Cloud Computing Security Challenges and their Compromised Attributes
|
|
|
- Rhoda Horton
- 9 years ago
- Views:
Transcription
1 Cloud Computing Security Challenges and their Compromised Attributes 1 Muhammad Aamir, 2 Prof. Xiang Hong, 3 Atif Ali Wagan, 4 Muhammad Tahir, 5 M.Asif 1,2,3,4 School of Software Engineering Chongqing University China 5 School of Electrical Engineering Chongqing University China Corresponding [email protected] Abstract Cloud computing is a revolutionary modern computing platform in the field of information technology. It has promptly became famous and considered the emerging field of recent times due to its potential for better utilization of computer resources like flexible IT architecture, scalability, availability, fault tolerance, computational power, computational platforms, storage and applications and to cut down costs of operations and supports. Nevertheless the is the biggest threat to its consumers and more research needs to be done to deal with this breach. In this paper, the better understanding of cloud computing and their is discussed. And I investigated the major cloud computing challenges, examined their compromised attributes and delivers the most threaten attribute to cloud computing. Keywords Cloud Computing, Security Challenges, Attributes, SLR. I. Introduction The outcomes of contemporary technologies depend on its efficiency, competence, performance, its feature of user friendliness and most importantly its level of information and control. Cloud computing is a new model which is taking place at very high speed in Information Technology services and became a prominent model of present days due to its fascinating features which are elastic, shared resources, immense scalability, pay as you go, self-provision of resources and zero maintenance cost. Cloud computing can be implemented in an extensive variety of architectures, within different service and deployment models where the services availability is the responsibility of service provider, and it can also be implemented with different technologies and software design approaches. Cloud computing is self-determining computing technology which is entirely different from grid and other computing technologies and Google apps is the greatest example of it. Cloud Computing makes novel progress in processors, virtualization technology, storage, broadband Internet connection, and fast, economical servers have combined to make the cloud a more credible solution. However several researchers have attempted to describe cloud computing and the definition all agreed upon didn t come up yet. But the most appropriate definition which is considered a standard definition presented by the federal technology agency National Institute of Standards and Technology shortly NIST: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [1]. According to the NIST definition numerous cloud computing key characteristics include; rapid elasticity, broad network access, on demand self service, resource pooling, metered service and multi tenacity that are advocated by Cloud Security Alliance shortly CSA. The three key modes of service offered in cloud computing is [1]: Software as a Service: It allows the user to utilize the hosted services on server according to their requirements, and the cloud users are responsible for controlling configurations of the applications. Platform as a Service: The hosting of environment is in charge of user and users are allowed to place their customized applications on cloud server and they are allowed to use development tools to develop their applications. Infrastructure as a Service: The cloud user in charge of controlling all services except data centre infrastructure and all computing resources such as storage, virtual machines processing, network capacity and others provided on demand over internet except data centre infrastructure. Further, according to the NIST classification, the cloud model is composed of four core deployment models: Public clouds: The cloud models accessible to all common, public and big industrial organizations. Community clouds: The cloud models which serve number of organizations or groups specifically and it may be managed by more than one organizations or group. Private clouds: The cloud models bound to particular group or organization with multiple users. It might be managed, and controlled by the single organization, and grouping of them. Hybrid clouds: The cloud models combination of two or more clouds of deployment model. Cloud computing is rapidly taking up since past few years, and its demand is relatively increasing. Cloud computing is an emerging technology and gaining popularity in the field of information IJSET@2014 Page 395
