Cloud Computing and Its Security Issues - A Review

Size: px
Start display at page:

Download "Cloud Computing and Its Security Issues - A Review"

Transcription

1 Cloud Computing and Its Security Issues - A Review Jitender Grover 1,Shikha 2, Mohit Sharma 3 1, 2, 3 Department of Computer Science & Engineering, M. M. University, Sadopur, Ambala, India 1 jitendergrover0101@gmail.com, 2 shikha.vrgo@gmail.com, 3 mohitsharma2360@gmail.com Abstract : Cloud Computing is one of the popular techniques in distributed computing due to its ability to minimize the cost of computing when scalability and flexibility of computer process get increased. Cloud Computing provides shared resources and services via internet. Services are delivered through data center. Cloud Computing allows an interesting business proposal for IT industries to provide IT services without any extra investment. Client is able to perform heavy computer processes with low capable device (like mobile) which has resource to run the web browser. But cloud computing is crowded with many security related issues. When client saves his data to the company s cloud, there may be chance of data breaching. So the purpose of this paper is to search out various issues in cloud computing where all computing is done on the server side and both data & tasks are stored on the data centers. Keywords- Cloud Computing, IaaS, PaaS, SaaS, Types of clouds, DDOS. I. INTRODUCTION In last few years, internet becomes an important part of life. So the need of internet as well as computing is increasing very rapidly which leads to the increase in cost of hardware, software and power consumption.[1] So the new technique known as cloud computing is a beam of hope to solve these problems by giving service over the internet and cutting down the cost of hardware and software. Services offered in cloud computing has various features like high scalability, reliability, flexibility and dynamic property. User needs to increase the resources in cloud system to improve the performance of his task. Cloud computing is internet (network) based distributed computing which emerged from grid computing. [2] It is used to provide application as services over the internet (network) and hardware by using virtualization of data center or data server, where responsibility of service availability is of provider. Data center is the collection of servers where all the applications used by user are collected. For example, everyone has an id in which a user needs only an internet connection to access it. Cloud computing working is very much similar to an client. All the data of a mail can be accessed anytime and anywhere if a user has an internet connection because data is not stored on a local computer system. [3] Clients need not to worry about the maintenance and management of the resources. On the basis of this property, cloud computing is also known as utility computing or IT on demand [4]. But cloud computing has much issues about security, because all information of client is stored on server. If cloud provider wants to misuse the client information, it can do so and that means cloud is not fully safe for sharing due to the chances of information leak or theft. So this paper picks some emerging issues in respect of security, privacy and its challenges. II. CLOUD : ITS TYPES & SERVICES The cloud computing takes place when numerous computers are using services which are distributed over the network (internet) and connected to the data center (private/public). Every service is loosely attached. If one service gets failed then it will not affect the other services. Cloud computing is performed in two phase as frontend and back end. The front end is a client who gets served by those services which are provided by the back end which is the cloud system. [8] Fig 1: Cloud Computing Model Definition of cloud computing according to The National Institute of Standards and Technology (NIST) is: Cloud computing is a way of enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services)

