Data Security Issues in Cloud Computing

Size: px
Start display at page:

Download "Data Security Issues in Cloud Computing"

Transcription

1 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 1, August 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Data Security Issues in Cloud Computing Neha Rawat*, Ratnesh Srivastava, Binay Kumar Pandey, Poonam Rawat, Shikha Singh and Awantika Sharma Department of Information Technology, Govind Ballabh Pant University of Agriculture and Technology, India *Corresponding author: Abstract: Cloud computing is an enticing technology which is a combination of many existing technologies such as parallel computing, grid computing, distributed computing and others. It offers services like data storage, computing power, shared resources at low cost to its users over internet at anytime from anywhere. Costing model on cloud computing is based on pay as you go method, hence companies are saving millions by adopting this technology. As more and more individuals and companies are relying on cloud for their data, the question arises here is how secure cloud environment is? Though cloud computing has many advantages, it also have some security problems. Data security issue is the major concern in cloud computing because after shifting clients data to cloud, service provider is responsible for the security and privacy of data. Hence data security issue is the major challenge which is hampering the growth of cloud computing and therefore it is needed to be resolved in order to make it widely acceptable and to accelerate its growth. In this paper data security problems of cloud are discussed. Here we presented an overview of cloud computing, its benefits and data security challenges in cloud computing model. Keywords: Cloud Computing; Data Security Issues 1. INTRODUCTION Cloud computing has given a new dimension to internet. It has changed internet into a computing platform where computing power, storage, network etc. are provided to users. Cloud computing has transformed IT industry completely. It has a great impact on the development of IT by enhancing its existing capabilities and increasing flexibility. In the recent years, cloud computing has made significant changes in IT industry and has become a promising part of IT world. Being a promising business model it provides on demand provisioning of resources to its consumers. It attracts not only large enterprises but also medium and small size companies. Clients can access service provided by cloud only through internet and can also scale up and down resources according to their need, hence it is a cost effective, efficient and flexible alternative. Thus by adopting cloud computing companies can achieve more by paying less. There are many cloud providers such as Google, Amazon, Microsoft, IBM, and Rackspace. Cloud computing is a technology which saves user data on remote location (i.e. at data center) rather 9

2 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Figure 1. NIST model of Cloud Computing than saving it locally [1]. So users do not have to worry about managing hardware and software but at the same time cloud computing increases the responsibility of cloud vendors because now users totally depends on cloud for their data. To ensure access to cloud anytime from anywhere cloud should provide several features like availability, data integrity, accessibility etc. Since data is shifted outside the control of data owner and is maintained by third party, it invites security issues too, so cloud computing must ensure security. There are many issues in cloud computing that should be addressed by cloud provider to convince individuals or companies to use this technology. The most important concern is to guarantee that user data integrity and confidentiality is attained while data is stored in the cloud system. Therefore data security issue is the major concern in cloud computing. 2. CLOUD COMPUTING Cloud computing is about the delivery of computing to users from a remote location. Using cloud computing a user can store his data on cloud, which get centrally stored in the cloud and can be accessed anytime from anywhere through internet. National Institute of Standards and Technology (NIST) defines cloud computing as a model for enabling ubiquitous, convenient, on demand network access to shared pool of resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models and five deployment models [2]. 10

