Security Architecture for Cloud Computing

2018 ◽  
pp. 729-755 ◽  
Author(s):  
Robin Singh Bhadoria

Clouds need to address three security issues: confidentiality, integrity, and availability. Security architecture for cloud computing is designed based on the functional architecture. The approach is to enhance the components of a functional architecture with additional components providing various security services. This is an extension of SaaS concept to have several security components that are common to all application and services. Various cloud security issues are discussed in this chapter.

Author(s):  
Robin Singh Bhadoria

Clouds need to address three security issues: confidentiality, integrity, and availability. Security architecture for cloud computing is designed based on the functional architecture. The approach is to enhance the components of a functional architecture with additional components providing various security services. This is an extension of SaaS concept to have several security components that are common to all application and services. Various cloud security issues are discussed in this chapter.


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


2021 ◽  
Author(s):  
Ramla Humayun

Review on Cloud-Computing and the security and privacy issues related with it.


2019 ◽  
pp. 1777-1799
Author(s):  
Emre Erturk

This chapter sets out to explore new trends in cyber and cloud security, and their implications for businesses. First, the terminology and assumptions related to cloud computing are stated. Next, the chapter reports on contemporary research around the awareness of security issues, and the security processes within the cloud computing realm. Cyber security poses a different challenge to local small and medium sized organizations, which may seem to have less at stake financially. However, they are more vulnerable, due to fewer resources dedicated toward prevention. A series of serious security incidents may even keep them out of business. Furthermore, security needs to be understood and handled differently in a cloud based environment. Therefore, the chapter identifies unique security practices and recommendations for these businesses to run their IT resources safely in the cloud.


Cloud computing, the utility base computing, is going to become the mainstream of IT future. Governments and enterprises are realizing that by immigrating into the cloud they can significantly enhance their current infrastructure or application services with minimum cost and maximum elasticity. But securing cloud user digital assets and addressing privacy concerns of cloud costumers has become serious challenge. Providing security in cloud always has to consider performance. Employing high secure methods with massive complexity will increase overall service cost, to address this problem in this paper a two- tier security architecture is proposed. This architecture use multiple work mode for security components in guest level to decrease security process over-head and a security supervisory in hypervisor layer to make sure avoiding from false security alarms


Author(s):  
Baldev Singh

Cloud computing is one of the emerged technologies in the past decade. Tremendous growth is noticed in the usage and implementation of Cloud computing. Although cloud spectrum is widely popular still there are lot of challenges and issues to be addressed for its optimal usage. Vulnerabilities and threats to the cloud services leads to attacks and exploitation of resources as well as data breaches and privacy violations that need to be addressed at the cloud customer satisfaction level. This paper highlights different cloud security issues and their security requirements. The review aspects and findings of the paper can be used as a reference for further appropriate and effective implementation from the suggested practically viable cloud security solution in an independent manner or using as a hybrid technique.


2018 ◽  
pp. 1624-1656
Author(s):  
G. M. Siddesh ◽  
K. G. Srinivasa ◽  
L. Tejaswini

Security in cloud is to be increased to strengthen the confidence and trust of cloud service consumers. In the upcoming years, the scientific research and education teams will have to investigate finding new ways to handle the issue of cloud security. This chapter discusses the major threats and their impact on clouds, security measures to handle the attacks in clouds, security as a service in research and education, and steps to enhance security feature in clouds.


2018 ◽  
pp. 77-92 ◽  
Author(s):  
Srinivas Sethi ◽  
Sai Sruti

Cloud computing refers to the basic setup for an emerging model of service delivery, that has the advantage of decreasing the cost by sharing computing, infrastructure including storage resources. This can be combined with on-demand delivery mechanism relying on a pay-per-use model. Cloud computing offers an added level of risk because of essential services provided by it to a third party, which makes it difficult to maintain data privacy and security. Security in cloud computing is a critical aspect, which has various issues and challenges related to it. Cloud service providers/ brokers and the cloud service users should make aware of safety cloud. That is the cloud is safe enough from all kinds of the threats, so that the users do not face any problem like; loss of data or data theft. There is a possibility that, a malicious user can enters the cloud by imitating an authentic user, thus corrupt the entire cloud. It can affect many users who are sharing these types of clouds. This chapter mentions the list of parameters that disturb the security of the cloud. This also explores the cloud security issues and challenges faced by cloud service provider/brokers and cloud service users like; data, privacy, and infected application. Finally, it discusses the countermeasure for handling these issues and its challenges.


Web Services ◽  
2019 ◽  
pp. 2115-2137
Author(s):  
Santosh Kumar ◽  
Debanjan Sadhya ◽  
Durgesh Singh ◽  
S. K. Singh

Establishing identity has become very difficult in the vastly crowded cloud computing environment. The need for a trustworthy cloud authentication phenomenon has increased in the wake of heightened concerns about authentication and rapid advancements in cloud computing, database access, and Internet communication. Face recognition is a non-intrusive method, and facial characteristics are probably most common biometrics features used by humans to identify others. Authentication for cloud computing using face recognition is based on security issues related to data access and cloud database in a cloud. It can provide a satisfactory level of security measures to users and service providers, cloud consumers, and different organizations. In this chapter, the authors cover different research aspects related to cloud security.


Author(s):  
Emre Erturk

This chapter sets out to explore new trends in cyber and cloud security, and their implications for businesses. First, the terminology and assumptions related to cloud computing are stated. Next, the chapter reports on contemporary research around the awareness of security issues, and the security processes within the cloud computing realm. Cyber security poses a different challenge to local small and medium sized organizations, which may seem to have less at stake financially. However, they are more vulnerable, due to fewer resources dedicated toward prevention. A series of serious security incidents may even keep them out of business. Furthermore, security needs to be understood and handled differently in a cloud based environment. Therefore, the chapter identifies unique security practices and recommendations for these businesses to run their IT resources safely in the cloud.


Sign in / Sign up

Export Citation Format

Share Document