Preview

Addressing Security Issues in Cloud Computing

Powerful Essays
Open Document
Open Document
4041 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Addressing Security Issues in Cloud Computing
Addressing Security Issues in Cloud Computing
Rituik Dubey, Muhammad Asim Jamshed, Xiaohui Wang, Rama Krishna Batalla
Carnegie Mellon University Pittsburgh, PA 15213 Email: {rdubey, mjamshed, xiaohuiw, rbatalla}@andrew.cmu.edu

Abstract—This paper discusses the security issues that arise in a cloud computing framework. We concentrate on what is typically called the metering problem or “proof of work” where the client can ascertain that the amount it is being billed for by the cloud service is in accordance with the amount of work done by it. We define many different attack scenarios and propose counter schemes for each. Our simulation and theoretical analysis show that the schemes require a reasonably low verification effort at the client side, and provide non-repudiation property.

reservations whether the server performed a complete search, scanning the table(s) in entirety before returning the results to the client. A. Proposed solution Fig.1 illustrates our proposed solution. Our architecture requires that our entire database also be stored in a trusted backup storage facility. Therefore, any updates to the data stored in the cloud service also have to be propagated to the backup trusted store. The entire data stored by the service can hypothetically be divided into n data slices. The first slice, M1 is stored both at the client and the server end. M1 has an extraneous x bytes of region known as the nonce (small region in M1 in Fig. 4). Whenever a client sends a new search request to the cloud, it also sends an updated randomly generated nonce to M1. This prompts the cloud service to calculate the intermediate iterative hashes of each data slice as it completes the search through the entire database. Once the search is complete the search results along with the set of digests are sent back to the client for processing/verification of its authenticity. In order to verify that the server scanned the entire table, the client can authenticate each slice’s digest

You May Also Find These Documents Helpful

  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Good Essays

    1. Form hypothesis: During photosynthesis, light energy is used to synthesize carbon dioxide (CO2) and water (H2O) into glucose (C6H12O6) and oxygen (O2). The complex series of chemical reactions is summarized by the following formula:…

    • 1218 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Trust is not easily defined, but most people agree that when it comes to cloud computing, transparency is essential to creating trust. Businesses must be able to see cloud service providers are complying with agreed data security standards and practices. These must include controls around who has access to data, staff security vetting practices, and the technologies and processes to segregate, backup and delete data. Suppliers of cloud technologies and services are quick to claim that cloud computing is well equipped to provide the necessary controls. Virtualization, they argue, underlies cloud computing, and therein lies the potential to achieve hitherto impossible levels of security. While virtualization is viewed with suspicion and fear by many IT directors, suppliers like RSA, IBM and other say that the technology enables organizations to build security into the infrastructure and automate security processes, to surpass traditional data protection…

    • 1351 Words
    • 6 Pages
    Better Essays
  • Good Essays

    During the Civil War a lot of people have lost their lives in battle. The Civil War was a fatal event that took place in the United States History which people know as the “First Modern War”. The civil war was caused by a numerous of reasons for example, the election of Abraham Lincoln, the fight between slaves and people who were not slaves and the States against federal rights. This essay will explain why did cities started to explode in population in the late 19th century.…

    • 919 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cloud computing is an emerging model where users can gain access to their applications from anywhere through their connected devices. A simplified user interface makes the infrastructure supporting the applications transparent to users. The applications reside in massively-scalable data centers where compute resources can be dynamically provisioned and shared to achieve significant economies of scale. A strong service management platform results in near-zero incremental management costs when more IT resources are added to the cloud. The proliferation of smart mobile devices, high speed wireless connectivity, and rich browser-based Web 2.0 interfaces has made the network-based cloud computing model not only practical but also a source of reduced IT complexity.…

    • 4246 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Powerful Essays

    Cloud Computing

    • 1763 Words
    • 7 Pages

    IT departments and infrastructure providers are under increasing pressure to provide computing infrastructure at the lowest possible cost. In order to do this, the concepts of resource pooling, virtualization, dynamic provisioning, utility and commodity computing must be leveraged to create a public or private cloud that meets these needs. Cloud computing is a general term for anything that involves delivering hosted services over the Internet. This provides the smaller companies or individuals who couldn’t able to buy costly software or any other resources. This becomes easy because of cloud computing. Cloud promises real costs savings and agility to customers. It’s a ‘Pay for Usage’ plan. We pay the money based on our usage only. Through cloud computing, a company can rapidly deploy applications where the underlying technology components. Access to applications and data anywhere, any Time, from any device is the potential outcome of cloud computing. This is suitable technology for limited budgets and a highly dynamic market with minimal resources.…