3 Data Security Issues in Cloud Computing 3. CLOUD COMPUTING DEPLOYMENT MODELS Cloud computing service models are classified as: A. Private Cloud Private clouds are built specifically for a single organization. It is owned and operated by specific organization and all cloud resources are also dedicated to that organization only. It offers greater control on data security, which lacks in public cloud. Organizations build private cloud to deal with their business critical applications. B. Public Cloud Public cloud is a cloud environment which is made available to public users by a service provider. It is owned and operated by cloud service providers. Resources in this cloud are available to public users on demand over the internet. User can rent resources and can scale resources up or down on the basis of their need. Examples of public cloud providers are Google, Amazon, Microsoft and Rackspace. C. Community Cloud It is analogous to private cloud. A private cloud is dedicated for a particular group, while community cloud is dedicated to a closed community which includes people of similar interest. With community cloud, organization having similar objectives can work together. Example of community cloud is Media Cloud. D. Hybrid Cloud Hybrid clouds are combination of two or more clouds (private, public or community cloud). With hybrid cloud, organizations can realize the benefit of multiple cloud deployment models. It provides augmentation of private cloud with resources of public cloud in order to handle any unexpected surges in workload. 4. CLOUD COMPUTING SERVICE MODELS Cloud computing service models are classified as: A. Software as a Service (SaaS) It is the delivery of application. In SaaS a complete application is provided to user which is running on cloud infrastructure. As software is hosted by provider, users do not need to buy, install or manage hardware for it. In SaaS instances of a software application are shared as a service. Examples of SaaS are Google Docs, Cloud Drive, and Salesforce.com CRM application. B. Platform as a Service (PaaS) PaaS enables developers to deploy their application on the cloud. The consumer can control their application but do not have any control over underlying infrastructure. It provides user an integrated set of software through the internet. PaaS is a delivery of computing platform as a service. Examples of PaaS are Google App Engine, Amazon Web Services, and Microsoft Azure. C. Infrastructure as a Service (IaaS) Using IaaS user get access to resources like storage, server, networks, data center space. It shares pool 11

4 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Figure 2. Cloud Deployment Models [3] of computing resources. User can deploy and run both application and operating system on IaaS. It frees user from buying or managing underlying software and hardware. Example of IaaS is Amazon EC2. 5. CLOUD SECURITY STANDARD ORGANIZATIONS Many standard bodies are developing standards for cloud environment. Users want the freedom to move between cloud providers for many reasons. For example, other vendors offer better prices, relationship with a provider may not be working. The community of cloud computing has already developed many standards by various forums. These standards are developed to provide interoperatibility between clouds and to develop a healthy environment in cloud computing industry [4]. Some cloud security standard organizations are: National Institute of Standards and Technology (NIST) Open Cloud Consortium (OCC) 12 Open Grid Forum (OGF)

5 Data Security Issues in Cloud Computing The Object Management Group (OMG) Storage Networking Industry Association (SNIA) Cloud Computing Interoperability Forum (CCIF) Distributed Management Task Force (DMTF) Cloud Security Alliance (CSA) 6. RELATED WORK Several researches have been done in the literature for cloud computing and its security issues. Here we presented a brief review of some recent researches. Harauz et al. [5] discuss the regulatory and legal concerns associated with security issues. Encryption schema, scheduled data backups and strict access control mechanism should be offered by storage provider in order to avoid unauthorized access and to ensure data integrity, confidentiality and availability of the data. For interoperability among service providers, adaptation of a universal standard is recommended. Data Availability, Data Location and Data Transmission, and Data Security are the major issues related to data security in the cloud computing environment, identified by Z. Mahmood [6]. Data Location and Data Transmission cloud customers may wish that data should reside on a specific location based on data polices and legislations of country. Similarly, cross country transition of data may cause potential risks due to varying policies and regulations. Data Availability - the unavailability of data may lead to service outages. Data Security- security risks become the major concern, particularly, when data is transferred to another country, because different countries may have different regulatory frameworks. In his paper, Wentao Liu [7] illustrates cloud concepts and security problems in the cloud system. The key security problems in cloud computing are data privacy and service availability and single security method cannot solve the cloud computing security problem. He recommends many traditional and new technologies must be used together for protecting the total cloud computing system. Jinguang Han et al. [8] proposed an identity-based proxy re-encryption scheme to outsource sensitive data from owner to an external party. This scheme supports both inter-domain and intra-domain queries, therefore it is suitable for cloud computing scenario. In the proposed scheme, the access key can be computed by the owner independently without using private key generator (PKG), and is bound not only to the requesters identity but also to the requested cipher text. This scheme is also secured against collusion attacks. In the past few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. Security is the major issue, as it has lot of loose ends which scares a lot of cloud users. Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment. S. Subashini et al. [9] presents a survey of the different security issues in service delivery models that pose a threat to the cloud. Sandeep K. Sood [10] proposed a framework that can efficiently protect the data from beginning to end, i.e., from the owner to the cloud and then to the user. The strategy used to protect the data utilizes various cryptographic measures such as Message Authentication Code (MAC) is used for integrity check of data, Secure Socket Layer (SSL) 128 bit or 256 bit encryption, searchable encryption and division of data into three different sections in cloud for storage. Proposed scheme achieves the integrity, availability 13

