Preview

Enhancement the Security in Cloud Computing

Satisfactory Essays
Open Document
Open Document
1016 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Enhancement the Security in Cloud Computing
Enhancement The Security in Cloud Computing

A short term proposal submitted for the registration of Ph.D. in Computer Science.

Researcher

Guide

Swami Ramanand Teerth Marathwada University
Nanded, Mahrrashtra, India

INTRODUCTION

Cloud computing provides a new computing paradigm that delivers IT as a service. The objectives of the new computing paradigm are to increase capacity and capabilities at runtime without investing in new infrastructure, licensing new software, and training new recruits. Cloud computing permits customers to utilize cloud services on the fly in pay-as-you-go manner [1,2] through the Internet.
The services provided by the cloud computing environment are: • Infrastructure as a Service (IaaS), • Data storage as a Service (DaaS), • Communication as a Service (CaaS), • Security as a Service (SecaaS), • Hardware as a Service (HaaS), • Software as a Service (SaaS), • Business as a Service (BaaS), • and Platform as a Service (PaaS).
There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.[3] In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
Security is very important to considered so in this proposal we try to elaborate and analyze the various unresolved issues in the cloud computing environment and try to propose alternative techniques which can be useful to the various architecture of controlling security in cloud computing.

AIMS:

Our aim is to exist and validate



References: [1] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia, Above the clouds: a Berkeley view of cloud computing, Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Feb. 2009. [2] R. Ranjan, A. Harwood, R. Buyya, Grid federation: an economy based distributed resource management system for large-scale resource coupling, Technical Report GRIDS-TR-2004-10, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia, 2004. [3] "Swamp Computing a.k.a. Cloud Computing". Web Security Journal. 2009-12-28. Retrieved 2010-01-25 [4] Mr.S.Subbiah et al “Enhanced Survey and proposal to secure the data in Cloud Computing Environment” International Journal Of Engineering Sciences And Technology (IJEST) January 2013 [5] Shilpashree Srinivasamurthy et al. “Survey on Cloud Computing Security”Indiana University – Purdue University Fort [6] D.Kanchana, Dr. S.Dhandapani “A Novel Method for Storage Security in Cloud Computing”. International Journal of Engineering Science and Innovative Technology (IJESIT) March 2013 Researcher

You May Also Find These Documents Helpful

  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Cis 500- Cloud Computing

    • 1078 Words
    • 5 Pages

    Technology has taken great leaps of advancement. Some of the new technology that companies and consumers are taking advantage of to store and process data is cloud computing. Cloud computing was derived from virtualization. Virtualization allows companies to separate business applications from hardware. Doing this gives the company the capability of assigning applications as needed. The option to manage applications is a great benefit to companies. Resulting from the virtualization error, cloud computing has emerged to provide flexible IT infrastructures. This has not only enhanced the options companies now have, but it is also proven to be more cost efficient. This has increasingly become a preferred method of companies and consumers alike. (Turban, & Volonino, 2011, p.47)…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Allen county is in the northern part of Indiana and a central hub to major cities. It is about three hours away from Detroit, Chicago and a couple of hours away from Indianapolis. It is a good place to raise a family because cost of living is reasonable and still accessible to major cities if needed. There are over two hundred and fifty thousand people that call Allen county home. Females make up fifty-four percent of population and males make up forty-six percent. There is diversity in population here in Allen County. In the most recent years Catholic Charities has help the Burmese people relocate to Allen County. It is a growing population that have met challenges due to a new culture and new language. Some of the other races that…

    • 214 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Powerful Essays

    Business Trend Memo

    • 1299 Words
    • 6 Pages

    Hayes, B. (2008, March), “Cloud computing”, Communications of the ACM, 51, 9-11. Retrieved from http://cacm.acm.org/magazines/2008/7/5368-cloud-computing/fulltext…

    • 1299 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Cloud Computing: Fact vs Fog

