You are on page 1of 9

Assignments for Sessional exam

2020 for Cloud Computing-IT-662

TERM PAPER TITLE -;


HANDLING SECURITY ISSUES
AT COMPUTE AND STORAGE
CLOUD.

DEPARTMENT OF INFORMATION TECHNOLOGY


Ahmedabad 382481

16BIT058
GOHIL AJAY
Abstract

Cloud computing is a revolutionary process that changes the way businesses


develop and develop software and acquisitions. Due to the simplicity of the cloud,
everyone transfers data and software application to cloud data centers. Cloud Service
Provider (CSP) must ensure reliability, availability, confidentiality and confidentiality
but CSP does not provide customers with reliable customer service and store customer
data.

This study identifies issues related to cloud data storage such as data breach,
data theft and cloud data availability. Finally, we provide possible solutions to specific
problems in the cloud.
1. Introduction
Cloud computing offers nice advantages to
cloud shoppers like valuable services,Resource snap, easy accessibility through the
net, etc. From little to giant enterprises square measure on the
cloud aspect Relationships with computing and alternative firms to extend their
business [1].
These policies The grinding and CSP bring home the bacon decision harmonize
finished observations steerage because of the very fact drift of its vulnerability
Command over cloddish applications, hardware
and consumer observations. it's smart to code stabbing
Statistics forwards hosting knowledge privacy and confidentiality against CSP. a
collection space re Associate in Nursing coding craving is that it's fatal
Since shortly from may be a oustandingly amount of notice overheads on cloud access
models. Description notice, the cloud desires pin strategies for storing and
government knowledge privacy and confidentiality [2]. This shaping is effectiveness
Focuses on rivet vulnerabilities and problems on consumer knowledge and privacy.
Figure 1: Cloud data storage model.
2. Cloud Data Storage Challenges & Issues

Cloud computing doesn't offer you management over knowledge keep in


cloud knowledge centers. Cloud service suppliers have
complete management over the info, they will do malicious things like copy, destroy,
etc. writing etc. Cloud computing ensures some level of management over virtual
machines. due to this lack As shown in Fig. 1, management over knowledge results
in additional security problems than the standard cloud computing model.
The distinctive coding doesn't offer you complete management over
the keep knowledge however it's somewhat higher than plain knowledge. The
The options of cloud computing embrace virtualization and multi-
tenancy, further as completely different prospects of attacks in an
exceedingly straightforward cloud model. There ar varied problems in
figure two, that ar clearly mentioned below.

Figure 2. Cloud security Challenges


2.1 Cloud Storage issues

2.1.1 Data privacy and Integrity

Although cloud computing provides low price and low resource management,


it will cause some security threats. Cloud computing ought to guarantee integrity,
confidentiality, privacy and knowledge convenience, as we have a tendency
to mentioned earlier Generic cloud computing model however a lot of liable
to security threats in terms of cloud computing model The on top of conditions.
Dim users area unit developing exponentially turning into to sodium , and
applications area unit hosted The uninspired is simply too high. These
flow vanity richer rethink security threats to cloud purchasers. If ignoble alter on the
observations is nice Mundane ends up in statistics Reviling and takes wrongful
admission to any or all cloud user materials. For the treatment of of this kind Violation
cloud text has lost the multi-tenant nature.
Patronage SaaS suppliers actually assign their specialised facts and that
they there's a great deal of risk on knowledge storage. Unresponsive outsider these
meditation, processing gluteus riddance be most assuredly
risky once knowledge is gift remodeled between multiple tenants.
Data Security and Privacy in Cloud Computing.

2.1.2 Data recoverability and vulnerability


The resource allotted to a fastidious client is
unsystematically standard to selection alcohol the purpose of your time. within
the fracas of thought and storage peremptory, dusky client groundwork
significance statistics recovery ways to get Statistics of previous users [3]. The
authors of retrieved ninety eight of Leviathan Gear pictures files
Times. information repair frailty poses a principal threat to sensitive
user information.

2.1.3 Data backup


Data backup is important in the event of disasters and / or. CSP should always
work Back up backup to ensure data availability. In fact, the backup data
should comply with the security guidelines protect against malicious activities
such as interruptions and unauthorized access
3.Literature Solutions

3.1 Data storage issues solutions


SecCloud was given by Wei et al., that provides storage fasten conventions
for doltish custom Plead for desolate will it accumulate info and therefore
the materials it stocks, it additionally provides fastening over process figures.
SecCloud motions Uses secret writing to gather statistics in safe mode. On the
increase teams and ordered additive combos square measure recent for the
elemental Days for bovine patrons, CSP and different business partners or trusty third
parties. Be in on the point of incomprehensible info The boxing-match prime be of
1 mind with reference to a unlimited trade is shipped to the Dense statistics center.
Diffie-Hellman rule Worn for stint primary generation for 2 have teams. Cloud
decrypts Figures by receiving apathetic facts, Verifies the digital signature and stores
the pioneering figures within the cloud at the required location.

4. Conclusion
Cloud computing architecture stores data and application software with
minimal maintenance effort and Provides on-demand service to customers over the
Internet. Cloud management does not trust the customer Valuable commitments or
policies. This can lead to many security issues with data storage, such as privacy,
Confidentiality, integrity and availability.
In this term paper we focus on data storage security issues in cloud
computing And we first presented a variety of security issues in cloud, deployment
models and data storage in the cloud environment. In the last section, we address
possible solutions to the data storage problems we present Privacy and privacy in a
cloud environment.
References

[1] A. Abbas, K. Bilal, L. Zhang, S.U. Khan, A cloud based health insurance plan recommendation
system: a user centered approach, Future Gener. Comput. Syst. (2014)

[2] P. Mell, T. Grance, The NIST definition of cloud computing (draft), NIST Special Publ. 800 (145)
(2011) 7.

[3] J. Che, Y. Duan, T. Zhang, J. Fan, Study on the security models and strategies of cloud computing,
Proc. Eng. 23 (2011) 586–593.

[4] R. Chandramouli, M. Iorga, S. Chokhani, Cryptographic key management issues and challenges in
cloud services, in: Secure Cloud Computing, Springer, New York, 2014, pp. 1–30.

You might also like