SlideShare a Scribd company logo
Technical Seminar
on
“Cloud Computing Security Issues in Infrastructure
as a Service”
By
Vivek Kumar Maurya (1JB10IS115)
Under the Guidance of
Asst. Prof Kiran Kumar V, Designation, Dept of ISE
Department of Information Science and
Engineering
CONTENTS
Abstract
Introduction
Literature Survey
Results
Conclusion
References
Abstract
 This paper presents an elaborated study of IaaS
components security and determines its drawbacks and
its countermeasures.
Cloud Infrastructure as a Service (IaaS) helps agencies
realize cost savings and efficiencies while modernizing
and expanding their IT capabilities.
Cloud-based infrastructure is rapidly scalable, secure, and
accessible over the Internet — you only pay for what you
use.
 Infrastructure as a Service (IaaS) serves as the foundation
layer for the other delivery models, and a lack of security
in this layer will certainly affect the other delivery models.
Introduction
Why CLOUD COMPUTING?
“In simple words, the Cloud refers to the process
of sharing resources (such as hardware,
development platforms and/or software) over the
internet. It enables On-Demand network access.
These resources are accessed mostly on a pay-per-
use or subscription basis.”
 Cloud computing is a technology that uses the
internet and central remote servers to maintain data
and applications.
Cloud computing is much more efficient computing
by centralizing storage, memory, and processing .
Data isn’t “chained” to one place; rather, it can be
accessed anywhere, from any medium.
Processor speed becomes less important then
internet connection speed.
Low maintenance.
Why do customers use the cloud?
Cloud computing allows consumers and businesses to
use applications without installation and access their
personal files at any computer with internet access.
Literature Survey
Authors &
Year
Paper Title Contribution Findings or
Drawbacks
G.
Frankova
-2008
“Service
Level
Agreements:
Web Services
and Security”
Web Service Level
Agreement (WSLA)
framework developed for
SLA monitoring
And enforcement in
SOA.
(service-oriented
architecture)
Cloud clients have
to trust providers ,
SLA monitoring until
standardizing.
W. Mao
-2012
“Virtual local
area network
technology
and
applications,
”
To strengthen network
isolation and
enhance systems
management capabilities.
Virtual networks
avoid wasting
bandwidth and offer
more flexibility,
performance, and
security.
Cloud Delivery Models
IaaS(Infrastructure – as- a- Service)
A. Iaas is a provision model in which an organization used to support
operations, including storage, hardware, servers and networking
components.
B. The service provider owns the equipment and is responsible for running
and maintaining it .
C. The client typically pays on a per-use basis.
PaaS(Platform –as- a- Service)
A. PaaS is a way to rent hardware, operating systems, storage and
network capacity over the Internet.
B. Operating system features can be changed and upgraded frequently.
C. Initial and ongoing costs can be reduced while developing a software.
SaaS(Software –as- a- Service)
A. SaaS sometimes referred to as "software on demand," is software that
is deployed over the internet .
B. It is deployed to run behind a firewall on a local area network or
personal computer.
C. With SaaS, a provider licenses an application to customers either as a
service on demand, through a subscription, in a "pay-as-you-go"
model.
D.This approach to application delivery is part of the utility computing
model.
SPI (SaaS, PaaS, IaaS)
Deployment models
Service models Deployment models
Software-As-A-Service (SaaS) Public
Platform-As-A-Service (PaaS) Private
Infrastructure-As-A-Service (IaaS) Hybrid
Structure of Deployment Model
Security- Who is in control ?
Understanding Security of Cloud
Security in cloud computing is a major concern. Data in
cloud should be stored in encrypted form.
Since all the data is transferred using Internet, data
security is of major concern in cloud. Here are key
mechanisms for protecting data mechanisms listed below:
Integrity
Accountability
Privacy
Access Control
Authentication
Authorization
RESULT
Conclusion
Each component in Cloud infrastructure has its
drawbacks which might impact the whole Cloud’s
Computing security.
Cloud is a tradeoff between cost, security and privacy.
Change in trust boundaries leads to security and
privacy challenges.
References
1. Pankaj Arora and Rubal Chaudhry Wadhawan ,”Cloud Computing
Security Issues in Infrastructure as a Service ”, Volume 2, Issue 1, January
2012
2. G. Frankova, Service Level Agreements: Web Services and Security, ser.
Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin
Heidelberg, 2007, vol. 4607.
3. S. Garg and H. Saran, “Anti-DDoS Virtualized Operating System,” ARES,
p. 7, 2008.
4. V. Rajaravivarma, “Virtual local area network technology and
applications,” Proceedings The Twenty-Ninth Southeastern Symposium
on System Theory, pp. 49–52, 1997.
Cloud Computing Security Issues in Infrastructure as a Service”