    • 9067 Words
    • 37 Pages

    News of Cloud is everywhere, and its predominance in IT is a foregone conclusion. In fact, the push to adopt Cloud has been so strong that risks inherent in this model have largely been ignored The recent economic turmoil and the promise of Cloud leading a renaissance of the tech sector are shaping the perspective and appetite for Cloud rather than the readiness of the technology itself. Cloud is a powerful tool for mobilizing data; however, there are no regulations, standards, or assurances of data protection from a technical perspective Major breaches at Google, Salesforce.com, and Amazon, have exposed the fragility of the Cloud delivery model, and the fundamental issues of data security, privacy, and standards that have yet to be addressed. Though price points gained in Cloud can be significant, businesses should weigh advantages against the hidden costs of compromised data Analyst sentiment seems to be the sole voice of reason. Principal analysts from Forrester, Gartner, and Yankee cite major security concerns with Cloud. Hackers have also highlighted the vulnerabilities of Cloud and issued a manifesto of mayhem against it (Black Hat 2009 – Clobbering the Cloud by SensePost) Assessing your organization’s readiness for Cloud should include the evaluation of hybrid models, hybrid architectures, integration constraints, and innovative data protection…

    • 9067 Words
    • 37 Pages
    Good Essays
  • Best Essays

    Cloud Computing Security Threats and Responses Farzad Sabahi Faculty of Computer Engineering Azad University Iran fsabahi@ieee.org Abstract-Cloud Hybrid clouds. A public cloud is standard model which providers make several resources, such as applications and storage, available to the public.…

    • 3527 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Cloud computing is a new name for an old concept: the delivery of computing services from a remote location, analogous to the way electricity, water, and other utilities are provided to most customers. Cloud computing services are delivered through a network, usually the Internet. Some cloud services are adaptations of familiar applications, such as e-mail and word processing. Others are new applications that never existed as a local application, such as online maps and social networks. Since 2009, the federal government has been shifting its data storage needs to cloud-based services and away from agency-owned data centers. This shift is intended to reduce the total investment by the federal government in information technology (IT) (data centers), as well as realize other stated advantages of cloud adoption: efficiency, accessibility, collaboration, rapidity of innovation, reliability, and security. In December 2010, the U.S. Chief Information Officer (CIO) released “A 25-Point Implementation Plan to Reform Federal IT Management” as part of a comprehensive effort to increase the operational efficiency of federal technology assets. One element of the 25-Point Plan is for agencies to shift to a “Cloud First” policy, which is being implemented through the Federal Cloud Computing Strategy. The Cloud First policy means that federal agencies must (1) implement cloud-based solutions whenever a secure, reliable, and cost-effective cloud option…

    • 13907 Words
    • 56 Pages
    Powerful Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cloud computing is a technology model that allows users to access and obtain delivery of information and resources over the Internet. This model generates all of the features required to support the complete cycle of constructing and delivering web-based applications. Nowadays, more and more companies are investing in the development of this powerful and valuable technology which has revolutionized the way of doing business, selling and marketing products. “It is a simple idea with great impact” that has evolution thanks to the faster and faster Internet connections, as we will discuss later on this paper.…

    • 3864 Words
    • 16 Pages
    Powerful Essays
  • Best Essays

    Cyber Security

    • 4964 Words
    • 20 Pages

    8. Jensen, M., Schwenk, J. O., Gruschka, N. and Iacono, L. L. (2009). On Technical Security Issues in Cloud Computing.…

    • 4964 Words
    • 20 Pages
    Best Essays
  • Powerful Essays

    Towards Trusted Cloud Computing Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues MPI-SWS Abstract Cloud computing infrastructures enable companies to cut costs by outsourcing computations on-demand. However, clients of cloud computing services currently have no means of verifying the confidentiality and integrity of their data and computation. To address this problem we propose the design of a trusted cloud computing platform (TCCP).…

    • 4011 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Cloud computing has recently developed as a new model for hosting and delivering services over the Internet. Since the development, the Cloud computing attracts different business owners by way of eliminating the requirement to plan in advance for IT hardware and software acquisition allowing the enterprises to start from scratch and they do not need to increase their resources but only when there is a growth in the service. Regardless of the fact that cloud computing offers huge opportunities to the IT industry and businesses, yet the development of cloud computing technology is currently in the early stages and has many issues to be addressed and researched. The purpose of this paper is to highlight the cloud computing technology pros and cons and its key concepts, from the business perspective as well as presenting all research challenges and security issues, plus identifying all important research directions in this new trend, so a better understanding of this technology will be obtained by enterprises prior to the technology adoption.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    among many firms and users owing to its economic advantages. This essentially means that the owner (client) of the…

    • 3120 Words
    • 13 Pages
    Powerful Essays

Related Topics