A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing



Similar documents
TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

Dynamic Query Updation for User Authentication in cloud Environment

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2

IMPLEMENTING DATA SECURITY IN MULTI CLOUD

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

A survey on cost effective multi-cloud storage in cloud computing

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Privacy Preserving Public Auditing for Data in Cloud Storage

Service and Data Security for Multi Cloud Environment

CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS

How To Ensure Correctness Of Data In The Cloud

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Security Issues In Cloud Computing and Countermeasures

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Security Issues in Cloud Computing

Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

International Journal of Advance Research in Computer Science and Management Studies

EXIN Cloud Computing Foundation

ADVANCE SECURITY TO CLOUD DATA STORAGE

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING

Keyword: Cloud computing, service model, deployment model, network layer security.

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

International Journal of Engineering Research & Management Technology

Cloud Courses Description

SECURITY THREATS TO CLOUD COMPUTING

Clinical Trials in the Cloud: A New Paradigm?

Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015

Secure Cloud Computing through IT Auditing

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Security Model for VM in Cloud

Cryptographic Data Security over Cloud

CLOUD COMPUTING OVERVIEW

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

An Intelligent Approach for Data Fortification in Cloud Computing

Ensuring Data Storage Security in Cloud Crop

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Cloud Computing Security Issues And Methods to Overcome

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Cloud Computing. Karan Saxena * & Kritika Agarwal**

Data Storage Security in Cloud Computing

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Cloud Courses Description

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

How To Design A Cloud Data Storage Service For A Cloud Computer System

CLOUD COMPUTING SECURITY CONCERNS

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

A Survey on Cloud Security Issues and Techniques

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

Security Analysis of Cloud Computing: A Survey

SURVEY PAPER ON SECURITY IN CLOUD COMPUTING

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

International Journal of Advanced Research in Computer Science and Software Engineering

John Essner, CISO Office of Information Technology State of New Jersey

ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

Keywords: Cloud; Security; privacy; multi-cloud; Application Partitioning; Tier Partitioning; Data Partitioning; Multi-party Computation.

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

Data Integrity Check using Hash Functions in Cloud environment

Architecting the Cloud

Managing Cloud Computing Risk

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

CLOUD COMPUTING. A Primer

The Keys to the Cloud: The Essentials of Cloud Contracting

Security Considerations for Public Mobile Cloud Computing

Addressing Data Security Challenges in the Cloud

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Analysis of Cloud Computing Vulnerabilities

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing

Cloud Computing Services and its Application

Web Services & Database Services Availability through Multi-Cloud Environment

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Secure Way of Storing Data in Cloud Using Third Party Auditor

MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES

Verifying Correctness of Trusted data in Clouds

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing: Risks and Auditing

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

How To Ensure Correctness Of Data In The Cloud

Cloud Data Protection for the Masses

CHAPTER 1 INTRODUCTION

What Cloud computing means in real life

[Sudhagar*, 5(5): May, 2016] ISSN: Impact Factor: 3.785

Cloud deployment model and cost analysis in Multicloud

Transcription:

International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing Prajakta S. Sadafule 1, Kumud Wasnik 2 1 Department of Computer Science and Tech, UMIT, Mumbai, India (Research Scholar) 2 Department of Computer Science and Tech, UMIT, Mumbai, India (Professor) ABSTRACT Cloud computing is typically defined as a type of online computing that believes in sharing computing resources, processing power and storage based on demand rather than dependent on local servers or personal devices to provide such facility. Making Cloud of Clouds is a recent trend; this mixing combine services from multiple clouds into a single Cloud of Clouds to avoid the problems of single Cloud Computing, like no guaranty of continuous availability of resources and services. As we are using MULTI-CLOUD facilities now a days because it provides high rate of availability and good performance, but still this Multi-cloud environment have fear of Security issues. To avoid the problem of security issues some prevention and avoidance policies and schemes should be adopted. This paper mainly focuses on many security issues in the Cloud computing and Multi-Cloud computing and also on security algorithms for Cloud; after surveying the different security algorithms, they have limited benefits and limitations is spotted. Keywords: Cloud Computing, Multi-Cloud Computing, Security issues in cloud, Dep-Sky model. INTRODUCTION Cloud Computing The National Institute of Standards and Technology NIST, gives a more formal definition: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [1]. The infrastructure, services and resource management of cloud computing are efficient and powerful than organization s personal services like resources and platforms. Cloud has some characteristics like, On-demand self-service Broad network access Resource pooling Location independence Measured service Rapid elasticity [2] Cloud Computing is classified into four category models such as Public Cloud, Private Cloud, Hybrid Cloud and Community Cloud as shown in Fig.1. Public Cloud can be accessible to everyone and Private cloud is restricted only to specific users. Hybrid is combination of Public and Private Cloud. Community cloud is used by some community organization like education, etc. *Address for correspondence prajakta.gpm@gmail.com International Journal of Emerging Engineering Research and Technology V3 I5 May 2015 1