6 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING and reliability of data. In addition to this it also enable to retrieve files from cloud by searching over an encrypted data. 7. CRITICAL REVIEW Table 1. Summary of surveyed literature Author Harauz et al. [5] Problem discussed/ Proposed Method Different regulatory and legal concerns associated with data security issues Z. Mahmood [6] Outlined the major security issues in cloud computing Wentao Liu [7] Jinguang Han et al. [8] Illustrates cloud concepts and security problems in the cloud system Proposed identity based proxy re-encryption scheme S. Subashini et al. [9] Security issues in service delivery models that pose a threat to the cloud. Sandeep K. Sood [10] Proposed a framework utilizing various cryptographic measures that can efficiently protect the data from beginning to end. 8. DATA SECURITY ISSUES IN CLOUD Cloud computing provides efficient, flexible and cost effective services. However this model is not 100% secure. The major concerns in cloud computing are privacy and security. There are various security issues in cloud computing. Of many security issues, data security seems to be the major obstacle towards the adaption of cloud computing. Data security in cloud is must, in order to ensure that the data has not been accessed by any unauthorized person. The different key data security issues of cloud computing are discussed as follows. A. Data Integrity It is one of the most critical issues in cloud security. Data integrity describes the wholeness or completeness of dat. It can easily be achieved in standalone system by using ACID properties. But it is not easy to achieve data integrity in cloud environment because transaction management is the biggest problem with web services. Although standards like WS-Reliability and WS-Transaction are available to manage data integrity with web services but these are not matured yet [9]. Damage to the data stored in cloud may occur during transaction as a result of lack of integrity control in cloud. Cachin et al. [11] suggests to use Byzantine fault-tolerant replication protocol as a solution. B. Data Location Consumers store their data on cloud without knowing where their data is getting stored. Data locality is of utmost importance because some enterprises do not want to get stored their data at the location outside of their country. In this case an agreement is signed between the cloud provider and the consumer who want to store data at a particular location or server. Cloud model should ensure security and reliability of the location of the data. Data location of stored data on cloud is a very big issue from the point of view of clients trust and security of data. Location of data stored in cloud can be prioritized according to users wish or requirement. It will be defined by user which data of user is sensitive and non-sensitive. An interface should be 14

