section{Secure Cloud Computation: Threats, Requirements and Efficiency}
In this section, one common system architecture of outsourcing computation is firstly proposed. Then, we demonstrate typical security threats and corresponding security requirements. After that, some functionally work related to secure outsourcing are discussed. The concept of the balance between security and efficiency is briefly talked at the end of the section. subsection{System Architectures for Outsourcing Computation }
A common secure computing outsourcing architecture is as illustrated in Figure~ ef{fig:one}.\ egin{figure} centerline{includegraphics[width=80mm]{abst}} caption{A hierarchy of computation abstraction levels.} label{fig:one} end{figure}
The
…show more content…
In some application scenarios, the system architecture can be largely diversified, such as the collaborative outsourced data mining with multi-owner [Secure Nearest Neighbor Revisited] and the bioinformatic data aggregation and computation on cloud servers. [Secure and Verifiable Outsourcing of Large-Scale Biometrics Computations] More details for the variants of system architecture will be discussed in Section 6.
subsection{Security Threats in Data Outsourcing}
Though the architecture of cloud computation brings about the mitigation or negation of current security threats for users, such as the risk of leaking sensitive information at a lost or stolen laptop, new vulnerabilities and challenges are introduced. [Security and Privacy Issues in Cloud Computing] The threats to information assets residing in the cloud, including the outsourced data (input) and its corresponding solution (output), can generally be on extit{confidentiality} given the context of cloud computation. The data that resides in the cloud is out of control of cloud user. It has to be satisfied that only authorized party can access the sensitive data, while other party
We would like to provide the benefits of cloud computing without any troubles to propel in the direction it is designed for. This is to be achieved by preventing the owner's data from all risks associated and providing a cloud model that is more secure and efficient. The proposed model shall overcome the security risks defined by the security functions over cloud computing, as follows in (Passent M. et al., 2015):
A significant paradigm shift is represented by public cloud computing from conventional norms of an organizational data center to a de-parameterized infrastructure which opens gates for potential adversaries to use. Cloud computing should be approached carefully with any emerging information technology area with due consideration to the sensitivity of data. A good planning helps and ensures that the computing environment is secure to the most possible extant and is in compliance with all relevant policies of an organization and makes sure the privacy is maintained.
A significant paradigm shift is represented by public cloud computing from conventional norms of an organizational data center to a de-parameterized infrastructure which opens gates for potential adversaries to use. Cloud computing should be approached carefully with any emerging information technology area with due consideration to the sensitivity of data. A good planning helps and ensures that the computing environment is secure to the most possible extant and is in compliance with all relevant policies of an organization and makes sure the privacy is maintained.
be an issue. In different service models, the level of trust must also be different.
Cloud services: The organizations have been highly dependent on the cloud services. The cybercriminals have been seeking ways to exploit corporate security policies for protecting cloud services. The cloud services have been providing immense risk of data being disclosed deliberately or accidentally. The hosting companies have a greater ease of control over the private data and information and can even communicate between the end user and access his user data even without his permission. Therefore this threat has to be placed at the highest priority. Additionally, the cloud providers have the authority to the share information with any of the third parties even without any warrant. All these activities poses privacy concerns as the data can be access on the cloud anywhere and anytime where the information can be deleted, or even altered. All these activities have further left a room for potential unwanted disclosure of data and information on the cloud. Thus using cloud services in an organization poses a threat to exploitation and stealing of confidential data by their competitors, cybercriminals and vigilante justice seekers (Shaikh, F. B., & Haider, S., 2011).
This section of paper includes why we need cloud computing as a security control tool against the cyber criminal activities and in how many ways it can be implemented. As we are living in a technical era, many aspects of our lives rely on the Internet and computers, including transportation, communications, government, medicine, finance and education. Consider how much of our personal information is stored either on our own computer or on someone else’s system.
Security of data has reliably been a noteworthy issue in information technology. In the cloud computing environment, it turns out to be especially genuine on the grounds that the data is situated in better places even in all the globe. Information security and protection assurance are the two primary elements of client 's worries about the cloud technology. In spite of the fact that numerous strategies on the subjects in cloud computing have been examined in both scholastics and commercial enterprises, data security and protection assurance are turning out to be more imperative for the future advancement of cloud computing technology in government, industry, and business. Data security and privacy protection issues are applicable to both hardware and software in the
The primary purpose of cloud computing is resource sharing. The biggest risk when multiple organizations share resources is of data misuse. So to prevent this risks it is essential to secure the data stored in the repositories, data in the transit and processes. To enhance the security in cloud computing,it is vital to provide authorization, authentication and access control for data that is stored in cloud.
The impacts of cloud computing have touched almost every area of Information Technology. The information kept in the cloud is private and confidential and protected by laws that regulate it and protect it. The cloud providers face laws that relate to the preservation of critical information touching on taxes, security, and sometime employment regulations. Also in other circumstances, they are forced to comply with laws requiring them to destroy such information.
ABSTRACT: Cloud computing is nothing but an internet based connection to remote servers which allows to store data and access to all services. These services are provided by the third party who owns the infrastructure. Cloud computing is classified into public, private or hybrid. It is a kind of grid computing. It is flexible and easy to adapt. Apart from advantages organizations are very slow in processing the customer resources because it has some security issues and challenges associated with it. Security is the main issue which is becoming a big hurdle for the growth of cloud computing. The companies are worrying to handle some important data to other companies due to these security challenges. This paper is going to give brief
Cloud computing has provide the software and services the demand of the client. It offer the client to connect to computer resources and access the resources with a previously unknown level of ease because of this new cloud become the new ground of development of a generation of delivering service and store the privacy and security may be include security concern among user of the cloud have become concern of cloud.
Users, resources, and the CLOUD should establish the trustful relationship among themselves. And they will be able to deal with the changing dynamically. The CLOUD includes distributed users and resource from distributed local systems or organizes, which have different security policies. According to this reason, how to build a suitable relationship among them is a challenge. In fact, the requirements for the security in cloud computing environment have some aspects, including confidentiality.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Cloud computing security or also known as cloud security talks about a broad set of technologies, policies and controls deployed to protect applications, data, and the corresponding infrastructure of cloud computing. The cloud is a great invention to allow high capacity storage of data but without the cost to allow sharing of resources in a quick and timely manner. With technology becoming advanced in such a short amount time, new steps must be created to protect people information from being hacked. Hacker’s mission is determined by greed, anger, or request to damage their victims and the organization they might be a part. No one can actually stop all the potential vulnerabilities from being breached, but the provider and clients
Despite the benefits offered by the outsourced computation paradigm is huge, the primary obstacles of its wide adoption are security issues. As we all know, the incentive of users to commit large-scaled computation on data is that the data may conceal valuable and beneficial information. Therefore, in most cases, users