SlideShare a Scribd company logo
Security Issues in Cloud Computing
Rahul Abhishek
.
Student, Dept. of Information Technology. MITS, Rayagada, Orissa.
.
E-mail: rahulmithu.abhishek@gmail.com
Abstract:
In this paper, we discuss cloud computing security and its security issues. In particular, we discuss a
scheme for secure publications of documents in a cloud. It will converse secure federated query
processing, and discuss the use of secure co-processors for cloud computing. Cloud computing is a
general term for anything that involves delivering hosted services over the Internet. These services are
broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and
Software-as-a-Service (SaaS). The name cloud computing was inspired by the cloud symbol that's often
used to represent the Internet in flowcharts and diagrams. There is a critical need to securely store,
manage, share and analyze massive amounts of complex(e.g., semi-structured and unstructured) data to
determine patterns and trends in order to improve the quality of healthcare, better safeguard the nation
and explore alternative energy. Because of the critical nature of the applications, it is important that
clouds be secure. The emerging cloud computing model attempts to address the explosive growth of web-
connected devices, and handle massive amount of data.
Key Words: IaaS, PaaS, SaaS , Cloud Module ,Data Encryption ,security concerns , Data security.
1. Introduction
As a metaphor for the Internet, "the cloud" is a
familiar cliché, but when combined with
"computing," the meaning gets bigger and fuzzier.
Some analysts and vendors define cloud
computing narrowly as an updated version of
utility computing: basically virtual servers
available over the Internet (figure 1). Others go
very broad, arguing anything you consume
outside the firewall is "in the cloud," including
conventional outsourcing.
Cloud computing is a new consumption and
delivery model for IT services. The concept of
cloud computing represents a shift in thought, in
those end users need not know the details of a
specific technology. The service is fully managed
by the provider. Users can consume services at a
rate that is set by their particular needs. This on-
demand service can be provided at any time.
Fig1. Cloud Computing
Data security involves encrypting the data as well
as ensuring that appropriate policies are enforced
for data sharing. In addition, resource allocation
and memory management algorithms have to be
secure. Finally, data mining techniques may be
applicable to malware detection in clouds. We
have extended the technologies and concepts we
have developed for secure grid to a secure cloud.
We have defined a layered framework for assured
cloud computing consisting of the secure virtual
machine layer, secure cloud storage layer, secure
1
cloud data layer, and the secure virtual network
monitor layer (Figure 2). Cross cutting services
are provided by the policy layer, the cloud
monitoring layer, the reliability layer and the risk
analysis layer. For the Secure Virtual Machine
(VM) Monitor we are combining both hardware
and software solutions in virtual machines to
handle problems such as key logger examining
XEN developed at the University of Cambridge
and exploring security to meet the needs of our
applications (e.g., secure distributed storage and
data management). For Secure Cloud Storage
Management, we are developing a storage
infrastructure which integrates resources from
multiple providers to form a massive virtual
storage system.
Figure2. Layered framework for assured cloud
2. Cloud Computing Models
Cloud computing models can be broken into three
basic designs, which are shown here and
described below(Figure 3).
Figure3. Cloud Computing Models
2.1 Infrastructure-as-a-Service (IaaS) – As the
name implies, you are buying infrastructure. You
own the software and are purchasing virtual
power to execute as needed. This is much like
running a virtual server on your own equipment,
except you are now running a virtual server on a
virtual disk. This model is similar to a utility
company model, as you pay for what you use. An
example is Amazon Web Services at
http://aws.amazon.com.
2.2 Platform-as-a-Service (PaaS) – In this model
of cloud computing, the provider provides a
platform for your use. Services provided by this
model include all phases of the system
development life cycle (SDLC) and can use
application program interface (APIs), website
portals, or gateway software. Buyers do need to
look closely at specific solutions, because some
providers do not allow software created by their
customers to be moved off the provider’s
platform. An example of PaaS is GoogleApps.
2.3 Software-as-a-Service (SaaS) – This model is
designed to provide everything and simply rent
out the software to the user. The service is usually
provided through some type of front end or web
portal. While the end user is free to use the service
from anywhere, the company pays a per use fee.
Salesforce.com offers this type of service.
3. Cloud Computing Attacks
As more companies move to cloud computing,
look for hackers to follow. Some of the potential
attack vectors criminals may attempt include:
3.1 Denial of Service (DoS) attacks - Some
security professionals have argued that the cloud
is more vulnerable to DoS attacks, because it is
shared by many users, which makes DoS attacks
much more damaging. Twitter suffered a
devastating DoS attack during 2009.
3.2 Side Channel attacks – An attacker could
attempt to compromise the cloud by placing a
malicious virtual machine in close proximity to a
