尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
What is CLOUD COMPUTING?
The most demanding computing.
Cloud computing means storing and accessing data and
programs over the Internet instead of your computer's
hard drive. [5]
Featuresof cloudcomputing
 On demand-self service
 Broad Network access
 Resource pooling
 Rapid elasticity
 Measured service
 Pricing [10]
CHALLENGES
IN CLOUD COMPUTING
o Security
o Costing model
o Charging model
o Service level agreement
o Cloud interoperability issue [7]
What do we mean by
CLOUDSECURITY?
 Set of control-based technologies and policies designed to
adhere to regulatory compliance rules and protect information,
data applications and infrastructure associated with cloud
computing use.
 It can be done without the cost of maintaining facilities and
hardware.
 It addresses both physical
and logical security issues across
all service models of software. [3]
INTRODUCTION
 The Introduction of numerous cloud based services and
geographically dispersed cloud service providers, sensitive
information of different entities are normally stored in remote
servers.
 Locations with the possibilities of being exposed to
unwanted parties in situations where the cloud servers
storing those information are compromised. [1]
Sometimes, it might be required or at least possible
for a person to store data on remote cloud servers.
Sensitive States of cloudcomputing :
 The transmission of personal sensitive data to the cloud
server.
 The transmission of data from the cloud server to clients'
computers.
 The storage of clients’ personal data in cloud servers which
are remote servers, not owned by the clients. [1]
PROBLEM STATEMENT
Cloud security is becoming a key differentiator and
competitive edge between cloud providers. So by applying
the strongest security techniques and practices, cloud
security may soon be more secure than the level that IT
departments achieve using their own hardware and
software.
TYPES OF CLOUD
• Private cloud
--The cloud is managed by an organization and serves it
solely.
• Public cloud
--The cloud infrastructure is owned and managed by a large
Cloud Service Provider (CSP).
• Hybrid cloud
--The cloud infrastructure is composed of two or more of
the above models.
• Community cloud
--The cloud is managed by several organizations and
supports a specific community that has the same interest.
[7]
If security is not robust and consistent, the
flexibility and advantages that cloud computing
has to offer will have little credibility.
Here, we are going to discuss about the security
issues of cloud computing.
SECURITY AND PRIVACY ISSUES
Concerns of security issues:
‼ Availability :
It is to ensure its users can use them at any time, at any
place.
‼ Confidentiality :
It means keeping users’ data secret in the cloud systems.
‼ Data integrity :
It means to preserve information integrity (i.e., not lost or
modified by unauthorized users).
‼ Control :
It means to regulate the use of the system, including the
applications, its infrastructure and the data.
‼ Audit :
It means to watch what happened in the cloud system,
could be added virtualized application environment hosted
on the virtual machine to provide facilities watching what
happened in the system. [3]
THREATS TO CLOUD COMPUTING
Data Breaches:
In cloud computing, the virtual machines (VMs) are residing in the
same physical host and when one VM is able to access information
from another VM, data breach occurs.
Data Loss:
The things leading to permanent loss of data include malicious
attacker, hard drive failure, fire or earthquake. Some of these
reasons could be due to the service providers fault.
AccountHijacking:
Account hijacking uses attack methods such as fraud ,exploitation
etc of software vulnerabilities where credentials and passwords
are reused.
Denial-of-Service:
This attack attempts to make the system or network resources
unavailable to the users from accessing their data and applications
from cloud.
AbuseofCloudService:
The main concern is for the CSVs rather than cloud service clients
since the users will be trying to hack the system to gain access to
confidential data.
MaliciousInsiders:
The employees who are working for cloud service providers such
as the system administrator will have complete access to the
confidential resources. Their access can be a big threat to
customers to view confidential data. [11]
WHY DO WE NEED CLOUD-SECURITY ?
Cloud adoption is expected to accelerate in the coming
years, organizations are still wary of the cloud as the
right delivery environment for many business
applications. The dominant concern is Security.
Businesses question whether their data is safe in
the cloud, and how they can employ an on-demand
service while maintaining regulatory and industry
compliance.
Organizations are right to balk about going head first into
the cloud without some guarantees about protection.
SECURITY MEASURES OF CLOUD
 User control.
 Investigative support, investigating inappropriate or
illegal activity may be impossible in cloud computing.
 Intrusion detection and prevention.
 Misconfiguration takes place, because lack of
expertise coupled with insufficient communication.
 Threat to access important information is also a
major concern which can lead to huge loss of data
and can even lead to hacking.
 Availability and backup. [23]
Four GeneralServerRisks in Cloud