2 that can be rapidly provisioned and released with minimal management effort or service provider interaction. [7] Wikipedia defines cloud computing as: The delivery of computing as a service rather than a product, whereby shared resources, software and information are provided to computers and other devices. Cloud computing provides computation, software, data access, and storage services that do not require enduser knowledge of the physical location and configuration of the system that delivers the services. Some bunch of users needs a separation in computing and service. So Cloud computing is divided into three types of clouds [1] [11]: Private Cloud Public Cloud Hybrid Cloud Private Cloud: The cloud is deployed by the private organization for own purpose. This type is limited to the access for a specific group. Services are design for private benefits called as private cloud that can be one house, industry cloud. Public Cloud: The cloud is implemented for general purpose where rent basis services are provided to the public. This can be accessed by any user. Charges are applied to the client on behalf of service utilization. Hybrid Cloud: The combination of the private cloud and public cloud is called hybrid cloud. This is done when private cloud needs some special service from public cloud. Software as a Service (SaaS): In this, provider provides service to user for accessing the software to develop application where software is provided on monthly rent basis. More the user used it, more he will be billed. For example goggle app software is provided for a certain time to develop application. [5] In this, a user has the least control over the cloud. Platform as a Service (PaaS): It is developed above the SaaS level and services are given to clients with access to the operating system as well as basic operating software to use software applications. It provides all the resources needed to build an application. For example for accessing database and payment services there is no need to purchase or maintain & manage the existing computing infrastructure. Like as Google App Engine allows clients to run their web applications (software that can be accessed using a web browser such as goggle chrome over the internet) [6] on Google s infrastructure. Infrastructure as a Service (IaaS): It offers an infrastructure to the client. It allows clients with the access to server hardware, storage, bandwidth and other basic needs for computing resources. For example, Amazon EC2 allows individuals and businesses to rent machines preconfigured with selected operating systems [6] to run their own applications. Figure 3 shows all the above three cloud providers in different layers with the reources managed. Each layer has its own importance to implement cloud computing which are explained as below [7]: Fig 2: Types of Clouds in Cloud Computing In cloud computing, there are three types of cloud services which give by cloud provider. These services are root execution of cloud computing. So whenever an user need to perform any processes, user able select any services those mention follow: Software as a service(saas) Platform as a service (PaaS) Infrastructure as a service (IaaS) Fig 3: Layered Architecture of Cloud Services Application Layer: Highest layer of the cloud, where request for services and resources push to the data centers. Here client use computing and perform his task which is possible by using application on cloud.

3 Platform Layer: This layer consists of operating system, application software and frameworks. The main aim of platform layer is to reduce the efforts for execution of application directly to the virtual machine. Therefore an application interfaces are used at this layer. Infrastructure Layer: The resource virtualization creates on an infrastructure layer by dividing the physical resources using virtualization tools like VMware, Xen. The dynamic resource and service allocation is also done at this layer. Thus it can be say that infrastructure layer is very important part of cloud computing. The hardware layer: This layer is responsible for arranging the physical resources of the cloud which have physical servers, routers, switches, power and cooling systems. The hardware layer is mostly applied in data centers. III. CHALLENGES IN CLOUD There are several challenges in cloud computing which are necessary to keep in knowledge and be aware about these. Some of the challenges are given as follows [9] [14]: Privileged User Access: If any sensitive data of client is accessing outside the enterprise then client needs to buy a new membership for verification otherwise the risk of data leak is increased. Availability: Some clients of cloud computing need to access the cloud services but the range of the company is not available at every time and place. Regulatory Compliance: Cloud computing provider never allows any external audits and also refuses to install new security certificates to network. Data Location: When a client uses the cloud computing then client doesn t know about the location where his data is stored. And hosted from where? Investigative Support: If any inappropriate and illegal activity takes place with client data in cloud computing then the proper investigation about this is impossible. Data segregation: In cloud computing, the data of client is available in a shared condition with other clients of cloud that is using services in parallel. Recovery: If server or data center ruined due to some natural problem or disaster, the cloud provider informs the client about the status of his data. IV. SECURITY RISK IN CLOUD Cloud computing is a way of accessing resources and service for a particular organization. But hacker, attacker and security researcher find out that cloud computing is not fully secure. It has some issues which are mentioned below [9] [13]: Insecure Interface: Cloud service provider show all the software interface and application which are used to interact with cloud by client. Data arrangement, identity management, monitor of service all happen on the cloud. And authentication and access control is monitored by these interfaces too [12]. Data Loss or Leakage: When cloud computing is being executed. There are two changes happen to the client data. Firstly, data is stored far from the client machine. Second, data is transmitted from one execution mode to multi execution mode. When these changes occur to information place the security issue of data loss or leakage. Malicious Insiders: At this time, cloud is served by organization which hires employees for providing service to its client. So those employee can misused the information or can sell information to other organization and this is happen on internal level of a company and hard to aware for clients or consumers.[2] Shared Technology: components of working under the cloud which make environment (virtual memory, processor, caches etc) for computing does not support strong isolation for multi execution mode [12]. Flood Attacks: When any customer is using the cloud computing services and he need to extend size of service and initialization is happen due to dependency on internal communication. And attacker makes large false request to the server. So server gets busy and unable to work properly. IP Spoofing: IP spoofing is known as analysis of network traffic. When any attacker send message to a computer being a trusted user. Attacker determines the IP address of a trusted system and makes some modification to packet information like packet header and sends that packet which seems as packet is originating from trusted system.[10] DDOS Attacks: In DDOS (Distributed Denial of Service) attack, attacker makes some spoofing and sends large number of requests to the server. So server gets busy and not able to response on the valid and authentic request of customer. In this way server deny for giving the service to customer and DDOS take place [10].

