Cloud Computing and Its Security Issues - A Review
|
|
- Helena Sparks
- 6 years ago
- Views:
Transcription
1 Cloud Computing and Its Security Issues - A Review Jitender Grover 1,Shikha 2, Mohit Sharma 3 1, 2, 3 Department of Computer Science & Engineering, M. M. University, Sadopur, Ambala, India 1 jitendergrover0101@gmail.com, 2 shikha.vrgo@gmail.com, 3 mohitsharma2360@gmail.com Abstract : Cloud Computing is one of the popular techniques in distributed computing due to its ability to minimize the cost of computing when scalability and flexibility of computer process get increased. Cloud Computing provides shared resources and services via internet. Services are delivered through data center. Cloud Computing allows an interesting business proposal for IT industries to provide IT services without any extra investment. Client is able to perform heavy computer processes with low capable device (like mobile) which has resource to run the web browser. But cloud computing is crowded with many security related issues. When client saves his data to the company s cloud, there may be chance of data breaching. So the purpose of this paper is to search out various issues in cloud computing where all computing is done on the server side and both data & tasks are stored on the data centers. Keywords- Cloud Computing, IaaS, PaaS, SaaS, Types of clouds, DDOS. I. INTRODUCTION In last few years, internet becomes an important part of life. So the need of internet as well as computing is increasing very rapidly which leads to the increase in cost of hardware, software and power consumption.[1] So the new technique known as cloud computing is a beam of hope to solve these problems by giving service over the internet and cutting down the cost of hardware and software. Services offered in cloud computing has various features like high scalability, reliability, flexibility and dynamic property. User needs to increase the resources in cloud system to improve the performance of his task. Cloud computing is internet (network) based distributed computing which emerged from grid computing. [2] It is used to provide application as services over the internet (network) and hardware by using virtualization of data center or data server, where responsibility of service availability is of provider. Data center is the collection of servers where all the applications used by user are collected. For example, everyone has an id in which a user needs only an internet connection to access it. Cloud computing working is very much similar to an client. All the data of a mail can be accessed anytime and anywhere if a user has an internet connection because data is not stored on a local computer system. [3] Clients need not to worry about the maintenance and management of the resources. On the basis of this property, cloud computing is also known as utility computing or IT on demand [4]. But cloud computing has much issues about security, because all information of client is stored on server. If cloud provider wants to misuse the client information, it can do so and that means cloud is not fully safe for sharing due to the chances of information leak or theft. So this paper picks some emerging issues in respect of security, privacy and its challenges. II. CLOUD : ITS TYPES & SERVICES The cloud computing takes place when numerous computers are using services which are distributed over the network (internet) and connected to the data center (private/public). Every service is loosely attached. If one service gets failed then it will not affect the other services. Cloud computing is performed in two phase as frontend and back end. The front end is a client who gets served by those services which are provided by the back end which is the cloud system. [8] Fig 1: Cloud Computing Model Definition of cloud computing according to The National Institute of Standards and Technology (NIST) is: Cloud computing is a way of enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services)
2 that can be rapidly provisioned and released with minimal management effort or service provider interaction. [7] Wikipedia defines cloud computing as: The delivery of computing as a service rather than a product, whereby shared resources, software and information are provided to computers and other devices. Cloud computing provides computation, software, data access, and storage services that do not require enduser knowledge of the physical location and configuration of the system that delivers the services. Some bunch of users needs a separation in computing and service. So Cloud computing is divided into three types of clouds [1] [11]: Private Cloud Public Cloud Hybrid Cloud Private Cloud: The cloud is deployed by the private organization for own purpose. This type is limited to the access for a specific group. Services are design for private benefits called as private cloud that can be one house, industry cloud. Public Cloud: The cloud is implemented for general purpose where rent basis services are provided to the public. This can be accessed by any user. Charges are applied to the client on behalf of service utilization. Hybrid Cloud: The combination of the private cloud and public cloud is called hybrid cloud. This is done when private cloud needs some special service from public cloud. Software as a Service (SaaS): In this, provider provides service to user for accessing the software to develop application where software is provided on monthly rent basis. More the user used it, more he will be billed. For example goggle app software is provided for a certain time to develop application. [5] In this, a user has the least control over the cloud. Platform as a Service (PaaS): It is developed above the SaaS level and services are given to clients with access to the operating system as well as basic operating software to use software applications. It provides all the resources needed to build an application. For example for accessing database and payment services there is no need to purchase or maintain & manage the existing computing infrastructure. Like as Google App Engine allows clients to run their web applications (software that can be accessed using a web browser such as goggle chrome over the internet) [6] on Google s infrastructure. Infrastructure as a Service (IaaS): It offers an infrastructure to the client. It allows clients with the access to server hardware, storage, bandwidth and other basic needs for computing resources. For example, Amazon EC2 allows individuals and businesses to rent machines preconfigured with selected operating systems [6] to run their own applications. Figure 3 shows all the above three cloud providers in different layers with the reources managed. Each layer has its own importance to implement cloud computing which are explained as below [7]: Fig 2: Types of Clouds in Cloud Computing In cloud computing, there are three types of cloud services which give by cloud provider. These services are root execution of cloud computing. So whenever an user need to perform any processes, user able select any services those mention follow: Software as a service(saas) Platform as a service (PaaS) Infrastructure as a service (IaaS) Fig 3: Layered Architecture of Cloud Services Application Layer: Highest layer of the cloud, where request for services and resources push to the data centers. Here client use computing and perform his task which is possible by using application on cloud.