Fig1. Cloud Computing Models Cloud is also having service models like first Software-as-a-Service (SaaS) in which software are hosted by cloud and available to users through Internet. Second Infrastructure-as-a-Service (IaaS) provides hardware service facility to users for virtualization and network resources. Third Platformas-a-Service (PaaS) provides environment for software development in which users are able to develop and deploy their own application on cloud. Multi-Cloud Computing Cloud mash -ups is a recent trend; mash-ups combine services from multiple clouds into a single service or application, possibly with On-premises (client-side) data and services [3]. Another trend is to be Cloud of Clouds ; the mixing combine services from multiple clouds into a single Cloud of Clouds to avoid the problem of single Cloud Computing. The most popular is the public cloud. Here, the provider of cloud services provides the user with applications, storage, resources etc. it is majorly the responsibility of the cloud provider to provide the features of security, availability, scalability etc. As we are using MULTI-CLOUD facilities now a day it provides high rate of availability and good performance, but still with this Multi-cloud environment have fear of Security issues. Organizations have started working in this multi cloud environment so that they never face lack of availability of a service or a resource at any point of time and could prevent from potential loss. Fastest access is also a benefit of Multi-cloud in this, if one cloud is not able to serve the request of the user, cloud service provider can use other cloud from multi-cloud to serve the user instead of waiting for that particular cloud to get free and serve the user. Also trusting a single cloud is risky as there could be some malicious user or software who may be spying on the data being exchanged. To deal with these issues multi cloud environments have gained importance [4]. Fig2. Multi-cloud Architecture 2 International Journal of Emerging Engineering Research and Technology V3 I5 May 2015

Multi-cloud Architecture allows clients and cloud applications to simultaneously use services from and route data among multiple clouds. Fig.2 shows Multi-cloud Architecture which allows users to use services and resources from multiple clouds without prior business agreements among cloud providers. Multi-Cloud Benefits Multi-Cloud now a day s gaining lot of attention and importance because of its benefits. These benefits includes Redundancy for disaster recovery and business continuity in which even disaster is occur Multi-cloud keeps copy of data. Also it solves the problem of availability issue of Single Cloud Computing by providing continuous availability of services and resources. Multi-cloud became cost benefit (Cheaper and infinite) because numerous services and resources are available at high rate in single environment of Multi-Cloud. It Support varying level of security concerns. DEP-SKY MODEL As fig. 3.shows multi-cloud architecture which consists of a combination of different storage clouds. In this architecture clouds are used for data storing and maintaining purpose. The Dep-Sky system designed to provide the confidentiality and the availability of data in their storage system and this is important for user and provided by Multi-Cloud. Dep-Sky library communicate with various cloud interface providers because it is multi-cloud architecture. The formation of data in Dep-Sky should be acceptable and compatible by each cloud. Data model made of three abstraction levels: the conceptual data unit, a generic data unit, and the data unit implementation [5]. Fig3. Dep-Sky Architecture for Multi-Cloud [5] SECURITY ISSUES AND SECURITY CONCERNS FOR CLOUD COMPUTING Fig.4 shows the security issues in Cloud and Multi-Cloud Computing. Cloud Computing brings new threats. Different users share the same physical infrastructure and platform. Thus an malicious attacker can logically be in the same physical machine as the target to attack the cloud environment. Based on these issues security prevention schemes need to be applied in Cloud environment. Identity Management User Identity: User identity is needed to identify authorized user for accessing resources e.g. Infrastructure, Software or Hardware on-line by using internet and these uses increase the security issues. Physical Identity: Many times users don t like to expose their physical location. For this reason the physical Identity is to be kept confidential. Therefore, physical identity is also security issues in cloud. International Journal of Emerging Engineering Research and Technology V3 I5 May 2015 3