4 VM-Based Malware Attack: Security can be break in virtual machines by some virus or malware like VM based root kits which design to harm both entity client and server system in computing of cloud services. The root kits uses cloaking technique, means client send some message to server which take by the attacker and send to server by attacker. Same process happen when server send message to client. So this malicious code hide some system information file like registry keys, antivirus and security program. V. PRIVACY ISSUES IN CLOUD Client uses all services which are server oriented and all processes have to be complete on the server. Due to server computing, all the data of client is saved at server which can be called as data center. But some issues may be arises in the regard of privacy. Some privacy issues are explained in this paper as [1]: Loss of Control: When a client is using cloud it means he is using some applications in cloud and makes some document and project under those applications which stored on cloud. If client needs to change cloud provider then he can be threaten about manipulation or misuse of his sensitive information which he already store on the present cloud data centers. Invalid Storage: The data may be stored on an inappropriate space or secondary memory of the cloud because if authentic storage is used then cloud provider has to pay for use of storage which reduces the profit of cloud provider. So this may be a serious issue about data privacy in cloud computing. Access Control: When client saves his complete data to the server and he is not accessing it for a long time due to any reason. An unauthorized access will use that data illegally due to lack of authorized rights of access control. Data Boundary: Cloud provider makes several copies of data to provide at the location for client. Wherever this data is required by a user, it is available there for use. If any data present at the data center is not used for a long time then it deleted from data center. And multiple copies of data for servers can be cause of information leak or theft. VI. CONCLUSION Cloud computing is a way of computing which depletes the boundaries of hardware and software. Each and every resource is available as a service to the user. It means cloud computing is a long term computing which will make IT technology more successful. Computing becomes easy to use & implement because a client just needs a web browser to experience cloud computing. But when security & privacy comes into existence then so many challenges and issues appeared according to hackers, crackers and security researcher s suggestion that cloud computing is not hundred percent safe due to information can be leak at any level of cloud. So this paper tries to analyze various challenges and issues related to the security of a cloud and need to work on those issues to protect manipulation of information. VII. REFERENCES [1] Satveer Kaur and Amanpreet Singh, The Concept of Cloud Computing and Issues Regarding its Privacy and Security, International Journal of Engineering Research & Technology (IJERT), Vol. 1 Issue 3, May [2] Farzad Sabahi, Cloud Computing Security Threats and Responses, 2011 IEEE 3rd International Conference on Communication Software and Network (ICCSN), pp , May [3] Alexa Huth and James Cebula, The Basics of Cloud Computing Carnegie Mellon University. Produced for US-CERT, [4] Farhan Bashir Shaikh and Sajjad Haider, Security Threats in Cloud Computing, 6 th IEEE International Conference on Internet Technology and Secured Transactions, December, pp: , Dec [5] Kim Kwang Raymond Choo, Cloud computing: Challenges and Future Directions", Trends & Issues in Crime and Criminal Justice No. 400, Canberra: Australian Institute of Criminology, pp , October [6] Hassan Takabi, James B.D. Joshi and Gail-Joon Ahn, Security and Privacy Challenges in Cloud Computing Environments, Copublished By The IEEE Computer And Reliability Societies, Vol. 8, No. 6, pp , Dec [7] Qi Zhang, Lu Cheng, Raouf Boutaba, Cloud Computing: State-of-The-Art and Research Challenges, Journal of Internet Services and Applications, Vol. 1, No. 1, pp 7-18, April [8] Wentao Liu, Research on Cloud Computing Security Problem and Strategy, 2nd International Conference on Consumer Electronics, Communications and Networks, pp , April [9] Xiang Tana, Bo Aib, The Issues of Cloud Computing Security in High-speed Railway, IEEE International Conference on Electronic & Mechanical Engineering and Information Technology, Vol. 8, pp , August 2011.