target cloud server and then launching a side
channel attack.
3.3 Authentication attacks – Authentication is a
weak point in hosted and virtual services and is
frequently targeted. There are many different
ways to authenticate users; for example, based on
what a person knows, has, or is. The mechanisms
used to secure the authentication process and the
methods used are a frequent target of attackers.
2
3.4 Man-in-the-middle cryptographic attacks –
This attack is carried out when an attacker places
himself between two users. Anytime attackers can
place themselves in the communication’s path,
there is the possibility that they can intercept and
modify communications.
4. Security Concerns of Cloud Computing
While cost and ease of use are two great benefits
of cloud computing, there are significant security
concerns that need to be addressed when
considering moving critical applications and
sensitive data to public and shared cloud
environments. To address these concerns, the
cloud provider must develop sufficient controls to
provide the same or a greater level of security
than the organization would have if the cloud
were not used. Listed here are ten items to review
when considering cloud computing.
5. Secure Data Publication Applied To Cloud
Cloud computing facilitates storage of data at a
remote site to maximize resource utilization.
As a result, it is critical that this data be protected
and only given to authorized individuals. This
essentially amounts to secure publication of data
that is necessary for data outsourcing, as well as
external publications. We have developed
techniques for publication of data in a secure
manner. We assume that the data is represented as
an XML document. This is a valid assumption as
many of the documents on the web are now
represented as XML documents. In the access
control framework proposed in Bertino (2002),
security policy is specified depending on user
roles and credentials Users must possess the
credentials to access XML documents.
Security could improve due to centralization of
data, increased security-focused resources, etc.,
but concerns can persist about loss of control over
certain sensitive data, and the lack of security for
stored kernels. Security is often as good as or
better than under traditional systems, in part
because providers are able to devote resources to
solving security issues that many customers
cannot afford. However, the complexity of
security is greatly increased when data is
distributed over a wider area or greater number of
devices and in multi-tenant systems that are being
shared by unrelated users. In addition, user access
to security audit logs may be difficult or
impossible. Private cloud installations are in part
motivated by users' desire to retain control over
the infrastructure and avoid losing control of
information security. This essentially amounts to
secure publication of data that is necessary for
data outsourcing, as well as external publications.
Since data in the cloud will be placed anywhere, it
is important that the data is encrypted. We are
using secure co-processor as part of the cloud
infrastructure to enable efficient encrypted storage
of sensitive data.
Security is needed at server access internet access
database access data privacy program access.
Security concerns arising because both customer
data and program are residing in provider
premises.
Security is used to save data and program from
disrupts services, theft of information, loss of
privacy, hostile program, hostile people giving
instructions to good programs, bad guys
corrupting or eavesdropping on communications.
6. Summary and Conclusion
In this paper, we first discussed cloud computing
then cloud module and its expansion secondly
security issues for cloud. These issues include
storage security, middleware security, data
security, network security and application
security. The main goal is to securely store and
manage data that is not controlled by the owner of
the data. We discussed how we may secure
documents that may be published. There are
several other security challenges including
security aspects of virtualization. We believe that
due to the complexity of the cloud, it will be
difficult to achieve end-to-end security.
However, the challenge we have is to ensure more
secure operations even if some parts of the cloud
fail.
For many applications, we not only need
information assurance but also mission assurance.
3
Figure2. Case study of Worldwide Spending
Cloud
Reference
1. Andy BechtolsheimChairman & Co-
founder, Arista Networks.
November 12th, 2008
2. Encrypted Storage and Key Management
for the cloud. Cryptoclarity.com. 2009-
07-30.
3. http://www.cryptoclarity.com/CryptoClar
ityLLC/Welcome/Entries/2009/7/23_Enc
rypted_Storage_and_Key_Management_
for_the_cloud.html. Retrieved 2010-08-
22
4. Mills, Elinor (2009-01-27). "Cloud
computing security forecast: Clear
skies". CNET.
5. Michael Gregg, Global Knowledge
Instructor, CISA, CISSP, CISM, MCSE,
CTT+, CGEIT, A+, N+, Security+,
CNA, CCNA, CIW Security Analyst,
CEH, CHFI, CEI, DCNP, ES Dragon
IDS, ES Advanced Dragon IDS, and
SSCP.
6. Ashwin Alfred Pinto, Shvetank Verma,
Satyam Singh, Prashant Srivastava,
Rahul Gupta, and Vijay Chourasia.
Proceedings of the World Congress on
Engineering 2011
7. Vol I WCE 2011, July 6 - 8, 2011,
London, U.K.
8. www.cloudbook.net/resources.
9. "Service-Oriented Computing and Cloud
Computing: Challenges and
Opportunities". IEEE Internet
Computing. Retrieved 2010-12-04.
10. "The NIST Definition of Cloud
Computing (Draft)". National Institute of
Science and Technology. Retrieved 24
July 2011.
4

