L. Wang, Gregor Laszewski, Marcel Kunze, Jie Tao, Cloud Computing: A Perspective Study, New Generation Computing- Advances of Distributed Information Processing, pp , vol. 28, no. 2, 2008.DOI: /s [3] Harold C. Lin, Shivnath Babu, Jeffrey S. Chase, Sujay S. Parekh, Automated Control in Cloud Computing: Opportunities and Challenges, Proc. of the 1 st Workshop on Automated control for data centres and clouds, New York, NY, USA, pp , 2009, ISBN: [4] R. Maggiani, Communication Consultant, Solari Communication, Cloud Computing is Changing How we Communicate, 2009 IEEE International Professional Conference, IPCC, pp. 1-4, Waikiki, HI, USA, July 19-22, ISBN: [5] B.P. Rimal, Choi Eunmi, I. Lumb, A Taxonomy andsurvey of Cloud Computing Systems, Intl. Joint Conference on INC, IMS and IDC, 2009, pp , Seoul, Aug, 2009.DOI: /NCM [10] S. Bhardwaj, L. Jain, and S. Jain, Cloud computing:a study of infrastructure as a service (IAAS),International Journal of engineering and informationtechnology, 2(1):60 63, [11] Seny Kamara, Kristin Lauter, Cryptographic cloud storage, Lecture Notes in Computer Science, Financial Cryptography and Data Security, pp , vol. 6054, DOI: / _13 [12] R. L. Grossman, The Case for Cloud Computing, ITProfessional, vol. 11(2), pp , Mar-April, 2009, ISSN: , INSPEC Accession Number: , DOI: /MITP [13] Shuai Zhang, Shufen Zhang, Xuebin Chen, Xiuzhen Huo, Cloud Computing Research and Development Trend, Intl. Conference on Future Networks, pp , China, DOI: /ICFN [14] Lizhe Wang, Jie Tao, Kunze M., Castellanos A.C., Kramer D., Karl W., Scientific Cloud Computing: Early Definition and Experience, 10th IEEE Int. Conference on High Performance Computing and Communications, pp , Dalian, China, Sep. 2008, ISBN: [15] Hoang T. Dinh, Chonho Lee, Dusit Niyato, Ping Wang, A Survey of Mobile Cloud Computing: Architecture, Applications and Approaches, Wireless Communications and Mobile Computing, Wiley Journals, Oct 11, DOI: /wcm.1203 ***** IJCI 2K ***** [6] Gaoyun Chen, Jun Lu and Jian Huang, Zexu Wu, SaaAS - The Mobile Agent based Service for Cloud Computing in Internet Environment, Sixth International Conference on Natural Computation, ICNC 2010, pp , IEEE, Yantai, Shandong, China, ISBN: [7] Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi o Iacon, On technical Security Issues in Cloud Computing, Proc. of IEEE International Conference on Cloud Computing (CLOUD-II, 2009), pp , India, [8] Sangeeta Sen, Rituparna Chaki, Handling Write Lock Assignment in Cloud Computing Environment, Communications in Computer and Information Science, vol. 245, issue. 7, pp , DOI: / _27 [9] Timothy Wood, Prashant Shenoy, Alexandre Gerber, Page No: 47
5 International Journal of Scientific & Engineering Research, Volume Ŝǰȱ ȱřǰȱ ȬŘŖŗśȱȱ ISSN 2229-5518
5 International Journal of Scientific & Engineering Research, Volume Ŝǰȱ ȱřǰȱ ȬŘŖŗśȱȱ Open Platform Cloud Infrastructure Model with Enhanced Virtualization Sountharrajan Sehar, Abilash Rajasekaran, Elangovan
More informationVIRTUALIZATION IN CLOUD COMPUTING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.540
More informationCloud Template, a Big Data Solution
Template, a Big Data Solution Mehdi Bahrami Electronic Engineering and Computer Science Department University of California, Merced, USA MBahrami@UCMerced.edu Abstract. Today cloud computing has become
More informationSecurity Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015
RESEARCH ARTICLE OPEN ACCESS A Survey on Cloud Computing Security and Solutions N. Sugavaneswaran, D.Saravanan Assistant Professor Department of Computer Science Srimad Andavan Arts and Science College
More informationMobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
More informationUNRESOLVED SECURITY ISSUES THREATENING THE CLOUD COMPUTING TECHNIQUE: A SURVEY
UNRESOLVED SECURITY ISSUES THREATENING THE CLOUD COMPUTING TECHNIQUE: A SURVEY Puneet Kumar 1, Gaurav Tyagi 1 1,2 Computer Science Department,Sir Chhotu Ram Institute of Engineering & Technology, CCS University
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More informationCloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
More informationCloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
More informationA Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
More informationCLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM Taha Chaabouni 1 and Maher Khemakhem 2 1 MIRACL Lab, FSEG, University of Sfax, Sfax, Tunisia chaabounitaha@yahoo.fr 2 MIRACL Lab, FSEG, University
More informationSurvey on Security Issues and Solutions in Cloud Computing
Survey on Security Issues and Solutions in Cloud Computing D.Gnanavelu 1 (Research Scholars), Computer Science, Meenakshi University, K.K Nagar, Chennai-78, Tamil Nadu, India Dr. G.Gunasekaran 2, Principal,
More informationSECURITY ISSUES IN CLOUD COMPUTINGAND ASSOCIATED MITIGATION TECHNIQUES
SECURITY ISSUES IN CLOUD COMPUTINGAND ASSOCIATED MITIGATION TECHNIQUES Vikas Teotia 1, Parutosh Sharma 2 1, 2 VR Siddhartha Engineering College, Andhra Pradesh (India) ABSTRACT Cloud computing is a new
