You are on page 1of 4

Security in Cloud Computing

(A Novel Methods For Security)

Asrarulhaq Asifali Maktedar Akshay C Navilkar Umesh M Kulkarni


Department of Comuter Science and Department of Comuter Science and Department of Comuter Science and
Engineering Engineering Engineering
KLS Gogte Institute of Technology KLS Gogte Institute of Technology KLS Gogte Institute of Technology
Belagavi India Belagavi India Belagavi India
Email Id: asrarmaktedar@gmail.com Email Id: akshay.navilkar@gmail.com Email Id: umesh_k@git.edu

Abstract: II. BENEFITS OF CLOUD COMPUTING


“The traditional business application has always been very
expensive and complicated. The total cost and variety of software
 Cost
and hardware required to run them are intimidating. You need a  Speed
whole team of experts to install, configure, test, run, secure, and  Global Scale
update them. To Overcome this Cloud computing is introduced,  Productivity
Cloud Computing is a term which is used to describe a paradigm  Performance
for delivery of computing services to users on a pay-as-you-go
 Reliability
basis. In this paradigm, users utilize the Internet and remote data
centers to run applications and store data. The cloud technology
allows more efficient computing by removing most of the upfront III. TYPES OF CLOUD COMPUTING
costs of setting up an IT infrastructure. It allows organizations to
expand or reduce their computing facilities. Cloud computing is a
complete internet dependent technology where client data is stored Cloud Computing services fall into three categories
and maintained in the data center of a cloud provider like Google,  Software as a service (SaaS)
Amazon, Salesforce.som and Microsoft etc. Limited control over
 Platform as a service (PaaS)
the data may incur various security issues and threats which
include data leakage, insecure interface, sharing of resources,  Infrastructure-as-a-service (IaaS)
data availability and inside attacks. There are various research
challenges also there for adopting cloud computing such as well
managed service level agreement (SLA), privacy, interoperability,
and reliability. It also allows users to minimize the complexity and
increase the reliability of overall networking. This paper also
analyzes the security issues and ways to tackle and provide hassle-
free access to the resources by an authorized user”.

I. INTRODUCTION
Proposed Technology is cost-effective, reliable and
functions to request and response in a very quick manner.
Cloud computing is the delivery of computing services
-servers, storage, databases, networking, software, analytics
and more -over the internet. Companies which are offering
these computing services bill users based on the usage.
Cloud Computing is a distributed architecture that
centralizes server resources on a scalable platform to provide
on-demand computing resources and services. Cloud
Computing is a proposed structure which enables to access
to a shared computing resources such as networks, servers,
storage, applications that can be rapidly provisioned and
released with minimal management effort or service
provider’s interaction. There are numerous reasons for
organizations to move towards IT solutions that include Fig. 1. Types of Cloud Computing
cloud computing as they are just required to pay for the
resources on a consumption basis. In addition, companies
can easily meet the needs of rapidly changing markets to
ensure that they are always on the leading edge for their
consumers [2] With the exploit of cloud computing
technology, users can access heavy applications via
lightweight portable devices such as mobile phones, and
PDAs.
I. TYPES OF CLOUD DEPLOYMENTS

