You are on page 1of 12

TABLE OF CONTENTS

CLOUD COMPUTING ................................................................................................................................# CHARACTERISTICS OF CLOUD COMPUTING ...................................................................................................... # Essential characteristics ................................................................................................................................. # Service model.................................................................................................................................................. # Development model ........................................................................................................................................ # SECURITY AND PRIVACY OF CLOUD COMPUTING ............................................................................................. # PRIVACY.......................................................................................................................................................... # AMAZON CLOUD DRIVE PRIVACY TERMS .......................................................................................# THE CLOUD DRIVE SERVICE ............................................................................................................................. # SERVICE PLANS ............................................................................................................................................... # Changes .......................................................................................................................................................... # termination ..................................................................................................................................................... # SECURITY IN CLOUD ...............................................................................................................................#
HOW TO INCREASE CONFIDENCE ...................................................................................................................... # CONCLUSION ................................................................................................................................................... #

EXECTIVE SUMMARY
CLOUD COMPUTING PRIVACY AND SECURITY

Cloud computing describe a deep range of services. Cloud

computing is being used in every aspect of life, in order to


understand cloud computing and how it works, what are the characteristics and what are the privacy being used in cloud computing I tried to discuss in detail about these above factors. Since the cloud is a deep collection of services, so each organization can choose how and when they use it. Security is main issue in computer field specially in internet sector and I tried to cover all of the security issues regarding cloud computing main focus of my research was how cloud works and the security of private data. Other than that I explained different types of cloud computing commonly known as SaaS (Software as a service), Paas (Platform as a service, Iaas ( Infrastructure as service) and how they work. Concern about privacy of data is another section which needs attention from cloud companies I tried to explain the weak points of cloud privacy in below assignment.

Cloud Computing Privacy and Security


In term of definition their isnt any specific definition for cloud computing not yet till this date but i will be using NIST definition which was defined as:Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resourses ( Storage, application, network and services) that can be rapidly provisioned and released with minimal management effort or service provider information (NIST, sep 2011) Under the above definition cloud computing is composed of different models like have 5 essential, 3 delivery and 4 development model characteristics, which are being discussed below:ESSENTIAL CHARACTERISTICS: On demand self service Broad network access Resources pooling Rapid elasticity Measured service

All of above five essential characteristics are used to make a cloud computing more seamless and transparent. ON-DEMAND SELF SERVICE:On-demand self-service refers to the provided services in cloud computing dealer, that enables the provision of cloud computing on demand wherever they are required. In on-demand self-service, the user uses cloud services through an online panel. On-demand self-service ability sourcing is the main feature of most cloud offerings where the user can scale the required base up to a heavy level without confusing the operations. BROAD NETWORK ACCESS:Broad network access refers to resources hosted in a private cloud network (operated within a company's firewall) that are available for access from a wide range of devices, such as tablets, PCs, Macs and smartphones. These resources are also accessible from a wide range of locations that offer online access.

SERVICE MODELS:Service model is based on following three delivery models Application/Software as aservice Platform as a service Infrastructure as a service

Its the most important feature or service of cloud computing you can say cloud computing is bases of service model as it is responsible of Data protection, risk management. We will be discussing these three feature in detail APPLICATION/SOFTWARE AS SERVICE:-(SaaS) 2. Cloud computing paradigm and privacy In this section client uses and operated the application of the the providers running on a cloud I and cloud user access the the software from client of cloud. These application can be accessed by different clients systems though client interface like web-browsers. (e.g. Web-based email such as Gmail or CRM from Salesforce). With the SaaS model, the consumer has little or no influence how input data is processed, but should be able to have confidence in the cloud providers responsibility and compliance or can control which input he gives to a SaaS. First of all he can avoid to give sensible data to a SaaS. Secondly he might be able to "secure" the sensible data before he inputs them into the SaaS (e.g. their exists plugins for browsers supporting encryption of input form fields. This could be used to send only encrypted mails using Gmail) (Computer security by Peter Mell, Timothy Grance) PLATFORM AS A SERVICE:The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment. (Computer security by Peter Mell, Timothy Grance) INFRASTRUCTURE AS A SERVICE:The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls). (Computer security by Peter Mell, Timothy Grance)