3 Platform Layer: This layer consists of operating system, application software and frameworks. The main aim of platform layer is to reduce the efforts for execution of application directly to the virtual machine. Therefore an application interfaces are used at this layer. Infrastructure Layer: The resource virtualization creates on an infrastructure layer by dividing the physical resources using virtualization tools like VMware, Xen. The dynamic resource and service allocation is also done at this layer. Thus it can be say that infrastructure layer is very important part of cloud computing. The hardware layer: This layer is responsible for arranging the physical resources of the cloud which have physical servers, routers, switches, power and cooling systems. The hardware layer is mostly applied in data centers. III. CHALLENGES IN CLOUD There are several challenges in cloud computing which are necessary to keep in knowledge and be aware about these. Some of the challenges are given as follows [9] [14]: Privileged User Access: If any sensitive data of client is accessing outside the enterprise then client needs to buy a new membership for verification otherwise the risk of data leak is increased. Availability: Some clients of cloud computing need to access the cloud services but the range of the company is not available at every time and place. Regulatory Compliance: Cloud computing provider never allows any external audits and also refuses to install new security certificates to network. Data Location: When a client uses the cloud computing then client doesn t know about the location where his data is stored. And hosted from where? Investigative Support: If any inappropriate and illegal activity takes place with client data in cloud computing then the proper investigation about this is impossible. Data segregation: In cloud computing, the data of client is available in a shared condition with other clients of cloud that is using services in parallel. Recovery: If server or data center ruined due to some natural problem or disaster, the cloud provider informs the client about the status of his data. IV. SECURITY RISK IN CLOUD Cloud computing is a way of accessing resources and service for a particular organization. But hacker, attacker and security researcher find out that cloud computing is not fully secure. It has some issues which are mentioned below [9] [13]: Insecure Interface: Cloud service provider show all the software interface and application which are used to interact with cloud by client. Data arrangement, identity management, monitor of service all happen on the cloud. And authentication and access control is monitored by these interfaces too [12]. Data Loss or Leakage: When cloud computing is being executed. There are two changes happen to the client data. Firstly, data is stored far from the client machine. Second, data is transmitted from one execution mode to multi execution mode. When these changes occur to information place the security issue of data loss or leakage. Malicious Insiders: At this time, cloud is served by organization which hires employees for providing service to its client. So those employee can misused the information or can sell information to other organization and this is happen on internal level of a company and hard to aware for clients or consumers.[2] Shared Technology: components of working under the cloud which make environment (virtual memory, processor, caches etc) for computing does not support strong isolation for multi execution mode [12]. Flood Attacks: When any customer is using the cloud computing services and he need to extend size of service and initialization is happen due to dependency on internal communication. And attacker makes large false request to the server. So server gets busy and unable to work properly. IP Spoofing: IP spoofing is known as analysis of network traffic. When any attacker send message to a computer being a trusted user. Attacker determines the IP address of a trusted system and makes some modification to packet information like packet header and sends that packet which seems as packet is originating from trusted system.[10] DDOS Attacks: In DDOS (Distributed Denial of Service) attack, attacker makes some spoofing and sends large number of requests to the server. So server gets busy and not able to response on the valid and authentic request of customer. In this way server deny for giving the service to customer and DDOS take place [10].