Public cloud
Public clouds are owned and operated by a third-party
cloud service provider, which deliver their computing
resources like servers and storage over the Internet.
Microsoft Azure is an example of a public cloud. With a
public cloud, all hardware, software and other supporting
infrastructure is owned and managed by the cloud provider.
You can access these services and manage your account
using a web browser.
Fig. 2. Resources access in Cloud Computing
Private cloud
Cloud computing resources which are used by a single V. CLOUD COMPUTING CHARACTERISTICS
business or organization. It can be physically located in the Cloud computing requires searching for a cloud provider.
company data center. Whereas some of the companies also Whether your cloud is public, private, or hybrid, look for
pay third-party service providers to host their private cloud. scalability, access, interface, and usage model:
A private cloud is one in which the services and
Scalability:
infrastructure of the cloud are maintained on a private
network. Resource allocation in cloud can get bigger or smaller
depending on client’s demand. Which means that the cloud
can scale upward for peak or downward for lighter demand
Hybrid cloud depending on needs. Scalability also means that an
This combines both public and private clouds, bound application can scale when adding users and when
together by technology that allows data and applications to application requirement change.
be shared between them. By allowing data and applications
to move between private and public clouds, hybrid cloud
Self Service Access:
gives businesses greater flexibility and more deployment
options. Cloud customers can get cloud services without going
through a lengthy process. All you have to do is request a
specific amount of computing, storage or software from the
IV. USES OF CLOUD COMPUTING service provider. After you use these resources, they can be
automatically shut down by disconnecting from the internet.
We all are probably using cloud computing right now,
even if we don’t realize it. If you use an online service to
send email, edit documents, watch movies or TV, listen to General User Interface:
music, play games or store pictures and other files, it is There should be a standardized interface, which must
likely that cloud computing technology is making provide instructions that how two applications can
everything possible behind the scenes. The first cloud communicate with each other, and such interfaces help the
computing service is barely a decade old, but already a customer more easily link cloud services together.
variety of organizations, from small startups to global
corporations, government agencies to non-profits
organizations are embracing the technology for all sorts of Free or Service Use Metering:
reasons, here are few of the things you can do with the Right now, there are number of free cloud services for
cloud basic document preparation capabilities for example Some
targeted Cloud services such as payroll or accounting
 Create new apps and services software are based on pay-as-you-go model.
 Store, backup, and recover data
 Host websites and blogs
 Stream audio and video VI. SECURITY ISSUES IN CLOUD COMPUTING
 Deliver software on demand Even though there are many advantages of cloud
 Analyze data for patterns and make predictions computing, the organizations aren’t accepting it due to
security issues associated with it. Security is one of the
primary issue in a cloud environment. Here there are various
security concerns given below
 Virtualization
 Network Security
 Policy and Compliance
 Data location
 Data integrity
Virtualization: Cloud providers have to ensure that the customer’s
Virtualization is one of the main components of a cloud. data won’t be breached anytime even when they left the
Virtual machines are dynamic in nature so that it is difficult organization.
to maintain security. Vulnerabilities or configuration errors
may be generated easily. The main issue in virtual machine Data location
is to keep maintaining the security state for a given time [1] Clients might never know where the data is
located.
Network Security:
Data Integrity
Networks have more security problem to deal with such
as DNS attacks, Sniffer attacks, issue of reused IP address, Maintaining Data Integrity is essential in cloud
etc. storage which is critical for any data center. Keeping data in
the clouds means users may lose control of their data and
rely on cloud operators to enforce access control.