DEVELOPMENT MODELS:- this is the last defined model for cloud computing which basically covers Privacy and organizing data, the main features are given below:-

Private cloud Community cloud Public cloud Hybrid cloud

In the above four parts of development model the user has been given the control means the end user will organize and manage the data. But as technology is achieving more success in field of new development we can also see new kinds of cloud computing which can be called a mobile cloud computing (MCC). We can define MCC as composition of mobile and cloud where data and the related processes will be happened in cloud but can be accessed by mobile, its like a competition or trend now a days we can our self-daily use thousands of softwares in our smartphones which are using cloud system in storage.

SECURITY AND PRIVACY IN CLOUD COMPUTING Cloud computing nowadays is most exciting and most usable feature in computer field everyone is shifting their data in cloud so its easy to carry it anywhere without carrying any hardware with you but every technology has its own side effects and as in the world of computers there are numerous risks and the biggest and most powerful one which is getting more strengths as technology is raising is HACKING. The worst nightmare for any Organization, user, or developer is the risk of being hacked, here in this section of our research we will discuss some security and privacy issues of cloud and will be using some recent cloud hacking incidents. PRIVACY:Privacy refers to the right of self-determination, means, the right to know what is known about them, control how that information communicate and also how it prevent it abuse. Protecting of personal information drives from the right of privacy by the associated right to selfdemonstration .everyone has the authority to own and control his data(Privately or Publically). Its easier to manipulate the data which is stored in cloud but also much easier to lose the control because maximum number of individuals dont know where the data is saved and what are the process involved in saving my data. Thats the reason cloud computing raises many questions about privacy issue of data. The ICT sector is poised for strong growth of cloud service. Users are creating an ever-growing quality of personal data. Ict Predicts that the Digital-universe, The amount of data stored digitally will grow from 1.8 zb to 7 zb in next 4 years. () Privacy policy by one of the best cloud service provider amazon is mentioned below in which we can clearly understand the whole concept of their privacy and the role of company while interacting your data i will be just be giving an overview and then mention one of the privacy lacks in the terms which is clearly mentioned :-

Amazon privacy terms and conditions:The Service:- In service amazon provides storage, complete management accesses, and the access to use the functionalities which can be used for your file/files. Sharing Your Files:- this section can be used for storage of users file and using the features and functions provided by amazon itself. The user cannot use this service in behalf of a third party for storage or transit. The user is solely responsible for his own files and to comply with all copyrights and laws including the law of import/export. You must not share any file which includes viruses worms, Trojan, malware or other harmful codes. Service Plan Selection:-Plan selection service offers different storage selections(i.e. Free/paid) plans) in which user can avail different capacity of storage limits and fees for each storage plan. If you havent chosen any paid plan you can avail a free service plan with limited storage. Service Plan Fees:This section of amazon cloud term will discuss about paid planslike if you have selected any paid plans the price does not include any tax that they can charge you in addition. The charges are non-refundable and can be change on any time. Information Provided to Amazon:This term is most important for us in term of privacy in clouds here Amazon is discussing his privacy term and how they can access or how much information they can get from us and from which different sources these information can be get. They information the software may provide informations relating to use of service, performance and also about that device by which the service have been updated or given.(i.e. the information may be include users mobile network connectivity, location, when and where the software has been launched, which device the user is using for the launch of the application, session length for how long the session has been activated, technical errors, which contents have been used through the service, any technical error has been occurred or not.) Any information we receive is subject to the Amazon.com Privacy Notice located at www.amazon.com/privacy. Changes; Suspension and Termination In this section amazon privacy terms are notifying the users when they network of your account can be changes or terminated and what can be the cause for such act. Changes:the rights of discontinue or changing an part of given data has been reserved by amazon itself in the privacy section they clearly mentioned that they can anytime change or discontinue the end users account or can

change any part of the give data at any time without noticing the user. If the service which has been terminating is a paid service the amount of money remaining will be paid back to the user. Suspension and Termination. Rights of end-users under the agreement of amazon privacy terms will automatically terminate without any notice if the user failed to comply the terms. If the user is failed to comply the terms the company can terminate the account at any time without providing any notice.if company founds you violating the agreement like differ use from normal users, involved infraud or harms or misuse the service. If the service plan of user is terminated then he cannot be able be access his/her files and cant get a re -fund.