7 Data Security Issues in Cloud Computing provided to user during the data storage which contains the checks of data sensitivity level and store the data according to users data sensitivity wish [12]. C. Data Confidentiality Cloud provides an environment to users where they can host their data. Unauthorized access to critical data of an enterprise can cause disaster. Therefore it is cloud providers responsibility to guarantee that data can be accessed by only legitimate user. Data confidentiality is achieved by encryption. Cloud provider should implement suitable authentication and accounting mechanism to achieve confidentiality and should assure cloud user that their data is safe and confidential. In june 2009 IBM proposed a fully homomorphic encryption scheme that supports arbitrary computations on encrypted data [13]. In his paper Krishna P. N. Puttaswamy et al. [14] proposed a data confidentiality solution silverline, a set of techniques that calls for end-to-end encryption of data by its owner (the organization) and its consumers (the users). D. Data Leakage Although adoption of cloud computing is providing significant benefits to enterprises, but because of data leakage fear, they are holding back. Data leakage has become one of the major concerns from security standpoint. Cloud is an outside party where customers data is hosted, and it has potential to access customers data. Cloud environment provides resource sharing, so it seems to be risky to move data in hands of cloud provider. Data in cloud stored in a shared environment, so it could be hacked easily either due to malicious hacker attack or accidentally. To mitigate the effects of this problem a sensible data encryption technique should be used. Encryption should be performed at client side and user should have control over the keys used for decryption. Furthermore, encryption should not be performed at any intermediary place before transmission to cloud. E. Data Availability Another important concern of the cloud computing is availability of services. Data availability is a term used by some computer storage manufacturers and storage service providers (SSPs) to describe products and services that ensure that data continues to be available at a required level of performance in situations ranging from normal through disastrous. In general, data availability is achieved through redundancy involving where the data is stored and how it can be reached [15]. The unavailability of data may lead to service outages. Incidents of such cloud outages include Amazon S3 (over seven-hour downtime on July 20, 2008) [16], Gmail (services unavailable for almost 1 hour on April 2012). Thus strong data recovery policies are required. Two increasingly popular approaches to providing data availability are the storage area network (SAN) and network-attached storage (NAS) [15]. F. Backup Cloud provider should ensure that all of its clients data is backed up across multiple servers in multiple copies regularly to provide recovery in case of disaster like hardware failure. And to prevent accidental leakage of backed up data, a strong encryption scheme should be used. High Security Distribution and Rake Technology (HS-DRT), Parity Cloud Service Technique (PCS), and Cold and Hot Backup Service Replacement Strategy (CBSRS) are some backup and recovery techniques that have been developed in cloud domain [17]. 15

8 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING 9. CONCLUSION In this paper we elucidate cloud computing and major security issues of cloud computing. By utilizing various facilities and services provided by cloud one can increase performance, agility and efficiency in addition to reduce cost and management responsibilities of an enterprise. Though there are lots of advantages of cloud, there are yet numerous challenges to be faced by cloud computing such as privacy issues and data security. In this paper we have tried to address most critical data security challenges of cloud. Many standard organizations such as National Institute of Standards and Technology (NIST), Cloud Security Alliance (CSA) and Cloud Computing Interoperability Forum (CCIF) are trying to develop standards to resolve various security issues of cloud. Cloud computing has the potential to provide a secure and economically viable IT solution in the future. References 16 [1] K. R. C. Wang, Q. Wang and W. Lou, Ensuring data storage security in cloud computing, in Proc. 17th International Workshop on Quality of Service (IWQoS 09), pp. 1 9, [2] N. I. of Standards and Technology(NIST). [3] A. Reed, C. Rezek, and P. Simmonds, Security guidance for critical areas of focus in cloud computing v3. 0, Cloud Security Alliance, [4] M. K. F. H. Judith Hurwitz, Robin Bloor, Cloud computing for dummies, cloud-computing-standards-organizations.html. [5] J. Han, W. Susilo, and Y. Mu, Identity-based data storage in cloud computing, Future Generation Computer Systems, vol. 29, no. 3, pp , [6] Z. Mahmood, Data location and security issues in cloud computing, in Emerging Intelligent Data and Web Technologies (EIDWT), 2011 International Conference on, pp , IEEE, [7] W. Liu, Research on cloud computing security problem and strategy, in Consumer Electronics, Communications and Networks (CECNet), nd International Conference on, pp , IEEE, [8] L. M. Kaufman, Data security in the world of cloud computing, Security & Privacy, IEEE, vol. 7, no. 4, pp , [9] S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1 11, [10] S. K. Sood, A combined approach to ensure data security in cloud computing, Journal of Network and Computer Applications, vol. 35, no. 6, pp , [11] C. Cachin, I. Keidar, and A. Shraer, Trusting the cloud, Acm Sigact News, vol. 40, no. 2, pp , [12] P. Kumar and H. S. Arri, Data location in cloud computing, International Journal for Science and Emerging Technologies with Latest Trends, vol. 5, no. 1, pp , [13] IBM-Uncovers-Encryption-Scheme-That-Could-Improve-Cloud-Security, http: // That-Could-Improve-Cloud-Security-Spam-Filtering [14] K. P. Puttaswamy, C. Kruegel, and B. Y. Zhao, Silverline: toward data confidentiality in storageintensive cloud applications, in Proceedings of the 2nd ACM Symposium on Cloud Computing, p. 10, 2011.

9 Data Security Issues in Cloud Computing [15] [16] A. S. Team et al., Amazon s3 availability event: July 20, 2008, See: aws. amazon. com/s html, [17] K. Sharma and K. R. Singh, Online data back-up and disaster recovery techniques in cloud computing: A review, International Journal of Engineering and Innovative Technology (IJEIT), vol. 2, no. 5, pp ,

10 About This Journal MCCC is an open access journal published by Scientific Online Publishing. This journal focus on the following scopes (but not limited to): Autonomic Business Process and Workflow Management in Clouds Cloud Composition, Federation, Bridging and Bursting Cloud Computing Consulting Cloud Configuration, Performance and Capacity Management Cloud DevOps Cloud Game Design Cloud Migration Cloud Programming Models and Paradigms Cloud Provisioning Orchestration Cloud Quality Management and Service Level Agreement (SLA) Cloud Resource Virtualization and Composition Cloud Software Patch and License Management Cloud Workload Profiling and Deployment Control Cloud Video and Audio Applications Economic, Business and ROI Models for Cloud Computing Green Cloud Computing High Performance Cloud Computing Infrastructure, Platform, Application, Business, Social and Mobile Clouds Innovative Cloud Applications and Experiences Security, Privacy and Compliance Management for Public, Private and Hybrid Clouds Self-service Cloud Portal, Dashboard and Analytics Storage, Data and Analytics Clouds Welcome to submit your original manuscripts to us. For more information, please visit our website: You can click the bellows to follow us: Facebook: Twitter: LinkedIn: Google+:

11 SOP welcomes authors to contribute their research outcomes under the following rules: Although glad to publish all original and new research achievements, SOP can t bear any misbehavior: plagiarism, forgery or manipulation of experimental data. As an international publisher, SOP highly values different cultures and adopts cautious attitude towards religion, politics, race, war and ethics. SOP helps to propagate scientific results but shares no responsibility of any legal risks or harmful effects caused by article along with the authors. SOP maintains the strictest peer review, but holds a neutral attitude for all the published articles. SOP is an open platform, waiting for senior experts serving on the editorial boards to advance the progress of research together.

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights

More information

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com

More information

Quick guide: Using the Cloud to support your business

Quick guide: Using the Cloud to support your business Quick guide: Using the Cloud to support your business This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help businesses

More information

An Intelligent Approach for Data Fortification in Cloud Computing

An Intelligent Approach for Data Fortification in Cloud Computing An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Cloud Computing Security Issues and Controls

Cloud Computing Security Issues and Controls Cloud Computing Security Issues and Controls ACC 626 Information System Assurance & Computer-Assisted Auditing Peter Shih-Hsien Chen June 30th, 2013 Table of Contents Introduction... 1 History of Cloud

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing

Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing VOLUME 1, NUMBER 1, JUNE 2014 OPEN JOURNAL OF INFORMATION SECURITY AND APPLICATIONS Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing K. Mohammed Aaqib Ameen, A. Anny

More information

Cloud Computing & Collaboration

Cloud Computing & Collaboration Sponsored by Cloud Computing & Collaboration The security implications for this new Web paradigm Please note the audio line will remain silent until 5 minutes before broadcast Sponsored by Event Housekeeping

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

Cloud Computing Standards: Overview and ITU-T positioning

Cloud Computing Standards: Overview and ITU-T positioning ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Cloud Computing Attacks: A Discussion With Solutions

Cloud Computing Attacks: A Discussion With Solutions OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 1, August 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Cloud Computing Attacks: A Discussion With Solutions Shikha Singh

More information

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD

More information

Cloud Computing Services and its Application

Cloud Computing Services and its Application Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its

More information

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM. Agenda. Security Cases What is Cloud? Road Map Security Concerns

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM. Agenda. Security Cases What is Cloud? Road Map Security Concerns BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com

