Security Flaws and Design Issues in Cloud Infrastructure

Information security plays a vital role in cloud computing. Sensitive information should be kept in secure mode for providing integrity and confidentiality from insiders and outsiders. An insider is an employee who has legitimate access to cloud resources which are hosted at cloud data center. They can perform malicious activities on consumer sensitive data with or without malicious intent. This security beach is obvious and the provider needs to protect from such attacks. In this chapter, insider attacks are demonstrated with empirical approach to breach consumer-sensitive data. In this chapter, the authors present the threat models where an insider can manipulate user VMs in the node controller of cloud platform. Here, they assume that cloud service provider is malicious and cloud consumer does not have any security constraints to access their cloud assets. The model described two locations in the cloud infrastructure.

2018 ◽  
Vol 7 (4.36) ◽  
pp. 511
Author(s):  
Mr. Girish kumar d ◽  
Dr. Rajashree v biradar ◽  
Dr. V c patil

Cloud computing increases the capacity or capabilities vigorously without devoting new infrastructure, training new personnel, or licensing the new software . In the past few years, cloud computing has grown from being a promising business concept to one of the fast-growing sectors of IT industry. As the more sensitive information and data are moved into the cloud data centers, they run on virtual computing resources in the form of virtual machines. Security has become one of the major issue in cloud computing which reduces the growth of cloud environment with complications in data privacy and data protection continue to outbreak the market. A new model created for the advancement should not result as a threat to the existing model. The architecture of cloud poses such a threat to the security of existing models when deployed in a cloud environment. The different cloud service users need to be attentive in considerate,about the risk of data breaks in the new environment. In this paper, advanced survey of the various secured storage in cloud computing using bidirectional protocols is presented.  


2020 ◽  
Vol 3 (2) ◽  
pp. 11-20
Author(s):  
Noora N. Bhaya ◽  
Rabah A. Ahmed

Cloud computing is a fast-growing technology used by major corporations these days because of the flexibility framework it provides to consumers. Cloud technology requires large data centers consisting of multiple IT equipment and servers. One main problem with these data centers is the vast amount of power consumed during servers operation. This reduces financial benefit and increases the need to produce more energy to cover the needs of operating the cloud infrastructure. This paper proposes an approach for managing the virtual central processing unit (vCPU) of a virtual machine to improve server power efficiency. A framework is used to study the proposed approach while processing different types of workloads widely found in most general-purpose cloud computing applications. Results indicate an improvement in server power saving.


Author(s):  
Anand Sisodiya ◽  
Khushbu Yadao ◽  
V.R. Dhawale

Cloud computing is regarded as massively extensible, an on-demand configurable resourcescomputing model. It approaches the cloud infrastructure in a distributed rather than dedicatedinfrastructure where users can have full access to the extensible, reliable resources. Datagenerated by IoT attached objects is high, cloud is a key to store the incalculable datagenerated by these attached devices and it is the forward stepped towards the green computing,it removes the setups and installation steps as the cloud user accessing the hardware resourcesco-exist on different platform in distributed way.Cloud computing environment furnished a great flexibility and availability of computingresources at a very lower cost. This arriving technology opens a new era of e-services indifferent disciplines. In this paper, we seen cloud computing with its applications, mostcommon Cloud Service Provider such as Google, Microsoft, Amazon, HP, and Sales force andwe present innovative applications for cloud computing in Enterprise Resource Planning.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Virtual Machine Image (VMI) is the building block of cloud infrastructure. It encapsulates the various applications and data deployed at the Cloud Service Provider (CSP) end. With the leading advances of cloud computing, comes the added concern of its security. Securing the Cloud infrastructure as a whole is based on the security of the underlying Virtual Machine Images (VMI). In this paper an attempt has been made to highlight the various risks faced by the CSP and Cloud Service Consumer (CSC) in the context of VMI related operations. Later, in this article a formal model of the cloud infrastructure has been proposed. Finally, the Ethereum blockchain has been incorporated to secure, track and manage all the vital operations of the VMIs. The immutable and decentralized nature of blockchain not only makes the proposed scheme more reliable but guarantees auditability of the system by maintaining the entire VMI history in the blockchain.