    • 1763 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    The significant development of information technology over past few years has led to the increasing demand of resources, extra bandwidth and computational power. Small and medium business companies with their limited budget are finding themselves in the middle of balancing between its client/employee needs and maintaining efficient work environment. In today’s economy the answer for the above problem is ‘Cloud Computing’.…

    • 1023 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Inf 103: Computer Literacy

    • 1963 Words
    • 8 Pages

    The national Institute of Standards and Technology under the department of Commerce defines Cloud Computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”. Another definition for cloud computing is a term used to describe a network of computers that deliver information technology services over the internet to many users in an on-demand environment (P.Y. Thomas 2011). As you can see by the definitions above the term Cloud Computing has been defined, yet many of us are barely getting to understand how this type of computing affects the work we do both in our personal life and in the workplace. In the following pages you will see how cloud computing is the way of the future without it being limited to business applications; furthermore creating a niche in the social media/personal computing we do on a daily basis.…

    • 1963 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Cloud Computing: Fact vs Fog

    • 9067 Words
    • 37 Pages

    News of Cloud is everywhere, and its predominance in IT is a foregone conclusion. In fact, the push to adopt Cloud has been so strong that risks inherent in this model have largely been ignored The recent economic turmoil and the promise of Cloud leading a renaissance of the tech sector are shaping the perspective and appetite for Cloud rather than the readiness of the technology itself. Cloud is a powerful tool for mobilizing data; however, there are no regulations, standards, or assurances of data protection from a technical perspective Major breaches at Google, Salesforce.com, and Amazon, have exposed the fragility of the Cloud delivery model, and the fundamental issues of data security, privacy, and standards that have yet to be addressed. Though price points gained in Cloud can be significant, businesses should weigh advantages against the hidden costs of compromised data Analyst sentiment seems to be the sole voice of reason. Principal analysts from Forrester, Gartner, and Yankee cite major security concerns with Cloud. Hackers have also highlighted the vulnerabilities of Cloud and issued a manifesto of mayhem against it (Black Hat 2009 – Clobbering the Cloud by SensePost) Assessing your organization’s readiness for Cloud should include the evaluation of hybrid models, hybrid architectures, integration constraints, and innovative data protection…

    • 9067 Words
    • 37 Pages
    Good Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2320 Words
    • 10 Pages

    This paper is intended to show the importance using a Public Key Infrastructure (PKI). PKI is a broad subject matter and is constantly evolving to meet the growing demands of the business world. This paper will address PKI at a relatively high-level and will not include details regarding the underlying cryptography (Weise, 2001). This paper will cover the history behind PKI, why we should us PKI, its purposes and functions how PKI works.…

    • 2320 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    Cloud Computing Security Threats and Responses Farzad Sabahi Faculty of Computer Engineering Azad University Iran fsabahi@ieee.org Abstract-Cloud Hybrid clouds. A public cloud is standard model which providers make several resources, such as applications and storage, available to the public.…

    • 3527 Words
    • 15 Pages
    Best Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users' fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem, in this project, we propose a novel highly decentralized information accountability framework to keep track of the actual usage of the users' data in the cloud. Our proposed CIA framework provides end-toend accountability in a highly distributed fashion. One of the main innovative features of the CIA framework lies in its ability of maintaining lightweight and powerful accountability that combines aspects of access control, usage control and authentication In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users' data and policies. By means of the CIA, data owners can track not only whether or not the service-level agreements are being honored, but also enforce access and usage control rules as needed. Associated with the accountability feature, We leverage the JAR programmable capabilities to both create a dynamic and traveling object, and to ensure that any access to users' data will trigger authentication and automated logging local to the JARs. To strengthen user's control, we also provide distributed auditing mechanisms. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis.…

    • 300 Words
    • 2 Pages
    Good Essays

Related Topics