Cloud Computing Security Analysis Zewen Zhu Telecommunications Engineering University of Maryland MD, USA Abstract – Cloud computing is a popular technology nowadays. Users of the cloud computing services share computing resources from the cloud service providers to run their applications in the cloud. The cloud computing provides users with high scalable, available, and reliable on-demand service that can be rapid provisioned and with minimal management effort. However the cloud is a multi-tenant environment with large amount of users, the security of the cloud is most concerned issue. This paper will analyze the data security issues of cloud computing and what actions cloud service providers can take to protect the users’ data in the cloud. Keyword—Cloud computing; data security I. Introduction Cloud computing is an advanced computing technology based on the Internet environment to share the computing resources. Cloud computing refers to the services and applications delivered via Internet and also refers to hardware and software in the datacenters that provide those services. Cloud computing model has five characters, three service models, and three deployment models [1]. Five characters are: On-demand self-service: Customers can use Cloud computing services based on their need and interaction with service providers in not required. Broad network access: Customers have access to the cloud resources via different platforms from anywhere. Resource pooling: Customers
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
DATA SECURITY IN CLOUD COMPUTING Introduction: Cloud computing has prompted a movement in how individuals consider IT frameworks structural engineering. Numerous associations today are either executing cloud-based services, or assessing which cloud-based measures they will be portraying later on. As indicated by Gartner Inc. distributed computing is "no less compelling than e-business". This sprocess in building design from an undertaking normal server-based framework to a cloud-based framework will have related expenses of passage and dangers, yet it can bring about inconceivable advantages in reserve funds and in IT and business deftness.
Cloud Computing, also known as ‘on-demand-computing’. It is a computing that based on internet to share resources, information, and data with other devices on-demand. It is a model that enabled everywhere, computing resources such as servers, networks, applications and storages that are configurable can be shared once demand with access and provision rapidly and released with minimum effort of management, and different services are handed through Internet to the computer of organization. Cloud Computing depend on sharing computing resources instead of using personal devices or local servers to handle applications.
Cloud computing security is a set of control based technologies and policies that must follow certain rules in order to protect applications, data and any information associated with cloud computing. It is known to provide excellent services but is still not supported by organizations due to privacy issues that includes security and privacy protection. As they obstruct the managers as well as the
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
There would various security issues to cloud computing Concerning illustration it includes Numerous innovations including networks, databases, operating systems, virtualization, asset scheduling, transaction management, load balancing, concurrency control and memory administration. Therefore, security issues to a significant number of these frameworks and innovations would relevant to cloud computing. For example, those system that interconnects the frameworks to a cloud need to be secure. Furthermore, virtualization standard clinched
Today, cloud computing is the 5th generation and cloud services are already in widespread use. Some of the pioneers in this field are Google (Gmail, Google Docs etc.), Microsoft (Azure), Salesforce, Apple (iCloud) and other Wireless Service providers like T-Mobile and Verizon.
In this paper, I will briefly introduce what cloud computing is and some of its fundamental concepts (service models and deployment models). The later part of the paper will mainly focus on examining cloud computing impacts on business – the benefits it will bring, and the risks and challenges that go along with it.
Cloud computing is Internet-based computing, whereby shared information, resources, and software, are provided to terminals and portable devices on-demand. It is a rapidly developing and excellent promising technology. Cloud computing is the product of the combination of grid computing, distributed computing, parallel computing, and ubiquitous computing. Cloud Computing model has enabled IT organizations to serve the users globally. It gives the services like Platform as a Service, Software as a Service and Infrastructure as a Service without users being much aware of the details in which the services are provided.
To make it simple, cloud computing is a system for users store and access data or programs over the internet instead of individual hard drive. This cloud system is composed of three parts in terms of four important features, several service models and development models, details of those components will be explained in this report.
Infrastructure as a Service like Amazon Web services provides virtual server instances with unique IP addresses and blocks of storage on demand. Customers use the providers application program interface(API) to start, stop, access and configure their virtual servers and storage. In the enterprise, cloud computing allows a company to pay for only as much capacity as needed and bring as soon as more is required.
The cloud resources are virtualized , i.e they are distributed and stored in several computers. This
Based on the study of various security models of cloud computing we have proposed a new security model of cloud computing the steps in the proposed security model are: first the user creates a local user agent, and establish a temporary security certificate, and then user agents use this certificate for secure authentication in an effective time. With this certificate, which includes the host name, user name, user id, start time, end time and security attributes etc; the user’s security access and authorization is complete. When the user’s task is to use the resource on the cloud service provider, mutual authentication take place between user agent and specific application, while the application checks if the user agents certificate is
3.1 Public Cloud- It allows system and services to be accessible to the general public.
The explanation of “cloud computing” from the National Institute of Standards and Technology (NIST) [2] is that cloud computing enables omnipresent, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. According to the explanation, cloud computing