4 VM-Based Malware Attack: Security can be break in virtual machines by some virus or malware like VM based root kits which design to harm both entity client and server system in computing of cloud services. The root kits uses cloaking technique, means client send some message to server which take by the attacker and send to server by attacker. Same process happen when server send message to client. So this malicious code hide some system information file like registry keys, antivirus and security program. V. PRIVACY ISSUES IN CLOUD Client uses all services which are server oriented and all processes have to be complete on the server. Due to server computing, all the data of client is saved at server which can be called as data center. But some issues may be arises in the regard of privacy. Some privacy issues are explained in this paper as [1]: Loss of Control: When a client is using cloud it means he is using some applications in cloud and makes some document and project under those applications which stored on cloud. If client needs to change cloud provider then he can be threaten about manipulation or misuse of his sensitive information which he already store on the present cloud data centers. Invalid Storage: The data may be stored on an inappropriate space or secondary memory of the cloud because if authentic storage is used then cloud provider has to pay for use of storage which reduces the profit of cloud provider. So this may be a serious issue about data privacy in cloud computing. Access Control: When client saves his complete data to the server and he is not accessing it for a long time due to any reason. An unauthorized access will use that data illegally due to lack of authorized rights of access control. Data Boundary: Cloud provider makes several copies of data to provide at the location for client. Wherever this data is required by a user, it is available there for use. If any data present at the data center is not used for a long time then it deleted from data center. And multiple copies of data for servers can be cause of information leak or theft. VI. CONCLUSION Cloud computing is a way of computing which depletes the boundaries of hardware and software. Each and every resource is available as a service to the user. It means cloud computing is a long term computing which will make IT technology more successful. Computing becomes easy to use & implement because a client just needs a web browser to experience cloud computing. But when security & privacy comes into existence then so many challenges and issues appeared according to hackers, crackers and security researcher s suggestion that cloud computing is not hundred percent safe due to information can be leak at any level of cloud. So this paper tries to analyze various challenges and issues related to the security of a cloud and need to work on those issues to protect manipulation of information. VII. REFERENCES [1] Satveer Kaur and Amanpreet Singh, The Concept of Cloud Computing and Issues Regarding its Privacy and Security, International Journal of Engineering Research & Technology (IJERT), Vol. 1 Issue 3, May [2] Farzad Sabahi, Cloud Computing Security Threats and Responses, 2011 IEEE 3rd International Conference on Communication Software and Network (ICCSN), pp , May [3] Alexa Huth and James Cebula, The Basics of Cloud Computing Carnegie Mellon University. Produced for US-CERT, [4] Farhan Bashir Shaikh and Sajjad Haider, Security Threats in Cloud Computing, 6 th IEEE International Conference on Internet Technology and Secured Transactions, December, pp: , Dec [5] Kim Kwang Raymond Choo, Cloud computing: Challenges and Future Directions", Trends & Issues in Crime and Criminal Justice No. 400, Canberra: Australian Institute of Criminology, pp , October [6] Hassan Takabi, James B.D. Joshi and Gail-Joon Ahn, Security and Privacy Challenges in Cloud Computing Environments, Copublished By The IEEE Computer And Reliability Societies, Vol. 8, No. 6, pp , Dec [7] Qi Zhang, Lu Cheng, Raouf Boutaba, Cloud Computing: State-of-The-Art and Research Challenges, Journal of Internet Services and Applications, Vol. 1, No. 1, pp 7-18, April [8] Wentao Liu, Research on Cloud Computing Security Problem and Strategy, 2nd International Conference on Consumer Electronics, Communications and Networks, pp , April [9] Xiang Tana, Bo Aib, The Issues of Cloud Computing Security in High-speed Railway, IEEE International Conference on Electronic & Mechanical Engineering and Information Technology, Vol. 8, pp , August 2011.
5 [10] D. Kishore Kumar, G. Venkatewara Rao, G.Srinivasa Rao, Cloud Computing: An Analysis of Its Challenges & Security Issues, International Journal of Computer Science and Network (IJCSN), Vol. 1, No. 5, October 2012, [11] Kuyoro S. O., Ibikunle F. and Awodele O., Cloud Computing Security Issues and Challenges, International Journal of Computer Networks (IJCN), Vol. 3, No. 5, pp , [12] Ruchi Bhatnagar, Proposal of Security Schemes For Protecting Services In Cloud Computing, International Journal of Engineering Research & Technology (IJERT), Vol. 1, No. 3, May [13] Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham, Security Issues for Cloud Computing, International Journal of Information Security and Privacy, Vol. 4, No. 2, April-June [14] Naveen Dogra and Harpreet Kaur, Cloud Computing Security: Issues and Concerns, International Journal of Emerging Technology and Advanced Engineering, Vol. 3, No. 3, March 2013.