5 [10] D. Kishore Kumar, G. Venkatewara Rao, G.Srinivasa Rao, Cloud Computing: An Analysis of Its Challenges & Security Issues, International Journal of Computer Science and Network (IJCSN), Vol. 1, No. 5, October 2012, [11] Kuyoro S. O., Ibikunle F. and Awodele O., Cloud Computing Security Issues and Challenges, International Journal of Computer Networks (IJCN), Vol. 3, No. 5, pp , [12] Ruchi Bhatnagar, Proposal of Security Schemes For Protecting Services In Cloud Computing, International Journal of Engineering Research & Technology (IJERT), Vol. 1, No. 3, May [13] Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham, Security Issues for Cloud Computing, International Journal of Information Security and Privacy, Vol. 4, No. 2, April-June [14] Naveen Dogra and Harpreet Kaur, Cloud Computing Security: Issues and Concerns, International Journal of Emerging Technology and Advanced Engineering, Vol. 3, No. 3, March 2013.

Mitigating Risks with Cloud Computing Dan Reis

Mitigating Risks with Cloud Computing Dan Reis Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution

More information

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department 1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud

More information

ISSN: (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing International Journal of Emerging Trends in Science and Technology To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing Author Preeti Ahuja Punjabi University

More information

Multi Packed Security Addressing Challenges in Cloud Computing

Multi Packed Security Addressing Challenges in Cloud Computing Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Why the cloud matters?

Why the cloud matters? Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with

More information

I. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25

I. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25 RESEARCH ARTICLE OPEN ACCESS Security Threat Issues and Countermeasures in Cloud Computing Jahangeer Qadiree [1], Trisha Arya [2] Ph.D. Scholar [1] Department Of Information Technology Aisect University,

More information

Introduction To Cloud Computing

Introduction To Cloud Computing Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

More information

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources, data and information are provided

More information

DDOS Attack Prevention Technique in Cloud

DDOS Attack Prevention Technique in Cloud DDOS Attack Prevention Technique in Cloud Priyanka Dembla, Chander Diwaker CSE Department, U.I.E.T Kurukshetra University Kurukshetra, Haryana, India Email: priyankadembla05@gmail.com Abstract Cloud computing

More information

Abstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a

Abstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a Abstract Cloud computing is the key technology widely used across most of the organizations. The main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a lot. Most

More information

Cloud Computing and Service-Oriented Architectures

Cloud Computing and Service-Oriented Architectures Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 29 - Friday March 22 2013. Cloud precursors

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

Cloud Computing and Service-Oriented Architectures

Cloud Computing and Service-Oriented Architectures Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 20 - Tuesday November 23 2010. SOA Service-oriented

More information

International Journal of Advance Engineering and Research Development. An Overview of Cloud Computing: Data Storage Protocols and Security Techniques

International Journal of Advance Engineering and Research Development. An Overview of Cloud Computing: Data Storage Protocols and Security Techniques Scientific Journal of Impact Factor (SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 2, Issue 11, November -2015 e-issn(o): 2348-4470 p-issn(p): 2348-6406 An Overview

More information

Kusum Lata, Sugandha Sharma

Kusum Lata, Sugandha Sharma International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 4 ISSN : 2456-3307 A Survey on Cloud Computing and Mobile Cloud Computing

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Vulnerability Assessment Of Personal Cloud Server

Vulnerability Assessment Of Personal Cloud Server Vulnerability Assessment Of Personal Cloud Server Dhiraj Kumar 1,Er. Kamal Ranga 2 1 Student,Department of Computer Engineering,Ganga Institute of Technology and Management Maharshi Dayanand University,Rohtak,Haryana,

More information

A Comparative Study of Various Computing Environments-Cluster, Grid and Cloud

A Comparative Study of Various Computing Environments-Cluster, Grid and Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1065

More information

Introduction to data centers

Introduction to data centers Introduction to data centers Paolo Giaccone Notes for the class on Switching technologies for data centers Politecnico di Torino December 2017 Cloud computing Section 1 Cloud computing Giaccone (Politecnico