Denial of Service (DoS) :
Being of the latter is obviously always an issue for
servers. The added risk to using the cloud is that attacks on
other users of the cloud would affect your
portion.
Data Breaches:
Have greater potential of disaster on the cloud. A single
flaw in a cloud service could cause one data breach to extend
to a breach of the entire system.
Data loss :
It is an issue not unique to the cloud. Power loss is a
potential scenario everywhere on Earth and sometimes
unavoidable.
Data Integrity :
The risk of giving other access to your server’s internals
and secrets is once again almost unavoidable . Unless you
were to buy, setup, and implement your own server in your
home you will probably have to trust someone else to help
you, thereby risking the data’s integrity. [4]
APPLICATIONS OF CLOUD COMPUTING
1) Cloud computing provides dependable and secure data
storage center.
2) Cloud computing can realize data sharing between
different equipments.
3) The cloud provides nearly infinite possibility for users to
use the internet.
4) Cloud computing does not need high quality equipment
for the user and it is easy to use. [3]
FUTURESCOPE OF CLOUD SECURITY
 It is facing many challenges regarding the security of data.
 Modification of this technology helps to secure the data.
 Many research on this technology are taking place which
would eventually help this technology to expand its scope in
future leading to more secure data.
 Architectures , thus it will help to grow the IT industry as
well as advancement of this technology would help in big
organizations as well as full-fill the requirement of public
industry as well. [23]
STEPS TAKEN FOR BETTER CLOUD
 There are organizations working towards a more secure cloud,
such as the CSA (CLOUD SECURITY ALLIANCE).
 Another is Silver Sky, an expert provider of cloud security and
provider of “the industry’s only advanced Security-as-a-Service
platform from the cloud”.
 The CTO of Silver Sky, Andrew Jaquith, explains that many CIOs
are moving their services to the cloud in order to save money,
but that security remains a key concern and these moves may
be insecure or at least hasty.
 On the other hand, he also explains that many cloud service
providers are becoming clearer, more transparent, and more
assured than ever before that they could protect customer data.
SOLUTIONS OF ISSUESIN CLOUD SECURITY
‼ Network and security audits
‼ Security threat assessments
‼ Secure network and infrastructure design
‼ Network perimeter protection, including firewalls and
intrusion detection
‼ Remote access strategies, including VPN implementations
‼ Data loss prevention for information in motion and at rest
[23]
CONCLUSION
 The Cloud provides many options for the everyday
computer user as well as large and small businesses.
 Clouds are more subjected to the data theft, malicious
access, and unsecured internet access.
 Efforts have been made to enforce confidentiality, integrity
and privacy of data.
 We have discussed the Issues, Factors Affecting the Data
Security, Threats to it, Measures being taken towards it,
Applications of it as well.
 The customers before shifting their data enter to cloud,
they should understand the sensitivity of data and choose
the cloud model based on their requirement.
 Thus it will help to grow the IT industry as well as
advancement of this technology would help in big
organizations as well as full-fill the requirement of public
industry as well. [23]
CITATIONS
[1] K.S. Wagh, Swapnil Chaudhari, Anita Deshmukh and Prajakta Khandave, “Data Security in
Cloud Computing”. International Journal of Current Engineering and Technology, 2014.
[2] Naveen Dogra and Harpreet Kaur, “Cloud Computing Security: Issues and Concerns”.
International Journal of Emerging Technology and Advanced Engineering, 2013.
[3] Alycia Sebastian and Dr. L. Arockiam, “A Study on Data Security Issues in Public Cloud”.
International Journal of Scientific & Technology Research, 2014.
[4] Rabi Prasad Padhy, Manas Ranjan Patra and Suresh Chandra Satapathy, “Cloud Computing:
Security Issues and Research Challenges”. International Journal of Computer Science and
Information Technology & Security, 2011.
[5] Monjur Ahmed and Moh. Ammad Ashraf Hossain, “Cloud Computing and Security Issues in
the Cloud”. International Journal of Network Security & Its Applications, 2014.
[6] Rampal Singh, Sawan Kumar and Shani Kumar Agrahari, “Ensuring Data Security in Cloud
Computing”. IOSR Journal of Engineering, 2012.
[7] Santosh Kumar and R.H. Goudar, “Cloud Computing – Research Issues, Challenges,
Architecture, Platforms and Applications”. International Journal of Future Computer and
Communication, 2012.
[8] Shevleen Pandey and Mohammed Farik, “Cloud Computing Security: Latest Issues &
Countermeasures”. International Journal of Scientific & Technology Research, 2015.
[9] Narendra Gaurha and Dr. Manish Shrivastava, “Data Security in Cloud Computing Using
Linear Programming”. International Journal of Emerging Technology and Advanced Engineering,
2012.
[10] Patrick Mosca, Yanping Zhang, Xhifeng Xiao and Yun Wang, “Cloud Security: Services, Risks
and a Case Study on Amaon Cloud Services”. Technical Report, 2010.
[11] Anu Rathi, Yogesh Kumar and Anish Talwar, “Aspects of Security in Cloud Computing”.
International Journal Of Engineering And Computer Science ISSN, 2013.

