Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
—Cloud computing has been an attention in the new era of the IT technologies as there is an increase demand in the services or utility computing all over the wide world web. Security risk resulting from resource sharing throughout the cloud computing becomes one of the most challenging concerns in providing powerful processing and storage as on-demand services. Taking the advantage of low cost derived from the increase in efficiency and performance facilitated by cloud computing, governments and organizations around the globe are motivated to build or migrate to the cloud. However, there are still many technical issues relating to the features of cloud computing and the provision of quality service, leading to a delay in adopting cloud computing. This review paper highlights the security risks and challenges of cloud computing and study the security requirements for cloud computing. The primary aim of this review is to classify the security risks and challenges related to the different forms of cloud computing (SaaS, PaaS and IaaS).
Cloud Computing is a new networking technology, which provides a pool of highly scalable and easily accessible virtualized resources, such as development platforms or services, hardware, software, and is capable of hosting end user applications. A major concern in the Cloud is security; some agree that the Cloud is a secure and trusted system, while others seem to think differently. This paper will survey few major security issues and challenges for Cloud Computing, and investigate the trust models in the Inter-Cloud environment area.
Cloud computing is a technology that uses the Internet and central remote servers to preserve data and applications in a system. It also allows patrons and enterprises to utilize applications without installation and access their individual files with accessing the Internet at any computer. It also allows for much more well organized computing by centralizing data storage, bandwidth and processing. Within the last few years, Cloud computing has progressed as an important prototype for IT enterprises along with inexpensive in costs, transaction according to makes use of, scalability, quick ease of access along with more elasticity. Utmost undersized, medium and huge scale companies, organizations are moving towards cloud computing as it eliminates setting up of high-investment on IT communications and other services like Paas, NaaS and SaaS. In this system, the client data can be accessible in all around the world, controlled and maintained outside their accessibility. Accordingly, there can be privacy and security issues with the client's data. The services providers in cloud industry should convince their clients by ensuring and providing security to their accessible data. Hence, in this survey paper we present and examine different security and privacy issues obtainable in cloud computing. We have also discussed different security models top cloud service providers. Cloud computing system is consuming the globe, and each day is bringing innovative developments in this world.
Cloud computing has become one of the hottest topics in the IT world today. Its model of computing as a resource has changed the landscape of computing as we know it, and its promises of increased flexibility, greater reliability, massive scalability, and decreased costs have enchanted businesses. Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet from lightweight portable devices. This would allow multi-fold increase in the capacity and capabilities of the existing and new software. In a cloud computing environment, the entire data resides over a set of networked resources, enabling the data to be accessed through virtual machines. Since these datacenters may be located in any part of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and addressed. One can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be addressed with respect to security and privacy in a cloud computing environment. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders associated with it.
Cloud computing brings new possibiliti es for individuals and firms to utilize computing as a utility. It utilizes computing power irrelevant of user's location and devices. Thus it has become more demanding due to its performance, high computing power, cheapness, elasticity, accessibility, sca lability and availability. Cloud computing offers ubiquitous operation with different security challenges. In this paper we discuss security challenges and vulnerabilities as well as limitations of current security modules. This paper will serve as a baseline guide for new researchers in this area.
Cloud Security is still rapidly evolving and it is imperative for us to stay current or face dire consequences. This paper draws upon the collective experience and expertise of current industry and research trends in cloud security to create a more complete review. The methods and techniques used for Cloud security must continue to evolve due to the security challenges that Cloud Computing poses. A dynamic security is critical to find new ways to improve the quality of cloud security since traditional security solutions are having a hard time trying to keep up with the growing security needs of the ever-changing threat landscape in today's cloud environment. This paper aims to explore the needs of cloud security and its impact on the present day IT environment. We try to classify the security risks in the cloud environment, assess the cost of cloud security, delve into the types of attacks, look for currently available security solutions and arrive at a roadmap for cloud security.
2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2012
Cloud computing, one of the emerging topic in the field of information technology, is the development of parallel computing, distributed computing and grid computing. By using the internet and central remote services it maintains the data, applications etc which offers much more efficient computing by centralizing storage, memory, processing, bandwidth and so on. It can also concentrate all computation resources and manage automatically through the software without intervene. There are several layers in present cloud computing architecture, service models, platforms, issues i.e. security, privacy, reliability, open standard etc. and types. This paper presents all about the promising cloud computing technology i.e. its architecture, advantages, platforms, issues and challenges, applications, future and research options of cloud computing. There four generations of computing such as mainframe based computing, personal computing, client server based computing and web server based computing respectively. As there are several advantages over present generation of web server based computing such as fast micro processor, huge memory, high-speed network, reliable system architecture etc. we can say that cloud computing will provide the next generation of computing services.