More Related Content

What's hot (14)

PDF
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor
 
PPT
Unit 3 -Data storage and cloud computing
MonishaNehkal
 
PDF
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
 
PDF
Security policy enforcement in cloud infrastructure
csandit
 
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
PDF
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
IJNSA Journal
 
PDF
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
 
PDF
Secure modelling schema of distributed information access management in cloud...
iaemedu
 
PDF
Secure modelling schema of distributed information access management in cloud...
iaemedu
 
PDF
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
 
PPTX
Security in cloud computing
Abhishek Kumar Sinha
 
PDF
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
PDF
Data Stream Controller for Enterprise Cloud Application
IJSRD
 
PPTX
Data storage security in cloud computing
Sonali Jain
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor
 
Unit 3 -Data storage and cloud computing
MonishaNehkal
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
 
Security policy enforcement in cloud infrastructure
csandit
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
IJNSA Journal
 
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
 
Secure modelling schema of distributed information access management in cloud...
iaemedu
 
Secure modelling schema of distributed information access management in cloud...
iaemedu
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
 
Security in cloud computing
Abhishek Kumar Sinha
 
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Data Stream Controller for Enterprise Cloud Application
IJSRD
 
Data storage security in cloud computing
Sonali Jain
 

Similar to Security Issues in Cloud Computing by rahul abhishek (20)

PDF
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
PDF
G0314043
iosrjournals
 
PDF
An Overview on Security Issues in Cloud Computing
IOSR Journals
 
PDF
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
PDF
Data Security Model Enhancement In Cloud Environment
IOSR Journals
 
PDF
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Journals
 
PDF
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Journals
 
PDF
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Publishing House
 
PDF
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
 
PPTX
Cloud computing and data security
Mohammed Fazuluddin
 
PDF
A220113
irjes
 
PDF
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
AJASTJournal
 
PDF
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
AJASTJournal
 
PDF
A study on_security_and_privacy_issues_o
Pradeep Muralidhar
 
PDF
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
 
PDF
CLOUD COMPUTING.pdf
Protelion
 
PDF
CLOUD COMPUTING.pdf
Protelion
 
PDF
Various Security Issues and their Remedies in Cloud Computing
INFOGAIN PUBLICATION
 
