scholarly journals Cloud Computing: Security Issues and Challenges

2016 ◽  
Vol 1 (1) ◽  
Author(s):  
Muhammad Aamir Nadeem

Cloud Computing is a recently emerged paradigm, for sure out of infancy but yet not matured, is aiming at provisioning of computing resources in most efficient and economical way. Virtualization is the key technique behind Cloud Computing. It adopts Service Oriented Architecture which enables its clients to transform their requirements problems into services thus benefited by the solution provided by the Cloud. Besides provisioning of computing and storage resources, it expanded the traditional threat environment. The vulnerabilities and threats to Cloud are the issues which if successfully overcome would make Cloud a digital fort for its users. This paper surveys the weaknesses in Cloud architecture, internet protocols, operating system and application software, and in crypto system. It also identifies the challenges related to Cloud security and counter measures to resolve those issues.

Author(s):  
Rizwan Ur Rahman ◽  
Divya Rishi Sahu ◽  
Deepak Singh Tomar

Web services and Service oriented architecture are innovative phase of distributed computing, build on top of the distributed computing models. Web services are being used mostly for the integration business components. One of the key concerns in web services and service oriented architecture is implementation of adequate security. Security issues in SOA are still probing and in spite of an increase in web service research and development, many security challenges remain unanswered. This chapter introduces the vulnerabilities, threats associated with web services and addresses WS-Security standards and countermeasures. Web service protocol is designed to provide connectivity. Not any of these standards of web services contain any inbuilt security aspect of their own. Web Services are exposed to attack from common Internet protocols and in addition to new categories of attacks targeting Web Services in particular. Consequently, the aim of this chapter is to provide review of security mechanism in web services.


2015 ◽  
pp. 2149-2164
Author(s):  
Joseph M. Kizza ◽  
Li Yang

Cloud computing as a technology is difficult to define because it is evolving without a clear start point and no clear prediction of its future course. Even though this is the case, one can say that it is a continuous evolution of a computer network technology. It extends client-server technology that offers scalability, better utilization of hardware, on-demand applications and storage, and lower costs over the long run. It is done through the creation of virtual servers cloned from existing instances. The cloud technology seems to be in flux; hence, it may be one of the foundations of the next generation of computing. A grid of a few cloud infrastructures may provide computing for millions of users. Cloud computing technology consists of and rests on a number of sound, fundamental, and proven technologies. This includes virtualization, service-oriented architectures, distributed computing, and grid computing. Based on these fundamental and sound computing principles, one wonders whether cloud computing is the next trajectory of computing. This chapter discusses this in depth and also looks at the security issues involved.


Author(s):  
Joseph M. Kizza ◽  
Li Yang

Cloud computing as a technology is difficult to define because it is evolving without a clear start point and no clear prediction of its future course. Even though this is the case, one can say that it is a continuous evolution of a computer network technology. It extends client-server technology that offers scalability, better utilization of hardware, on-demand applications and storage, and lower costs over the long run. It is done through the creation of virtual servers cloned from existing instances. The cloud technology seems to be in flux; hence, it may be one of the foundations of the next generation of computing. A grid of a few cloud infrastructures may provide computing for millions of users. Cloud computing technology consists of and rests on a number of sound, fundamental, and proven technologies. This includes virtualization, service-oriented architectures, distributed computing, and grid computing. Based on these fundamental and sound computing principles, one wonders whether cloud computing is the next trajectory of computing. This chapter discusses this in depth and also looks at the security issues involved.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


Author(s):  
Ainul Azila Che Fauzi ◽  
A. Noraziah ◽  
Tutut Herawan ◽  
Noriyani Mohd. Zin

2018 ◽  
pp. 54-76
Author(s):  
Tabassum N. Mujawar ◽  
Ashok V. Sutagundar ◽  
Lata L. Ragha

Cloud computing is recently emerging technology, which provides a way to access computing resources over Internet on demand and pay per use basis. Cloud computing is a paradigm that enable access to shared pool of resources efficiently, which are managed by third party cloud service providers. Despite of various advantages of cloud computing security is the biggest threat. This chapter describes various security concerns in cloud computing. The clouds are subject to traditional data confidentiality, integrity, availability and various privacy issues. This chapter comprises various security issues at different levels in environment that includes infrastructure level security, data level and storage security. It also deals with the concept of Identity and Access Control mechanism.