More Related Content

What's hot

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
Thanakrit Lersmethasakul
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
 
Data-Intensive Technologies for Cloud Computing
Data-Intensive Technologies for CloudComputingData-Intensive Technologies for CloudComputing
Data-Intensive Technologies for Cloud Computing
huda2018
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
Abhishek Pachisia
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
Ravindra Dastikop
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Dmz
Dmz Dmz
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
Mohammad Ilyas Malik
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Software as a service
Software as a serviceSoftware as a service
Software as a service
Divya korrapati
 
Historical development of cloud computing
Historical development of cloud computingHistorical development of cloud computing
Historical development of cloud computing
gaurav jain
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
Ripal Ranpara
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 

What's hot (20)

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Data-Intensive Technologies for Cloud Computing
Data-Intensive Technologies for CloudComputingData-Intensive Technologies for CloudComputing
Data-Intensive Technologies for Cloud Computing
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Dmz
Dmz Dmz
Dmz
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Software as a service
Software as a serviceSoftware as a service
Software as a service
 
Historical development of cloud computing
Historical development of cloud computingHistorical development of cloud computing
Historical development of cloud computing
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Google App Engine ppt
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 

Similar to Cloud security

Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
Jahangeer Qadiree
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
IAEME Publication
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
cscpconf
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
csandit
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
Er. Saba karim
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
Jahangeer Qadiree
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
sophiabelthome
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
ijcsa
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
H017155360
H017155360H017155360
H017155360
IOSR Journals
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Fog doc
Fog doc Fog doc
Fog doc
priyanka reddy
 

Similar to Cloud security (20)

Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 

Recently uploaded

(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"
MJDuyan
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
 
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
yarusun
 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
MattVassar1
 
Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024
Friends of African Village Libraries
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT KanpurDiversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
Decolonizing Universal Design for Learning
Decolonizing Universal Design for LearningDecolonizing Universal Design for Learning
Decolonizing Universal Design for Learning
Frederic Fovet
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity
RuchiRathor2
 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
Quizzito The Quiz Society of Gargi College
 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
khabri85
 
Creating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptxCreating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptx
Forum of Blended Learning
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Celine George
 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
EducationNC
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
Nguyen Thanh Tu Collection
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
 
pol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdfpol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdf
BiplabHalder13
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 

Recently uploaded (20)

(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
 
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
 
Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT KanpurDiversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT Kanpur
 
Decolonizing Universal Design for Learning
Decolonizing Universal Design for LearningDecolonizing Universal Design for Learning
Decolonizing Universal Design for Learning
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity
 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
 
Creating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptxCreating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptx
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
 
pol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdfpol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdf
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 