2 technology and growing area in IT space. The foremost Cloud providers present in the recent marketplace are Amazon, Microsoft, Google, IBM, Oracle, Eucalyptus, VMware, Eucalyptus, Citrix, Sales force, and Rack space and there are many different vendors offering different Cloud services. Figure: 1 NIST Visual Model of Cloud Computing Cloud Computing Security Significance II. The cloud computing is the promising development platform of IT industry which provides organizations with an efficient, flexible and cost effective substitutes to host their resources. Cloud computing delivers various advantages to the organizations who decide to adopt it. Regardless of potential benefits to the organizations in implementing cloud model, there are several issues which are threat to the cloud consumers and that impact the model reliability and passiveness. Cloud is the main fear that hinders the implementation of the cloud computing model and it is the key prerequisite for any service which presented cloud computing platform. To cope with the is not an easy task, it is not a minute challenge and there are several challenges which are threats from different factors and levels and it is obvious that the concerns has played the main significant role in hindering cloud computing. In this paper, I identify the challenges, their compromised attributes and find the most influential attribute which would be the toughest obstacle to overcome. The factors such as a computing on demand, storage on demand, elastic computing, virtualization requirement, and multi processing which makes the cloud dynamic and multifaceted. Because of these features it is hard and premeditated to apply the exact technique at the exact places. Cloud computing offers a novel business model for organizations to implement IT services with no in advance investment. Regardless of the potential gains accomplished from the cloud computing, the organizations are unhurried in admitting it due to issues and challenges related with it. Due to cloud s very nature cloud is one of the major issues which obstruct its growth and probably the biggest reason why organizations fear to move their data to cloud and has become priority concern for organizations. The cloud users and providers are showing their keen interest in cloud computing and both are willing to use it, with a condition which guarantees that their data and information will remain confidential and protected [2]. The popularity of cloud computing is largely due to the factuality that various enterprise applications and data are moving into cloud platforms; nevertheless, inadequacy of is still the key hurdle for cloud implementation [3]. To understand the need to keep the cloud secure, the not-forprofit organization is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholder s Cloud Security Alliance (CSA) is formed with a mission to promote the use of the best practices for providing assurance within cloud computing, and to provide education on the uses of cloud computing to help secure all other forms of computing [4]. International Data Corporation shortly IDC an American market research, analysis and advisory firm conducted surveys in 2008 and 2009 successively, amongst senior business executives and IT professionals regarding the challenges/issues which mainly affect the performance of cloud computing. According to the survey 2008, respondents rated 74.6% to and it shows is the biggest concern emerged in cloud service [5]. In the survey year of 2009, the result reveals many of the same challenges but the respondents rated topped with 87.5% masses which declares its importance compared to other cloud services challenges. On January.20, 2010 at the Brookings Institute forum on Cloud Computing for business, Brad Smith Microsoft General Counsel and the Senior Vice President conveyed a very important message. Throughout his crucial speech to the forum, he brought to light data from a survey amongst business leaders and the general population about their measuring attitude on cloud computing which is organized by Microsoft. The survey uncovered that 86 percent of business leaders chief concern is potential of cloud computing and 58 percent of the general population also believe the same, while other more than 90 percent of the same people are worried about cloud computing, privacy and access for their personal information and data in the cloud [6]. III. Methodology In this research work, the method, systematic literature review shortly SLR has been chosen in order to analyze the on hand literature concerning the issues of cloud computing and to answer the designed research question: what are the cloud computing challenges and their compromised attributes? And mention the most threaten attribute to its. Most of the earlier research works were done with conventional literature review which has low scientific value due to nonrigorous and unfair approach, where the systematic literature review has is of highly defined characteristics with more clear scientific perspective. In this paper we have undertaken the systematic literature review (SLR) as a primary research method and the guidelines and IJSET@2014 Page 396
