Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i) how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii) the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators. Keywords—Cloud computing; Data security; Network security; Cloud service provider security INTRODUCTION Cloud computing provides a lot of advantages like increased utilization of hardware resources, scalability, reduced costs, and easy deployment. To control the security risks in cloud, it is crucial for researchers, developers and all those who interact with the architecture to understand them so that they can take precautions to deploy security techniques. Nowadays There are a large number of consumers that choose to transfer their
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
The economic case for cloud computing is compelling and at the same time there are striking challenges in its security. The concepts of cloud computing security issues are fundamentally new and intractable. What appears new is only relative to traditional computing that has been practiced since several years. Many such security problems have been giving attention since the time-sharing era. Cloud computing providers have and can build datacenters as large due to their expertise in organizing and provisioning computational resources at
security of the cloud computing system. As stated in Gwu.edu. (2010), “We must be able to
The economic case for cloud computing is compelling and at the same time there are striking challenges in its security. The concepts of cloud computing security issues are fundamentally new and intractable. What appears new is only relative to traditional computing that has been practiced since several years. Many such security problems have been giving attention since the time-sharing era. Cloud computing providers have and can build datacenters as large due to their expertise in organizing and provisioning computational resources at as low cost as possible.
This journal examines the various types of threats that a cloud-based company has to defend against. The authors recognize that the cloud has the potential to be a disruptive force in technology, and it examines the concerns that a business has for migrating to the cloud through the use of surveys. The benefits and risks are examined and the article provides statics and charts to illustrate the findings. The most interesting point of this article is it highlights the concerns customers have listing security as the number one reason preventing a business from migrating to the cloud. I plan to use this article to explain the challenges developers face in securing data on the cloud, not only with application development but also with educating businesses to alleviate misconceptions on cloud computing.
DATA SECURITY IN CLOUD COMPUTING Introduction: Cloud computing has prompted a movement in how individuals consider IT frameworks structural engineering. Numerous associations today are either executing cloud-based services, or assessing which cloud-based measures they will be portraying later on. As indicated by Gartner Inc. distributed computing is "no less compelling than e-business". This sprocess in building design from an undertaking normal server-based framework to a cloud-based framework will have related expenses of passage and dangers, yet it can bring about inconceivable advantages in reserve funds and in IT and business deftness.
The top Cloud Service Providers (CSPs) in our market are various. Most of them have their special advantages for surviving in fierce business competitions. Some may have advantages on mobile app, some may have advantages on languages, customer help and support services or prices, or others may pay more attention on security protection and their reputation improvements. In this assignment, I picked up four top CSPs with comparisons of their functionality, cost, security, mobile access and customer support services. The four CSPs are Apple iCloud, Google, OpenDrive, and Amazon.
Cloud computing has formed the basis for future computing. The global computing infrastructure is rapidly moving towards cloud computing. While it is important to take advantages of it by means of deploying it in diversified sectors, the security aspects in a cloud based computing environment should be considered (Ahmed, 2014). Cloud computing is still a new technology in many enterprises. Findings show that most organizations are reluctant to adopt it and the demand to reduce computing cost has led to this great innovation (Agarwal, 2012). A sample size of 150 technical IT people will be used for data collection through questionnaires and interviews and the data collected will be analyzed using SPSS. The purpose of this study is to identify the cloud computing concepts as well as security issues inherent within cloud infrastructure. The adoption of cloud computing is not as complex as many organizations have thought and by moving the applications and hardware out of the organization the user can focus on its core strategies.
In this paper, the authors survey many sources and literature on cloud security issues, namely vulnerabilities, threats, and attacks. A total of 504 articles were look at to gather the data used in this paper. While the authors use this number to say that the research trend is up on mitigating security risks, they also suggest that security is the main priority of most research to the detriment of other areas. They offer no concrete numbers to back up this claim..
The cloud computing industry evolved over the past fifteen years and according to (White, 2013) in the article, “A Cloud Retrospective”, the cloud industry was introduced out of the dot.com bubble burst at the beginning of the twenty-first century compelled internet-based companies to modernize their Information Technology (IT) Architecture and find more efficient IT operating solutions (White, 2013). (White, 2013), writes that Amazon entered the cloud market by introducing its Amazon Web Services (AWS) in 2006. (White, 2013) states in 2007 there were disagreements by the experts on the true definition of cloud computing. In 2008 the cloud market expands to include more vendors (White, 2013). (White, 2013)
The Cloud Security Alliance reported that providers lack to offer much insight on their hiring practices and standards and for potential employees and access controls and audit techniques being used within their firm (Cloud Security Alliance, 2011). Providers with lapse practices and controls create an opening for attackers; they can simply gain employment with providers and attack the infrastructure from within.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Much like a giant office building provides the basic resources that can be tailored to fit several different businesses specific needs, Cloud providers offer customizable IT resources to satisfy an organization’s demands. (Salesforce, 2011) Employing Cloud allows the organization to focus on its primary goals and objectives.
The guidance provided herein is the third version of the Cloud Security Alliance document, “Security Guidance for Critical Areas of Focus in Cloud Computing,” which was originally released in April 2009. The permanent archive locations for these documents are: http://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf (this document) http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf (version 2 guidance) http://www.cloudsecurityalliance.org/guidance/csaguide.v1.0.pdf (version 1 guidance) In a departure from the second version of our guidance, each domain was
While reading this paper, the authors are discussing the security worries with in cloud computing and its challenges. In the information technology area, cloud computing has become one of the fastest-growing parts of the industry. As a result of the vast movement of cloud computing some concerns of security issues have appeared. The issues come from the idea that data is stored remotely from the user’s location. The beauty of cloud computing is that data can be stored in any location. Users concern about their privacy and security risk has lowered overall, however regarding cloud computing users do not feel comfortable because data is stored in a cloud (the network of computers used for remote storage and maintenance) and not