CLOUD COMPUTING SECURITY By Yoshita Jumili Lawrence Technology University INT7223 Enterprise System Security Summer 2015 Dr. Terrance E. Dillard Instructor Introduction The economic case for cloud computing is compelling and at the same time there are striking challenges in its security. The concepts of cloud computing security issues are fundamentally new and intractable. What appears new is only relative to traditional computing that has been practiced since several years. Many such security problems have been giving attention since the time-sharing era. Cloud computing providers have and can build datacenters as large due to their expertise in organizing and provisioning computational resources at as low cost as possible. …show more content…
A significant paradigm shift is represented by public cloud computing from conventional norms of an organizational data center to a de-parameterized infrastructure which opens gates for potential adversaries to use. Cloud computing should be approached carefully with any emerging information technology area with due consideration to the sensitivity of data. A good planning helps and ensures that the computing environment is secure to the most possible extant and is in compliance with all relevant policies of an organization and makes sure the privacy is maintained. To understand the public cloud computing environment that is being offered by the cloud providers. The responsibilities of an organization and the cloud providers vary depending on the service model. Any organization should understand and organize the process of consuming the cloud services and also keep an eye on the delineation responsibilities over the computing environment and implicate security and privacy. Assurances or certification and compliance review entity paid by the cloud providers to support security or privacy should be well verified time to time by organization through independent assessment. To warrant the cloud
We would like to provide the benefits of cloud computing without any troubles to propel in the direction it is designed for. This is to be achieved by preventing the owner's data from all risks associated and providing a cloud model that is more secure and efficient. The proposed model shall overcome the security risks defined by the security functions over cloud computing, as follows in (Passent M. et al., 2015):
Cloud computing has set a trend in the information technology arena that has sparked the interest of all who utilize the internet on purpose and unsuspectingly. Initially, the primary purpose of cloud computing was to provide a centralized data bank that organizations could use for quick data access. Its use has been quickly adapted, however, beyond business use to become the first option for personal use. The advantages and disadvantages of implementing such a shift from business to personal are varied, yet, statistically, according to the CISCO Global Cloud Index: Forecast and Methodology, 2014-2019 White Paper, its public use is on the rise. The report notes that “by 2019, 56 percent of the cloud workloads will be in public cloud data centers, up from 30 percent in 2014 and by 2019, 44 percent of the cloud workloads will be in private cloud data centers, down from 70 percent in 2014”. Though disadvantages with regard to data security is prominent, users have deemed that its implementation will still promote greater benefits than loss.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are
Services such as, data storage and security, are provided by cloud computing over the internet. In cloud computing, users can pay for what they consume (Bisong & Rahman, An Overview of the Securtiy Concerns in Enterprise Cloud Computing, 2011). Cloud computing is an emerging information technology, which can make it easier for the users to manage their data. Cloud computing allows businesses to expand as new cloud-based models are being discussed and implemented as solutions (Bamiah & Brohi, 2011).
Though the architecture of cloud computation brings about the mitigation or negation of current security threats for users, such as the risk of leaking sensitive information at a lost or stolen laptop, new vulnerabilities and challenges are introduced. [Security and Privacy Issues in Cloud Computing] The threats to information assets residing in the cloud, including the outsourced data (input) and its corresponding solution (output), can generally be on
DATA SECURITY IN CLOUD COMPUTING Introduction: Cloud computing has prompted a movement in how individuals consider IT frameworks structural engineering. Numerous associations today are either executing cloud-based services, or assessing which cloud-based measures they will be portraying later on. As indicated by Gartner Inc. distributed computing is "no less compelling than e-business". This sprocess in building design from an undertaking normal server-based framework to a cloud-based framework will have related expenses of passage and dangers, yet it can bring about inconceivable advantages in reserve funds and in IT and business deftness.
The benefits such as low cost and convenience of cloud computing services have significantly changed our day to days activities, however, there are numerous security issues facing cloud computing making it difficult to maintain data security and privacy, support data and service availability and
Nowadays, cloud computing has penetrated into every corner of Internet industry with its low-cost computing resources, easy scaling architectures, and everywhere on-demand services. Security issues is the most important issue faced by people in the use of cloud computing data storage services [1].The advantage of cloud is cost savings. The prime disadvantage is security. The security risks associated with each cloud delivery model vary and are dependent on a wide range of issues counting the understanding of data quality’s, cloud architectures and safety measures organizes engaged in a exacting cloud atmosphere. With public audit capability, a trusted entity with expertise and capabilities data owners do not hold can be entrusted as an outside
Cloud computing depicts the utilization of a gathering of services, applications, data, and framework. While distributed computing is extending quickly and utilized by numerous people and associations globally, clients ' information is generally handled remotely in obscure machines that clients don 't possess or work. Consequently, clients ' apprehension of classified information spillage and loss of security in the cloud turns into a noteworthy boundary to the wide appropriation of cloud administrations. Data Loss/Leakage Prevention has been discovered to be one of the compelling methods for averting Data Loss. In this paper, we will examine about cloud computing data security issues, counting tile security of information transmission, storage, security and administration of security. Concentrate on all inclusive data administration influence cloud security examination, and called attention to that an achievement in the advancement of this cloud computing, attempt to list the comparing
be an issue. In different service models, the level of trust must also be different.
Cloud computing is a service that many businesses and organizations use to store large amounts of data with more cost efficiency. Using a service such as cloud computing can greatly minimize the cost spent on hardware and software or software licensing for corporations, and at the same time enhance the performance of business processes. The main concern with cloud computing remains primarily with privacy and security since all data and information are stored on the service provider’s network rather than a local personal computer. However, to resolve the problem of security, a Trusted cloud computing platform (TCCP) design was proposed to enable Infrastructure as a Service (IAAS). The suppliers like Amazon EC2 guarantees the trusted execution of virtual machines to provide a closed box execution, facilitating the users to test the IAAS supplier and decide whether the service is secure or not before launching their virtual machines (Santos, Gummadi, & Rodrigues, 2009, p. 1). Considering how important cloud computing had become, TCCP seems to be an ideal solution to the problem of cloud computing privacy and security.
This section of paper includes why we need cloud computing as a security control tool against the cyber criminal activities and in how many ways it can be implemented. As we are living in a technical era, many aspects of our lives rely on the Internet and computers, including transportation, communications, government, medicine, finance and education. Consider how much of our personal information is stored either on our own computer or on someone else’s system.
Visibility – The use of cloud services requires an organization to hand over the security management procedures of the systems with which the organization’s data and applications operate on to the service provider. Management and technical security control measures of the service provider should be in alignment with that of the service consumer to ensure that the security objectives of the consumer is achieved. Research on metrics for comparing the security procedures and controls between the consumer and service provider is still underway (Jansen, Directions in Security Metrics Research, 2009).
A major organisation involved in data security within cloud computing is the Cloud Security Alliance (CSA). They are a non profit organisation and their target is to “promote the use of best practise by providing security assurance within cloud computing and to provide education on the use of cloud computing to help secure other forms of computing”. The CSA works at an advantage for all users of the cloud as they work together to create and maintain a trusted cloud environment.