More Related Content

What's hot (20)

PPT
Cloud Computing - Security Benefits and Risks
William McBorrough
 
PPTX
Data Confidentiality in Cloud Computing
Ritesh Dwivedi
 
PPT
Cloud Computing Security Challenges
Yateesh Yadav
 
PDF
Cloud Computing Security
Piyush Mittal
 
PDF
SECURE CLOUD ARCHITECTURE
acijjournal
 
PDF
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
PPT
Cloud Computing Security Issues
Discover Cloud Computing
 
PPTX
Chap 5 software as a service (saass)
Raj Sarode
 
PDF
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
elysiumtechnologies
 
PPT
Security issue in cloud by himanshu tiwari
bhanu krishna
 
PDF
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 
PPTX
Security Issues in Cloud Computing
Jyotika Pandey
 
PPTX
Security in cloud computing
veena venugopal
 
PPTX
SaaS Challenges & Security Concerns
Kannan Subbiah
 
PDF
Literature Review: Security on cloud computing
Suranga Nisiwasala
 
PPTX
Cloud computing and its security issues
Jyoti Srivastava
 
PDF
Cloud computing security and privacy
Adeel Javaid
 
PDF
Cloud Computing Security Organization Assessments Service Categories Responsi...
SlideTeam
 
PPTX
Cloud Computing security issues
Pradeepti Kamble
 
PPTX
Cloud Encryption
RituparnaNag
 
Cloud Computing - Security Benefits and Risks
William McBorrough
 
Data Confidentiality in Cloud Computing
Ritesh Dwivedi
 
Cloud Computing Security Challenges
Yateesh Yadav
 
Cloud Computing Security
Piyush Mittal
 
SECURE CLOUD ARCHITECTURE
acijjournal
 
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
Cloud Computing Security Issues
Discover Cloud Computing
 
Chap 5 software as a service (saass)
Raj Sarode
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
elysiumtechnologies
 
Security issue in cloud by himanshu tiwari
bhanu krishna
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 
Security Issues in Cloud Computing
Jyotika Pandey
 
Security in cloud computing
veena venugopal
 
SaaS Challenges & Security Concerns
Kannan Subbiah
 
Literature Review: Security on cloud computing
Suranga Nisiwasala
 
Cloud computing and its security issues
Jyoti Srivastava
 
Cloud computing security and privacy
Adeel Javaid
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
SlideTeam
 
Cloud Computing security issues
Pradeepti Kamble
 
Cloud Encryption
RituparnaNag
 

Similar to Cloud Computing Security Issues in Infrastructure as a Service” (20)

PDF
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
IJIR JOURNALS IJIRUSA
 
PPTX
Cloud computing ppt
Jagriti Rai
 
PDF
Overview of cloud computing architecture service
eSAT Publishing House
 
PDF
Overview of cloud computing architecture
eSAT Journals
 
PDF
Review on Security Techniques using Cloud Computing
Editor IJCATR
 
PPTX
Cloud computing and Cloud Security - Basics and Terminologies
Techsparks
 
PDF
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
PPTX
Cloud computing
Dulith Kasun
 
PPTX
Cloud computing
Hamza Sajjad
 
DOC
Cloud security
Mohamed Shalash
 
PPTX
Cloud computing & security basics
Rahul Gurnani
 
PDF
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
 
PPTX
cloud computing and its service models.pptx
Kavitabani1
 
PDF
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
 
PPT
Cloud computing 2
Shyam Kona
 
PPTX
cloud computing
Tapesh Chalisgaonkar
 
PDF
Cloud computing & IAAS The Dual Edged Sword of New Technology
Mekhi Da ‘Quay Daniels
 
PPTX
Cloud-Computing basic introduction chap 1 pptx
arjundas690069
 
PDF
Cloud computing
ananyaakk
 
PPTX
Cloud Computing
khushi kalaria
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
IJIR JOURNALS IJIRUSA
 
Cloud computing ppt
Jagriti Rai
 
Overview of cloud computing architecture service
eSAT Publishing House
 
Overview of cloud computing architecture
eSAT Journals
 
Review on Security Techniques using Cloud Computing
Editor IJCATR
 
Cloud computing and Cloud Security - Basics and Terminologies
Techsparks
 
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
Cloud computing
Dulith Kasun
 
Cloud computing
Hamza Sajjad
 
Cloud security
Mohamed Shalash
 
Cloud computing & security basics
Rahul Gurnani
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
 
cloud computing and its service models.pptx
Kavitabani1
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
 