PDF
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Er Piyush Gupta IN ⊞⌘
 
PDF
Cloud Computing Security Issues and Challenges
CSCJournals
 
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
G0314043
iosrjournals
 
An Overview on Security Issues in Cloud Computing
IOSR Journals
 
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
Data Security Model Enhancement In Cloud Environment
IOSR Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Publishing House
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
 
Cloud computing and data security
Mohammed Fazuluddin
 
A220113
irjes
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
AJASTJournal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
AJASTJournal
 
A study on_security_and_privacy_issues_o
Pradeep Muralidhar
 
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
 
CLOUD COMPUTING.pdf
Protelion
 
CLOUD COMPUTING.pdf
Protelion
 
Various Security Issues and their Remedies in Cloud Computing
INFOGAIN PUBLICATION
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Er Piyush Gupta IN ⊞⌘
 
Cloud Computing Security Issues and Challenges
CSCJournals
 
Ad

More from Er. rahul abhishek (11)

PDF
The relationship between artificial intelligence and psychological theories
Er. rahul abhishek
 
PDF
The technologies of ai used in different corporate world
Er. rahul abhishek
 
PDF
Learning of robots by using & sharing the cloud computing techniques
Er. rahul abhishek
 
PDF
Artificial intelligence apporoach to robotics
Er. rahul abhishek
 
DOCX
Quality Analyst related job
Er. rahul abhishek
 
DOCX
Artificial intelligence approaches to thermal imaging
Er. rahul abhishek
 
PDF
Future aspects of ai by rahul abhishek
Er. rahul abhishek
 
PDF
intelligent computing relating to cloud computing
Er. rahul abhishek
 
PDF
Design a rule based expert system for eia
Er. rahul abhishek
 
PDF
Uncertainty classification of expert systems a rough set approach
Er. rahul abhishek
 
PPTX
Inteligent computing relating to cloud computing.final
Er. rahul abhishek
 
The relationship between artificial intelligence and psychological theories
Er. rahul abhishek
 
The technologies of ai used in different corporate world
Er. rahul abhishek
 
Learning of robots by using & sharing the cloud computing techniques
Er. rahul abhishek
 
Artificial intelligence apporoach to robotics
Er. rahul abhishek
 
Quality Analyst related job
Er. rahul abhishek
 
Artificial intelligence approaches to thermal imaging
Er. rahul abhishek
 
Future aspects of ai by rahul abhishek
Er. rahul abhishek
 
intelligent computing relating to cloud computing
Er. rahul abhishek
 
Design a rule based expert system for eia
Er. rahul abhishek
 
Uncertainty classification of expert systems a rough set approach
Er. rahul abhishek
 
Inteligent computing relating to cloud computing.final
Er. rahul abhishek
 
Ad

Recently uploaded (20)

PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PDF
Electrical Engineer operation Supervisor
ssaruntatapower143
 
PPTX
Knowledge Representation : Semantic Networks
Amity University, Patna
 
DOCX
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
PPTX
Big Data and Data Science hype .pptx
SUNEEL37
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PPTX
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PPTX
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
PPTX
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
PDF
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
PPTX
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
PPTX
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
PPTX
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PPTX
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
PPTX
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
Electrical Engineer operation Supervisor
ssaruntatapower143
 
Knowledge Representation : Semantic Networks
Amity University, Patna
 
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
Big Data and Data Science hype .pptx
SUNEEL37
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 