More informationA Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
More informationCloud Computing and Attacks
Cloud Computing and Attacks Joseph Spring School of Computer Science 7COM1027 - Distributed Systems Security 1 Areas for Discussion Cloud Computing Attacks Firewalls 2 Cloud Computing A Cloud is a large
More informationCloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
More informationCloud Computing Services on Provisioning Cost Approach
Cloud Computing Services on Provisioning Cost Approach 1 Sasidevi Puppala, 2 P.Radha Krishna, 3 Srilakshmi Aluri 1, 3 Student, Nova College of Engineering & Technology, Jupudi, Ibrahimpatnm. 2 Associate
More informationCloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
More informationA Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
More informationCloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
More informationAuthentication Mechanism for Private Cloud of Enterprise. Abstract
Authentication Mechanism for Private Cloud of Enterprise Mei-Yu Wu *, and Shih-Pin Lo Department of Information Management, Chung Hua University, Hsinchu, Taiwan {mywu, e10010008}@chu.edu.tw Abstract Enterprises
More informationImplementing & Developing Cloud Computing on Web Application
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationEnhanced Survey and Proposal to secure the data in Cloud Computing Environment
Enhanced Survey and Proposal to secure the data in Cloud Computing Environment MR.S.SUBBIAH, Research Scholar PRIST University Thanjvur, Tamil Nadu. subbussp2007@gmail.com DR.S.SELVA MUTHUKUMARAN, Director,
More informationSecurity Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
More informationSecurity Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
More informationA Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com
More informationHow To Compare Cloud Computing To Cloud Platforms And Cloud Computing
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms
More informationApplication Based Access Control on Cloud Networks for Data Security
Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,
More informationCloud Computing Architecture: A Survey
Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and
More informationExploring Resource Provisioning Cost Models in Cloud Computing
Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department
More informationCloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
More informationA Study of Infrastructure Clouds
A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,
More informationA Model for Data Protection Based on the Concept of Secure Cloud Computing
International Journal of Scientific and Research Publications, Volume 2, Issue 3, March 2012 1 A Model for Data Protection Based on the Concept of Secure Cloud Computing Gargee Sharma 1, Prakriti Trivedi
More informationA Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
More informationA Comparative Study of cloud and mcloud Computing
A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu
More informationCLOUD COMPUTING AND BENEFITS OF PRIVATE CLOUD IN E-LEARNING SOLUTIONS
CLOUD COMPUTING AND BENEFITS OF PRIVATE CLOUD IN E-LEARNING SOLUTIONS SHRINIVAS ADHYAPAK DEPARTMENT OF MCA, BLDEA S COLLEGE OF ENGINEERING & TECHNOLOGY, ASHRAM ROAD, BIJAPUR,shrinivasadhyapak@gmail.com
More informationLoad Balancing in Cloud Computing using Observer's Algorithm with Dynamic Weight Table
Load Balancing in Cloud Computing using Observer's Algorithm with Dynamic Weight Table Anjali Singh M. Tech Scholar (CSE) SKIT Jaipur, 27.anjali01@gmail.com Mahender Kumar Beniwal Reader (CSE & IT), SKIT
More informationA SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING
A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING Yogita gangboir 1, Praveen Shende 2, Tushar Kumar Vaidya 3 1,3 Department of Computer Science and Engineering, CSIT, Durg, (India) 2 Assoistant Professor
More informationCLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas
CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas PART 1 A brief Concept of cloud Issues in cloud Security Issues A BRIEF The Evolution Super
More informationKeywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
More informationThe Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
More informationReallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b
Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan
More informationHow To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
More informationAnalysis of Cloud Computing Vulnerabilities
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 308-312 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
More informationCloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
More informationOCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing
OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing K. Satheeshkumar PG Scholar K. Senthilkumar PG Scholar A. Selvakumar Assistant Professor Abstract- Cloud computing is a large-scale
