The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service. Virtualization alters the relationship between the OS and underlying hardware - be it computing, storage or even networking. This introduces an additional layer -
According to Prasad, Gyani and Murti (2012), “Cloud computing can be defined as a new style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet” (p.7). This statement is from five years ago, and although cloud computing is no longer considered new, this definition still describes what cloud computing means today. Cloud computing being private or public is becoming more primordial in the IT sector due to the numerous advantages it gives to its end users (Basmadjian et al. 2012). Since the interest in cloud computing keeps on increasing, efforts need to continue to evaluate current trends in security and privacy. Cloud computing
In this paper, the authors survey many sources and literature on cloud security issues, namely vulnerabilities, threats, and attacks. A total of 504 articles were look at to gather the data used in this paper. While the authors use this number to say that the research trend is up on mitigating security risks, they also suggest that security is the main priority of most research to the detriment of other areas. They offer no concrete numbers to back up this claim..
The cloud computing has more security threats from the cyber hackers, to avoid the cyber-attacks on the cloud the organization must take concerning the cloud security problems like privacy, trust, authentication, data loss. Though the cloud anyone can access the computing technology and the storage of data from the network, as it used for the network cause
This section of paper includes why we need cloud computing as a security control tool against the cyber criminal activities and in how many ways it can be implemented. As we are living in a technical era, many aspects of our lives rely on the Internet and computers, including transportation, communications, government, medicine, finance and education. Consider how much of our personal information is stored either on our own computer or on someone else’s system.
Cloud technologies revolve heavily around virtual machines that reside on physical servers (Talbot, 2009). One physical server could be the home of a slew of virtual machines; should an attacker interrupt the normal operations of a physical server it could result in the inoperability of the virtual machines also. One of the techniques can be used is an attacker implanting a virtual machine on a physical server (Talbot, 2009). Once the
Cloud Computing has many threats which are disturbing gigantic acceptance of cloud. Major threats that affect data integrity and privacy in cloud storage. In order to reduce this type of threats in cloud many researches are going on.
Considering both the gains and harms related to the cloud world, Cloud Security Alliance(CSA) has set some cloud security standards throughout the industry. The report “Treacherous 12 - Top Threats” is an important research artifact done by the CSA. Though there are
Cloud computing infrastructure is based on the client server architecture and is thus subjected to threats that standard service infrastructure is, such as XSS, SQL Injection, machine code injection etc. But some attacks are specific just to the cloud based infrastructure,
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Despite the growth in cloud computing, many enterprises adopted the model, several security issues raise severe concerns about the performance which requires us to cast a wider net to find practical solutions to cloud security that work with technology that is available today. Various techniques need to be used making cloud computing secure and it will improve service delivery. The major concern is how to protect data from illegal access by hackers. The goal of this research is to help in educating organizations and individuals on how to protect themselves from hackers. Developing counter-measures can help in ensuring the safety of data in cloud computing. This will mean more organizations will trust cloud computing companies. Key areas for security concerns are (1) Data in server/rest, (2) data in transit, (3) authentication, (4) separation between customers, (5) cloud legal and regulatory issues and (6) incident response.
Another solution that has been studied is Virtual Machine Introspection (VMI) based technique (Amna Riaz 2017). Virtual machine introspection (VMI) is the main idea behind out-of-box intrusion detection. VMI is a technique of inspecting VM state by moving the inspection module outside of the VM. The software running inside the guest system is analysed externally to detect any intrusion. One advantage of this technique is that malware detection continues to work unaffectedly even in the
Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security [1]. With the extensive use of virtualization technologies combined with self-service potentialities cloud service providers are providing services to their customers through the Internet. In these service provider surroundingses, virtual machines from different multiple organizations have to be co-located on the same physical server in order to optimally maximize the effectiveness and efficiencies of virtualization. Cloud service
Introduction: With the latest developments in the area of could based computing have completely transformed the way of computing and the resources of computing. In the environment of cloud computing, the various resources are frequently present in a network of someone else and accessed by the cloud based users remotely. Processing is completed remotely. The data need to be transmitted from a person to server or the cloud based infrastructure for processing and the output is returned when required processing finished. Security is an important aspect of safer computing . In today’s world it is easy for unwanted guests to enter into any private computer by using different types of hacking. There are so
Infrastructure as a service is a form virtual cloud computing that provides virtualized computing services over internet [1]. In model, a third party provider gives hardware, software, servers, storage and other infrastructure components on behalf of its users. Providers also host user’s applications and handle tasks including system maintenance, backup and resiliency planning. Environments include the automation of administrative talks, dynamic scaling, desktop virtualization and policy based services. Leading service providers are amazon web services, windows azure, Google compute engine, Rackspace open cloud, and IBM smart cloud enterprise.