You are on page 1of 2

UNISYS 20/20 cloud computing version 3.0 technical paper contest.

Section: Security for Cloud Computing Topic :Clouds Possible threats and ways to protect data from that using proposed model known as - SeCloud By:Saba Wasim Could Computing is emerging as a enticing field in IT sector because of its numerous benefits ranging from its efficiency to scalability .Cloud Computing changes the total scenario of today's IT infrastructure because of its flexibility and computational performance. Cloud has a major advantages of all the above technologies by providing cent percent piracy free software environment , low manpower load on software updates and maintenance. Cloud gives the power to the consumer to access related data anywhere with much more computational power without any extra hardware cost. Cloud computing is a increased level of Virtualization, grid computing and SOA. However compromises are being made because of security .Since cloud computing share resources via the network. Thus arises security problems to develop cloud computing application. Security is the major concern of cloud computing .Almost 70% of consumers before adoption show there concerns on cloud's security. The tag "access anywhere" gives the security concern a boost.

This paper propose a secure cloud model known as SeCloud. Some important security services, including authentication, confidentiality and integrity, are provided in cloud computing system. This paper covers the cloud security details like its loopholes, its vulnerabilities , effective exploits ,possible backdoor, various hacking techniques like SQL injections, Xss , RFI, xml signatures, XDos and server misconfiguration , may used in it and the effective way to prevent all of the above using SeCloud. Using an appropriate model with its effective audit by examining the various vulnerabilities , we can make a cloud architecture which is secure.CCM (cloud computing Model) cannot be implemented without a proper security model to be introduce into CCM.API plays important role in the security breach of clouds, implementation of better API controls. For a better cloud model which is secure we should follow authentication, authorization, and audit (AAA) model. Also giving certain guidelines on SSO, identity management, regulations for proper usage and logs thus preventing

the data leakage in clouds. By securing the cloud we can easy implement the architecture of enterprise cloud model and use the cloud computing power to its fullest.

Keywords-cloud computing; trusted computing; cloud security.

You might also like