More informationCloud Computing: The Next Computing Paradigm
Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea rdcaytiles@gmail.com,
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
More informationCLOUD COMPUTING AND ITS SECURITY ASPECTS
CLOUD COMPUTING AND ITS SECURITY ASPECTS Subhash Basishtha 1, Saptarshi Boruah 2 1 Department of Information Technology, Assam University, Silchar-788011, India 2 Department of Information Technology,
More informationEfficient Cloud Management for Parallel Data Processing In Private Cloud
2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Efficient Cloud Management for Parallel Data Processing In Private
More informationCloud Based E-Government: Benefits and Challenges
Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North
More informationSurvey on Security Attacks and Solutions in Cloud Infrastructure
Survey on Security Attacks and Solutions in Cloud Infrastructure Shilpa D 1, Nagashree C 2, Divya C 3, Spurthi G S 4 Assistant Professor, Department of Computer Science and Engineering, SVIT, Bangalore,
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationSecure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection Govinda.K 1, Sathiyamoorthy.E *2, Surbhit Agarwal 3 # SCSE,VIT University Vellore,India 1 kgovinda@vit.ac.in
More informationONLINE C, C++, JAVA COMPILER USING CLOUD COMPUTING - A SURVEY
International Journal of Advances in Engineering Science and Technology 318 www.sestindia.org/volume-ijaest/ and www.ijaestonline.com ISSN: 2319-1120 ONLINE C, C++, JAVA COMPILER USING CLOUD COMPUTING
More informationEnhancing M-Learning System Using Cloud Computing
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-01 E-ISSN: 2347-2693 Enhancing M-Learning System Using Cloud Computing Sharmila 1*, Nisha Jebaseeli
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
More informationCloud Computing For Distributed University Campus: A Prototype Suggestion
Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert mferkoc@yildiz.edu.tr, sbkert@yildiz.edu.tr Yildiz Technical University (Turkey) Abstract
More informationCloud Computing: An Overview
Cloud Computing: An Overview Mohsin Nazir 1, Prashant Tiwari 2, Shakti Dhar Tiwari 3, Raj Gaurav Mishra 4 Abstract Cloud computing is a group of IT services which have been presented to a person on the
More informationCHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
More informationCLOUD COMPUTING: THE EMERGING COMPUTING TECHNOLOGY. Feng-Tse Lin and Teng-San Shih. Received May 2010; accepted July 2010
ICIC Express Letters Part B: Applications ICIC International c 2010 ISSN 2185-2766 Volume 1, Number 1, September 2010 pp. 33 38 CLOUD COMPUTING: THE EMERGING COMPUTING TECHNOLOGY Feng-Tse Lin and Teng-San
More informationCLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
More informationA Survey on Cloud Computing
A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India dalapati89@gmail.com G. Sahoo Department of Information Technology Birla
More informationTheoretical Survey on Research Areas in Cloud Computing
Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394 3343 e-issn: 2394 5494 Theoretical Survey on Research Areas in Cloud Computing Jignesh
More informationCloud computing: benefits, risks and recommendations for information security
Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation
More informationSurvey of the network security in cloud computing
Survey of the network security in cloud computing M.usha devi #1 Research Scholar Mr. B.Loganathan* 2 # Assistant professor Department of Computer Science Government Arts college(autonomous),coimbatore-18,tamilnadu,india.
More informationData Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: prashantpatil11@rediffmail.com ABSTRACT
More informationABSTRACT: [Type text] Page 2109
International Journal Of Scientific Research And Education Volume 2 Issue 10 Pages-2109-2115 October-2014 ISSN (e): 2321-7545 Website: http://ijsae.in ABSTRACT: Database Management System as a Cloud Computing
More informationSurvey On Security Threats In Data Storing & Sharing In Cloud Environment
Survey On Security Threats In Data Storing & Sharing In Cloud Environment Seema Tahalyani 1 and Dr. S.M Ghosh 2 1 CSE Department, Rungta College of Engineering & Technology, Bhilai, Chhattisgarh, India
More informationCERTIFICATE PROGRAMME ON CLOUD SPECIALISTS DEVELOPMENT
CERTIFICATE PROGRAMME ON CLOUD SPECIALISTS DEVELOPMENT Present awareness and demands of cloud computing calls for increasing needs of cloud specialists development noticeably worldwide. VMware's Singapore
More informationHow To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
More informationPrivate Vs Public Cloud
Private Vs Public Cloud Solanke Vikas 1, Kulkarni Gurudatt 2, Maske Vishnu 3, Kumbharkar Prashant 4 1 Lecturer in Information Technology Department,MM Polytechnic Pune, India solankevs@mmpolytechnic.com
More informationWhat is Computing?