More information

Securing Cloud Computing

Securing Cloud Computing Securing Cloud Computing NLIT Summit, May 2018 PRESENTED BY Jeffrey E. Forster jeforst@sandia.gov Lucille Forster lforste@sandia.gov Sandia National Laboratories is a multimission laboratory managed and

More information

DEEP DIVE INTO CLOUD COMPUTING

DEEP DIVE INTO CLOUD COMPUTING International Journal of Research in Engineering, Technology and Science, Volume VI, Special Issue, July 2016 www.ijrets.com, editor@ijrets.com, ISSN 2454-1915 DEEP DIVE INTO CLOUD COMPUTING Ranvir Gorai

More information

CLOUD FORENSICS : AN OVERVIEW. Kumiko Ogawa

CLOUD FORENSICS : AN OVERVIEW. Kumiko Ogawa CLOUD FORENSICS : AN OVERVIEW Kumiko Ogawa What is Cloud Forensics Forensic Science - Application of science to the criminal and civil laws that are enforced by police agencies in a criminal justice system.

More information

Introduction to Cloud Computing and Virtual Resource Management. Jian Tang Syracuse University

Introduction to Cloud Computing and Virtual Resource Management. Jian Tang Syracuse University Introduction to Cloud Computing and Virtual Resource Management Jian Tang Syracuse University 1 Outline Definition Components Why Cloud Computing Cloud Services IaaS Cloud Providers Overview of Virtual

More information

CHEM-E Process Automation and Information Systems: Applications

CHEM-E Process Automation and Information Systems: Applications CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

Introduction to Cloud Computing. [thoughtsoncloud.com] 1 Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:

More information

COMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES

COMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES COMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES Mr. Ammar Rafique**, Mr. Muhammad Waqas Anwar, Mr. Haris Shabbir, Mr. Moazzam Ali Baig, Mr. Rohail Ayaz Computer Science

More information

Spotlight Report. Information Security. Presented by. Group Partner

Spotlight Report. Information Security. Presented by. Group Partner Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in

More information

Online Editor for Compiling and Executing Different Languages Source Code

Online Editor for Compiling and Executing Different Languages Source Code Online Editor for Compiling and Executing Different Languages Source Code Ratnadip Kawale 1, Pooja Soni 2,Gaurav Suryawanshi 3 & Prof.Pradip Balbudhe 4 1 VIII Sem, B.E,.CE,Suryodaya College of Engg. &

More information

Cloud Computing Introduction & Offerings from IBM

Cloud Computing Introduction & Offerings from IBM Cloud Computing Introduction & Offerings from IBM Gytis Račiukaitis IT Architect, IBM Global Business Services Agenda What is cloud computing? Benefits Risks & Issues Thinking about moving into the cloud?

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 5th March 2015 Duration 2 Days Location Dublin Course Code SS15-13 Programme Overview Cloud Computing is gaining increasing attention

More information

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the

More information

Cloud Computing introduction

Cloud Computing introduction Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica

More information

Large Scale Computing Infrastructures

Large Scale Computing Infrastructures GC3: Grid Computing Competence Center Large Scale Computing Infrastructures Lecture 2: Cloud technologies Sergio Maffioletti GC3: Grid Computing Competence Center, University

More information

THE DATA CENTER AS A COMPUTER

THE DATA CENTER AS A COMPUTER THE DATA CENTER AS A COMPUTER Cloud Computing November- 2013 FIB-UPC Master MEI CLOUD COMPUTING It s here to stay CONTENT 1. How do we get here? 2. What is Cloud Computing? 3. Definitons and types 4. Case

More information

Third Party Cloud Services Its Adoption in the New Age

Third Party Cloud Services Its Adoption in the New Age Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals

More information

Cloud Computing Context. Image: T. Sridhar

Cloud Computing Context. Image: T. Sridhar Introduction to Cloud Computing Sunland Springs Village Computer Club March 2 nd, 2016 Mesa, AZ Presented and edited by Bob Samson, Faculty - Mesa Community College Cloud Computing We will be discussing:

More information

1/10/2011. Topics. What is the Cloud? Cloud Computing

1/10/2011. Topics. What is the Cloud? Cloud Computing Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 ISSN 81 CLOUD FORENSICS: INTRODUCTION AND CHALLENGES IN RESEARCH Prajakta N. Sonone1, Department of CSE,Government College of Engineering, Amravati, India, sonu11sonone@gmail.com Pushpanjali Chauragade2, Department

More information

Securing the Cloud Today: How do we get there?