Cloud Infrastructure including as a Service promise potential reducing capital expense, cost savings for businesses by offering the ability with scalable computing processing power to match flexible supply and demand, remote, and data storage. Security concerns and awareness arise as soon as one begins to run applications beyond the chosen firewall and move closer towards the public domain. The purpose of the paper identifies overall "cloud computing security" the aim to highlight the security attacks concerns that should be properly managed to realize the full potential of "cloud computing". These are aligned within the CIA (confidentiality, integrity, availability) model as a way to determine security risk.
Cloud computing is the development of parallel computing, distributed computing, grid computing and virtualization technologies which define the shape of a new era. Cloud computing is an emerging model of business computing. In this paper, we explore the concept of cloud architecture and compares cloud computing with grid computing. We also address the characteristics and applications of several popular cloud computing platforms. In this paper, we aim to pinpoint the challenges and issues of cloud computing. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt into cloud computing systems. In this paper, we investigate several cloud computing system providers about their concerns on security and privacy issues.
International Journal of Innovation and Scientific Research, 2014
Cloud computing is one of the most emerging networking technology, which has been considered as significantly effective among different types of users. Using cloud computing can be cost effective and organisation can focus more on their unique business idea instead of IT infrastructure or developing software, if they use IaaS or SaaS according to the business needs. However, there are issues with security of critical business data that is stored on cloud service provider's server. There are many concerns in regards to cloud computing security, which have many vulnerabilities and threats. In our previous paper, we have investigated security issues for cloud computing environment, where we have revealed the lack of awareness of cloud service providers to ensure the security. In this paper we have discussed about more threats and vulnerabilities of cloud computing, which cover some of the technical aspects of this burning issue. We would like to propose a cost effective and efficient security model for cloud computing environment after identifying the security risks involved in this sector of modern computing.
Cloud computing has transformed a large portion of the IT industry through its ability to provision infrastructure resources – computing, networking, storage, and software-as services. Software-Defined Networking (SDN) has transformed the physical underlying network infrastructure into programmable and virtualized networks. Network Functions Virtualization (NFV) has transformed physical telecommunication infrastructures and network functions into virtualised network functions and services. Cloud, SDN and NFV technologies and their associated software-defined infrastructures all rely on the virtualization technology to provision their virtual resources and offer them as services to users. These new technologies and infrastructures invariably bring with them traditional vulnerabilities and introduce new technology-specific security risks. In this paper, we discuss extensively cloud-, SDN-, and NFV-specific security challenges as well as approaches for addressing integrated infrastructural issues where cloud, SDN, and NFV all play their integral parts.
Citation/Export MLA Sakshi Sanjay Deshmukh, Dr.G.R.Bamnote, “Access to Encrypted Data in Cloud Database”, January 15 Volume 3 Issue 1 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 347 - 350, DOI: 10.17762/ijritcc2321-8169.150170 APA Sakshi Sanjay Deshmukh, Dr.G.R.Bamnote, January 15 Volume 3 Issue 1, “Access to Encrypted Data in Cloud Database”, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 347 - 350, DOI: 10.17762/ijritcc2321-8169.150170
Cloud computing has become one of the most interesting topics in the IT world today. Cloud model of computing as a resource has changed the landscape of computing as it promises of increased greater reliability, massive scalability, and decreased costs have attracted businesses and individuals alike. It adds capabilities to Information Technology's. Over the last few years, cloud computing has grown considerably in Information Technology. As more and more information of individuals and companies are placed in the cloud, there is a growing concern about the safety of information. Many Companies that are considered to be giants in software industry like Microsoft are joining to develop Cloud services [1]. Despite the hype about the cloud, customers are reluctant to deploy their business in the cloud. Security issues is one of the biggest concerns that has been affecting the growth of cloud computing .It adds complications with data privacy and data protection continues to affect the market. Users need to understand the risk of data breaches in the cloud environment. The paper highlights issues related to cloud computing.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.