Cloud computing 2
Shyam Kona
 
cloud computing
Tapesh Chalisgaonkar
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Mekhi Da ‘Quay Daniels
 
Cloud-Computing basic introduction chap 1 pptx
arjundas690069
 
Cloud computing
ananyaakk
 
Cloud Computing
khushi kalaria
 
Ad

More from Vivek Maurya (18)

PDF
Unit8 tgb
Vivek Maurya
 
PDF
System%20 modelling%20and%20simulation
Vivek Maurya
 
PDF
Adhoc networks notes by divya (rnsit)
Vivek Maurya
 
PDF
System modeling and simulation full notes by sushma shetty (www.vtulife.com)
Vivek Maurya
 
PDF
Ise viii-system modeling and simulation [10 cs82]-solution
Vivek Maurya
 
PDF
Ise viii-system modeling and simulation [10 cs82]-question paper
Vivek Maurya
 
PDF
Ise viii-system modeling and simulation [10 cs82]-notes
Vivek Maurya
 
PDF
Ise viii-system modeling and simulation [10 cs82]-assignment
Vivek Maurya
 
PDF
Ise viii-software architectures [10 is81]-solution
Vivek Maurya
 
PDF
Ise viii-software architectures [10 is81]-notes
Vivek Maurya
 
PDF
Ise viii-information and network security [10 is835]-solution
Vivek Maurya
 
PDF
Ise viii-software architectures [10 is81]-assignment
Vivek Maurya
 
PDF
Ise viii-information and network security [10 is835]-question paper
Vivek Maurya
 
PDF
Ise viii-information and network security [10 is835]-assignment
Vivek Maurya
 
PDF
Ise viii-ad-hoc networks [10 is841]-notes
Vivek Maurya
 
PDF
Ise viii-ad-hoc networks [10 is841]-assignment
Vivek Maurya
 
PDF
Adhoc notes by ashok kumar.pdf
Vivek Maurya
 
PDF
VTU 8th Sem Notes Simulation
Vivek Maurya
 
Unit8 tgb
Vivek Maurya
 
System%20 modelling%20and%20simulation
Vivek Maurya
 
Adhoc networks notes by divya (rnsit)
Vivek Maurya
 
System modeling and simulation full notes by sushma shetty (www.vtulife.com)
Vivek Maurya
 
Ise viii-system modeling and simulation [10 cs82]-solution
Vivek Maurya
 
Ise viii-system modeling and simulation [10 cs82]-question paper
Vivek Maurya
 
Ise viii-system modeling and simulation [10 cs82]-notes
Vivek Maurya
 
Ise viii-system modeling and simulation [10 cs82]-assignment
Vivek Maurya
 
Ise viii-software architectures [10 is81]-solution
Vivek Maurya
 
Ise viii-software architectures [10 is81]-notes
Vivek Maurya
 
Ise viii-information and network security [10 is835]-solution
Vivek Maurya
 
Ise viii-software architectures [10 is81]-assignment
Vivek Maurya
 
Ise viii-information and network security [10 is835]-question paper
Vivek Maurya
 
Ise viii-information and network security [10 is835]-assignment
Vivek Maurya
 
Ise viii-ad-hoc networks [10 is841]-notes
Vivek Maurya
 
Ise viii-ad-hoc networks [10 is841]-assignment
Vivek Maurya
 
Adhoc notes by ashok kumar.pdf
Vivek Maurya
 
VTU 8th Sem Notes Simulation
Vivek Maurya
 
Ad

Recently uploaded (20)

PPTX
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
PPTX
Damage of stability of a ship and how its change .pptx
ehamadulhaque
 
PPTX
Presentation 2.pptx AI-powered home security systems Secure-by-design IoT fr...
SoundaryaBC2
 
PPTX
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
PDF
Viol_Alessandro_Presentazione_prelaurea.pdf
dsecqyvhbowrzxshhf
 
PPT
Carmon_Remote Sensing GIS by Mahesh kumar
DhananjayM6
 
PDF
smart lot access control system with eye
rasabzahra
 
PPTX
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PDF
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PPTX
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
PPTX
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
PPTX
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PPTX
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PDF
Design Thinking basics for Engineers.pdf
CMR University
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PPT
Electrical Safety Presentation for Basics Learning
AliJaved79382
 
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
Damage of stability of a ship and how its change .pptx
ehamadulhaque
 
Presentation 2.pptx AI-powered home security systems Secure-by-design IoT fr...
SoundaryaBC2
 
