File Name: cloud computing research and security issues .zip
- Cloud Computing: Security Issues and Research Challenges
- Privacy and security issues in cloud Computing
- Cloud Computing Security Issues and Challenges: A Survey
Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations.
Cloud Computing: Security Issues and Research Challenges
Cloud Computing Security - Concepts and Practice. Cloud Computing is currently one of the hottest topics in computing and information technology IT. Cloud computing is a technology paradigm that is offering useful services to consumers. Cloud Computing has the long-term potential to change the way information technology is provided and used.
The entire cloud ecosystem consists of majorly four different entities which plays vital role to fulfill the requirements of all the stake holders. The role played by each individual depends on their position in the market and their business strategy. These most prominent entities in the cloud ecosystem are: Cloud Service Provider: it provides cloud services available to cater the needs of different users from different domain by acquiring and managing the computing resources both hardware and software and arranging for networked access to the cloud customers.
It plays the important role of matchmaking and negotiating the relationship between the consumer and producer of the services. Cloud Carrier: it is an intermediary which facilitates the connectivity and takes the cloud services at the doorsteps of end-user by providing access through different network access and devices. Cloud Customer: the actual user of services extended by the service provider which may be an individuals or organizations which in turn may have their own end-users like employees or other customers.
Cloud service providers harness the benefit of huge computing resources span over large geographical area to provide seamless, efficient and reliable services to customers at marginal price. The computing resource deployed over the Internet comprises hardware and application software and OS used in virtualization, storage and compute purposes.
There are basically three different service models Figure 1 of offering high-volume low-cost services to the end user: Software as a Service SaaS. In this model, various applications are hosted by a cloud service provider and publicized to the customers over internet, wherein end user can access the software using thin client through web browsers.
Here all the software and relevant data are hosted centrally on the cloud server. A PaaS is typically is a programming platform for developers. It thus provides the access to the runtime environment for application development and deployment tools. Here developer does not have any access to underlying layers of OS and Hardware, but simply can run and deploy their own applications. IaaS facilitates availability of the IT resources such as server, processing power, data storage and networks as an on demand service.
Here user of this service can dynamically choose a CPU, memory storage configuration according to needs. A cloud user buys these virtualized and standardized services as and when required.
For example, a cloud customer can rent server time, working memory and data storage and have an operating system run on top with applications of their own choice. Furthermore, these services can be deployed into Public Clouds, Private Clouds or Hybrid Clouds; each has its own advantages and disadvantages. Here the customer has no control and limited visibility over where the service is hosted as all these massive hardware installations are distributed throughout the country or across the globe seamlessly.
This massive size enables economies of scale that permit maximum scalability to meet varying requirements of different customers and thus provides greatest level of efficiency, maximum reliability through shared resources but with rider cost of added vulnerability. In case of Private Cloud mode, entire infrastructure is owned, managed and operated exclusively by the organization or by a third-party vendor or both together and is hosted on the organization premise using virtualization layer.
It also facilitates flexibility, scalability, provisioning, automation and monitoring and thus offers the greatest level of control, configurability support, high availability or fault tolerant solutions and advanced security which is missing in public cloud. Basically, very concept of private clouds is driven by concerns around security and keeping assets within the firewall which results it to significantly more expensive with typically modest economies of scale.
As name suggest, Hybrid Cloud includes a variety of product mix from both Public and Private Cloud options sourced from multiple providers at added cost to keep track of multiple different security platforms by ensuring all aspects of business to communicate with each other seamlessly.
In case of Hybrid approach, operational flexibility, scalability, efficiency and security are properly balanced by hosting mission critical applications and sensitive data protected on the Private Cloud and generic application development, big data operations on non-sensitive data and testing on the Public Cloud.
Hybrid Cloud thus leverage benefits of both Public and Private Cloud by maintain balance between the efficiency, cost saving, security, privacy, and control. The combination of the different service and deployment models enables different business models with new business roles. A cloud service is likely to have many layers of abstraction that build on top of each other with define roles and duties. Accessibilities of these predefine services to the end user depends on the different service model.