3 systematic process by Kitchenham is adopted to conduct this research work [7]. A Systematic literature review is a means of identifying, evaluating and interpreting all available research relevant to a particular research question, topic or phenomenon of interest and their primary aim is to outline a search strategy to find out the primary studies to answer the research questions [7]. The view of the research methods which are used to answer the research questions is shown in figure 2. Planning Conducting Reporting Figure: 2 Research Design The most important features that distinguish a systematic literature review from a conventional literature review are [7]: Particular question addressed by defining a review protocol in systematic literature review. A search strategy defines in order to attain as much of the relevant information in Systematic literature review. The inclusion and exclusion criteria are requiring evaluating each potential main study Systematic literature review. Systematic review is carried out mostly in three phases: Planning Controlling Reporting Figure: 3 Systematic Review Phases SLR In order to attain the research objectives, research question is developed mentioned above. The most important intend of research questions is to recognize the cloud challenges and their compromised attributes. PICO criteria are used to explain keywords which have impact on this research. The PICO is an acronym which stands for Population Intervention Comparison Outcomes. It is criteria of placing a search strategy together that permits to obtain a further proof based approach to literature searching [7]. Population: The population might be any of the specific role, application and area. In this research Cloud Computing has chosen as Population. Intervention: The intervention is the tool or technology or procedure that addresses an exact concern. In this research Security is an intervention. Comparison: This is the tool or technology or procedure with which intervention is being compared. In this research, we are not comparing any of the technology or procedure. Outcomes: Outcomes are supposed to relate to factors of importance of specific tool or technology. All related outcomes should be particular and different challenges and their compromised attributes are the outcomes of this research. The quality assessment is done in order to make sure that the proper and related studies were integrated throughout the SLR and must accomplish the overall aim and research objectives. A review protocol states the methods that are used to carry out an exact systematic review [7]. In this research the SLR is carried out to determine the published papers related to the challenges and their compromised attributes. In order to attain the research objectives the related research papers selected, by following the selection criteria as mentioned by Kitchenham [7]. During the SRL, to identify the related research papers, required information and to ensure that the selected material is relevant to our research work the following search string was constructed the search string ((Cloud Computing) AND () AND (issues* OR threats* OR challenges*)). Then search was conducted from four databases which include IEEE Xplore, Springer link, Science direct and Scopus using search string which provided number of papers, to filter the papers which do not contain Irrelevant information the criteria of exclusion is done and which do contain relevant information the criteria of inclusion is done which is necessary to assess our potential primary study. IV. Results and Analysis In the process of SLR, the number of relevant papers has extracted to meet the objectives of the research from the huge number of papers published. Data analysis is the method of collection and summarization the results of the studies. And these methods are used to structure the data properly based on the findings. In our research, the Narrative Analysis for analyzing the results is used. Narrative analysis is a method of non-quantitative synthesis which represents the extracted information about studies should be tabulated in a manner consistent with the review questions. From the analysis, 62 challenges has identified throughout the SLR. The complete description of these challenges is presented in Table A. IJSET@2014 Page 397
4 Nos. Challenges Compromised Attributes 1 WS-Security Integrity, Confidentiality Account or service Confidentiality 2 hijacking 3 Limited Audit ability Audibility 4 Longer Chain of Trust Security 5 Data scavenging Availability 6 Customer-data Integrity manipulation 7 XML-related Integrity attacks 8 Browser Security Security 9 Dictionary attacks Security 10 VM Confidentiality,Integrity 11 input validation attack Confidentiality, Integrity 12 Computer hardware Confidentiality 13 VM escape Integrity 14 VM hopping Confidentiality 15 Sniffing/Spoofing Security virtual network 16 Data management Confidentiality 17 Network transport Integrity 18 Data storage Security, Integrity, Availability 19 Phishing attack Confidentiality 20 wrapping attack Integrity 21 Injection Attack Availability 22 IP Spoofing Confidentiality 23 Tampering Integrity 24 Repudiation Audibility 25 Information Disclosure Confidentiality 26 Denial of Service Availability 27 Elevation of Privilege Confidentiality 28 Physical Security, Availability 29 WLAN s Usability, Accountability 30 Direct attacking Confidentiality method 31 Replay attack