SECURITY IN CLOUD COMPUTING:-

As we know cloud computing promise to help organizations and their departments like I.T to be more effective on delivering new services to their clients But to keep this kind of promise cloud computing must assure I.T specialist about their security because if that system is not secure why anyone invest or relies on into check the security about cloud computing i in my research will discuss to kind of cloud system private and public and will be taking help from some research from international companies like INTEL. In security section we try to understand, The issues that I.T professionals are facing and how these issues are different for our two cloud computing networks (i.e. public and private) What kind of issue hardware and software providers are facing in cloud computing and how can they overcome these barriers and trust on cloud security.

Information Technology field is concerned following main features like Protecting identities. Cloud delivery service infrastructure and etc. My research will cover approximately 100% of these issues. First lets discuss private and public computing:Private cloud computing:Its basically a system for those internal users of Organization who are responsible for companies data protection those who are sitting behind the firewall. Public cloud computing:Those I.T professionals who use cloud computing to send or store software services of organization. According to Intel the concern about security cloud computing are justified and approximately 28% surveyed have experienced security breeches in cloud computing. (What holding the back the cloud by Intel)

To better understand i have researched and tried to find whether the thread I.T professionals and Organizations are facing where they came from and by the help by various research papers written in start of 2013 or at the end time of 2012 i have found that more then 30% of treads facing by any organization are attacking from outside of the organization. WHAT I.T WANTS:Concerns of I.T professionals increases about cloud computing when it goes to Public cloud, because its security controls goes to a third party like i gave an example of amazon cloud computing in which it is mention the third party (amazon cloud server) can any time read, change, or terminate users account. Shared Data center of public cloud computing is main concern of security in cloud computing. Another main reason of security concerns is not knowing what kind of security services being offered by cloud provider, like if i have an account in amazon cloud computing i have uploaded my important documents but i dont know whats the level of security amazon is offering my document it will be my main concern and soon i will delete my account and find an alternate for my documents storage. HYPERVISORS:Hypervisors can be defined as a virtual machine that allows multiple operating systems to share one hardware host. (Margaret rose, oct 2006) Another important concern about cloud computing security is hypervisors which is a software layer between virtual machine and hardware which allows different VMs to use/share single platform. So if a system which is connecting multiple users in single platfoms is in aattack thats mean all users are on attack and each and every file, document is not secure in that database,thats another reason of security concerns about cloud computing.

HOW TO INCREASE CONFIDENCE OF USERS ABOUT CLOUD:While the main point of my research was to focus on cloud computing securty and privacy concerns and define each of them clearly which i think i did or i tried my best to do so, now on next phase i will discuss some solutions about security concerns of cloud computing. Data boundaries creating abilities Help in understanding if the cloud server is highly secure and concern about malware, virus etc. End-user must be capable to compare security levels between different cloud providers.

DATA BOUNDARIES:Creating data boundaries gives the users better chance to understand where the certain workload are run, HELP UNDERSTANDING SECURITY:If the user dont know whether my data is completely safe or not how he trust the server and upload the files which can be important for him, so the cloud

