We can protect the data on cloud by decreasing its value to the attacker or intruder.We can achieve this by seeding false information in other word using disinformation attack. We imagine thatsecure cloud services can be implemented given six other security features: a. Confusing the intruder/masquerader with bogus information. b. Confuse the intruder by false information c. Secure the confidential data form web-administrator. d. Block the masquerader. e. Enhanced Authentication with OTP. f. Data security using AES encryption technique a. Monitoring the undesired behavior of the user: We imagine that the combination of these security features will provide high level of security for the Cloud. currently no other system can provide this level of security .We have used these concepts to notice illegal data access to data stored on a local file system by masqueraders, i.e. attackers who copy valid users after theft their identification .Our trial results in a local file system setting show that combining both techniques can produce better results, and our results advise that this approach may work in a Cloud environment, as the Cloud is proposed to be as clear to the user as a local file system. In the following we analysis briefly some of the trial results achieved by using this approach to detect masquerade activity in a local file setting.[11] b. Confuse the intruder by false information We suggest the use of decoy information technology. We monitor data access in the
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
We would like to provide the benefits of cloud computing without any troubles to propel in the direction it is designed for. This is to be achieved by preventing the owner's data from all risks associated and providing a cloud model that is more secure and efficient. The proposed model shall overcome the security risks defined by the security functions over cloud computing, as follows in (Passent M. et al., 2015):
The economic case for cloud computing is compelling and at the same time there are striking challenges in its security. The concepts of cloud computing security issues are fundamentally new and intractable. What appears new is only relative to traditional computing that has been practiced since several years. Many such security problems have been giving attention since the time-sharing era. Cloud computing providers have and can build datacenters as large due to their expertise in organizing and provisioning computational resources at
The economic case for cloud computing is compelling and at the same time there are striking challenges in its security. The concepts of cloud computing security issues are fundamentally new and intractable. What appears new is only relative to traditional computing that has been practiced since several years. Many such security problems have been giving attention since the time-sharing era. Cloud computing providers have and can build datacenters as large due to their expertise in organizing and provisioning computational resources at as low cost as possible.
Imagine massive server failures that not only lead to complete data loss, but also a financial crisis for customers. This is the problem that Lloyds Banking Group faced when servers failed and left thousands of customers without access to their accounts according to Clarke (2014). In order to protect firm data, firm reputation, and especially customer trust and loyalty, Bank of America needs to assure proper precautions are taken to securely store all data.
The scope of this memorandum is to develop a research project on the subject of cloud computing security and specifically the innovative ways developers are trying to secure data in the cloud. I will briefly describe the current cloud computing security structure and discuss measurement protocols that have been developed recently in order to test and measure the effectiveness of cloud security (Yesilyurt, et al.,
DATA SECURITY IN CLOUD COMPUTING Introduction: Cloud computing has prompted a movement in how individuals consider IT frameworks structural engineering. Numerous associations today are either executing cloud-based services, or assessing which cloud-based measures they will be portraying later on. As indicated by Gartner Inc. distributed computing is "no less compelling than e-business". This sprocess in building design from an undertaking normal server-based framework to a cloud-based framework will have related expenses of passage and dangers, yet it can bring about inconceivable advantages in reserve funds and in IT and business deftness.
There are numerous ways one can gain unauthorized access to data maintained in the cloud’s data centers. The methods vary from physical theft to trickery and electronic attack. Common methods of attack include cracking weak passwords, privilege escalation, exploiting unused database functionality, targeting known unfixed software vulnerabilities, SQL injection, and stealing unencrypted back-up tapes (Higgins, 2008).
In this article, we discuss about the different cloud types and models, threats and vulnerabilities of cloud, and how to manage them. The main aim of this literature review is to identify the weak points in cloud computing, minimize the threats and improve the security system. We will also discuss two of the main concepts of cloud – virtualization and multi-tenancy (Mishra, Mathur, Jain, & Rathore, 2013). A brief analysis of each of the threat and security measure is described in the literature review.
Security of data has reliably been a noteworthy issue in information technology. In the cloud computing environment, it turns out to be especially genuine on the grounds that the data is situated in better places even in all the globe. Information security and protection assurance are the two primary elements of client 's worries about the cloud technology. In spite of the fact that numerous strategies on the subjects in cloud computing have been examined in both scholastics and commercial enterprises, data security and protection assurance are turning out to be more imperative for the future advancement of cloud computing technology in government, industry, and business. Data security and privacy protection issues are applicable to both hardware and software in the
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Cloud computing is a web based utility model. Cybercrime effecting web based systems are equally applicable in the cloud computing. Considering the affectability and the harm that can be created by cybercrimes, this is an effort to examine the different digital dangers and routines used to mitigate them. Firstly, the paper will highlight cloud utilization according to different service models (IaaS, PaaS, and SaaS) and the potential dangers that are pertinent to these service models. Next, it highlights the commercial industries that are generally attacked. Lastly, we propose a complete five stage model to relieve cybercrime. It begins with disinfecting the client’s PC, usage of security amid transmission and closures with the information present in the cloud. Sticking to the proposed model, cybercrime may be controlled up to 90%. Instead of the five stage model, some companies frequently rely upon replicating the information.
While reading this paper, the authors are discussing the security worries with in cloud computing and its challenges. In the information technology area, cloud computing has become one of the fastest-growing parts of the industry. As a result of the vast movement of cloud computing some concerns of security issues have appeared. The issues come from the idea that data is stored remotely from the user’s location. The beauty of cloud computing is that data can be stored in any location. Users concern about their privacy and security risk has lowered overall, however regarding cloud computing users do not feel comfortable because data is stored in a cloud (the network of computers used for remote storage and maintenance) and not
In current paper we will go through current solution that are used to secure a cloud and get an idea where it is headed. We will start with the basic encryption techniques to complex and understand the infrastructure of who encryption is used to secure the cloud environment.
Cloud computing has become so famous; there is much widespread news about the cloud these days. This is mainly because of the exponential shift of the business applications from traditional models of software towards the Internet, and now through mobile devices. Cloud computing is a model that uses the network of remote servers that has been hosted on the internet rather than on a specific hardware. This would enable a better shared pool for storing, accessing and processing of data. With the huge information being available in the internet, the security for cloud computing has been challenging and this paper would elucidates the security threats of cloud computing also stating the possible countermeasures for them.