Abstraction layers of standard Cloud model is depicted in adjoining Figure 2. Service providers may adapt and compose several services into one, which is then offered to the cloud customers. Cloud computing has emerged as a major shift in how computing resources are deployed and consumed both by individuals and enterprises Cloud computing is an approach that covers a wide spectrum of cloud tools and models.
This technology has a lot of potential and promises its consumer an enhancement in agility, efficiency and profitability by offering software, platform, and infrastructure delivered as services at very negligible cost by reducing up-front investment and ease of use by providing most user and eco-friendly operations.
Like other technology, cloud also offers many benefits which come with some rider cost associated with it. Cloud too has its weaknesses and that is security. Essentially, security in the cloud environment does not differ from the one in the traditional computing model.
In both cases, the major focus is on the issues of protecting data from theft, leakage or deletion. Unlike in traditional computing model, issue of security in the cloud is slightly different. When individual users or organizations move computer systems and data to the cloud, security responsibilities become shared between user and cloud service provider. When an increasing number of individual users and businesses are moving their precious data and entire IT infrastructures to the cloud, it is natural to start wondering how security and privacy are handled in the cloud.
Due to its intrinsic nature, however, the cloud environment highly susceptible to security threats as compared to its counterpart as data is stored with some third-party provider and accessed on the web which increases the overall vulnerability and thus affects overall reliability.
Moreover, as most of the precious data is transferred to the cloud, it is difficult to maintain its integrity and thus overall data security is compromised. To make thinks further complicated, data and services may be replicated horizontally among these multiple service providers and as a consequence, it is often extremely difficult to determine the physical location as to where the data is being stored or processed at any one time.
All this constituted the obvious security implications as data is transmitted and stored in different locations over the Internet and shared among multiple service providers simultaneously. Apart from just data, virtualization and applications are equally important security issues in cloud computing.
Thus, Security has severe impact on the overall decision making process as to whether an individual or organization will adopt for the cloud services or not. Though cloud services have ushered in a new age of transmitting and storing data and cloud has its own beneficial power but it is imperative to take focused security approach, reviews the changes needs to undertake before making decision to migrate to the cloud.
Some of the key aspects of cloud security in nut shell are depicted in Figure 3. Cloud computing being a modern technology offers numerous advantages. In order to harness all these benefits, one has to scrupulously investigate as many cloud security measures as possible. These concerns may vary from vulnerability to malicious code penetration to hijacked accounts to full-scale data breaches.
Cloud computing and services being relatively new and enable accessing remote data via the Internet is the most vulnerable source for misconfiguration or exploitation. This very intrinsic property of cloud becomes unique set of characteristics which make it more vulnerable to all form of data breaches. Data breaches or losses can be any form of cyber security attack in which confidential or sensitive information is stolen, viewed or used by an unauthorized stranger or it may the result out of accidental deletion by service provider or a natural catastrophe, like fire outbreak or earthquake.
This may results to the loss of intellectual property IP to rivals, impacts the competitive edges, financial losses out of regulatory implications, affecting brand value and goodwill of organization and thus overall market value may be at stake as it foster mistrust from customers and business partners.
Though Encryption techniques can protect data but at the cost of system performance. Thus robust and well-tested Data breach avoidance, data loss preventions, data backup and recovery data management strategy must be adopted before making up mind to migrate to cloud. The basic framework of cloud which offers scalability and speed also becomes nurturing ground for delivering super scalable malware.
Cloud applications themselves are great weapon for spreading the malicious attacks on a large scale to cause greater harm like hijacking accounts, breaching data. Malware injections are basically code scripts which are embedded into the basic cloud service modules thus run as legitimate instance having access to all the sensitive resources and thus intruder can eavesdrop, compromise the overall integrity of vital information.
Denial of Service attack DoS makes valuable services unavailable to the legitimate user thus hamper the overall performance and security.