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
Viol_Alessandro_Presentazione_prelaurea.pdf
dsecqyvhbowrzxshhf
 
Carmon_Remote Sensing GIS by Mahesh kumar
DhananjayM6
 
smart lot access control system with eye
rasabzahra
 
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
Thermal runway and thermal stability.pptx
godow93766
 
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
Design Thinking basics for Engineers.pdf
CMR University
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
Electrical Safety Presentation for Basics Learning
AliJaved79382
 

Cloud Computing Security Issues in Infrastructure as a Service”

  • 1. Technical Seminar on “Cloud Computing Security Issues in Infrastructure as a Service” By Vivek Kumar Maurya (1JB10IS115) Under the Guidance of Asst. Prof Kiran Kumar V, Designation, Dept of ISE Department of Information Science and Engineering
  • 3. Abstract  This paper presents an elaborated study of IaaS components security and determines its drawbacks and its countermeasures. Cloud Infrastructure as a Service (IaaS) helps agencies realize cost savings and efficiencies while modernizing and expanding their IT capabilities. Cloud-based infrastructure is rapidly scalable, secure, and accessible over the Internet — you only pay for what you use.  Infrastructure as a Service (IaaS) serves as the foundation layer for the other delivery models, and a lack of security in this layer will certainly affect the other delivery models.
  • 5. “In simple words, the Cloud refers to the process of sharing resources (such as hardware, development platforms and/or software) over the internet. It enables On-Demand network access. These resources are accessed mostly on a pay-per- use or subscription basis.”  Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications.
  • 6. Cloud computing is much more efficient computing by centralizing storage, memory, and processing . Data isn’t “chained” to one place; rather, it can be accessed anywhere, from any medium. Processor speed becomes less important then internet connection speed. Low maintenance.
  • 7. Why do customers use the cloud? Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access.
  • 8. Literature Survey Authors & Year Paper Title Contribution Findings or Drawbacks G. Frankova -2008 “Service Level Agreements: Web Services and Security” Web Service Level Agreement (WSLA) framework developed for SLA monitoring And enforcement in SOA. (service-oriented architecture) Cloud clients have to trust providers , SLA monitoring until standardizing. W. Mao -2012 “Virtual local area network technology and applications, ” To strengthen network isolation and enhance systems management capabilities. Virtual networks avoid wasting bandwidth and offer more flexibility, performance, and security.
  • 9. Cloud Delivery Models IaaS(Infrastructure – as- a- Service) A. Iaas is a provision model in which an organization used to support operations, including storage, hardware, servers and networking components. B. The service provider owns the equipment and is responsible for running and maintaining it . C. The client typically pays on a per-use basis.
  • 10. PaaS(Platform –as- a- Service) A. PaaS is a way to rent hardware, operating systems, storage and network capacity over the Internet. B. Operating system features can be changed and upgraded frequently. C. Initial and ongoing costs can be reduced while developing a software. SaaS(Software –as- a- Service) A. SaaS sometimes referred to as "software on demand," is software that is deployed over the internet . B. It is deployed to run behind a firewall on a local area network or personal computer. C. With SaaS, a provider licenses an application to customers either as a service on demand, through a subscription, in a "pay-as-you-go" model. D.This approach to application delivery is part of the utility computing model.
  • 12. Deployment models Service models Deployment models Software-As-A-Service (SaaS) Public Platform-As-A-Service (PaaS) Private Infrastructure-As-A-Service (IaaS) Hybrid
  • 14. Security- Who is in control ?
  • 15. Understanding Security of Cloud Security in cloud computing is a major concern. Data in cloud should be stored in encrypted form. Since all the data is transferred using Internet, data security is of major concern in cloud. Here are key mechanisms for protecting data mechanisms listed below: Integrity Accountability Privacy Access Control Authentication Authorization
  • 17. Conclusion Each component in Cloud infrastructure has its drawbacks which might impact the whole Cloud’s Computing security. Cloud is a tradeoff between cost, security and privacy. Change in trust boundaries leads to security and privacy challenges.
  • 18. References 1. Pankaj Arora and Rubal Chaudhry Wadhawan ,”Cloud Computing Security Issues in Infrastructure as a Service ”, Volume 2, Issue 1, January 2012 2. G. Frankova, Service Level Agreements: Web Services and Security, ser. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, vol. 4607. 3. S. Garg and H. Saran, “Anti-DDoS Virtualized Operating System,” ARES, p. 7, 2008. 4. V. Rajaravivarma, “Virtual local area network technology and applications,” Proceedings The Twenty-Ninth Southeastern Symposium on System Theory, pp. 49–52, 1997.