Cloud security

  • 1.
  • 2.
  • 3. What is CLOUD COMPUTING? The most demanding computing. Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. [5]
  • 4. Featuresof cloudcomputing  On demand-self service  Broad Network access  Resource pooling  Rapid elasticity  Measured service  Pricing [10]
  • 5. CHALLENGES IN CLOUD COMPUTING o Security o Costing model o Charging model o Service level agreement o Cloud interoperability issue [7]
  • 6. What do we mean by CLOUDSECURITY?  Set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use.  It can be done without the cost of maintaining facilities and hardware.  It addresses both physical and logical security issues across all service models of software. [3]
  • 7. INTRODUCTION  The Introduction of numerous cloud based services and geographically dispersed cloud service providers, sensitive information of different entities are normally stored in remote servers.  Locations with the possibilities of being exposed to unwanted parties in situations where the cloud servers storing those information are compromised. [1]
  • 8. Sometimes, it might be required or at least possible for a person to store data on remote cloud servers. Sensitive States of cloudcomputing :  The transmission of personal sensitive data to the cloud server.  The transmission of data from the cloud server to clients' computers.  The storage of clients’ personal data in cloud servers which are remote servers, not owned by the clients. [1]
  • 9. PROBLEM STATEMENT Cloud security is becoming a key differentiator and competitive edge between cloud providers. So by applying the strongest security techniques and practices, cloud security may soon be more secure than the level that IT departments achieve using their own hardware and software.
  • 10. TYPES OF CLOUD • Private cloud --The cloud is managed by an organization and serves it solely. • Public cloud --The cloud infrastructure is owned and managed by a large Cloud Service Provider (CSP). • Hybrid cloud --The cloud infrastructure is composed of two or more of the above models. • Community cloud --The cloud is managed by several organizations and supports a specific community that has the same interest. [7]
  • 11. If security is not robust and consistent, the flexibility and advantages that cloud computing has to offer will have little credibility. Here, we are going to discuss about the security issues of cloud computing.
  • 12. SECURITY AND PRIVACY ISSUES Concerns of security issues: ‼ Availability : It is to ensure its users can use them at any time, at any place. ‼ Confidentiality : It means keeping users’ data secret in the cloud systems. ‼ Data integrity : It means to preserve information integrity (i.e., not lost or modified by unauthorized users).
  • 13. ‼ Control : It means to regulate the use of the system, including the applications, its infrastructure and the data. ‼ Audit : It means to watch what happened in the cloud system, could be added virtualized application environment hosted on the virtual machine to provide facilities watching what happened in the system. [3]
  • 14. THREATS TO CLOUD COMPUTING Data Breaches: In cloud computing, the virtual machines (VMs) are residing in the same physical host and when one VM is able to access information from another VM, data breach occurs. Data Loss: The things leading to permanent loss of data include malicious attacker, hard drive failure, fire or earthquake. Some of these reasons could be due to the service providers fault. AccountHijacking: Account hijacking uses attack methods such as fraud ,exploitation etc of software vulnerabilities where credentials and passwords are reused.
  • 15. Denial-of-Service: This attack attempts to make the system or network resources unavailable to the users from accessing their data and applications from cloud. AbuseofCloudService: The main concern is for the CSVs rather than cloud service clients since the users will be trying to hack the system to gain access to confidential data. MaliciousInsiders: The employees who are working for cloud service providers such as the system administrator will have complete access to the confidential resources. Their access can be a big threat to customers to view confidential data. [11]
  • 16. WHY DO WE NEED CLOUD-SECURITY ? Cloud adoption is expected to accelerate in the coming years, organizations are still wary of the cloud as the right delivery environment for many business applications. The dominant concern is Security. Businesses question whether their data is safe in the cloud, and how they can employ an on-demand service while maintaining regulatory and industry compliance. Organizations are right to balk about going head first into the cloud without some guarantees about protection.
  • 17. SECURITY MEASURES OF CLOUD  User control.  Investigative support, investigating inappropriate or illegal activity may be impossible in cloud computing.  Intrusion detection and prevention.
  • 18.  Misconfiguration takes place, because lack of expertise coupled with insufficient communication.  Threat to access important information is also a major concern which can lead to huge loss of data and can even lead to hacking.  Availability and backup. [23]
