Identification of Various Privacy and Trust Issues in Cloud Computing Environment

Author(s):  
Shivani Jaswal ◽  
Manisha Malhotra

Cloud computing is a rising paradigm in today's world. In this, users can send his or her request to any CSP, i.e., cloud service provider, of their choice. In return, the CSP reverts him back with that particular service. Now, while communicating from various two locations, the data transferred is not passed through that much amount of security and privacy as expected. So, there are lots of parameters in the environment that are taken care of while sending, receiving or just passing data over the network. This chapter presents various security issues that are underlying in cloud computing. This chapter has illustrated various issues such as Trust, Encryption, Authenticity, Confidentiality and Multi Tenancy. Also, some of the proposed solutions have also been discussed later in the chapter.

2019 ◽  
pp. 992-1013
Author(s):  
Shivani Jaswal ◽  
Manisha Malhotra

Cloud computing is a rising paradigm in today's world. In this, users can send his or her request to any CSP, i.e., cloud service provider, of their choice. In return, the CSP reverts him back with that particular service. Now, while communicating from various two locations, the data transferred is not passed through that much amount of security and privacy as expected. So, there are lots of parameters in the environment that are taken care of while sending, receiving or just passing data over the network. This chapter presents various security issues that are underlying in cloud computing. This chapter has illustrated various issues such as Trust, Encryption, Authenticity, Confidentiality and Multi Tenancy. Also, some of the proposed solutions have also been discussed later in the chapter.


Author(s):  
Shantanu Pal

In a cloud ecosystem, most of the data and software that users use reside on the remote server(s), which brings some new challenges for the system, especially security and privacy. At present, these security threats and attacks are the greatest concern for the service providers towards delivering a more secure cloud infrastructure. One of the major concerns is data security, implemented by the most effective means possible and the protection of stored data from unauthorized users and hackers. When considering these security issues, trust is one of the most important means to improve the system’s security and enable interoperability of current heterogeneous cloud computing platforms. The objective of this chapter is to discuss and understand the basic security and privacy challenges of a cloud computing environment as the security of cloud computing is the greatest challenge for delivering a safer cloud environment for both the service providers and the service customers. With this in mind, this chapter will introduce the risks and possible attacks in a cloud computing environment. The major goal is to specify the security risks and attacks and consider trust of cloud service users for delivering a safer and innovation business model.


Application portability in a cloud computing condition is characterized to be the exchange of utilization or its segments starting with one cloud administration then onto the next cloud administration of its specialized comparability. The application should be such transferred that it does not make any significant changes in the application code although recompilation or relinking may be allowed. Application portability can be performed by the customer only in case of IaaS and PaaS services because for SaaS the application code relies on the cloud service provider itself. The application artifacts and their dependencies play a major role in the target environment. Containers and their related infrastructure hold valuable importance for application portability. In this paper, we will elaborate on all the issues, challenges, scenarios, and approaches for application portability that rose to date. We will study all the facets of data and application portability such as its instruction, syntax, metadata, and policies. The evolution of automation tools and technologies has made the portability of applications easier as the manual processes were inefficient and error-prone.


Efficient computations are increasing now a day, so their need is very high in the world. Infrastructure and computation techniques are not as much as efficient in conventionally or in present scenario, therefore the cloud computing is new to deal this type of problems. Sequencing of hardware and software technologies, for giving scalable and low cost computational understandings in cloud computing. The major focus of this research is to diminish the transportation cost of resource allocation along with various virtual machines in cloud computing environment. In this research paper, implementation of Vogel's Approximation Method (VAM) to obtain an Initial Basic Feasible Solution (IBFS) and an algorithm to optimize the cost of resource transportations for cloud service provider (CSP) as well as present an example also to understand the proposed method for total supply values and total demand values. Although the calculation of cost reduction until the iteration still has a non-negative values, and the calculation is done again until the last iteration. A comparison has been shown the cost of the proposed mechanism is much less from other technique.