VII. STEPS TO IMPROVE CLOUD SECURITY


Domain Name System (DNS Attack) i. Make sure someone is monitoring the actions of
users on cloud (who is accessing what and
It is the corruption of Domain Name System (DNS) watching your every move). There are people
server. A DNS server performs the translation of a domain within your organization who are privileged users,
name to an IP address. In this case, the user request one IP such as an IT administrator must be appointed and
address but it is redirected to some other unauthorized cloud. trusted by an organization to make any changes
Counter measure for this attack is that Domain Name regarding their computers system or their clouds
System Security Extensions (DNSSEC). But this security [6].
measure proves to be inadequate one. [1]
ii. Administrator must limit the data access for every
user based on what a user is going to use it for:
Sniffer Attack Administrator must always be aware and
Sniffer attack is a more critical issue of network security continuously changing the level of access of their
in which unencrypted data are hacked through the internet data in their organizations cloud, depending on
during the communication between two parties. Figure3 where the user is and what device they are using.
represents the attacker. Counter measure for this attack is For example: When a person uses a mobile device,
that the parties should use efficient encryption method for he/ she has to go through additional sign-in steps
securing the data. and has more limited access to the data [7].
iii. Taking a risk-based approach in securing assets,
such as valuable information stored on a cloud.
Thus identifying databases that store highly
sensitive or valuable data and provide extra
protection to such databases, encryption and
monitoring around them.
iv. Use of supplementary security software to the
device that is being used: Ensure that corporate data
is isolated from personal data on the mobile
devices, such as tablets & smart-phones. Install
management software, that always monitors the
device so that it is running the latest software.
Scanning mobile applications from time to time to
check for vulnerabilities this can reduce the risks,
such as data loss and privacy [9].
Fig. 3. Sniffer Attack v. Add artificial intelligence to network protection:
The network still needs to be protected – never
Issue of Reused IP Addresses more so than in the cloud. Network protection
devices need to have the ability to provide extra
Each node of a network is provided with an IP control with insight into what users are accessing
address and the number of IP addresses that can be assigned and what content or applications, that they are
is limited. When a User leaves the network the IP-address running. The intelligence can be used in multiple
assigned to him will be given to a new user. But it causes a ways, with its primary goal as the protection of its
lot of security issues to the new user if any time lag occurs network’s service being provided to cloud
between the variation of IP address in DNS and deleting of operators. This will make a user feel more secure in
address in DNS Caches. [1] his attempts to use cloud computing properly [10-
13]
Policy and Compliance
RESEARCH CHALLENGES IN CLOUD
COMPUTING
Cloud Computing research addresses the challenges of Considering the time, computation resources, and even the
meeting the new requirements of next-generation related online burden of users, to provide the extension of
computing architectures, also the challenges of allowing the proposed main scheme to support third-party auditing,
applications and development platforms to take advantage users can also appoint any third-party auditors inorder to
of the benefits of cloud computing. Many existing issues mainten the integrity of data.
have not been fully addressed, while new challenges keep
emerging from industrial applications. Followings are the REFERENCES
challenging research issues in cloud computing. [1] Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy
“Cloud Computing: Security Issues and Research Challenges”,
International Journal of Computer Science and Information
 Service Level Agreements (SLA’s) Technology & Security (IJCSITS), Vol. 1, No. 2, December 2011
 Cloud Data Management & Security [2] A. Kundu, C. D. Banerjee, P. Saha, “Introducing New Services in
 Data Encryption Cloud Computing Environment”, International Journal of Digital
Content Technology and its Applications, AICIT, Vol. 4, No. 5, pp.
 Migration of virtual Machines 143-152, 2010..
 Interoperability [3] Garter, “Seven Cloud computing security risks”, 2008[Online]
 Access Controls Available http://www.infoworld.com.
 Energy Management [4] Marios D. Dikaiakos, Dimitrios Katsaros, Pankaj Mehra, George
 Multitenancy Pallis, Athena Vakali, ―Cloud Computing: Distributed Internet
Computing for IT and Scientific Research,‖ IEEE Internet Computing
 Server Consolidation Journal, vol. 13, issue.5, pp. 10-13, Sep.2009.
 Reliability & Availability of Service [5] R. Maggiani, Communication Consultant, Solari Communication,
 Common Cloud Standards ―Cloud Computing is Changing How we Communicate,‖ 2009 IEEE
International Professional Conference, IPCC, pp. 1-4, Waikiki, HI,
 Platform Management USA, Jul. 2009.
[6] Security for Cloud Computing Ten Steps to Ensure Success Version
2.0, 2015. http://www.cloud-council.org/
[7] G. Pallis, “Cloud Computing: The New Frontier of Internet
Conclusion and Feature work Computing”, Internet Computing, IEEE, Vol. 14, No. 5, pp. 70-73,
2010.
The biggest security worries with the cloud [8] B. R. Kandukuri, R. V. Paturi and A. Rakshit, “Cloud Security
computing model is sharing of resources. Cloud service Issues,” 2009 IEEE International Conference on Services Computing,
Bangalore, India, September 21-25, 2009. In Proceedings of IEEE
providers need to inform their customers on the level of SCC'2009. pp. 517-520, 2009. ISBN: 978-0-7695-3811-2.
security that they provide on their cloud. In this paper, we [9] B. R. Kandukuri, R. V. Paturi and A. Rakshit, “Cloud Security
first discussed types of cloud computing, benefits of cloud Issues,” 2009 IEEE International Conference on Services Computing,
computing, uses of cloud computing and characteristics of Bangalore, In Proceedings of IEEE SCC’2009. pp. 517-520,. ISBN:
cloud computing. Data security is the major issue in the 978-0-7695-3811-2, 2009.
Cloud Computing. There are many other security challenges [10] A. Williamson, “Comparing cloud computing providers,” Cloud
Comp. J, Vol. 2, No. 3, pp. 3–5, 2009.
including security aspects of network and virtualization.
[11] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A.
This paper has highlighted almost all these issues and risks Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M.
of cloud computing. We believe that due to the complexity Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing”,
of the cloud, it will be difficult to achieve end-to-end EECS Department, University of California, Berkeley, Technical
Report No., UCB/EECS-2009-28, pp.1-23, February 2009.
security. New security techniques need to be developed and
[12] R. W. Lucky, “Cloud computing”, IEEE Journal of Spectrum, Vol. 46,
updated at a regular interval of time to gain more security No. 5, 27-45, 2009
inorder to avoid loss of resources. Certain infrastructures [13] M. D. Dikaiakos, G. Pallis, D. Katsa, P. Mehra, and A. Vakali, “Cloud
such as IaaS, PaaS and SaaS can play the major role in Computing: Distributed Internet Computing for IT and Scientific
securing the future of cloud computing. This brings along Research”, IEEE Journal of Internet Computing, Vol. 13, No. 5, pp.
additional security requirements and responsibilities. 10-13, 2009.

You might also like