Integrity 32 Man-in-the-middle Availability, Integrity attack 33 Reflection attack Confidentiality 34 Interleaving attack Integrity, Confidentiality 35 Timeliness attack Usability, Availability 36 Self-adaptive storage Integrity, Confidentiality resource management 37 Client monitoring and Security 38 Lack of trust Confidentiality 39 Weak Service Level Agreements (SLAs) Availability, Confidentiality 40 Perceived Lack of Availability Reliability 41 Auditing Security, Confidentiality 42 Back-Door Usability 43 TCP Hijacking Confidentiality, Integrity 44 Social Engineering Confidentiality 45 Dumpster Diving Availability 46 Password Guessing Confidentiality 47 Trojan Horses and Usability Malware 48 Completeness Availability 49 Roll back attack Availability, Usability 50 Fairness Confidentiality 51 Data Loss or Leakage Availability 52 Computer Network Integrity, Confidentiality Attack 53 Denial of service Availability attack 54 Service Availability Availability 55 Data Privacy Confidentiality 56 Data Security 57 Network Integrity, Security 58 Data locality Reliability 59 Data integrity Integrity 60 Data segregation Security, Confidentiality 61 Data Backups Availability 62 Data manipulation Availability, Integrity Table A: List of Challenges and Compromised Attributes And it is found that Confidentiality is the most threaten compromised attribute in the of cloud computing in contrast to others attributes. The result is shown below in the figure 4. Compromised Attributes Confidentiality Integrity Availability Security Usability Audibility Reliability IJSET@2014 Page % 21% 3% 1% 1% 6% Accountability 23% 31% Figure: 4 Compromised Attributes
5 IV. Conclusion Cloud computing is the rapidly growing and adopting technologies of recent times. It provides plentiful potential benefits; despite numerous challenges. The paper efforts to bring to light the challenges of cloud computing, their compromised attributes and mentioned the most threaten attribute. The numerous challenges have been identified has strong impact on cloud users, and providers of cloud computing and it is found that compromised attribute confidentiality, is most threatening attribute in of cloud computing. As the cloud computing technology is improving continuously, the new challenges have to be faced in future too. It is necessary for the future, the users and providers has to be more risk aware, aware and should have potential to face and cope with upcoming challenges, in order to protect their information. Acknowledgement The authors are thankful to Prof. Xiang Hong for his valuable suggestions and support. References [1]The NIST Definition of Cloud Computing Peter Mell Timothy Grance NIST Special Publication ,2011. [2]Eystein Mathisen, Security Challenges and Solutions in Cloud Computing, 5th IEEE International Conferenceon Digital Ecosystems and Technologies (IEEE DEST 2011), [3]Bansidhar Joshi, A. Santhana Vijayan, Bineet Kumar Joshi, Securing Cloud computing Environment against DDoS Attacks, IEEE,, pp. 1-5,2011. [4] [5]Haoyong Lv and Yin Hu, Analysis and Research about Cloud Computing Security Protect Policy, IEEE, pp ,2011. [6] [7]Kitchenham B, Charters S.,Guidelines for performing Systematic Literature Reviews in Software Engineering, Keele University and Durham University Joint report,2007. Page 399
Security Techniques for Protecting Data in Cloud Computing
Master Thesis Electrical Engineering November 2011 Security Techniques for Protecting Data in Cloud Computing Venkata Sravan Kumar Maddineni Shivashanker Ragi School of Computing Blekinge Institute of
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
The Trend and Challenges of Cloud Computing: A Literature Review
The Trend and Challenges of Cloud Computing: A Literature Review Doi:10.5901/ajis.2013.v2n10p9 Abstract Evwiekpaefe, Abraham E. Department of Mathematics, Computer Science Nigerian Defence Academy, Kaduna,
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013
Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
Cloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
Security Issues In Cloud Computing And Their Solutions
Security Issues In Cloud Computing And Their Solutions Mr. Vinod K. Lalbeg Lecturer (Management), NWIMSR, Pune-1 & Ms. Anjali S. Mulik Lecturer (Management), NWIMSR, Pune-1 ABSTRACT Cloud Computing offers
The trend and challenges of cloud computing: a literature review
International Letters of Social and Humanistic Sciences Vol. 16 (2014) pp 13-20 Online: 2013-11-08 (2014) SciPress Ltd., Switzerland doi:10.18052/www.scipress.com/ilshs.16.13 The trend and challenges of
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
Security Techniques for Protecting Data in Cloud Computing one SHOULD know WHAT...
Security Techniques for Protecting Data in Cloud Computing one SHOULD know WHAT... Venkata Sravan Kumar Maddineni, Blekinge Institute of Technology IT Security for the Next Generation European Cup, Prague
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072
Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2
Cloud Computing: Security Model Comprising Governance, Risk Management and Compliance.