Author(s):  
Ihssan Alkadi

There are many steps involved with securing a cloud system and its applications (SaaS) and developed ones in (PaaS). Security and privacy issues represent the biggest concerns to moving services to external clouds (Public). With cloud computing, data are stored and delivered across the Internet. The owner of the data does not have control or even know where their data are being stored. Additionally, in a multi-tenant environment, it may be very difficult for a cloud service provider to provide the level of isolation and associated guarantees that are possible with an environment dedicated to a single customer. Unfortunately, to develop a security algorithm that outlines and maps out the enforcement of a security policy and procedure can be a daunting task. A good security algorithm presents a strategy to counter the vulnerabilities in a cloud system. This chapter covers the complete overview, comparative analysis of security methods in Cloud Applications in STEM Education and the introduction of a new methodology that will enforce cloud computing security against breaches and intrusions. Much light will be shed on existing methodologies of security on servers used for cloud applications in STEM education and storage of data, and several methods will be presented in addition to the newly developed method of security in cloud-based servers, such as the MIST (Alkadi). Not only can cloud networks be used to gather sensitive information on multiple platforms, also there are needs to prevent common attacks through weak password recovery, retrieval, authentication, and hardening systems; otherwise hackers will spread cyber mayhem. Discussion of current security issues and algorithms in a real world will be presented. Different technologies are being created and in constant competition to meet the demands of users who are generally “busy”. The selling point of these technologies is the ability to address these demands without adding more to any workloads. One of the demands often discussed is that users want to have their digital information accessible from anywhere at any time. This information includes documents, audio libraries, and more. Users also demand the ability to manage, edit and update this information regardless of physical location. Somewhat recently, mobile devices such as laptops, tablets, and smartphones have provided these abilities. This is no small feat as vendors and providers have reduced the size of these devices to increase mobility. However, as the amount of personal information that users are wanting to access has grown exponentially, manipulation and storage of it require more capable devices. To meet increased demands, increasing the capabilities of mobile devices may be impractical. Making mobile devices more powerful without technological advancement would require that the device be larger and use more resources such as battery life and processing power to function properly. Storing all of a user's information on a mobile device that travels everywhere also adds vulnerability risks. The best technical solution to having a user's information accessible is some sort of online storage where there is the convenience to store, manipulate and retrieve data. This is one of the most practical applications for the concept of cloud computing in STEM education. As storage capabilities and Internet bandwidth has increased, so has the amount of personal data that users store online. And today, the average user has billions of bytes of data online. Access is everywhere and whenever is needed. As everyone started doing so, people want their data safe and secure to maintain their privacy. As the user base grew in size, the number of security issues of the personal data started to become increasingly important. As soon as someone's data are in the remote server, unwanted users or “hackers” can have many opportunities to compromise the data. As the online server needs to be up and running all the time, the only way to secure the cloud server is by using better passwords by every user. By the same token, the flaws in the password authentication and protection system can also help unwanted users to get their way to other people's personal data. Thus, the password authentication system should also be free from any loopholes and vulnerabilities.


2011 ◽  
pp. 678-693
Author(s):  
Ishan Bhalla ◽  
Kamlesh Chaudhary

Traffic Management System (TMS) is a possible implementation of a Green IT application. It can have direct impact on reducing the greenhouse gases. The focus of this report is to illustrate how event driven SOA design principles can be applied in designing traffic management system. It also discusses how cloud computing concept can be used for TMS application. Traffic during peak hours is a problem in any major city where population growth far exceeds the infrastructure. Frequent stop and start of the cars on the heavy traffic roads and slow moving traffic causes greater fuel consumption, which results in greater emission of carbon gases. If efficient traffic management system can speed up the traffic average speed it will help reduce the carbon emission. As the WiMAX technology reaches maturity and achieves greater reliability and speed for wireless data transmissions new mobile applications are possible. Traffic Management System is one such example. WiMAX can facilitate communication to and from fast moving cars. WiMAX combined with GPS (Global Positioning System) technology can facilitate building an efficient traffic management system. The authors have also discussed various scenarios where Cloud computing technology can be utilised resulting in further optimisation of the computing resources and therefore reducing the carbon emission.


Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


Sign in / Sign up

Export Citation Format

Share Document