Securing the Cloud Today: How do we get there? Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009 What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services,

More information

Data Centers and Cloud Computing

Data Centers and Cloud Computing Data Centers and Cloud Computing CS677 Guest Lecture Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Data Centers and Cloud Computing. Slides courtesy of Tim Wood

Data Centers and Cloud Computing. Slides courtesy of Tim Wood Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Security Enhancements

Security Enhancements OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows

More information

DNA Based Cryptography in Multi-Cloud: Security Strategy and Analysis

DNA Based Cryptography in Multi-Cloud: Security Strategy and Analysis 19 International Journal of Engineering Technology Science and Research DNA Based Cryptography in Multi-Cloud: Security Strategy and Analysis Dept of ISE, The National Institute of Engineering, Mysore,

More information

Security Models for Cloud

Security Models for Cloud Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer

More information

MANAGED CLOUD SERVICES

MANAGED CLOUD SERVICES JARGON BUSTERS MANAGED CLOUD SERVICES CLOUD SERVICES Any IT service that is accessed on demand via the internet rather than from your own computers and servers. PRIVATE CLOUD Services offered over the

More information

Cloud Security Myths Paul Mazzucco, Chief Security Officer

Cloud Security Myths Paul Mazzucco, Chief Security Officer Cloud Security Myths Paul Mazzucco, Chief Security Officer Discussion Points >Yesterday s standards: today s security myths >Cloud security: an ongoing mandate >Actions to take now 90% of Businesses Breached

More information

Auditing the Cloud. Paul Engle CISA, CIA

Auditing the Cloud. Paul Engle CISA, CIA Auditing the Cloud Paul Engle CISA, CIA About the Speaker Paul Engle CISA, CIA o Fifteen years performing internal audit, IT internal audit, and consulting projects o Internal audit clients include ADP,

More information

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Ezz El-Din Hemdan 1, Manjaiah D.H 2 Research Scholar, Department of Computer Science, Mangalore University,

More information

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski Rutgers University Fall 2013 December 12, 2014 2013 Paul Krzyzanowski 1 Motivation for the Cloud Self-service configuration

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

1 The intersection of IAM and the cloud

1 The intersection of IAM and the cloud 1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud

More information

The Challenge of Cloud Security

The Challenge of Cloud Security The Challenge of Cloud Security Dr. Ray Klump Chair, Mathematics & Computer Science Director, MS in Information Security Lewis University Poll Question #1: What type of cloud service are you

More information

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model Abhijit Vitthal Sathe Modern Institute of Business Management, Shivajinagar, Pune 411 005 abhijit_sathe@hotmail.com

More information

Keys to a more secure data environment

Keys to a more secure data environment Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

A Review of Hacking Method in Cloud Computing

A Review of Hacking Method in Cloud Computing A Review of Hacking Method in Cloud Computing Omid Mahnaei Bizolaikhaei 1 1 Islamic azad university science and research, Yasooj Branch, Yasooj, Iran. Abstract Cloud computing has enhanced various business

More information

Distributed System Framework for Mobile Cloud Computing

Distributed System Framework for Mobile Cloud Computing Bonfring International Journal of Research in Communication Engineering, Vol. 8, No. 1, February 2018 5 Distributed System Framework for Mobile Cloud Computing K. Arul Jothy, K. Sivakumar and M.J. Delsey

More information

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government

More information

2018 THALES DATA THREAT REPORT

2018 THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. HEALTHCARE EDITION www.thales-esecurity.com 2018 THALES DATA THREAT REPORT NOW IN ITS SIXTH YEAR SWEDEN NETHERLANDS U.S. U.K.

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

CLOUD COMPUTING. Rajesh Kumar. DevOps Architect.