Cloud Computing: Security Model Comprising Governance, Risk Management and Compliance. Sumit Kr. Yadav 1, Fawaz S. Al-Anzi 2, Jyoti Soni 3 1 Indira Gandhi Delhi Technical University, Delhi, India; 2 Computer
Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT
An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
A Prototype Implementation of Database-as-a-Service for the Cloud
A Prototype Implementation of Database-as-a-Service for the Cloud Kashif Laeeq Asst. Professor and PhD Scholar Dept. of Computer Science National University of Computer & Emerging Sciences, Karachi, Pakistan
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Clinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
VIRTUALIZATION IN CLOUD COMPUTING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.540
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
Cloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
FACING SECURITY CHALLENGES
24 July 2013 TimeTec Cloud Security FACING SECURITY CHALLENGES HEAD-ON - by Mr. Daryl Choo, Chief Information Officer, FingerTec HQ Cloud usage and trend Cloud Computing is getting more common nowadays
Implementing & Developing Cloud Computing on Web Application
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Customer Security Issues in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
Improving IT Service Management Architecture in Cloud Environment on Top of Current Frameworks
Improving IT Service Management Architecture in Cloud Environment on Top of Current Frameworks Fatemeh Arabalidousti 1 and Ramin Nasiri 2 1 Department of Computer Engineering, Islamic Azad University,
Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service
Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas
CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas PART 1 A brief Concept of cloud Issues in cloud Security Issues A BRIEF The Evolution Super
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) Introduction to Cloud Security. Taniya
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 6464(Print)
http://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir
Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Department of Computer Science Lahore College for Women University, Lahore, Pakistan. [email protected],
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
Addressing Data Security Challenges in the Cloud
Addressing Data Security Challenges in the Cloud Coordinate Security. The Need for Cloud Computing Security A Trend Micro White Paper July 2010 I. INTRODUCTION Enterprises increasingly recognize cloud
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING 1. K.SURIYA Assistant professor Department of Computer Applications Dhanalakshmi Srinivasan College of Arts and Science for Womren Perambalur Mail: [email protected]
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
Cloud Computing For Distributed University Campus: A Prototype Suggestion
Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert [email protected], [email protected] Yildiz Technical University (Turkey) Abstract
What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos
Research Challenges Overview May 3, 2010 Table of Contents I 1 What Is It? Related Technologies Grid Computing Virtualization Utility Computing Autonomic Computing Is It New? Definition 2 Business Business
20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in
To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in [email protected] A monthly publication from South Indian Bank 20 th Year of Publication Experience
How To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
Cloud Computing and Attacks
Cloud Computing and Attacks Joseph Spring School of Computer Science 7COM1027 - Distributed Systems Security 1 Areas for Discussion Cloud Computing Attacks Firewalls 2 Cloud Computing A Cloud is a large
An Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
CLOUD COMPUTING. When It's smarter to rent than to buy
CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD
WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory
Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Caveats and Disclaimers This presentation provides education on cloud technology and its benefits
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
The cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
Survey On Security Threats In Data Storing & Sharing In Cloud Environment
Survey On Security Threats In Data Storing & Sharing In Cloud Environment Seema Tahalyani 1 and Dr. S.M Ghosh 2 1 CSE Department, Rungta College of Engineering & Technology, Bhilai, Chhattisgarh, India
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
Analysis and Research of Cloud Computing System to Comparison of Several Cloud Computing Platforms
Volume 1, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Analysis and Research of Cloud Computing System to Comparison of
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Capturing the New Frontier:
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
CLOUD COMPUTING SECURITY CONCERNS
CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST
Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service
The NIST Definition of Cloud Computing (Draft)
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
Cloud Computing Benefits for Educational Institutions
Cloud Computing Benefits for Educational Institutions ABSTRACT Mr. Ramkumar Lakshminarayanan 1, Dr. Binod Kumar 2, Mr. M. Raju 3 Higher College of Technology, Muscat, Oman [email protected] 1,
SURVEY ON VIRTUALIZATION VULNERABILITIES
SURVEY ON VIRTUALIZATION VULNERABILITIES Indumathy M Department of MCA, Acharya Institute of Technology, Bangalore, (India) ABSTRACT Virtualization plays a major role in serving the organizations to reduce
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
The Analysis of Cloud Computing Major Security Concerns & Their Solutions
Journal of Information & Communication Technology Vol. 6, No. 2, (Fall 2012) 48-53 The Analysis of Cloud Computing Major Security Concerns & Their Solutions Farhat Sharif * Institute of Business and Technology
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012
A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES
21/09/11. Introduction to Cloud Computing. First: do not be scared! Request for contributors. ToDO list. Revision history
Request for contributors Introduction to Cloud Computing https://portal.futuregrid.org/contrib/cloud-computing-class by various contributors (see last slide) Hi and thanks for your contribution! If you
A Review on Cloud Computing Vulnerabilities
A Review on Cloud Computing Vulnerabilities Ms. Sugandha Nandedkar, Ms.Sangeeta Kakarwal Asst.Prof., Department of Computer Science and Engineering, DIEMS /Dr. BAMU, Aurangabad, MH, India. Prof. and HOD,
Analysis of Cloud Computing Vulnerabilities
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 308-312 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. [email protected]
DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY Adnan Khalid* a,dr. Muhammad Shahbaz b, Dr. Athar Masood c d Department of Computer Science, Government College University Lahore, Pakistan,
Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
How To Compare Cloud Computing To Cloud Platforms And Cloud Computing
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