More information

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud

More information

Survey On Security Threats In Data Storing & Sharing In Cloud Environment

Survey On Security Threats In Data Storing & Sharing In Cloud Environment Survey On Security Threats In Data Storing & Sharing In Cloud Environment Seema Tahalyani 1 and Dr. S.M Ghosh 2 1 CSE Department, Rungta College of Engineering & Technology, Bhilai, Chhattisgarh, India

More information

Parametric Analysis of Various Cloud Computing Security Models

Parametric Analysis of Various Cloud Computing Security Models International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1499-1506 International Research Publications House http://www. irphouse.com Parametric Analysis

More information

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

Cloud Computing Technology

Cloud Computing Technology Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures

More information

Mobile Cloud Computing Security Considerations

Mobile Cloud Computing Security Considerations 보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications

More information

Cloud Computing Phillip Hampton LogicForce Consulting, LLC

Cloud Computing Phillip Hampton LogicForce Consulting, LLC Phillip Hampton LogicForce Consulting, LLC New IT Paradigm What is? Benefits of Risks of 5 What the Future Holds 7 Defined...model for enabling ubiquitous, it convenient, ondemand network access to a shared

More information

Security issues for Cloud Computing

Security issues for Cloud Computing 274 Security issues for Cloud Computing Vikas Goyal [1], Dr. Chander Kant [2] [1] Research Scholar, [2] Assistant Professor Deptt. of Comp. Sc. & Appl., Kurukshetra University, Kurukshetra, India. vikas.goyal_85@yahoo.co.in,

More information

Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University.

Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University. Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University P a g e 1 P a g e 2 Table of Contents Abstract... 3 Introduction... 3 Previous

More information

Customer Security Issues in Cloud Computing

Customer Security Issues in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the

More information

Cloud Courses Description

Cloud Courses Description Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment

More information

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National

More information

CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas

CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas PART 1 A brief Concept of cloud Issues in cloud Security Issues A BRIEF The Evolution Super

More information

CLOUD COMPUTING IN HIGHER EDUCATION

CLOUD COMPUTING IN HIGHER EDUCATION Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,

More information

A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS

A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS A Guide to Common Cloud Security Concerns Why You Can Stop Worrying and Start Benefiting from SaaS T he headlines read like a spy novel: Russian hackers access the President s email. A cyber attack on

More information

Cloud Computing An Elephant In The Dark

Cloud Computing An Elephant In The Dark Cloud Computing An Elephant In The Dark Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir

More information

Cloud Courses Description

Cloud Courses Description Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

CHAPTER 8 CLOUD COMPUTING

CHAPTER 8 CLOUD COMPUTING CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics

More information

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:

More information

The Magazine for IT Security. May 2010. issue 3. sör alex / photocase.com

The Magazine for IT Security. May 2010. issue 3. sör alex / photocase.com The Magazine for IT Security May 2010 sör alex / photocase.com free digital version made in Germany issue 3 Luiz Fotolia.com Clouds or storm clouds? Cloud Computing Security by Javier Moreno Molinero Gradually,

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

A Survey on Security Issues in Service Delivery Models of Cloud Computing

A Survey on Security Issues in Service Delivery Models of Cloud Computing A Survey on Security Issues in Service Delivery Models of Cloud Computing { S. Subashini and V. Kavitha (2011) Presented by: Anthony Postiglione Outline Introduction What is Cloud Computing Pros/Cons of

More information

Cloud Computing. Cloud computing:

Cloud Computing. Cloud computing: Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:

More information

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of

More information

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD

More information

Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT

Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT Abstract Cloud computing is a method to enhance the capacity dynamically without investing in

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

Digital Forensics. Lab 10: Cloud Computing & the Future of Digital Forensics

Digital Forensics. Lab 10: Cloud Computing & the Future of Digital Forensics Digital Forensics Lab 10: Cloud Computing & the Future of Digital Forensics Today's Topics Cloud Computing Overview Applications of Cloud Computing Impact of CC to Digital Forensics Future of Digital Forensics

More information

Cloud Computing Security Issues

Cloud Computing Security Issues Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, marchany@vt.edu Something Old, Something New New: Cloud describes the use of a collection of services, applications,