CLOUD COMPUTING. Rajesh Kumar. DevOps Architect. CLOUD COMPUTING Rajesh Kumar DevOps Architect @RajeshKumarIN www.rajeshkumar.xyz www.scmgalaxy.com 1 Session Objectives This session will help you to: Introduction to Cloud Computing Cloud Computing Architecture

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform

More information

Science Computing Clouds.

Science Computing Clouds. Science Computing Clouds. December 9, 2008 Chan-Hyun Youn School of Engineering/ Grid Middleware Research Center Information and Communications University COPYRIGHT@LANS Lab, Information and Communication

More information

Moving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop

Moving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop Moving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop 10.08.2011 What is computing? Examples of service providers Computing preface Cloud computing

More information

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry SECURITY ON AWS By Max Ellsberry AWS Security Standards The IT infrastructure that AWS provides has been designed and managed in alignment with the best practices and meets a variety of standards. Below

More information

Recent Case Study on Cloud Computing and Cloud Deployment Strategies

Recent Case Study on Cloud Computing and Cloud Deployment Strategies Recent Case Study on Cloud Computing and Cloud Deployment Strategies S. Sindhu Assistant Professor, Department of Computer Applications, K.S.Rangasamy College of Arts and Science, Thiruchengode, India

More information

Kerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook

Kerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class  , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook Kerio Cloud Cloud Hosted Enterprise-Class Email, Calendars, Contacts, Tasks, and Instant Messaging Twitter LinkedIn Facebook Presented by Adam Bielawski June 15, 2016 Why Kerio? Kerio provides safe, simple,

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud?

DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud? DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing Slide 1 Slide 3 ➀ What is Cloud Computing? ➁ X as a Service ➂ Key Challenges ➃ Developing for the Cloud Why is it called Cloud? services provided

More information

Five Essential Capabilities for Airtight Cloud Security

Five Essential Capabilities for Airtight Cloud Security Five Essential Capabilities for Airtight Cloud Security SECURITY IN THE CLOUD REQUIRES NEW CAPABILITIES It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption.

More information

CLOUD COMPUTING CHALLENGES

CLOUD COMPUTING CHALLENGES CLOUD COMPUTING CHALLENGES Richa Singh 1, Shakti Bhati 2, Dr. Ajay S. Singh 3 1,2 2 Yr-B.Tech (CSE), Galgotias University,India 3 Professor, SCSE,Galgotias University,India Abstract Cloud computing can

More information

Essential Cloud Security Features in Windows Azure

Essential Cloud Security Features in Windows Azure Essential Cloud Security Features in Windows Azure Ramya Dharam 1, and Sajjan G. Shiva 2 1 Department of Computer Science, University of Memphis, Memphis, TN, USA 2 Department of Computer Science, University

More information

Network Services, Cloud Computing and Virtualization

Network Services, Cloud Computing and Virtualization Network Services, Cloud Computing and Virtualization Client Side Virtualization Purpose of virtual machines Resource requirements Emulator requirements Security requirements Network requirements Hypervisor

More information

Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at

Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design of Architecture for Efficient

More information

Privacy hacking & Data Theft

Privacy hacking & Data Theft Privacy hacking & Data Theft Cloud Computing risks & the Patricia A RoweSeale CIA, CISA, CISSP, CRISC, CRMA The IIA (Barbados Chapter) Internal Audit Portfolio Director CIBC FirstCaribbean Objectives Cloud

More information

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United

More information

CLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to

CLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to CLOUD COMPUTING In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet.

More information

A Survey on Economic Denial of Sustainability Attack Mitigation Techniques

A Survey on Economic Denial of Sustainability Attack Mitigation Techniques A Survey on Economic Denial of Sustainability Attack Mitigation Techniques Rohit Thaper 1, Amandeep Verma 2 Research Scholar, Dept. of IT, U.I.E.T., PU, Chandigarh, India 1 Assistant Professor, Dept. of

More information

HTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME DURATION

HTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME DURATION International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17, www.ijcea.com ISSN 2321-3469 HTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME

More information

Cloud Infrastructure and Operations Chapter 2B/8 Page Main concept from which Cloud Computing developed