DoS may act as catalyst and used as smokescreen to hide the malicious activities bypassing the firewall of cloud and thus can spread easily to cause greater harm instead of infecting one device. The recent growth and easy adaption of cloud services by organization leads to altogether new set of issues related to hijacking account. Imposter now can easily exploit the ability to gain access to login credentials and thus the sensitive data comprises of business logic, functions, data and applications stored on the remote cloud.
Account hijacking which includes scripting bugs, reused password, cross-site scripting enables the intruder to falsify and manipulate information. Man-In-Cloud Attack, Key-logging, Phishing, and buffer overflow are some other similar threats which eventually leads to theft of user token which cloud platform uses to verify each individuals without requiring login credentials typically during data updation or sync.
The impact of the account hijacking can be severe, some even leads to significant disruption of business operations by means of complete eliminations of assets and capabilities.
Thus account hijacking needs to be dealt seriously as tangible and intangible impact out of leakage of sensitive and personal data may damage the reputation and band value. Volume and scope of the various resources used in cloud environment augmented with complexity and dynamism of resources poses major challenge in configuring effectively for efficient use. Inappropriately configure precious computing resources, results in making these resources soft target for vulnerable malicious undesired activities and thus entire cloud repositories may exposed to intruders.
The overall business impact depends on the nature of the misconfiguration, and how quickly it has been detected and resolved. Application Programming Interfaces APIs as name suggests is an interface between the system and outside un-trusted entities most exposed parts of a system accessible via the Internet, facilitates users to customize their cloud experience and also indirectly provide the safe conduit or entry points for strangers.
A poorly designed weak set of interfaces exposes organizations precious sensitive resources to various security issues related to confidentiality, integrity, availability, and accountability. Apart from giving programmers the tools to build and integrate their applications with other job-critical software, API also serves to authenticate, provide access, and effect encryption.
The cloud assets can be compromised if the vulnerability of an API which lies in the communication that takes place between applications is exploited. Thus standard and open API frameworks must be referred while designing the interfaces which may help to protect against both accidental and malicious attempts to circumvent security.
The human intervention in data security has many faces and many sources. The human element of data security has many faces and being authorized and operated on a trusted level, these insiders may misuse information or perform nefarious activities through malicious intent, accidents, carelessness or malware. Various measures to mitigate the consequences of insider threats includes routine audits of on-offsite servers, frequent change in passwords, confined privileged access to security systems and central servers to limited numbers of employees apart from controlling access and offering business partnerships to the employees.
Prevention is better than cure; dealing with such category of threat would become more expensive and complex as it involves containments, forensic investigation, escalation, surveillance and monitoring. Inadequate credential, identity or key management may leads to unauthorized access to data and information.
As a result, malicious intruders camouflaged as genuine users can manipulate the sensitive data. Other tenants of the same cloud are also at high risk to security incidences and breaches. An Automated regular rotation of cryptographic keys and passwords, removal of unused credentials, implementation of proper scalable central programmatic credential management system, and use of multifactor authentication process are some of the measures which must be undertaken by the cloud provider to deviate the risk of data breaches.
Moreover, due diligence should be taken to ensure that third parties to whom cloud provider may have outsources operations or maintenance work satisfy the requirements of security as contracted by cloud service provider because it indirectly levitate the threats and compromised the overall security.
Strictest credential access, multifactor authentication, segregated and segmented accounts are some of the suggested measures one should opt for to mitigate the risk. This may results in either cloud provider will start exploiting or in case if for some reason cloud provider ceases its operation and goes out of business, moving data to other in timely manners becomes hectic and eventually may result in loss of data too. Thus to avoid such grim situation of Vendor lock-in, adequate control plan and due diligence should be in place before making decision migrating to any cloud.
Any hasty decision without anticipating the quality and nature of services from cloud provider may pose security risk, especially when the desired services are bound and control under legal and statutory obligations or services hired for handling highly sensitive or personal or financial data.