Laptop Phones Object Storage Monitoring Compute Content Server Application Collaboration Platform Infrastructure Block Storage Communication Network Finance Data Base Tablet Desktop International Journal
More informationLayered Mapping of Cloud Architecture with Grid Architecture
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE ADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM Neela Bhuvan 1, K.Ajay Kumar 2 1 M.Tech Student, Dept of CSE, Vathsalya Institute
More informationSECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING
SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING Ali Newaz Bahar 1*, Md. Ahsan Habib 2, Md. Manowarul Islam 3 1, 2, 3 Department of Information and Communication Technology, Mawlana Bhashani Science and
More informationSECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
More informationyvette@yvetteagostini.it yvette@yvetteagostini.it
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of
More informationLecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
More informationINTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS
INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS P.Shanthi Bala Lecturer, Department of Computer Science, Pondicherry University, Puducherry. Abstract Cloud computing
More informationCloud Computing: Overview & Current Research Challenges
IOSR Journal of Computer Engineering (IOSR-JCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 8, Issue 1 (Nov. - Dec. 2012), PP 14-22 Cloud Computing: Overview & Current Research Challenges Mohsin Nazir Department
More informationSecurity issues for Cloud Computing
274 Security issues for Cloud Computing Vikas Goyal [1], Dr. Chander Kant [2] [1] Research Scholar, [2] Assistant Professor Deptt. of Comp. Sc. & Appl., Kurukshetra University, Kurukshetra, India. vikas.goyal_85@yahoo.co.in,
More informationCloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationBig Data & Its Bigger Possibilities In The Cloud
Big Data & Its Bigger Possibilities In The Cloud Chhavi Gupta Software Engineer, EMC Corporation Sai Pattem Professional MBA Candidate 2013 August 15 th, 9:30 10:30 AM Session 13860 Room 200 (Hynes Convention
More informationCLOUD COMPUTING SECURITY CONCERNS
CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.
More informationVirtual Machine Instance Scheduling in IaaS Clouds
Virtual Machine Instance Scheduling in IaaS Clouds Naylor G. Bachiega, Henrique P. Martins, Roberta Spolon, Marcos A. Cavenaghi Departamento de Ciência da Computação UNESP - Univ Estadual Paulista Bauru,
More information[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
More informationCloud Computing Overview with Load Balancing Techniques
Cloud Computing Overview with Load Balancing Techniques Yatendra Sahu M.Tech Scholar, Dept. of Computer Science & Engineering, MANIT Bhopal, India R.K. Pateriya Associate Professor, Dept. of Computer Science
More informationRealization of Interoperability & Portability Among Open Clouds by using Agent s Mobility & Intelligence
Realization of Interoperability & Portability Among Open s by using s Mobility & Intelligence Rabia Khan 1 and Amjad Mehmood 2 1,2 Institute of Information Technology, KUST, Indus Highway, Off Jarma, Kohat,
More informationANALYSIS OF CLOUD VENDORS IN INDIAN ENVIORNMENT
ANALYSIS OF CLOUD VENDORS IN INDIAN ENVIORNMENT Mrs. Jeena Thomas Asst. Professor, Department of Computer Science St.Joseph s College of Engineering & Technology, Palai, Kerala,(India) ABSTRACT Grid Computing
More informationCloud computing: utility computing over the Internet
Cloud computing: utility computing over the Internet Taneli Korri Helsinki University of Technology tkorri@hut.fi Abstract Cloud computing has become a hot topic in the IT industry, as it allows people
More informationLi Sheng. lsheng1@uci.edu. Nowadays, with the booming development of network-based computing, more and more
36326584 Li Sheng Virtual Machine Technology for Cloud Computing Li Sheng lsheng1@uci.edu Abstract: Nowadays, with the booming development of network-based computing, more and more Internet service vendors
More informationN TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
More informationResearch Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD
More information