Cloud Infrastructure and Operations Chapter 2B/8 Page Main concept from which Cloud Computing developed Cloud Infrastructure and Operations Chapter 2B/8 Page 1 Chapter 2: Cloud Layer Setup and Maintenance Topics covered: 2.1 Basic Cloud Computing Concept 2.2 Benefits of Cloud Computing 2.3 Main concept from

More information

Protecting Your Cloud

Protecting Your Cloud WHITE PAPER Protecting Your Cloud Maximize security in cloud-based solutions EXECUTIVE SUMMARY With new cloud technologies introduced daily, security remains a key focus. Hackers and phishers capable of

More information

Construction and Application of Cloud Data Center in University

Construction and Application of Cloud Data Center in University International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2014) Construction and Application of Cloud Data Center in University Hong Chai Institute of Railway Technology,

More information

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES To Secure Azure and Hybrid Cloud Environments Introduction Cloud is at the core of every successful digital transformation initiative. With cloud comes new

More information

EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]

EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC] EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC] Rajalakshmi V., Jothi Nisha V. and Dhanalakshmi S. Faculty of Computing, Sathyabama University, Chennai,

More information

Next Generation Privilege Identity Management

Next Generation Privilege Identity Management White Paper Next Generation Privilege Identity Management Nowadays enterprise IT teams are focused on adopting and supporting newer devices, applications and platforms to address business needs and keep

More information

Chapter 6 Network and Internet Security and Privacy

Chapter 6 Network and Internet Security and Privacy Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal

More information

Key words: Cloud computing, Reverse Proxy, SaaS, PaaS, IaaS and Security threats

Key words: Cloud computing, Reverse Proxy, SaaS, PaaS, IaaS and Security threats Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Service Model Specific

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

BUSINESS CONTINUITY MANAGEMENT

BUSINESS CONTINUITY MANAGEMENT BUSINESS CONTINUITY MANAGEMENT 64 th RBAP National Convention & General Membership Meeting 29 30 May 2017 PRESENTATION OUTLINE 2015 Disasters in Numbers 2016 & 2017 Top Business Risks What is BCM? Supervisory

More information

Load Balancing in Cloud Computing System

Load Balancing in Cloud Computing System Rashmi Sharma and Abhishek Kumar Department of CSE, ABES Engineering College, Ghaziabad, Uttar Pradesh, India E-mail: abhishek221196@gmail.com (Received on 10 August 2012 and accepted on 15 October 2012)

More information

SEEM3450 Engineering Innovation and Entrepreneurship

SEEM3450 Engineering Innovation and Entrepreneurship SEEM3450 Engineering Innovation and Entrepreneurship Cloud Computing Guest Lecture Gabriel Fung, Ph.D. 2017-10-26 What is Cloud Computing? According to NIST (National Institute of Standards and Technology)

More information

The Oracle Trust Fabric Securing the Cloud Journey

The Oracle Trust Fabric Securing the Cloud Journey The Oracle Trust Fabric Securing the Cloud Journey Eric Olden Senior Vice President and General Manager Cloud Security and Identity 05.07.2018 Safe Harbor Statement The following is intended to outline

More information

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter How your network can take on the cloud and win Think beyond traditional networking toward a secure digital perimeter Contents Introduction... 3 Reduce risk points with secure, contextualized access...

More information

What Dropbox Can t Do For Your Business

What Dropbox Can t Do For Your Business What Dropbox Can t Do For Your Business 33 Things to Consider When Choosing a Secure File Sharing and Collaboration Service for Your Business A Soonr White Paper Executive Summary The need for a well-rounded

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

Twilio cloud communications SECURITY

Twilio cloud communications SECURITY WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and

More information

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Why Are We Here? Expanded Enterprise Data access anywhere, anytime

More information

A Review on Reliability Issues in Cloud Service

A Review on Reliability Issues in Cloud Service A Review on Reliability Issues in Cloud Service Gurpreet Kaur Department of CSE, Bhai Gurdas Institute of Engineering and Technology, India Rajesh Kumar, Assistant Professor Department of CSE, Bhai Gurdas

More information

Cloud Computing An IT Paradigm Changer

Cloud Computing An IT Paradigm Changer Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App

More information