Cloud service user must perform due diligence and ensure that proposed cloud service provider possesses an adequately strong control plane in place; absence of this could results in data loss, either by theft or corruption.
Apart from technical issues discussed above, one equally important parameter which must be given due weightage in decision making process is people factor.
If a person in charge is unable to exercise full control over data security, infrastructure and verification, then security, integrity and stability of data may be stake.
Multi-tenancy feature of cloud makes cloud services cost effective for individual organization but incidentally it leads to yet another security issue. Exploitation of system and software vulnerabilities within cloud infrastructure, services results into failure to maintain physical and logical separation among different tenants in multi-tenant environment.
Privacy and security issues in cloud Computing
Cloud Computing has become another buzzword after Web 2. The phrase cloud computing originated from the diagrams used to symbolize the internet. Cloud computing is not a completely new concept; it has intricate connection to the grid Computing paradigm, and other relevant technologies such as utility computing, cluster computing, and distributed systems in general. With the development of cloud computing, a set of security problems appears. Security issues present a strong barrier for users to adapt into Cloud Computing systems. Several surveys of potential cloud adopters indicate that security is the primary concern hindering its adoption.
So, All of authors and contributors must check their papers before submission to making assurance of following our anti-plagiarism policies. Today cloud computing is the most trending and advanced technology with high future implementation in the information and technology industries. Nowadays many cloud storages or online storages are provided by a number of companies to their customers as well as to the employees. In current scenario computing infrastructure is rapidly moving towards the cloud based architecture in which the users are enabled to move their data and application software to the network and access the services on-demand. It is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet.
Discover Cloud Computing Solutions. Get Deep Enterprise Expertise Across 20 Industries.
Cloud Computing Security Issues and Challenges: A Survey
Viswanadham, Dr. Abstract:- The unique feature of Cloud Computing holds in its potential to eliminate the requirements for setting up of high- cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet from lightweight portable devices.
Cloud Computing Security - Concepts and Practice. Cloud Computing is currently one of the hottest topics in computing and information technology IT. Cloud computing is a technology paradigm that is offering useful services to consumers.
Skip to Main Content. A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. Use of this web site signifies your agreement to the terms and conditions.
Профессионалы Интернета стали глазами и ушами АНБ. Люди, занимавшиеся нелегальной деятельностью с использованием электронной почты, быстро убедились в том, что их секреты больше не являются их частным достоянием. ФБР, Налоговое управление, Агентство по борьбе с наркотиками и другие правоохранительные агентства США - с помощью опытных штатных хакеров - сумели арестовать и предать суду гораздо больше преступников. Разумеется, когда пользователи компьютеров во всем мире обнаружили, что американское правительство имеет широкий доступ к их электронной почте, раздались возмущенные голоса. Даже те, кто использовал электронную почту лишь для развлечения, занервничали из-за вторжения в их частную жизнь.
Что-то в этом абсурдном имени тревожно сверлило его мозг. Капля Росы. Он слышал приятный голос сеньора Ролдана из агентства сопровождения Белена.
Он попробовал плюхнуться на заднее сиденье, но промахнулся. Тело его сначала оказалось в воздухе, а потом - на жестком полу. Из тени на авенида дель Сид появилась фигура человека. Поправив очки в железной оправе, человек посмотрел вслед удаляющемуся автобусу.
Чатрукьян растерялся. - Так вы обратили внимание. - Конечно. Он работает уже шестнадцать часов, если не ошибаюсь.
За углом показалась смотровая площадка. Лестница, ведущая наверх, была пуста. Его жертва не приготовилась к отпору.
Ведь он был пацифистом и не стремился к разрушению. Он лишь хотел, чтобы восторжествовала правда. Это касалось ТРАНСТЕКСТА.
Стратмор покачал головой: - Больше никто не знает о существовании кольца. Именно поэтому я и послал за ним Дэвида. Я хотел, чтобы никто ничего не заподозрил.