Prajakta S. Sadafule & Kumud Wasnik A Survey on Security Issues and Security Schemes for Cloud Authentication Authentication is primary issue in which user logins in system by user names and passwords. So that access is allowed to authenticated person in cloud environment Authorization The permission to access facilities of cloud computing. Authorization for services of the authentic user by the cloud provider. Application and Data security In most cases user need to provide confidential information and for getting access to Applications, Services and Data. As clouds provide the Data, services and applications over internet, so the Application and Data security is to be taken into consideration. Another important issue includes protecting and preventing the cloud from malicious attackers or data intrusion. For this encryption algorithms are used for this purpose. Hence, security of the Data, applications and Services is a necessity in cloud like providing passwords. Data Integrity Fig4. Security Issues in Cloud Computing During transaction, its protection should be taken into consideration as a Data Integrity. It is an important security issue. Data confidentially is another issue in which data should be maintained while data transaction over the cloud. Also Byzantine fault-tolerant replication protocol within the cloud maintain for confidentiality of data over the cloud Availability The very basic and important issues with user requirement are Availability of Data, Services and Applications in all favorable and un-favorable conditions and there should be no loss of data. Key mechanism for this is CSP need to audit the clouds all the time for high rate of Availability. Data and Service availability is also a major issue to the cloud. Data is replicated and stored over various fragmented locations or data centres. 4 International Journal of Emerging Engineering Research and Technology V3 I5 May 2015

Fig.5 shows the Areas for security concerns in cloud computing in which data may be at risk at its resting place. During transaction data may be prone to leakage. Authentication of user and cloud provider is necessary to avoid the unauthorized access. To avoid the problem of mismatching service delivery separation between users is important. To provide accurate and exact access to cloud the CSP should keep legal assurance. CSP should provide fastest incident response to the users. Fig5. Areas for security concerns in cloud computing: (1) data at rest, (2) data in transit, (3) authentication, (4) separation between Users, (5) cloud legal and regulatory issues and (6) incident response. For security issues some schemes are adopted. The schemes are data classification and security algorithms for obtaining passwords. The security schemes are analysed and compared in Table 1. OBERVATIONS Existing systems depicts strategies related availability and security like partitioning of data at different number of cloud and security algorithms to secure all fundamental aspects. Security issue is crucial in Single cloud and Multi-cloud. In Multi-cloud we have to take care of data and operation performed on it. - A model of different architectural patterns for distributing resources to multiple cloud providers. Data and logic is classified depending upon the classification. - RSA, DES, AES, BLOWFISH, 3DES and Shamir secret key algorithms are difficult to crack without static passwords obtained from these algorithms. By using existing systems once the static password is leaked or cracked then it is easy to use or manipulate the facilities of Cloud Computing. Table1. Comparative analysis of security issues and various algorithms used in Cloud and Multi-Cloud computing with advantages and its limitation Paper "Collaboration in Multi-cloud Computing Environments: Framework and Security Issues",[2013] Existing System Cloud includes applications delivered as Services Proposed System Cloud mashups is recent trend. It combines services from multiple clouds into a single service or applications. It used proxies conflicts. Key mechanism Key issues Advantages Limitations and Methodology addressed by Used Paper 1. Establishing trust A proposed proxy- To facilitate Refining of and secure dynamic proxy delegation. collaboration deployment 2. Policy between heterogeneity and clouds. based multicloud computing framework allows dynamic, on thefly collaborations and resource sharing among cloud-based services, addressing trust scenario and operation components. International Journal of Emerging Engineering Research and Technology V3 I5 May 2015 5