server must make user understand how secure they are and what steps have been taken to improve the security of server. COMPARING SECURITY LEVELS:Each server have its own way of securing data or saving the data to be lost, the user must be confident and it can only be happen when he select the best one or the one can be perfect for his documents so cloud providers must give the user a chance to compare the level of security among different cloud computing server and let them select the best for their data. ANOTHER BIG ISSUE:Another issue about security is since HTML5 when we use any file from cloud on our mobile phone it automatically be saved in memory of that smartphone and when the smartphone is lost the person can easily access the data so its also an security thread the professionals must find a way to disable data on missing devices. Example:if your PC is forgotten or you lost it somewhere then there must be a way to stop all access from your pc by your smartphone , or if you lost your smartphone there must be a way to stop the data transferring or feature by your pc before it goes to wrong hand. 2013 INVESTMENTS ON CLOUD COMPUTING In this year 2013 its expected to expand more 130 billion dollars on security of cloud computing as it shows a high increasing graph in its users, but yet still the report show its will be difficult for the companies to trust the cloud computing for handling of critical data and computing task, Stuart McClure the former chief of technology officer of MacAfee suggested not to use cloud for storing critical data because the confident level for cloud is less then low. Top ten threads in cloud computing in 2013 are:Loss of data, hijacking database, breaches data, APIs securing, malicious insider, cloud service abuse, shared technology.

CONCLUSION Cloud computing is still in its initial stages, just few years back cloud computing took its first step in the world of technology, but at initial stage cloud achieved a great success and the smartphones are the major factor in cloud computing success, however security and privacy policies are the major challenges a cloud is facing right now. Privacy factor in cloud computing requires a wide range of stakeholders to cover multidiscipline approaches benefiting all areas of society. Adoption of cloud completely depends how secure cloud could be and how well companies deals with the privacy issue of cloud computing because many I.T professionals have issues according to security and privacy of cloud. Cybercriminal activities impacting computing environments, like hacking frauds (threads that can undermine confidence of cloud users). Data loss or leakage is another big issue regarding the use of cloud computing cloud companies providing cloud services like amazon are not clear about their data loss and leak policies and that is effecting about

20% of overall users, The government and private sectors must work hand in hand to address the security concerns of this influential trend. In my research i discussed cloud computing in detail the concern about privacy and specially security, i have discussed the types of cloud in detail in which mentioned the issues of users and the I.T professionals regarding the use of cloud and what professional users want from cloud computing servers or companies, Confidence building is very important for cloud companies because the users are losing their trust in cloud storage because of unclear security and privacy policy of companies. In example i have mentioned amazon privacy which is one of the biggest company providing cloud storage and amazons privacy clearly mentions user can lose the data and user id can also be blocked without any notice, these are the main issues regarding security and privacy i discussed in my project.

REFERENCES Alex Bender, Cloud Computing Issue And Impact Bernard Golden, How Cloud Computing Changes Enterprise IT Economics, http://www.cio.com/article/733072/How_Cloud_Computing_Changes_Enter prise_IT_Ec

Cloud Computing, https://www.privacy.vic.gov.au/privacy/web2.nsf/files/cloud-computing Danny Sullivan, After The Hack What Should I Still Trust Cloud DASOJU SHIVA KUMAR, HI-TECH COLLEGE OF ENGINEERING. Dawn Rowlett. http://www.internetmarketingwebsites.com/web-sitetheme.htm Emereo Publishing, An Introduction On Cloud Computing, http://www.scribd.com/doc/62607095/An-introduction-to-CloudComputing-Educational-resources-to-get-you-started-on-the-Business-ofCloud-Computing Eric Knorr, Galen Gruman, What cloud computing really means, http://www.infoworld.com/d/cloud-computing/what-cloud-computingreally-means-031 Jonathan Strickland, How Cloud Computing Works http://www.howstuffworks.com/cloud-computing/cloud-computing.htm

Kai Hwang, Deyi Li. Trusted cloud computingwith secure resources and data coloring. Larry Augustin, CEO SugarCRM, The cloud enterprises trust, http://www07.ibm.com/au/cloud-computing/ Mano Paul, Security in the skies Mark Ward (March 2013), Cloud Computing Security Pitfalls, by BBC NEWS Marko Holbl, Clod Computing Security and Privacy Issues Mikael Rickns, Dell and On App cooperate on pretested cloud packages http://www.infoworld.com/d/cloud-computing/dell-and-onapp-cooperatepretested-cloud-packages-218267 Rohit Bhandauria, A Survey On Security Issues in Cloud Computing Technology Watch Report, privacy In Cloud Computing. Shutter stock, Top 9 threads facing Cloud computing.