Mitigating Risks with Cloud Computing Dan Reis
Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution
More informationCLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department
1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud
More informationISSN: (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationTo Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing
International Journal of Emerging Trends in Science and Technology To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing Author Preeti Ahuja Punjabi University
More informationMulti Packed Security Addressing Challenges in Cloud Computing
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationI. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25
RESEARCH ARTICLE OPEN ACCESS Security Threat Issues and Countermeasures in Cloud Computing Jahangeer Qadiree [1], Trisha Arya [2] Ph.D. Scholar [1] Department Of Information Technology Aisect University,
More informationIntroduction To Cloud Computing
Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
More informationIn this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,
In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources, data and information are provided
More informationDDOS Attack Prevention Technique in Cloud
DDOS Attack Prevention Technique in Cloud Priyanka Dembla, Chander Diwaker CSE Department, U.I.E.T Kurukshetra University Kurukshetra, Haryana, India Email: priyankadembla05@gmail.com Abstract Cloud computing
More informationAbstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a
Abstract Cloud computing is the key technology widely used across most of the organizations. The main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a lot. Most
More informationCloud Computing and Service-Oriented Architectures
Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 29 - Friday March 22 2013. Cloud precursors
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationCloud Computing and Service-Oriented Architectures
Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 20 - Tuesday November 23 2010. SOA Service-oriented
More informationInternational Journal of Advance Engineering and Research Development. An Overview of Cloud Computing: Data Storage Protocols and Security Techniques
Scientific Journal of Impact Factor (SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 2, Issue 11, November -2015 e-issn(o): 2348-4470 p-issn(p): 2348-6406 An Overview
More informationKusum Lata, Sugandha Sharma
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 4 ISSN : 2456-3307 A Survey on Cloud Computing and Mobile Cloud Computing
More informationEFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationVulnerability Assessment Of Personal Cloud Server
Vulnerability Assessment Of Personal Cloud Server Dhiraj Kumar 1,Er. Kamal Ranga 2 1 Student,Department of Computer Engineering,Ganga Institute of Technology and Management Maharshi Dayanand University,Rohtak,Haryana,
More informationA Comparative Study of Various Computing Environments-Cluster, Grid and Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1065
More informationIntroduction to data centers
Introduction to data centers Paolo Giaccone Notes for the class on Switching technologies for data centers Politecnico di Torino December 2017 Cloud computing Section 1 Cloud computing Giaccone (Politecnico
More informationSecuring Cloud Computing
Securing Cloud Computing NLIT Summit, May 2018 PRESENTED BY Jeffrey E. Forster jeforst@sandia.gov Lucille Forster lforste@sandia.gov Sandia National Laboratories is a multimission laboratory managed and
More informationDEEP DIVE INTO CLOUD COMPUTING
International Journal of Research in Engineering, Technology and Science, Volume VI, Special Issue, July 2016 www.ijrets.com, editor@ijrets.com, ISSN 2454-1915 DEEP DIVE INTO CLOUD COMPUTING Ranvir Gorai
More informationCLOUD FORENSICS : AN OVERVIEW. Kumiko Ogawa
CLOUD FORENSICS : AN OVERVIEW Kumiko Ogawa What is Cloud Forensics Forensic Science - Application of science to the criminal and civil laws that are enforced by police agencies in a criminal justice system.
