Anda di halaman 1dari 15

Challenges and Security

Issues in Cloud Computing


Journal Name: International Journal of
Computational Intelligence and Information
Security

Author(s): R. Kalaichelvi Chandrahasan, S


Shanmuga Priya and Dr. L. Arockiam

Volume, Issue Year: Vol. 3, March 2012

Web Link:
http://cloudtribes.com/docstation/com_docstatio
n/12/research_challenges_and_security_issues_i
n_cloud.pdf
INTRODUCTION:

Cloud is a metaphor for internet


Resources in large data centre are made available
as service over internet
It provides virtual data storage to business
environment
It takes virtual infrastructure and is on demand
access to It services and products
Lot of sensitive and confidential data is present on
cloud
Purpose of this paper is to highlight all
possible security issues related to
virtualized world
Structure Of Paper
Cloud is:
On Demand
Self Service
ubiquitous network access(widely accessible)
Location independent
Resource pooling
Rapid elasticity
Measured service
Cloud is a service oriented
architecture
It has three layer:
SAAS: (top most) cloud as software provides
customer with ready to use application on
infrastructure of service provider.
PAAS:(middle) cloud as a platform, provides
platform oriented services means services that
applications can request from operating system
for example Google App Engine
IAAS:(last) cloud as an infrastructure provides
services such as memory, storages and virtual
servers.
Service model:
Security challenges:
Data Security
Access Control
Service Management
Trust Management
Identity Management
Data Segregation
Policy Integration
Denial of service attacks
As lot of users sensitive data is available on
public domain so privacy is key challenge.
Solutions:
Cryptography
Public Key Infrastructure
Standardization of APIs
Prioritize the controlling and monitoring
physical access
Audit network flow
Confidentiality agreements.
The Service Level
Agreement:
The quality and reliability of services are
becoming very important day by day.
SLA is a agreement between the consumer
and provider.
It serves a basic level of service between the
consumer and provider.
This is the only mean a customer trust the
cloud provider or it is the only way a vendor
can gain the consumers trust.
Research Methodology:
The authors have used real time examples to
relate the security issues of cloud for better
understanding of the potential threats and
data security.
Authors have given example how Google App
monitor0s data and maintain security.
There are also some information taken from
different sources like The US National Institute
of Standards and Technology (NIST),
International Data Corporation(IDC).
Criticism:
The Authors have not talked about:
A. Cost in maintaining the security standards.
B. The cyber laws.
C. The hardware failure is also not looked upon.

Learning:
In todays world where technology has taken
over where we are living a virtual world, data
security is very important aspect.
Encryption should be used, user should be more
vigilant, security policies should be there, better
monitoring of systems should be there and
authentication should be done.
Also we have learn about cloud computing
virtualization, types of cloud its function,
services provided by cloud and what all
challenges are there in cloud.
CONCLUSION:
The richer the pot of data, the more cloud
service provider need to do to protect it
says IDC research analyst (David
Bradshaw).
Cloud computing has become a highly
demanded service due to the advantages
of high computing power, cheap cost of
services, high performance, scalability,
accessibility as well as availability.
But at the same time security issues
should also be acknowledge.
References:
Hashizume, K., Rosado, D. G., Fernndez-Medina, E., &
Fernandez, E. B. (2013). An analysis of security issues
for cloud computing.Journal of Internet Services and
Applications,4(1), 1.
Jonathan Spring Software Engineering, "Monitoring
Cloud computing by layer part 1" Security & Privacy,
IEEE vol 9, Issue 2, pp 66-68, Mar 2011
Nelson Gonzalez, Charles Miers, "A quantitative
analysis of current security concerns and solutions for
cloud computing", Third IEEE International conference
on Cloud Computing Technology and Science, pp 231-
238, 2011.

Anda mungkin juga menyukai