2019 ◽  
Vol 8 (3) ◽  
pp. 7544-7548

The increasing popularity of cloud data storage and its ever-rising versatility, shows that cloud computing is one of the most widely excepted phenomena. It not only helps with powerful computing facilities but also reduce a huge amount of computational cost. And with such high demand for storage has raised the growth of the cloud service industry that provides an affordable, easy-to-use and remotely-accessible services. But like every other emerging technology it carries some inherent security risks associated and cloud storage is no exception. The prime reason behind it is that users have to blindly trust the third parties while storing the useful information, which may not work in the best of interest. Hence, to ensure the privacy of sensitive information is primarily important for any public, third-party cloud. In this paper, we mainly focus on proposing a secure cloud framework with encrypting sensitive data’s using AES-GCM cryptographic techniques in HEROKU cloud platform. Here we tried to implement Heroku as a cloud computing platform, used the AES-GCM algorithm and evaluate the performance of the said algorithm. Moreover, analyses the performance of AES/GCM execution time with respect to given inputs of data


Author(s):  
J. Craig Mudge

Cloud computing is a mode of acquisition of infrastructure where a cloud service provides on demand computing and on-demand storage, accessible over the web, with a matching business model, namely pay-per-use. Lower cost, sometimes a factor of five, is achieved by automating operations in warehouse-sized data centres, sharing the hefty burden of cooling, physical security, and power backup, and the use of commodity components. As access to storage managed by cloud service providers gained market acceptance, the phrase “the cloud” came into use to refer to the location of information stored with a cloud service provider to be shared (business documents and photos) or copied for backup (against losing a phone or deleting information on a laptop).  Security, and to a lesser extent privacy, concerns are the major barriers to the adoption of cloud computing, but the leading cloud service providers have responded to the point that sensitive information, such as medical records and credit-card-holder data, is now held in the cloud. 


2018 ◽  
Vol 9 (1) ◽  
pp. 22-27
Author(s):  
Santosh Kumar Singh ◽  
P.K. Manjhi ◽  
R.K. Tiwari ◽  
V.R. Vadi

Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of cloud based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing environment remains at the core of interest. Cloud based services and service providers are being evolved which has resulted in a new business trend based on cloud technology. With the introduction of numerous cloud based services and geographically dispersed cloud service providers, sensitive information of different entities are normally stored in remote servers and locations with the possibilities of being exposed to unwanted parties in situations where the cloud servers storing those information are compromised. If security is not robust and consistent, the flexibility and advantages that cloud computing has to offer will have little credibility. This paper presents a review on the cloud computing concepts as well as security issues inherent within the context of cloud computing and cloud infrastructure.


Cloud computing is most widely used in many companies now a days. Cloud means services available and provided in the web. Security plays a major role in cloud computing to store the various forms of data. Providing quality of security for the cloud storage data is very important. Many cloud providing service companies takes various steps to secure the data. In this paper, the integrated triple type security system is provided for the cloud data. The proposed three way security system provides the encryption to the data uploaded by the data owner and if the user wants to download the available data with encryption key sent by the data owner and decryption key sent by the cloud service provider then the verification of the user can be done by the cloud admin. In this way, the three way data security is implemented.


Cloud infrastructure Resources hosted in Data Centers, support the effective execution of Cloud computing applications. Given the increased adoption of the Cloud Computing Applications and the Businesses getting to be Data-driven, there is a huge increase in the number of Data Centers and the Size and amount of resources hosted in these Data Centers. These Data Center resources consume a significant amount of energy and this continuous scaling of the resources is leading to increased power consumption and a large carbon footprint. Given our fragile eco-system, optimization of the Data Center resources for energy conservation and thus the carbon footprint is the primary area of our focus. Businesses also need to satisfy QoS guarantees on Availability to their customers. Optimization towards Energy efficiencies may compromise on the Availability and thus may warrant a trade-off, and a need for them to be considered together. Although there have been numerous studies towards Energy efficiencies, most of them have been focused on only energy. In this paper, we initially segregate Optimization activities towards the Data Center resources like Compute, Network, and Storage. We then study the different control parameters or approaches which will lead to meeting the objectives of Energy Efficiencies, Availability and Energy Efficiency constrained with Availability. Thus, this will support the selection of approaches for the optimization of energy while meeting the QoS Availability requirement.


2019 ◽  
Vol 8 (4) ◽  
pp. 4822-4825

The existing works on security storage in cloud computing cause overhead, data correctness issue, key escrow problem, single point of failure and so on. This develops Multiple Authority based Data Fragmentation Technique for providing Secure Storage in Cloud Computing. It aims to avoid the key escrow and single point of failure issues of secure storage. In this technique, the Cloud Service Provider (CSP) provides multiple services for a client, the trusted and verification authorities are responsible for jointly creating the master key and system parameters and the Cloud Data Owner (CDO) encrypts the documents using CP-ABE. In order to provide data recoverability, a file is divided into blocks and sectors. Probabilistic algorithm checks the integrity of fragmented file. By simulating, the proposed technique reduces the overhead and data failures.


Sign in / Sign up

Export Citation Format

Share Document