"Security and Privacy - Enhancing Multi-cloud Architectures", [2013] "Hybrid Multicloud data security (HMCDS) model and data classification",[2013] "Security Issues and Security Algorithms in Cloud Computing",[2 012] "Using Secret Sharing Algorithm for Improving Security in Cloud Computing",[2 014] CONCLUSION Idea is use of multiple distinct clouds at the same time to mitigate the risks of malicious data manipulation,disclosure and process tampering When the number of cloud users increases this may be lead to data security and privacy threats. Security Concerns:- Data, Access, Data Classificatio n and Service Level Agreement Multi-cloud architecture HAIL,RACS faces some problem Introduced a model of different architectural patterns for distributing resources to multiple cloud providers. The data classification and cloud model are proposed to overcome data confidentiality and efficient data retrieval issue. 1.Replication of application 2. Partition of application system into tiers. 3.Partition of application logic into Fragments 4. Partition of application data into Fragments Data is classified depending upon its confidentiality. Low level data and high level data Cryptographic RSA, DES, AES, algorithm are BLOWFISH, 3DES used to hide and Shamir secret the data and to key algorithms. restrict the data Dep-Sky architecture is one of the best architecture due to combination of different storage cloud It s a combination of SSA+BFT. without requiring prior agreements between the cloud service providers. This model is used to discuss the security benefits and also to classify existing approaches by distributing resources to multiple cloud providers. HMCDS improves the efficiency of data retrieval, confidentiality availability in cloud computing by data classification. This paper addresses security algorithms for security issues like Data hiding and unauthorized access. DepSky syste increases the system availability as data is not relayed on a single cloud, also avoid vendor lock-in issue since lack of dominant cloud. It also reduces cost of than using single cloud. Data and logic is classified depending upon the approach. Best part of its that it access only required data Mentioned algorithms difficult crack without static passwords. It provides security and client-side aggregation. Homomorphic Encryption gives unreal results. Gives narrow applicability and high complexity in use. This paper not testing data retrieval deficiency. Not providing best data classification technique. These all are static passwords generation algorithms It does not providing privacy preserving public auditing system. Auditing will reduce verification file at each upload. In cloud computing, everything which is related to resources and services is kept at cloud and will get access of cloud by user as online service so that it may be prone to security threats. Security issue is crucial in Single cloud and Multi-cloud. In Multi-cloud we have to take care of data and operation Performed on it. Moving from single cloud to multi-cloud has security challenges. The solution of security issues in 'Multi-cloud' or 'Cloud of Clouds is that use of security algorithms, some data classification strategies and prevention measures. As mentioned in observations static passwords may be leaked or cracked to get access to cloud. So we need some new and strong algorithm to resolve the problem of existing system such as dynamic password which is valid only for particular time period. 6 International Journal of Emerging Engineering Research and Technology V3 I5 May 2015

REFERENCES [1] NIST,"NIST.gov -Computer Security Division Computer security resource center, http://csrc.nist.gov/publications /nistpubs /800-145 /SP800-145.pdf, 2011 [2] M. Malathi Cloud Computing Concepts, Bangalore, Karnataka, India., 2011, IEEE. [3] MunwarAli Zardari, Low Tang Jung, Mohamed Nordin B.Zakaria, "Hybrid Multi-cloud data security (HMCDS) model and data classi_cation",2013ieee TRANSACTION. [4] K.S. Suresh, K. V.Prasad, Andhra Pradesh, "Security Issues and Security Algorithms in Cloud Computing", 2013 [5] Swapnila S Mirajkar, Santoshkumar Biradar, "Using secret sharing algorithm for improving security in cloud computing", 2014. [6] Mukesh Singhal and Santosh Chandrasekhar, Merced Tingjian Ge, l Ravi Sandhu and Ram Krishnan, "Collaboration in Multicloud Computing Environments: Framework and security issues -2013IEEE TRANSACTION [7] Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Member,IEEE,Luigi Lo Iacono, and Ninja Marnau,"Security and Privacy -Enhancing Multicloud Architectures",2013 IEEE TRANSACTION. [8] Swapnila S Mirajkar, Santoshkumar Biradar Secret Sharing Based Approach to Enhance Security in Cloud omputing, 2014 [9] Shaik.Aafreen Naaz, Pothireddygari.Ramya, P.Vishunu Vardhan Reddy and S.Vinay kumar CLOUD COMPUTING: USE OF MULTI-CLOUDS,2013 [10] Understanding Cloud Computing Vulnerabilities, COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES, 2011 International Journal of Emerging Engineering Research and Technology V3 I5 May 2015 7