More informationIntroduction to Cloud Computing and Virtual Resource Management. Jian Tang Syracuse University
Introduction to Cloud Computing and Virtual Resource Management Jian Tang Syracuse University 1 Outline Definition Components Why Cloud Computing Cloud Services IaaS Cloud Providers Overview of Virtual
More informationCHEM-E Process Automation and Information Systems: Applications
CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationIntroduction to Cloud Computing. [thoughtsoncloud.com] 1
Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:
More informationCOMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES
COMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES Mr. Ammar Rafique**, Mr. Muhammad Waqas Anwar, Mr. Haris Shabbir, Mr. Moazzam Ali Baig, Mr. Rohail Ayaz Computer Science
More informationSpotlight Report. Information Security. Presented by. Group Partner
Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in
More informationOnline Editor for Compiling and Executing Different Languages Source Code
Online Editor for Compiling and Executing Different Languages Source Code Ratnadip Kawale 1, Pooja Soni 2,Gaurav Suryawanshi 3 & Prof.Pradip Balbudhe 4 1 VIII Sem, B.E,.CE,Suryodaya College of Engg. &
More informationCloud Computing Introduction & Offerings from IBM
Cloud Computing Introduction & Offerings from IBM Gytis Račiukaitis IT Architect, IBM Global Business Services Agenda What is cloud computing? Benefits Risks & Issues Thinking about moving into the cloud?
More informationCloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 5th March 2015 Duration 2 Days Location Dublin Course Code SS15-13 Programme Overview Cloud Computing is gaining increasing attention
More informationWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the
More informationCloud Computing introduction
Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica
More informationLarge Scale Computing Infrastructures
GC3: Grid Computing Competence Center Large Scale Computing Infrastructures Lecture 2: Cloud technologies Sergio Maffioletti GC3: Grid Computing Competence Center, University
More informationTHE DATA CENTER AS A COMPUTER
THE DATA CENTER AS A COMPUTER Cloud Computing November- 2013 FIB-UPC Master MEI CLOUD COMPUTING It s here to stay CONTENT 1. How do we get here? 2. What is Cloud Computing? 3. Definitons and types 4. Case
More informationThird Party Cloud Services Its Adoption in the New Age
Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals
More informationCloud Computing Context. Image: T. Sridhar
Introduction to Cloud Computing Sunland Springs Village Computer Club March 2 nd, 2016 Mesa, AZ Presented and edited by Bob Samson, Faculty - Mesa Community College Cloud Computing We will be discussing:
More information1/10/2011. Topics. What is the Cloud? Cloud Computing
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 ISSN
81 CLOUD FORENSICS: INTRODUCTION AND CHALLENGES IN RESEARCH Prajakta N. Sonone1, Department of CSE,Government College of Engineering, Amravati, India, sonu11sonone@gmail.com Pushpanjali Chauragade2, Department
More informationSecuring the Cloud Today: How do we get there?
Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009 What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services,
More informationData Centers and Cloud Computing
Data Centers and Cloud Computing CS677 Guest Lecture Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationData Centers and Cloud Computing. Slides courtesy of Tim Wood
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationSecurity Enhancements
OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows
More informationDNA Based Cryptography in Multi-Cloud: Security Strategy and Analysis
19 International Journal of Engineering Technology Science and Research DNA Based Cryptography in Multi-Cloud: Security Strategy and Analysis Dept of ISE, The National Institute of Engineering, Mysore,
More informationSecurity Models for Cloud
Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer
More informationMANAGED CLOUD SERVICES
JARGON BUSTERS MANAGED CLOUD SERVICES CLOUD SERVICES Any IT service that is accessed on demand via the internet rather than from your own computers and servers. PRIVATE CLOUD Services offered over the
More informationCloud Security Myths Paul Mazzucco, Chief Security Officer
Cloud Security Myths Paul Mazzucco, Chief Security Officer Discussion Points >Yesterday s standards: today s security myths >Cloud security: an ongoing mandate >Actions to take now 90% of Businesses Breached
More informationAuditing the Cloud. Paul Engle CISA, CIA
Auditing the Cloud Paul Engle CISA, CIA About the Speaker Paul Engle CISA, CIA o Fifteen years performing internal audit, IT internal audit, and consulting projects o Internal audit clients include ADP,
More informationForensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud
Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Ezz El-Din Hemdan 1, Manjaiah D.H 2 Research Scholar, Department of Computer Science, Mangalore University,
More informationDistributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski Rutgers University Fall 2013 December 12, 2014 2013 Paul Krzyzanowski 1 Motivation for the Cloud Self-service configuration
More informationData Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More information1 The intersection of IAM and the cloud
1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud
More informationThe Challenge of Cloud Security
The Challenge of Cloud Security Dr. Ray Klump Chair, Mathematics & Computer Science Director, MS in Information Security Lewis University Poll Question #1: What type of cloud service are you
More informationManagement of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model
Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model Abhijit Vitthal Sathe Modern Institute of Business Management, Shivajinagar, Pune 411 005 abhijit_sathe@hotmail.com
More informationKeys to a more secure data environment
Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting
More informationSAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2
APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,
More informationA Review of Hacking Method in Cloud Computing
A Review of Hacking Method in Cloud Computing Omid Mahnaei Bizolaikhaei 1 1 Islamic azad university science and research, Yasooj Branch, Yasooj, Iran. Abstract Cloud computing has enhanced various business
More informationDistributed System Framework for Mobile Cloud Computing
Bonfring International Journal of Research in Communication Engineering, Vol. 8, No. 1, February 2018 5 Distributed System Framework for Mobile Cloud Computing K. Arul Jothy, K. Sivakumar and M.J. Delsey
More informationData Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle
Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government
More information2018 THALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. HEALTHCARE EDITION www.thales-esecurity.com 2018 THALES DATA THREAT REPORT NOW IN ITS SIXTH YEAR SWEDEN NETHERLANDS U.S. U.K.