More information

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:

More information

What Cloud computing means in real life

What Cloud computing means in real life ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

Security Issues In Cloud Computing and Countermeasures

Security Issues In Cloud Computing and Countermeasures Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department

More information

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35

More information

Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking

Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking B.Sujana 1, P.Tejaswini 2, G.Srinivasulu 3, Sk.Karimulla 4 1,2,3,4 QUBA COLLEGE OF ENGINEERING & TECH, NELLORE Abstract:

More information

Fully homomorphic encryption equating to cloud security: An approach

Fully homomorphic encryption equating to cloud security: An approach IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach

More information

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Wikipedia defines cloud computing as Internet-based computing, whereby shared

More information

Enterprise Cloud Computing Standards, Innovation & Shifts

Enterprise Cloud Computing Standards, Innovation & Shifts Enterprise Cloud Computing Standards, Innovation & Shifts Anubrata Chakrabarti Director, Technology Integration July 29, 2011 Standards - the need & the way forward Hybrid Cloud Community Cloud Does every

More information

Cloud Computing For Distributed University Campus: A Prototype Suggestion

Cloud Computing For Distributed University Campus: A Prototype Suggestion Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert mferkoc@yildiz.edu.tr, sbkert@yildiz.edu.tr Yildiz Technical University (Turkey) Abstract

More information

ISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,

More information

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Cloud Computing in Banking

Cloud Computing in Banking Financial Services the way we see it Cloud Computing in Banking What banks need to know when considering a move to the cloud Contents 1 Overview 3 2 Why Cloud Computing for Banks? 4 2.1 Cost Savings and

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities

More information

WhitePaper. Private Cloud Computing Essentials

WhitePaper. Private Cloud Computing Essentials Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....

More information

SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING

SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING Ali Newaz Bahar 1*, Md. Ahsan Habib 2, Md. Manowarul Islam 3 1, 2, 3 Department of Information and Communication Technology, Mawlana Bhashani Science and

More information

A Study on Service Oriented Network Virtualization convergence of Cloud Computing

A Study on Service Oriented Network Virtualization convergence of Cloud Computing A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute

More information

A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING

A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING Yogita gangboir 1, Praveen Shende 2, Tushar Kumar Vaidya 3 1,3 Department of Computer Science and Engineering, CSIT, Durg, (India) 2 Assoistant Professor

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 1 Cloud Computing In the Industry Introduction to Cloud Computing The term cloud computing is simply the use of computing

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Everything You Need To Know About Cloud Computing

Everything You Need To Know About Cloud Computing Everything You Need To Know About Cloud Computing What Every Business Owner Should Consider When Choosing Cloud Hosted Versus Internally Hosted Software 1 INTRODUCTION Cloud computing is the current information

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled

Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

Role of Cloud Computing in Education

Role of Cloud Computing in Education Role of Cloud Computing in Education Kiran Yadav Assistant Professor, Dept. of Computer Science. Govt. College for Girls, Gurgaon, India ABSTRACT: Education plays an important role in maintaining the economic

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous

More information

International Journal of Engineering Research & Management Technology

International Journal of Engineering Research & Management Technology International Journal of Engineering Research & Management Technology Cloud Security Issues, Challenges And Their Optimal Solutions Vinay Kumar Pant M.Tech. (CSE) Subharti Institute of Technology and Engineering

More information

Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen

Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen Samah Sadeq Ahmed Bagish Department of Information Technology, Faculty of Engineering, Aden University,

More information

The cloud - ULTIMATE GAME CHANGER ===========================================

The cloud - ULTIMATE GAME CHANGER =========================================== The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud

More information

Shaping Your IT. Cloud

Shaping Your IT. Cloud Shaping Your IT Cloud Hybrid Cloud Models Enable Organizations to Leverage Existing Resources and Augment IT Services As dynamic business demands continue to place unprecedented burden on technology infrastructure,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

Security & Trust in the Cloud

Security & Trust in the Cloud Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer

More information