Security Issues in Cloud Computing by rahul abhishek

  • 1. Security Issues in Cloud Computing Rahul Abhishek . Student, Dept. of Information Technology. MITS, Rayagada, Orissa. . E-mail: [email protected] Abstract: In this paper, we discuss cloud computing security and its security issues. In particular, we discuss a scheme for secure publications of documents in a cloud. It will converse secure federated query processing, and discuss the use of secure co-processors for cloud computing. Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). The name cloud computing was inspired by the cloud symbol that's often used to represent the Internet in flowcharts and diagrams. There is a critical need to securely store, manage, share and analyze massive amounts of complex(e.g., semi-structured and unstructured) data to determine patterns and trends in order to improve the quality of healthcare, better safeguard the nation and explore alternative energy. Because of the critical nature of the applications, it is important that clouds be secure. The emerging cloud computing model attempts to address the explosive growth of web- connected devices, and handle massive amount of data. Key Words: IaaS, PaaS, SaaS , Cloud Module ,Data Encryption ,security concerns , Data security. 1. Introduction As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing," the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers available over the Internet (figure 1). Others go very broad, arguing anything you consume outside the firewall is "in the cloud," including conventional outsourcing. Cloud computing is a new consumption and delivery model for IT services. The concept of cloud computing represents a shift in thought, in those end users need not know the details of a specific technology. The service is fully managed by the provider. Users can consume services at a rate that is set by their particular needs. This on- demand service can be provided at any time. Fig1. Cloud Computing Data security involves encrypting the data as well as ensuring that appropriate policies are enforced for data sharing. In addition, resource allocation and memory management algorithms have to be secure. Finally, data mining techniques may be applicable to malware detection in clouds. We have extended the technologies and concepts we have developed for secure grid to a secure cloud. We have defined a layered framework for assured cloud computing consisting of the secure virtual machine layer, secure cloud storage layer, secure 1
  • 2. cloud data layer, and the secure virtual network monitor layer (Figure 2). Cross cutting services are provided by the policy layer, the cloud monitoring layer, the reliability layer and the risk analysis layer. For the Secure Virtual Machine (VM) Monitor we are combining both hardware and software solutions in virtual machines to handle problems such as key logger examining XEN developed at the University of Cambridge and exploring security to meet the needs of our applications (e.g., secure distributed storage and data management). For Secure Cloud Storage Management, we are developing a storage infrastructure which integrates resources from multiple providers to form a massive virtual storage system. Figure2. Layered framework for assured cloud 2. Cloud Computing Models Cloud computing models can be broken into three basic designs, which are shown here and described below(Figure 3). Figure3. Cloud Computing Models 2.1 Infrastructure-as-a-Service (IaaS) – As the name implies, you are buying infrastructure. You own the software and are purchasing virtual power to execute as needed. This is much like running a virtual server on your own equipment, except you are now running a virtual server on a virtual disk. This model is similar to a utility company model, as you pay for what you use. An example is Amazon Web Services at http://aws.amazon.com. 2.2 Platform-as-a-Service (PaaS) – In this model of cloud computing, the provider provides a platform for your use. Services provided by this model include all phases of the system development life cycle (SDLC) and can use application program interface (APIs), website portals, or gateway software. Buyers do need to look closely at specific solutions, because some providers do not allow software created by their customers to be moved off the provider’s platform. An example of PaaS is GoogleApps. 2.3 Software-as-a-Service (SaaS) – This model is designed to provide everything and simply rent out the software to the user. The service is usually provided through some type of front end or web portal. While the end user is free to use the service from anywhere, the company pays a per use fee. Salesforce.com offers this type of service. 3. Cloud Computing Attacks As more companies move to cloud computing, look for hackers to follow. Some of the potential attack vectors criminals may attempt include: 3.1 Denial of Service (DoS) attacks - Some security professionals have argued that the cloud is more vulnerable to DoS attacks, because it is shared by many users, which makes DoS attacks much more damaging. Twitter suffered a devastating DoS attack during 2009. 3.2 Side Channel attacks – An attacker could attempt to compromise the cloud by placing a malicious virtual machine in close proximity to a target cloud server and then launching a side channel attack. 3.3 Authentication attacks – Authentication is a weak point in hosted and virtual services and is frequently targeted. There are many different ways to authenticate users; for example, based on what a person knows, has, or is. The mechanisms used to secure the authentication process and the methods used are a frequent target of attackers. 2