  • 20. Denial of Service (DoS) : Being of the latter is obviously always an issue for servers. The added risk to using the cloud is that attacks on other users of the cloud would affect your portion. Data Breaches: Have greater potential of disaster on the cloud. A single flaw in a cloud service could cause one data breach to extend to a breach of the entire system.
  • 21. Data loss : It is an issue not unique to the cloud. Power loss is a potential scenario everywhere on Earth and sometimes unavoidable. Data Integrity : The risk of giving other access to your server’s internals and secrets is once again almost unavoidable . Unless you were to buy, setup, and implement your own server in your home you will probably have to trust someone else to help you, thereby risking the data’s integrity. [4]
  • 22. APPLICATIONS OF CLOUD COMPUTING 1) Cloud computing provides dependable and secure data storage center. 2) Cloud computing can realize data sharing between different equipments. 3) The cloud provides nearly infinite possibility for users to use the internet. 4) Cloud computing does not need high quality equipment for the user and it is easy to use. [3]
  • 23. FUTURESCOPE OF CLOUD SECURITY  It is facing many challenges regarding the security of data.  Modification of this technology helps to secure the data.  Many research on this technology are taking place which would eventually help this technology to expand its scope in future leading to more secure data.  Architectures , thus it will help to grow the IT industry as well as advancement of this technology would help in big organizations as well as full-fill the requirement of public industry as well. [23]
  • 24. STEPS TAKEN FOR BETTER CLOUD  There are organizations working towards a more secure cloud, such as the CSA (CLOUD SECURITY ALLIANCE).  Another is Silver Sky, an expert provider of cloud security and provider of “the industry’s only advanced Security-as-a-Service platform from the cloud”.  The CTO of Silver Sky, Andrew Jaquith, explains that many CIOs are moving their services to the cloud in order to save money, but that security remains a key concern and these moves may be insecure or at least hasty.  On the other hand, he also explains that many cloud service providers are becoming clearer, more transparent, and more assured than ever before that they could protect customer data.
  • 25. SOLUTIONS OF ISSUESIN CLOUD SECURITY ‼ Network and security audits ‼ Security threat assessments ‼ Secure network and infrastructure design ‼ Network perimeter protection, including firewalls and intrusion detection ‼ Remote access strategies, including VPN implementations ‼ Data loss prevention for information in motion and at rest [23]
  • 26. CONCLUSION  The Cloud provides many options for the everyday computer user as well as large and small businesses.  Clouds are more subjected to the data theft, malicious access, and unsecured internet access.  Efforts have been made to enforce confidentiality, integrity and privacy of data.  We have discussed the Issues, Factors Affecting the Data Security, Threats to it, Measures being taken towards it, Applications of it as well.
  • 27.  The customers before shifting their data enter to cloud, they should understand the sensitivity of data and choose the cloud model based on their requirement.  Thus it will help to grow the IT industry as well as advancement of this technology would help in big organizations as well as full-fill the requirement of public industry as well. [23]
  • 28. CITATIONS [1] K.S. Wagh, Swapnil Chaudhari, Anita Deshmukh and Prajakta Khandave, “Data Security in Cloud Computing”. International Journal of Current Engineering and Technology, 2014. [2] Naveen Dogra and Harpreet Kaur, “Cloud Computing Security: Issues and Concerns”. International Journal of Emerging Technology and Advanced Engineering, 2013. [3] Alycia Sebastian and Dr. L. Arockiam, “A Study on Data Security Issues in Public Cloud”. International Journal of Scientific & Technology Research, 2014. [4] Rabi Prasad Padhy, Manas Ranjan Patra and Suresh Chandra Satapathy, “Cloud Computing: Security Issues and Research Challenges”. International Journal of Computer Science and Information Technology & Security, 2011. [5] Monjur Ahmed and Moh. Ammad Ashraf Hossain, “Cloud Computing and Security Issues in the Cloud”. International Journal of Network Security & Its Applications, 2014. [6] Rampal Singh, Sawan Kumar and Shani Kumar Agrahari, “Ensuring Data Security in Cloud Computing”. IOSR Journal of Engineering, 2012.
  • 29. [7] Santosh Kumar and R.H. Goudar, “Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications”. International Journal of Future Computer and Communication, 2012. [8] Shevleen Pandey and Mohammed Farik, “Cloud Computing Security: Latest Issues & Countermeasures”. International Journal of Scientific & Technology Research, 2015. [9] Narendra Gaurha and Dr. Manish Shrivastava, “Data Security in Cloud Computing Using Linear Programming”. International Journal of Emerging Technology and Advanced Engineering, 2012. [10] Patrick Mosca, Yanping Zhang, Xhifeng Xiao and Yun Wang, “Cloud Security: Services, Risks and a Case Study on Amaon Cloud Services”. Technical Report, 2010. [11] Anu Rathi, Yogesh Kumar and Anish Talwar, “Aspects of Security in Cloud Computing”. International Journal Of Engineering And Computer Science ISSN, 2013.
  翻译: