How To Secure Cloud From Data Loss
|
|
|
- Shanna Malone
- 5 years ago
- Views:
Transcription
1 International Journal of Knowledge, Innovation and Entrepreneurship Volume 2 No. 2, 2014, pp Security Management in Cloud Computing to Secure Cloud from Data Loss ASMA SATTAR, FARIA NAZIR, FAIZA KIANI & MUHAMMAD FAHAD KHAN University of Engineering and Technology Taxila, Pakistan Received 7 May 2014; received in revised form 1 December 2014; accepted 31 December 2014 ABSTRACT Cloud computing is growing rapidly in IT industry providing a set of services to customers that can be accessed remotely. Cloud computing technology has many advantages as well as challenges one is a concern by organizations about putting their data in the cloud. This paper highlights a number of cloud computing security issues and proposes a model designed to make the cloud more secure. A security layer is also introduced to handle clients mission-critical data which, in cloud computing, is designed to manage, store, analyze and share complex amount of data more securely. Keywords: Cloud Computing, Cloud Security Issues, Data Encryption, Risk Management
2 ASMA SATTAR, FARIA NAZIR, FAIZA KIANI & MUHAMMAD FAHAD KHAN Introduction The next generation in computation is cloud computation. Cloud computing enables individuals and organisations across the globe to access digital information on the cloud. Cloud computing is based on the internet. Clouds are actually clusters of computer servers that are used to store and transmit data. The servers in question are huge and have ability to store large amount of data. These servers can be housed anywhere in the world. Cloud computing is a technology which allows on-demand, and appropriate network access to a shared group of configurable computing resources. These resources can be networks, storage, servers, services and applications that can be quickly provisioned and then released with minimum effort by management or through interaction of the service provider. Cloud computing delivers calculation, software, access of data and the storage facilities that do not involve end-user information about the physical locality or configuration of system that provides the services. People can connect to the cloud through the internet for a variety of purposes such as performing computing tasks and running different applications. Typical cloud computing suppliers provide common business requests and applications online that are retrieved from another web software or web browser while the data and software are stored on the servers. Cloud computing is a system in which all the capabilities that are related to the IT are provided in form of service that enable the user to access these services with the use of the internet (i.e. cloud). This process does not require any expertise, knowledge or control over technological infrastructure that are actually supporting them (Mirzaei, 2008). The principle behind the cloud is that any device or computer linked to the internet is linked to the same group of computing power, services, applications and files. The users can access and store private files such as pictures, music, bookmarks and videos or play games or use applications of productivity on a remote server instead of physically carrying a storage device such as a thumb drive or DVD. These files can also be made public (depending on the security level of the file) that can be searched by anyone. Many users of the internet are likely to be using a method of cloud computing without realizing it or recognizing such method. Example include users of web-based s like Yahoo, Hotmail, Gmail, or client-owned s such as Evolution, Outlook, Mozilla Thunderbird or Backup that are linked to the cloud server. Similarly, the use of desktop applications to connect to cloud is still regarded as a cloud application. Cloud computing has a number of characteristics. It provides shared infrastructure. It is a virtualized software model which enables sharing of storage memory, services and networking facilities to the users. In cloud computing the services are offered on demands based of requirements and automated. These services can be easily accessed through internet using different type of portable and non-portable devices like mobiles, laptops and PCs. It provides only those services to user which is required to them and they pay only for those services. Cloud computing has both benefits and challenges (see for example Mirzaei, 2008); this paper sought to propose solutions to some of these challenges. Literature Review A number of studies have been conducted and reported in literature on cloud computing and related issues of security (see for example Ogigau-Neamtiu, 2012; Hamlen et el., 2010; 7
3 SECURITY MANAGEMENT IN CLOUD COMPUTING Chaitanya et el., 2011). Cloud Computing platform is a system of providing intensely scalable and the virtualized resources, software, hardware and bandwidth to consumers on their demand. As the data grew in cloud, the need for security and protection of those data becomes critical. However, the advent of cloud computing has enable consumers to save cost of software licenses, system maintenance and hardware deployment. Cloud computing has also present users with security issues to deal with. Ogigau-Neamtiu s (2012) paper on cloud computing relates to cloud security and the risks of using cloud services. He highlighted the risks of moving mission-critical data to the cloud focusing in particular on the issues of security, operability, misunderstanding responsibilities and lack of standards. Similalry, Hamlen et el., s (2010) paper relates to cloud security. Hamlen et el. proposed two-layered security framework data layer and storage layer to resolve those security issues. Chaitanya et el. s (2011) discourse on cloud computing concerned security problems often encountered by organisations adopting the cloud computing. He also set out steps which, to some extent, might be taken to resolve those security issues. In his paper, Rashmi et el., (2013) provides an empirical analysis of existing status of security challenges in cloud computing including traditional issues like availability, authentication, authorization and cloud specific security issues relating to digital information and internet security. Onwubiko (2010) discussed cloud computing security risks including disaster recovery, data location, privacy, control, legal, trust, business continuity and security attacks and threats. He proposed cloud computing information asset and framework to help cloud users not only to choose the cloud services, but also have an understanding of the risks to and threats of using cloud. Kresimir and Zeljko (2010) has discussed the high level security issues such as payment, data integrity and the privacy of critical information in cloud computing infrastructure, while Grobauer et el. (2010) explored the vulnerabilities of security that residing in cloud computing platform. Similarly, Hashizume et el. s (2013) examines the vulnerabilities and threats in cloud computing and the relationship between the vulnerabilities, threats and countermeasures. Chen and Zhao (2012) examines privacy protection and data security in cloud computing and offer a number of solutions crucial to addressing the problem. He argued that private data must be identified and isolated from non-private data. Jamil and Zaki (2011) highlighted four security problems of cloud including Browser Security, XML Signature Element Wrapping, Flooding Attacks and Malware Injection Attack on cloud as well as offer possible measures to overcome the problems. The Cloud Computing Use Case Discussion Group 1 has examined a number of cloud computing scenarios, issues and requirements including the analyses of cases from the perspective of customer, security engineers and developers (see Cloud Computing Use Case Discussion Group, 2010). Similarly, ENSIA (2009) investigated the security risk parameter of adopting cloud computing and susceptibilities that lead to these risks in cloud computing. Cloud Computing Cloud computing is new general purpose technology that has huge economic benefits. It provides and delivers efficiency to public sector services such as health and social care, education among others. Cloud delivers computing resources as a service to the users. Computing facilities are provided on demand thereby remove the need for organisations to acquire 8
4 ASMA SATTAR, FARIA NAZIR, FAIZA KIANI & MUHAMMAD FAHAD KHAN and install own cloud-based computing resources. The technology facilitates the sharing of data with different organisations which is managed by third party vendor. This technology allows more efficient computing because of centralized storage servers, effective memory management, networking and support for multiple application on a variety of platforms. Service Models In Cloud Computing, service delivery includes different service models. These layers or service models are accomplished by the layer of end user that encapsulates the perspective of end user on cloud services. The following are the three service models provided in cloud computing: Software-as-a-Service (SaaS) SaaS provides the complete applications to the end user of cloud. It is mostly accessed through a service oriented architectures and web portal that are based on the web service technologies. Applications such CRM or word processors and application services such as calendar or schedule execute in cloud through the internet interconnectivity for data propagation. User must provide the details of bank account or credit card to allow the payments to be billed for the use of services. The application layer services can be understood as an addition of the Application Service Provider (ASP) model. Here, an application is maintained, run and supported by an application service vendor. The main dissimilarities among the services on ASP model and the application layer are the dynamic procurement, application encapsulation as a service, and payment by the consumption units (i.e. Pay-as-you-go). Platform-as-a-Service (PaaS) PaaS is actually a computing platform that allows the formation of web applications easily without purchasing the whole software. Pass is similar to the SaaS except that in SAAS software is produced while PaaS platform is provided. PaaS provide the services to develop the application which can be tested and deployed. It provides the users with interface based on web that contains tools to develop, modify and test different user consequences. PaaS also provide support for effective collaboration between the team by providing requisite communication tools. It also handles the billing mechanism. Multiple users can use the same platform for creating the applications. PaaS is best suited when there are multiple persons working on the same project or another party wants to interact with the development team. PaaS is not used in situations where application have to be portable and where exclusive languages affect the development process and where performance of application needs to be customized. Infrastructure-as-a-Service (IAAS) In cloud computing, Infrastructure as a Service (IAAS) is a way of delivering storage, networks, servers and operating systems on demand. Instead of purchasing software, servers, space on datacenters, clients buy resources as a outsource service. IaaS is a rapidly developing field. IaaS provider is responsible for providing hardware to the clients and performs maintenance to guarantee that server runs correctly all time. Examples of IaaS providers include Amazon EC2, Profit Bricks or Rackspace Cloud. Clients pay for the virtual servers 9
5 SECURITY MANAGEMENT IN CLOUD COMPUTING provided by these three providers for rent. IaaS provides a lot of advantages for multiple situations where scalability is beneficial. Security issue in Cloud Computing Security is regarded as a critical feature in everyday computing and this is not different in cloud computing, due to the sensitivity of data that are stored in the cloud. The main challenge in cloud computing therefore is how to address concerns about privacy and security of businesses that are thinking about adopting cloud computing. For example, one serious concern is the leakage of enterprise data outside the business firewall. Various malicious attacks on and hacking to cloud infrastructure often disturb clients operations even if only one website is attacked. Many organizations do not feel comfortable in storing their valuable data and applications on off-site data centers mainly because of security concerns. In 2008, Gartner (2008), in a seminal work, identified some issues related to security that should be identified and addressed by organizations before deciding whether or not to adopt the cloud computing model. Organization should spend time to know the cloud computing service providers and how these providers are regulated before outsourcing. Another issue highlighted in Gartner (2008) is that a client might never know in which country or jurisdiction their data is located. Another issue relates to data segregation i.e. the assignment of encrypted information of multiple companies on the same hard disk. It should be necessary to have mechanism in place to separate such encrypted data. Other issues raised by Gartner (2008) include the recovery of data in case of disaster or a sudden data loss of losing data, necessary investigation support in case of any suspicious activities from the side of the provider side and the long term viability of the project should the current provider be taken over by another firm. This paper sought to address some of these issues. Proposed Model 10
6 ASMA SATTAR, FARIA NAZIR, FAIZA KIANI & MUHAMMAD FAHAD KHAN Methodology To increase traffic in cloud platform and to encourage businesses and organizations to adopt cloud computing, it is essential to make cloud computing reliable in terms of security. In this research work, a database named Encrypted Data Storage is introduced in cloud. There are other components in cloud i.e. servers, data storage database and applications. Encrypted data storage is a type of storage where only critical data is placed. Cloud computing is conceptualised as pay-as-you-go model. This means to make the data more secure, organizations have to pay for usage, and any data non -critical is placed in data storage. To avoid the problem of data loss [from storage database] due to hacking or attacks, encrypted data storage database is introduced to store the client s encrypted data. A security layer is also introduced when the users request to share their data on cloud. In the security layer, the user is asked for critical data confirmation which s/he wants to store in encrypted form, in separate encrypted data storage, to make the data more secure. When the user confirms the critical data, this data is transformed into encrypted data. An encrypted key is generated and send to the user; and this encrypted data is moved to encrypted data storage. The user can access his/her encrypted data anytime by using assigned encrypted key. It is important to know that the model presented in this paper only encrypts most critical data. It is therefore possible that not all data are encrypted to save time, effort and resources. Issue regarding to privilege access can be solved initially in the contract by specifying exactly that who is the owner of data is when it is thrown on the internet. In this way client and provider both know who can access what. Provider must tell client about the country and jurisdiction where data is located. Encryption of data is not required generally when data is transmitted inside the organization. If data is transmitted across boundaries of enterprise, data integrity and security are necessary to prevent access by unauthorized user. The security and integrity of data can be achieved by encryption. The model [encrypted key] proposed in this paper might help to address some of the issues relating to data segregation. Conclusion Cloud computing technology provides benefits to individuals and businesses alike. The technology enables access to personal files and data from anywhere via the internet. Despite of the benefits of cloud computing, there remain some challenges. Security is a major issue in cloud computing which needs to be addressed to make cloud computing more reliable. The model proposed in this paper sought to address the need to encrypt data so as to make it more secure as well as store the data in question in a separate Encrypted data storage database. An additional security layer is introduced in the model which not only encrypts enterprise data but also assign a key against encrypted data to prevent unauthorized access as well as minimize hacking or malicious attacks. 11
7 SECURITY MANAGEMENT IN CLOUD COMPUTING Correspondence Asma Sattar University of Engineering and Technology Taxila, Pakistan Mailing address: #390-A Gulistan Colony No.2 Millat chowk sheikhupura Road Faisalabad Faria Nazir University of Engineering and Technology Taxila, Pakistan Mailing address: # CB 1674, Siddique-e-Akbar Street Zeeshan Colony Rwp [email protected] Faiza Kiani University of Engineering and Technology Taxila, Pakistan Mailing address: # N/322, st # 7,Waris Khan Murree Road Rwp [email protected] Note1 Cloud Computing Use Case Discussion Group (Miha Ahronovitz, Dustin Amrhein, Patrick Anderson, Andrew de Andrade, Joe Armstrong, Ezhil Arasan B, James Bartlett, Richard Bruklis, Ken Cameron, Mark Carlson, Reuven Cohen, Tim M. Crawford, Vikas Deolaliker, Pete Downing, Andrew Easton, Rodrigo Flores, Gaston Fourcade, Thomas Freund, Tom Hanan, Valery Herrington, Babak Hosseinzadeh, Steve Hughes, William Jay Huie, Nguyen Quang Hung, Pam Isom, Shobha Rani J, Sam Johnston, Ravi Kulkarni, Anil Kunjunny, Edmond Lau, Thomas Lukasik, Bob Marcus, Gary Mazzaferro, Craig McClanahan, Meredith Medley, Walt Melo, Andres Monroy-Hernandez, Ayman Nassar, Dirk Nicol, Lisa Noon, Santosh Padhy, Gilad Parann-Nissany, Greg Pfister, Thomas Plunkett, Ling Qian, Balu Ramachandran, Jason Reed, German Retana, Bhaskar Prasad Rimal, Dave Russell, Matt F. Rutkowski, Clark Sanford, Krishna Sankar, Alfonso Olias Sanz, Mark B. Sigler, Wil Sinclair, Erik Sliman, Patrick Stingley, Phillip Straton, Robert Syputa, Robert J. Taylor, Doug Tidwell, Kris Walker, Kurt Williams, John M Willis, Yutaka Sasaki, Michael Vesace, Eric Windisch, Pavan Yara and Fred Zapper). "Cloud Computing Use Cases Version 3.0,"
8 ASMA SATTAR, FARIA NAZIR, FAIZA KIANI & MUHAMMAD FAHAD KHAN References Grobauer, B., Walloschek, T. and Stöcker, E. (2010) Understanding Cloud Computing Vulnerabilities, IEEE Security and Privacy, Vol. 99. Onwubiko, C. (2010) Security Issues to Cloud Computing, in Cloud Computing: Principles, Systems & Application, (Eds) Nick Antonopoulos and Lee Gilam, Springer-Verlag, August, Jamil, D. and Zaki, H. (2011) Security Issues in Cloud Computing and Countermeasures, International Journal of Engineering Science and Technology, Vol.3, No.4. Chen, D. and Zhao, H. Data security and privacy protection issues in cloud computing, in Proceeding of the International Conference on Computer Science and Electronics Engineering (ICCSEE 12), vol. 1, pp , Hangzhou, China, March ENISA (2009, Feb) Cloud computing: benefits, risks and recommendations for information security." Available: [online] accessed: Jul. 10, Ogigau-Neamtiu, F. (2013) Cloud Computing Security Issues, Journal of Defense Resources Management,3(2), Hashizume, K, Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013) An Analysis of security issue for cloud Computing, Journal of Internet Services and Applications, online: Hamlen, K., Kantarcioglu, M., Khan, L. and Thuraisingham, B. (2010) Security Issues for cloud computing, International Journal of Information Security and Privacy, 4(2), 39-51, April-June Chaitanya.Y. K., Shankar.Y. B., Krishna.V. K.R., Rao, S. (2011) Study of Security issues in Cloud Computing, International Journal of Computer Science and Technology, Vol. 2, No.3, September Morsy. M.A., Grundy, J. and Müller, I. (2010) An analysis of the Cloud Computing Security problem. In: Proceedings of APSEC 2010 Cloud Workshop. Sydney, Australia: APSEC. Kresimir, P. and Zeljko, H. (2010) "Cloud computing security issues and challenges," In PROC Third International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp Rashmi, R., Sahoo, G. and Mehfuz, S. (2013) Securing Software as a Service Model of Cloud Computing: Issues and Solutions, International Journal on Cloud Computing, Vol.3, No.4, August 2013 Gartner (2008) Assessing the Security Risks of Cloud Computing, 3 June 2008, online:
Cloud Computing Use Cases
Cloud Computing Use Cases A white paper produced by the Cloud Computing Use Case Discussion Group Contributors: Miha Ahronovitz, Dustin Amrhein, Patrick Anderson, Andrew de Andrade, Joe Armstrong, Ezhil
Cloud Computing Use Cases
Cloud Computing Use Cases A white paper produced by the Cloud Computing Use Case Discussion Group Version 2.0 30 October 2009 Contributors: Dustin Amrhein, Patrick Anderson, Andrew de Andrade, Joe Armstrong,
Cloud Computing Use Cases
Cloud Computing Use Cases A white paper produced by the Cloud Computing Use Case Discussion Group Version 1.0 5 August 2009 Contributors: Dustin Amrhein, Andrew de Andrade, Joe Armstrong, Ezhil Arasan
How cloud computing can transform your business landscape
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
How cloud computing can transform your business landscape.
How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
Investigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
Analysis of Cloud Computing Vulnerabilities
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 308-312 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges Kuyoro S. O. Department of Computer Science Babcock University Ilishan-Remo, 240001, Nigeria Ibikunle F. Department of Computer Science Covenant University
Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD
Review of Cloud Computing and future research
Review of Cloud Computing and future research Computer Science, IIS University, India Abstract: Cloud computing is also referred to as the evolutionary offspring of distributed computing, parallel computing,
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE H.Madhusudhana Rao* Md. Rahmathulla** Dr. B Rambhupal Reddy*** Abstract: This paper targets on the productivity of cloud computing technology in healthcare
How to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
CLOUD COMPUTING IN HIGHER EDUCATION
Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
Module 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
Cloud Computing Guidelines
1 Cloud Computing Guidelines Contents Introduction... 3 What is cloud computing?... 3 Why use cloud computing?... 4 The building blocks of cloud computing... 8 Best practice guidelines... 12 The legal
SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN 2278 5973)
SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN 2278 5973) Cloud Computing: Security Issues In Infrastructure-As-A-Service Model
CHAPTER 2 THEORETICAL FOUNDATION
CHAPTER 2 THEORETICAL FOUNDATION 2.1 Theoretical Foundation Cloud computing has become the recent trends in nowadays computing technology world. In order to understand the concept of cloud, people should
CLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
Quick guide: Using the Cloud to support your business
Quick guide: Using the Cloud to support your business This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help businesses
IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33
CLOUD COMPUTING NEW TECHNOLOGIES 1 Gokul krishnan. 2 M, Pravin raj.k, 3 Ms. K.M. Poornima 1, 2 III MSC (software system), 3 Assistant professor M.C.A.,M.Phil. 1, 2, 3 Department of BCA&SS, 1, 2, 3 Sri
International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014
An Overview on Cloud Computing Services And Related Threats Bipasha Mallick Assistant Professor, Haldia Institute Of Technology [email protected] Abstract. Cloud computing promises to increase the velocity
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
A VIEW OF CLOUD COMPUTING ADOPTION IN JORDANIAN BUSINESSES
A VIEW OF CLOUD COMPUTING ADOPTION IN JORDANIAN BUSINESSES RAED M.AL-QIREM [email protected] MOATH J. HAMAD [email protected] FACULTY OF ECONOMICS & ADMINISTRATIVE SCIENCES ALZAYTOONAH UNIVERSITY OF
Cloud Computing and Amazon Web Services
Cloud Computing and Amazon Web Services Gary A. McGilvary edinburgh data.intensive research 1 OUTLINE 1. An Overview of Cloud Computing 2. Amazon Web Services 3. Amazon EC2 Tutorial 4. Conclusions 2 CLOUD
In a dynamic economic environment, your company s survival
Chapter 1 Cloud Computing Defined In This Chapter Examining the reasons for cloud Understanding cloud types Defining the elements of cloud computing Comparing private and public clouds In a dynamic economic
A Review: Data Security Approach in Cloud computing by using RSA Algorithm
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Review:
How To Understand Cloud Computing
A STUDY OF CLOUD COMPUTING: APPLICATIONS AND CHALLENGE 1 DR. NEERAJ BHARGAVA, 2 ANCHAL KUMAWAT, 3 DR. RITU BHARGAVA, 4 SONIYA DAYMA 1 Associate Professor, Dept. of Computer Science, School of Engineering
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
CLOUD COMPUTING An Overview
CLOUD COMPUTING An Overview Abstract Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of cloud computing. The two key advantages of this
Private Vs Public Cloud
Private Vs Public Cloud Solanke Vikas 1, Kulkarni Gurudatt 2, Maske Vishnu 3, Kumbharkar Prashant 4 1 Lecturer in Information Technology Department,MM Polytechnic Pune, India [email protected]
ABSTRACT. KEYWORDS: Cloud Computing, Load Balancing, Scheduling Algorithms, FCFS, Group-Based Scheduling Algorithm
A REVIEW OF THE LOAD BALANCING TECHNIQUES AT CLOUD SERVER Kiran Bala, Sahil Vashist, Rajwinder Singh, Gagandeep Singh Department of Computer Science & Engineering, Chandigarh Engineering College, Landran(Pb),
Electronic Records Storage Options and Overview
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
Intrusion Detection from Simple to Cloud
Intrusion Detection from Simple to Cloud ICTN 6865 601 December 7, 2015 Abstract Intrusion detection was used to detect security vulnerabilities for a long time. The methods used in intrusion detection
Chapter 7: Trends in technology impacting SDLC... 2 7.1 Learning objective... 2 7.1 Introduction... 2 7.2 Technology Trends... 2 7.2.
Chapter 7: Trends in technology impacting SDLC... 2 7.1 Learning objective... 2 7.1 Introduction... 2 7.2 Technology Trends... 2 7.2.1 Virtualization... 2 Characteristics of virtualizations affecting SDLC...
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Cloud Computing and Attacks
Cloud Computing and Attacks Joseph Spring School of Computer Science 7COM1027 - Distributed Systems Security 1 Areas for Discussion Cloud Computing Attacks Firewalls 2 Cloud Computing A Cloud is a large
High Performance Computing Cloud Computing. Dr. Rami YARED
High Performance Computing Cloud Computing Dr. Rami YARED Outline High Performance Computing Parallel Computing Cloud Computing Definitions Advantages and drawbacks Cloud Computing vs Grid Computing Outline
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 1 P a g e ABSTRACT This study examined improving web
Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service
Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;
http://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir
Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Department of Computer Science Lahore College for Women University, Lahore, Pakistan. [email protected],
Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
A Review on Cloud Computing Vulnerabilities
A Review on Cloud Computing Vulnerabilities Ms. Sugandha Nandedkar, Ms.Sangeeta Kakarwal Asst.Prof., Department of Computer Science and Engineering, DIEMS /Dr. BAMU, Aurangabad, MH, India. Prof. and HOD,
Contents. What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market
Cloud Computing Contents What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market What is Cloud Computing? Definitions: Cloud computing
Cloud Computing. Cloud computing:
Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:
International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.
Survey On Cloud Computing For Mobile Users Using Machine Servers Ms. Deepali Gothawal 1, Deepali Patil 2, Sneha Chavan 3, Tejaswini Chandekar 4, Rohit Koti 5 Department of Computer Engineering, DYPCOE,
Leveraging the Cloud for Data Protection and Disaster Recovery
WHITE PAPER: Leveraging the Cloud for Data Protection and Disaster Recovery Leveraging the Cloud for Data Protection and Disaster Recovery Bennett Klein DATA MANAGEMENT CUSTOMER SOLUTIONS MARCH 2012 Table
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
Getting Familiar with Cloud Terminology. Cloud Dictionary
Getting Familiar with Cloud Terminology Cloud computing is a hot topic in today s IT industry. However, the technology brings with it new terminology that can be confusing. Although you don t have to know
Creating Dynamic IT Infrastructure at Reduced Cost with Cloud Computing
Creating Dynamic IT Infrastructure at Reduced Cost with Cloud Computing White Paper Date: 12/9/2011 Version: 0.4 (Final) Author: Matt Baker, Clarity Business and IT Solutions Creating Dynamic IT Infrastructure
Quattra s Cloud Vision & Framework Value
Quattra s Cloud Vision & Framework Value Data centers provide the foundation for the applications and services that organizations deliver, and companies need their IT facilities to be reliable, compliant
FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS
International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.
Auto-Scaling Model for Cloud Computing System
Auto-Scaling Model for Cloud Computing System Che-Lun Hung 1*, Yu-Chen Hu 2 and Kuan-Ching Li 3 1 Dept. of Computer Science & Communication Engineering, Providence University 2 Dept. of Computer Science
GETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing
Expert Reference Series of White Papers 10 Security Concerns for Cloud Computing 1-800-COURSES www.globalknowledge.com 10 Security Concerns for Cloud Computing Michael Gregg, Global Knowledge Instructor,
Mobile and Personal Cloud Computing The Next Step in Cloud Computing
A Member of OneBeacon Insurance Group Mobile and Personal Cloud Computing The Next Step in Cloud Computing Author: Edgar Germer, Risk Control Specialist Published: November 2015 Executive Summary Cloud
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
Session 3. the Cloud Stack, SaaS, PaaS, IaaS
Session 3. the Cloud Stack, SaaS, PaaS, IaaS The service models resemble a cascading architecture where services on a higher level, as identified by Weinhardt et.al. (2009); encapsulate functionality from
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
Cloud computing: benefits, risks and recommendations for information security
Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation
A Study of Infrastructure Clouds
A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,
Clinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
Cloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
Introduction to Cloud Services
Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud
Typical Security Measures Of Cloud Computing
Typical Security Measures Of Cloud Computing Mohamed Ashik M. 1, Sankara Nayanan A. 2, Nithyananda Kumari.K 3 1&2 Faculty in Department of Information Technology & Salalah College of Technology, Sultanate
A Survey on Security Issues in Service Delivery Models of Cloud Computing
A Survey on Security Issues in Service Delivery Models of Cloud Computing { S. Subashini and V. Kavitha (2011) Presented by: Anthony Postiglione Outline Introduction What is Cloud Computing Pros/Cons of
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
Security, Reliability & Control with Hosted Exchange
Hosted Applications Commonly referred to a Cloud Computing and/or Software-as-a-Service (SaaS), web-hosted software applications service provides you with a new way to get business software and applications
CLOUD COMPUTING OVERVIEW
2110414 - Large Scale Computing Systems 1 CLOUD COMPUTING OVERVIEW 2110414 Large Scale Computing Systems Natawut Nupairoj, Ph.D. Outline 2 Overview Cloud Approaches Real-World Case Study 2110414 - Large
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. [email protected]
DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY Adnan Khalid* a,dr. Muhammad Shahbaz b, Dr. Athar Masood c d Department of Computer Science, Government College University Lahore, Pakistan,
About me & Submission details
About me & Submission details Parveen Yadav Security Researcher aka Ethical Hacker. Working as a Freelancer. White Hat Hacking work. Few Recognitions :- Got listed my name in Google Hall of fame,amazon,paypal,adobe
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