2013 ◽  
Vol 13 (1) ◽  
pp. 46-60 ◽  
Author(s):  
N. Jeyanthi ◽  
N. Ch. S. N. Iyengar

Abstract Availability is one of the primary security issues in Cloud computing environment. The existing solutions that address the availability related issues can be applied in cloud computing environment, but because of their unique characteristics, such as on-demand self service, rapid elasticity, etc., there is a need to develop a detection mechanism that must satisfy the characteristics and an optimal profit for the Cloud Service Provider (CSP). A solution named Escape-on- Sight (EoS) algorithm is proposed in this paper that helps in detecting the attacker’s characteristics by analyzing traffic conditions stage by stage and protects the Data Center (DC) from malicious traffic. The profit analysis shows that the proposed approach has a reasonable chance of deploying EoS mechanism at DCs that are prone to DDoS attacks.


Author(s):  
Suneeta Mohanty ◽  
Prasant Kumar Pattnaik ◽  
G. B. Mund

<p>Cloud Computing Environment provides computing resources in the form of Virtual Machines (VMs), to the cloud users through Internet. Auction-based VM instances allocation allows different cloud users to participate in an auction for a bundle of Virtual Machine instances where the user with the highest bid value will be selected as the winner by the auctioneer (Cloud Service Provider) to gain more. In this auction mechanism, individual bid values are revealed to the auctioneer in order to select the winner as a result of which privacy of bid values are lost. In this paper, we proposed an auction scheme to select the winner without revealing the individual bid values to the auctioneer to maintain privacy of bid values. The winner will get the access to the bundle of VM instances. This  scheme relies on a set of cryptographic protocols including Oblivious Transfer (OT) protocol and Yao’s protocol to maintain privacy of bid values.</p>


2019 ◽  
pp. 127-139
Author(s):  
Shivani Jaswal ◽  
Gurpreet Singh

Cloud computing is growing with a giant pace in today's world. The speed with which it is growing, the same speed is taken over by the insecure data transfer over the cloud. There are many security issues that are underlying in cloud computing. This chapter presents how a trust is built between any user and a cloud service provider. Various techniques have been adopted to calculate the value of trust and further how it can be strength. This chapter has also explained various trust models based on the necessities of a user. This chapter has also thrown some light over the concept of TTP, i.e., Trusted Third Party which further helps in maintaining trust over the cloud environment.


Author(s):  
Shivani Jaswal ◽  
Gurpreet Singh

Cloud computing is growing with a giant pace in today's world. The speed with which it is growing, the same speed is taken over by the insecure data transfer over the cloud. There are many security issues that are underlying in cloud computing. This chapter presents how a trust is built between any user and a cloud service provider. Various techniques have been adopted to calculate the value of trust and further how it can be strength. This chapter has also explained various trust models based on the necessities of a user. This chapter has also thrown some light over the concept of TTP, i.e., Trusted Third Party which further helps in maintaining trust over the cloud environment.


In today's world, new virtualization technologies have become popular like container-based virtualization technologies due to its nature like lightweight, scalability, and flexibility. Kubernetes is the most popular open-source platform for container-based cluster management systems that provide mechanisms for deploying, maintaining, and scaling containerized applications across a cluster of hosts. KOPS is a Kubernetes Operations for attempting at simplifying complex installation and maintenance processes of the Kubernetes cluster. Kops helps in deploying highly available Kubernetes cluster, make installation secure, easy, and automatable applications on the AWS cloud. The rapid increase of cloud-native applications has taken cloud computing to the next level, but there are several issues in the deployment of automatable applications, and also complexity increases due to this. Nevertheless, there are still issues to be solved, such as cluster monitoring and cluster deployment automation. The goal of this paper is to deploy a containerized application onto a Kubernetes cluster using KOPS on cloud providers like AWS. This paper discusses how the Kubernetes cluster is deployed on the cloud service provider like AWS cloud using Kops which is the best tool for deploying Kubernetes cluster on AWS and also the Kubernetes services available today on cloud providers like AWS cloud and examines what they offer in comparison with other cloud providers like Google(GKE), Azure(AKE), and also the security issues in AWS cloud provider.


Cloud computing is the theoretical basis for future computing. All the global frameworks are now looking up to architecture which is purely based on cloud. Being the core of such a large web of network, it is important to consider the security aspects in a cloud based computing environment. This has resulted in a new research trend on the security issues of cloud. Cloud is a popular paradigm with extreme abilities and benefits for trending ICT environment. On the other end the major concern came in terms of security and privacy while adopting the cloud technology. This article is an effort to cover the challenges in fields like storage, virtualization and communication in cloud .Also it is a try to elaborate relevance of current cryptographic approach in order to increase security of cloud in ICT.


Sign in / Sign up

Export Citation Format

Share Document