  • 3. 3.4 Man-in-the-middle cryptographic attacks – This attack is carried out when an attacker places himself between two users. Anytime attackers can place themselves in the communication’s path, there is the possibility that they can intercept and modify communications. 4. Security Concerns of Cloud Computing While cost and ease of use are two great benefits of cloud computing, there are significant security concerns that need to be addressed when considering moving critical applications and sensitive data to public and shared cloud environments. To address these concerns, the cloud provider must develop sufficient controls to provide the same or a greater level of security than the organization would have if the cloud were not used. Listed here are ten items to review when considering cloud computing. 5. Secure Data Publication Applied To Cloud Cloud computing facilitates storage of data at a remote site to maximize resource utilization. As a result, it is critical that this data be protected and only given to authorized individuals. This essentially amounts to secure publication of data that is necessary for data outsourcing, as well as external publications. We have developed techniques for publication of data in a secure manner. We assume that the data is represented as an XML document. This is a valid assumption as many of the documents on the web are now represented as XML documents. In the access control framework proposed in Bertino (2002), security policy is specified depending on user roles and credentials Users must possess the credentials to access XML documents. Security could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than under traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security. This essentially amounts to secure publication of data that is necessary for data outsourcing, as well as external publications. Since data in the cloud will be placed anywhere, it is important that the data is encrypted. We are using secure co-processor as part of the cloud infrastructure to enable efficient encrypted storage of sensitive data. Security is needed at server access internet access database access data privacy program access. Security concerns arising because both customer data and program are residing in provider premises. Security is used to save data and program from disrupts services, theft of information, loss of privacy, hostile program, hostile people giving instructions to good programs, bad guys corrupting or eavesdropping on communications. 6. Summary and Conclusion In this paper, we first discussed cloud computing then cloud module and its expansion secondly security issues for cloud. These issues include storage security, middleware security, data security, network security and application security. The main goal is to securely store and manage data that is not controlled by the owner of the data. We discussed how we may secure documents that may be published. There are several other security challenges including security aspects of virtualization. We believe that due to the complexity of the cloud, it will be difficult to achieve end-to-end security. However, the challenge we have is to ensure more secure operations even if some parts of the cloud fail. For many applications, we not only need information assurance but also mission assurance. 3
  • 4. Figure2. Case study of Worldwide Spending Cloud Reference 1. Andy BechtolsheimChairman & Co- founder, Arista Networks. November 12th, 2008 2. Encrypted Storage and Key Management for the cloud. Cryptoclarity.com. 2009- 07-30. 3. http://www.cryptoclarity.com/CryptoClar ityLLC/Welcome/Entries/2009/7/23_Enc rypted_Storage_and_Key_Management_ for_the_cloud.html. Retrieved 2010-08- 22 4. Mills, Elinor (2009-01-27). "Cloud computing security forecast: Clear skies". CNET. 5. Michael Gregg, Global Knowledge Instructor, CISA, CISSP, CISM, MCSE, CTT+, CGEIT, A+, N+, Security+, CNA, CCNA, CIW Security Analyst, CEH, CHFI, CEI, DCNP, ES Dragon IDS, ES Advanced Dragon IDS, and SSCP. 6. Ashwin Alfred Pinto, Shvetank Verma, Satyam Singh, Prashant Srivastava, Rahul Gupta, and Vijay Chourasia. Proceedings of the World Congress on Engineering 2011 7. Vol I WCE 2011, July 6 - 8, 2011, London, U.K. 8. www.cloudbook.net/resources. 9. "Service-Oriented Computing and Cloud Computing: Challenges and Opportunities". IEEE Internet Computing. Retrieved 2010-12-04. 10. "The NIST Definition of Cloud Computing (Draft)". National Institute of Science and Technology. Retrieved 24 July 2011. 4