Introduction I selected a paper named “Cloud Computing Security Threats and Responses” by “Farzad Sabahi”. In this paper he summarizes reliability, availability, and security issues for cloud computing (RAS issues), and propose feasible and available solutions for some of t hem. And he discusses cloud security issues and finally he tries to find solutions for against cloud security problems Internet has been developing very rapidly in wide range. It has become available and accessible for everyone. However, other issues such as storage size, the power consumed by equipment and hardware cost have been constantly increasing. The storage space in data center is no longer meeting our increasing demands. The innovation of cloud computing has emerged in an attempt to solve these and other environmental problems. This make software even more attractive as a service and shaping the way hardware is designed and purchased. According to Architectural requirements for cloud computing systems: An enterprise cloud approach, “The overarching goal of Cloud Computing is to provide on-demand computing services with high reliability, scalability, and availability in distributed environments. Despite this common goal, Cloud Computing has been described in many different ways and no standard definition has been adopted until now.” Why Security is very important? security risk management and solutions within cloud computing should be studied very well and in wide range to address these
Cloud computing is a one of the most talked of topics in the field of Information Technology in recent times (Keyun, Joe, Taha, & Ibrahim, 2013). This subject area of cloud computing basically is a term used to describe computer resources available as a service accessible over a network (Darren & Kim-Kwang, 2013). The National Institute of Standards and Technology (NIST) define cloud computing as a model for enabling ubiquitous, convenient, on-demand network access on a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (Peter & Timothy, 2011). Due to the attractive nature of the model there has been rise in the use of cloud computing. Gartner, an IT research and consulting firm, says that cloud computing is growing will become the bulk of IT spend by 2016 (Gartner, 2013).
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
We would like to provide the benefits of cloud computing without any troubles to propel in the direction it is designed for. This is to be achieved by preventing the owner's data from all risks associated and providing a cloud model that is more secure and efficient. The proposed model shall overcome the security risks defined by the security functions over cloud computing, as follows in (Passent M. et al., 2015):
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
The Important of Cloud Computing is increasing and it is receiving a growing attention in Scientific & Industrial Communities. Cloud computing is one of the top 10 most important technologies and has a greater possibility in successive years by companies and organizations. Cloud computing implement everywhere, favourable, on demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and servers) that can be immediately supply and released with minimal management effort.
In this article, we discuss about the different cloud types and models, threats and vulnerabilities of cloud, and how to manage them. The main aim of this literature review is to identify the weak points in cloud computing, minimize the threats and improve the security system. We will also discuss two of the main concepts of cloud – virtualization and multi-tenancy (Mishra, Mathur, Jain, & Rathore, 2013). A brief analysis of each of the threat and security measure is described in the literature review.
Cloud computing has become so famous; there is much widespread news about the cloud these days. This is mainly because of the exponential shift of the business applications from traditional models of software towards the Internet, and now through mobile devices. Cloud computing is a model that uses the network of remote servers that has been hosted on the internet rather than on a specific hardware. This would enable a better shared pool for storing, accessing and processing of data. With the huge information being available in the internet, the security for cloud computing has been challenging and this paper would elucidates the security threats of cloud computing also stating the possible countermeasures for them.
Cloud computing is defined by Cearly and Phifer in their case study titled “Case Studies in Cloud Computing” as “a style of computing in which scalable and elastic IT-related capabilities are provided ‘ as a service’ to customers using Internet technologies”. Cloud computing services had been provided by major vendors such as Google, Amazon, Microsoft, IBM, Hewlett-Packard, and others for business computing until recently when Apple Corporation announced iCloud for consumers. Therefore, cloud computing is now available for businesses as well as consumers. Read the case study titled, “ Ericsson”, located here, about Ericsson cloud computing.
Cloud computing is regarded as one of the most rapidly developing technologies in the present world and giving superb solutions to the small and medium sized enterprises with remarkably low cost. The data of the entrepreneurs is stored in the cloud servers and accessed by the users of the company. But there is reasonable doubts are instigating the users of the cloud computing data availability, confidentiality and the security. Cloud Computing has become famous because of the low cost and customizable business needs to be provided with its three basic services IaaS, PaaS and SaaS. Many research works have been done to incorporate a strong security to prevent the possible threats in cloud computing. The securities incorporated in cloud computing for data security, Application security and transactional security. In developing the security the relative analysis has to be done, a suitable frame work has to be instigated and a novel approach has to be followed for the management of security in cloud computing. In establishing the security the architecture of cloud computing has to be taken care in relation with SAAS, PAAS and IAAS implementation
The authors described characteristics of cloud computing system and its attributes in terms of functionality, scalability, reliability, and security. Authors presented the need of synchronization between technology, human intervention and human behavior to build a secured cloud platform. The authors used their research study using qualitative and quantitative methods similar to a mixed method. The authors did not discuss any limitations
By introducing the intense programming which were extremely difficult to hack the servers move toward becoming more secure however it includes certain financial costs furthermore for the organizations which were eager to upgrade to such security components. Centralization is likewise one more factor that makes the cloud innovation the most secure one as it guarantees the simple control particularly to the customers of PaaS and IaaS models. Cloud security is centered around the single area on the primary server which is much better than the idea of individual organizations controlling the security of various servers at various areas. Through cloud security better treatment of the framework in a sheltered and secure way is accomplished. In organizations, if business is coordinated with the cloud administrations they may confront bring down dangers and enhance responsibility and kept up since the cloud specialist co-op is in charge of taking care of the whole thing. Therefore, the business require not to have money related incurrence and due to this reason it is important to pick the most committed organization to give the administrations, further developed safety efforts should have been actualized. The organizations in a need to guarantee development via completing the profound examination with respect to the
Whenever an examination about cloud security is occurred there will be particularly to accomplish for it. The cloud service provider for cloud ensures that the client does not confront any issue, for example, loss of information or data theft. Likewise, there is a probability where a harmful user can infiltrate the cloud by claiming a authorized user, there by infecting the whole cloud. This prompts to influences numerous clients who are sharing the contaminated cloud. There are four sorts of issues raise while examining security of a cloud.
There would various security issues to cloud computing Concerning illustration it includes Numerous innovations including networks, databases, operating systems, virtualization, asset scheduling, transaction management, load balancing, concurrency control and memory administration. Therefore, security issues to a significant number of these frameworks and innovations would relevant to cloud computing. For example, those system that interconnects the frameworks to a cloud need to be secure. Furthermore, virtualization standard clinched
In analysis, the data will be studied with the aim of trying to understand the risks in order to mitigate the risks or to minimize the existing risks in the cloud computing system. The objective is to extract the useful information from the analysis of the data collected during the course of the study, which will help in creating resolutions to the issues that surface regarding cloud computing security.
Cloud computing security or also known as cloud security talks about a broad set of technologies, policies and controls deployed to protect applications, data, and the corresponding infrastructure of cloud computing. The cloud is a great invention to allow high capacity storage of data but without the cost to allow sharing of resources in a quick and timely manner. With technology becoming advanced in such a short amount time, new steps must be created to protect people information from being hacked. Hacker’s mission is determined by greed, anger, or request to damage their victims and the organization they might be a part. No one can actually stop all the potential vulnerabilities from being breached, but the provider and clients