Professional Documents
Culture Documents
ISSN 2278-6856
ABSTRACT
2. RELATED WORK
1. INTRODUCTION
Cloud computing is an architecture for providing
computing services via internet on demand and pay per use
access to a pool of shared resources namely networks,
storage, servers, services and applications, without
physically acquiring them. So it saves managing cost and
time for organizations.Many industries such as banking,
healthcare, educations and individuals are moving towards
the cloud due to efficiency of services provided by the pay
per use pattern based on the resources such as processing
power used, transactions carried out, data transferred or
storage space occupied. Cloud computing is a completely
internet dependent technology where client data stored and
maintain in the data centre of a cloud provider like Google,
Amazon, Microsoft and Apple etc. As security is
considered a key requirement for cloud computing as a
robust and feasible multipurpose solution. This viewpoint
is shared by many distinct groups, including academic
researchers, business decision makers and government
organizations. The many similarities in this perspective
indicate a grave concern on crucial security and legal
obstacles for cloud computing, including service
availability and data confidentiality. These concerns have
their origin not only on existing problems, directly
inherited from the adopted technologies, but also related
to new issues derived from the composition of essential
cloud computing features like scalability, resource sharing
and virtualization i.e. data leakage and hypervisor
vulnerabilities. The main goal of this article is to identify,
classify, organize and quantify the main security concerns
and solutions associated to cloud computing, helping in the
task of pinpointing the concerns that remain unanswered.
Aiming to organize this information into a useful tool for
comparing, relating and classifying already identified
concerns and solutions as well as future ones.
Page 137
ISSN 2278-6856
2.6.2. Interfaces:
Concentrates all issues related to users, administrative and
programming interfaces for using and controlling cloud.
(a)API:
Programming interfaces for accessing virtualized
resources and systems must be protected in order toprevent
malicious use.
(b) User Interface:
End user interface for exploring the provided resources
and tools implying the need of adopting for securing the
environment.
(c) Authentication:
Mechanism required to enable access the cloud. Most of
the services rely on regular accounts being susceptible to a
plethora of attacks whose consequences are boosted by the
resource sharing.
2.6.3.Data Security
Protection of data in terms of confidentiality, availability,
and integrity.
(a) Cryptography:
Most employed practice to secure the sensitive data.
(b) Redundancy:
Essential to avoid data loss.
2.6.4. Virtualization:
Isolation between VMs, hypervisor vulnerabilities and
other problems associated to the use of virtualization
technologies.
(a) Isolation:
Although logically isolated, all VMs share the same
hardware and consequently the same resources, allowing
malicious entities exploit data leaks and cross VM attacks.
(b) Hypervisor Vulnerabilities:
The hypervisor is the main software component of
virtualization. Even though there are known security
vulnerabilities for hypervisors, solutions are still scare and
demand further studies to harden these security aspects.
(c) Data leakage:
Exploit hypervisor vulnerabilities and lack of isolation
controls in order to leak data from virtualized
infrastructures, obtaining sensitive data and affecting
confidentiality.
(d) Cross VM attacks:
It includes attempt to estimate provider traffic rates in
order to steal cryptographic keys and increase and increase
chance of VM placement attacks.
2.6.4. Governance:
Issues related to losing administrative and security controls
in cloud computing. It includes moving data to the cloud
means losing control over redundancy, location, and file
system.
2.6.5.Compliance:
Includes requirements related to service availability and
service level agreements.
2.6.6. Legal issues:
Aspects related to judicial requirements and laws, such as
multiple data location, provider privilege (malicious
activities of provider insiders are threat to confidentiality,
availability) and legislation.
Page 138
ISSN 2278-6856
3. PROPOSED WORK
3.1. Security SolutionsDuring our study we observe that the number of citations
covering security problems related to legal issues,
compliance and governance is high, however the same also
happens when we consider the number of references
proposing solutions for those issues. In other words, these
concerns are highly relevant but a large solutions are
available for tackling them. The situation is completely
different when we analyse technical aspects such as
virtualization, isolation and data leakage. Indeed,
virtualization amounts for 12% of problem references and
only 3% for solutions. Isolation is a perfect example of
such discrepancy. We noted that for this specific issue,
special care has been taken when the most popular virtual
machines solution providers (e.g. XEN, VMWARE and
KVM) aiming to verify their concerns and available
solutions. This indicates the need of evaluating potential
areas still to be developed in order to provide better
security conditions when migrating data and processes in
cloud.
5.COMPARISION
MECHANISMS
WITH
PREVIOUS
6. CONCLUSION
Considering the points raised in the above discussions, a
straight forward conclusion is that cloud security includes
Page 139
ISSN 2278-6856
AUTHOR
Vinayak Shukla is currently pursing B.Tech
fromDr. K. N. Modi Institute of Engineering
& Technology, Modinagar, Ghaziabad, U.P.
India
7.ACKNOWLEDGEMENT
This project is developed under the guidance of Mr.
Nidheesh Sharma, Assistant professor at Dr.K.N. Modi
Institute of Engineering and Technology, Modinagar,
Ghaziabad, U.P. India.
REFERENCES
[1]
Top
threats
to
Cloud
Computing
htps://cloudsecurityalliance.org/topthreats.
[2] SaaS ,PaaS and IaaS: A security checklist for Cloud
Models-http://www.cssonline.com.
[3] http://pds.ewi.tudelft.nl/~iosup/research_cloud.html
[4] www.cloudreadsecurity.com
[5] www.programmableweb.com
[6] Hunter S (2011) Ascending to the cloud creates
negligible
e-discovery
risks.
www.ediscovery.quarles.com
[7] Sharon D, Nelson JWS (2011) Virtualization and cloud
computing www.slaw.ca
[8] e-discovery risks. www.ediscovery.quarles.com
[9] Sharon D, Nelson JWS (2011) Virtualization and cloud
computing www.slaw.ca
[10] Dinoor S (2010) ten steps to securing a cloud based
enterprise www.cloudcomputing.sys-con.com
[11] Rarnireddy S, Chakraborthy R (2010) Privacy and
Security practices in the arena of cloud computing.
[12] Olstrik j (2010) Information security, virtualization,
and the journey to the cloud.
[13] Linthicum D (2009) Defining the cloud computing
framework.
[14] www.cloudsecurityalliance.org
[15]
Shankland S (2009) HPs hurd dings cloud
computing, IBM.
[16] CSA (2009) Security guidance for critical areas of
focus in cloud computing.
Page 140