More informationThreat Modeling. Bart De Win Secure Application Development Course, Credits to
Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,
More informationCLOUD COMPUTING. Rajesh Kumar. DevOps Architect.
CLOUD COMPUTING Rajesh Kumar DevOps Architect @RajeshKumarIN www.rajeshkumar.xyz www.scmgalaxy.com 1 Session Objectives This session will help you to: Introduction to Cloud Computing Cloud Computing Architecture
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform
More informationScience Computing Clouds.
Science Computing Clouds. December 9, 2008 Chan-Hyun Youn School of Engineering/ Grid Middleware Research Center Information and Communications University COPYRIGHT@LANS Lab, Information and Communication
More informationMoving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop
Moving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop 10.08.2011 What is computing? Examples of service providers Computing preface Cloud computing
More informationSECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry
SECURITY ON AWS By Max Ellsberry AWS Security Standards The IT infrastructure that AWS provides has been designed and managed in alignment with the best practices and meets a variety of standards. Below
More informationRecent Case Study on Cloud Computing and Cloud Deployment Strategies
Recent Case Study on Cloud Computing and Cloud Deployment Strategies S. Sindhu Assistant Professor, Department of Computer Applications, K.S.Rangasamy College of Arts and Science, Thiruchengode, India
More informationKerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook
Kerio Cloud Cloud Hosted Enterprise-Class Email, Calendars, Contacts, Tasks, and Instant Messaging Twitter LinkedIn Facebook Presented by Adam Bielawski June 15, 2016 Why Kerio? Kerio provides safe, simple,
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud?
DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing Slide 1 Slide 3 ➀ What is Cloud Computing? ➁ X as a Service ➂ Key Challenges ➃ Developing for the Cloud Why is it called Cloud? services provided
More informationFive Essential Capabilities for Airtight Cloud Security
Five Essential Capabilities for Airtight Cloud Security SECURITY IN THE CLOUD REQUIRES NEW CAPABILITIES It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption.
More informationCLOUD COMPUTING CHALLENGES
CLOUD COMPUTING CHALLENGES Richa Singh 1, Shakti Bhati 2, Dr. Ajay S. Singh 3 1,2 2 Yr-B.Tech (CSE), Galgotias University,India 3 Professor, SCSE,Galgotias University,India Abstract Cloud computing can
More informationEssential Cloud Security Features in Windows Azure
Essential Cloud Security Features in Windows Azure Ramya Dharam 1, and Sajjan G. Shiva 2 1 Department of Computer Science, University of Memphis, Memphis, TN, USA 2 Department of Computer Science, University
More informationNetwork Services, Cloud Computing and Virtualization
Network Services, Cloud Computing and Virtualization Client Side Virtualization Purpose of virtual machines Resource requirements Emulator requirements Security requirements Network requirements Hypervisor
More informationVolume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at
Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design of Architecture for Efficient
More informationPrivacy hacking & Data Theft
Privacy hacking & Data Theft Cloud Computing risks & the Patricia A RoweSeale CIA, CISA, CISSP, CRISC, CRMA The IIA (Barbados Chapter) Internal Audit Portfolio Director CIBC FirstCaribbean Objectives Cloud
More informationThree Levels of Access Control to Personal Health Records in a Healthcare Cloud
Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United
More informationCLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to
CLOUD COMPUTING In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet.
More informationA Survey on Economic Denial of Sustainability Attack Mitigation Techniques
A Survey on Economic Denial of Sustainability Attack Mitigation Techniques Rohit Thaper 1, Amandeep Verma 2 Research Scholar, Dept. of IT, U.I.E.T., PU, Chandigarh, India 1 Assistant Professor, Dept. of
More informationHTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME DURATION
International Journal of Computer Engineering and Applications, Volume XI, Issue III, March 17, www.ijcea.com ISSN 2321-3469 HTTP BASED BOT-NET DETECTION TECHNIQUE USING APRIORI ALGORITHM WITH ACTUAL TIME
More informationCloud Infrastructure and Operations Chapter 2B/8 Page Main concept from which Cloud Computing developed
Cloud Infrastructure and Operations Chapter 2B/8 Page 1 Chapter 2: Cloud Layer Setup and Maintenance Topics covered: 2.1 Basic Cloud Computing Concept 2.2 Benefits of Cloud Computing 2.3 Main concept from
More informationProtecting Your Cloud
WHITE PAPER Protecting Your Cloud Maximize security in cloud-based solutions EXECUTIVE SUMMARY With new cloud technologies introduced daily, security remains a key focus. Hackers and phishers capable of
More informationConstruction and Application of Cloud Data Center in University
International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2014) Construction and Application of Cloud Data Center in University Hong Chai Institute of Railway Technology,
More informationAZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments
AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES To Secure Azure and Hybrid Cloud Environments Introduction Cloud is at the core of every successful digital transformation initiative. With cloud comes new
More informationEFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]
EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC] Rajalakshmi V., Jothi Nisha V. and Dhanalakshmi S. Faculty of Computing, Sathyabama University, Chennai,
More informationNext Generation Privilege Identity Management
White Paper Next Generation Privilege Identity Management Nowadays enterprise IT teams are focused on adopting and supporting newer devices, applications and platforms to address business needs and keep
More informationChapter 6 Network and Internet Security and Privacy
Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal
More informationKey words: Cloud computing, Reverse Proxy, SaaS, PaaS, IaaS and Security threats
Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Service Model Specific
More informationQuestion 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:
Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,
More informationBUSINESS CONTINUITY MANAGEMENT
BUSINESS CONTINUITY MANAGEMENT 64 th RBAP National Convention & General Membership Meeting 29 30 May 2017 PRESENTATION OUTLINE 2015 Disasters in Numbers 2016 & 2017 Top Business Risks What is BCM? Supervisory
More informationLoad Balancing in Cloud Computing System
Rashmi Sharma and Abhishek Kumar Department of CSE, ABES Engineering College, Ghaziabad, Uttar Pradesh, India E-mail: abhishek221196@gmail.com (Received on 10 August 2012 and accepted on 15 October 2012)
More informationSEEM3450 Engineering Innovation and Entrepreneurship
SEEM3450 Engineering Innovation and Entrepreneurship Cloud Computing Guest Lecture Gabriel Fung, Ph.D. 2017-10-26 What is Cloud Computing? According to NIST (National Institute of Standards and Technology)
More informationThe Oracle Trust Fabric Securing the Cloud Journey
The Oracle Trust Fabric Securing the Cloud Journey Eric Olden Senior Vice President and General Manager Cloud Security and Identity 05.07.2018 Safe Harbor Statement The following is intended to outline
More informationHow your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter
How your network can take on the cloud and win Think beyond traditional networking toward a secure digital perimeter Contents Introduction... 3 Reduce risk points with secure, contextualized access...
More informationWhat Dropbox Can t Do For Your Business
What Dropbox Can t Do For Your Business 33 Things to Consider When Choosing a Secure File Sharing and Collaboration Service for Your Business A Soonr White Paper Executive Summary The need for a well-rounded
More informationINFS 214: Introduction to Computing
INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing
More informationTwilio cloud communications SECURITY
WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and
More informationBuilding a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.
Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Why Are We Here? Expanded Enterprise Data access anywhere, anytime
More informationA Review on Reliability Issues in Cloud Service
A Review on Reliability Issues in Cloud Service Gurpreet Kaur Department of CSE, Bhai Gurdas Institute of Engineering and Technology, India Rajesh Kumar, Assistant Professor Department of CSE, Bhai Gurdas
More informationCloud Computing An IT Paradigm Changer
Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App
More information