Premium Essay

Cloud and Security

In:

Submitted By cabney
Words 638
Pages 3
The Reality about Clouds and the Security Challenges They Pose

Clouds are an extremely practical and obvious solution to data storage management. However, there is a critical need to securely store, manage, and share (structured and unstructured) amounts of data. “The major security challenge with clouds is that the owner of the data may not have control of where the data is placed. Therefore, we need to safeguard the data in the midst of untrusted processes. There are numerous security issues for cloud computing. For example, the networks that connects the system in a cloud has to be secure. Mapping the virtual machines to the physical machines has to be carried at securely. Since data in the cloud will be placed anywhere, it is important that the data is encrypted. As a result, it is critical that this data be protected and only given to authorized individuals. Access control is a key concern, because insider attacks are a huge risk.
A cloud can be private or public. A public cloud sells services to anyone on the Internet. (Currently, Amazon Web Services is the largest public cloud provider.) A private cloud is a proprietary network or a data center that supplies hosted services to a limited number of people. When a service provider uses public cloud resources to create their private cloud, the result is called a virtual private cloud. Private or public, the goal of cloud computing is to provide easy, scalable access to computing resources and IT services (Rouse, M. 2013). However, in my opinion by definition clouds are not really private. If it’s being stored on an unsecured internet source, then the content that is stored is still susceptible to hackers.
The issue about access control is important to everyone from individual PC users to big business. Seemingly, “Data breaches and cloud service abuse rank among the greatest cloud security threats, according

Similar Documents

Premium Essay

Security in the Cloud

...Problem Statement Discussion and Justification Cloud users face security threats both from outside and inside the cloud. Many of the security issues involved in protecting clouds from outside threats are similar to those already facing large data centers. In the cloud, however, this responsibility is divided among potentially many parties, including the cloud user, the cloud vendor, and any third-party vendors that users rely on for security-sensitive software or configurations. The cloud user is responsible for application-level security. The cloud provider is responsible for physical security, and likely for enforcing external firewall policies. Security for intermediate layers of the software stack is shared between the user and the operator; the lower the level of abstraction exposed to the user, the more responsibility goes with it. While cloud computing may make external-facing security easier, it does pose the new problem of internal-facing security. Cloud providers must guard against theft or denial-of-service attacks by users. Users need to be protected from one another. The primary security mechanism in today's clouds is virtualization. It is a powerful defense, and protects against most attempts by users to attack one another or the underlying cloud infrastructure. However, not all resources are virtualized and not all virtualization environments are bug-free. Virtualization software has been known to contain bugs that allow virtualized code to "break loose" to some...

Words: 2433 - Pages: 10

Premium Essay

Cloud Security

...threat landscape is fundamentally different with the proliferation of mobile, web and cloud based applications supported by third parties. The need for third party software security is so essential that a group of security leaders from the highly competitive financial services sector established a working group through the Financial Services Information Sharing and Analysis Center (FS-ISAC) to provide guidance for the rest of the industry on additive controls to address software security. Though the goal of this working group is to help improve security at financial organizations, enterprises of all kinds can and should adopt this new guidance to address the increasing danger posed by third party applications. Every industry uses third party software to increase employee productivity, deliver the latest technology to their customers and maintain relevancy in evolving markets. In the financial services industry, this has manifested with mobile payments, hip web interfaces, and banks going social, just to name a few. Financial services has long worked to apply effective controls and protect the sensitive data flowing through these slick applications through the Financial Services Roundtable (BITS) or FS-ISAC. Though there are established controls for protecting information from software vulnerabilities of third party service and software providers, what is not established is how to ensure secure software development practices are applied by those third parties that develop software...

Words: 322 - Pages: 2

Premium Essay

Cloud Computing Security

...Cloud Computing Security Mohamed Y. Shanab, Yasser Ragab, Hamza nadim Computing & Information Technology AAST Cairo, Egypt {myshanab, yasseritc, hamzanadim }@gmail.com Abstract-- In the past two decades, data has been growing in a huge scale making it almost impossible to store, maintain and keep all data on premises , thus emerged the idea of cloud computing and now it’s becoming one of the most used services used by firms, organizations and even governments. But its security risks are always a concern and a major setback. In this paper we talk about those risks and the most feared ones and what are the latest techniques to overcome them, we also discuss a solution on cloud computing based on a fully homomorphic encryption Key Words -- Cloud computing , Cloud computing security, Challenges, Privacy, Reliability, Fully homomorphic encryption. interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models." [1] II. TOP BENEFITS OF CLOUD COMPUTING  Achieve economies of scale. increase volume output or productivity with fewer people. Your cost per unit, project or product plummets. Reduce spending on technology infrastructure. Maintain easy access to your information with minimal upfront spending. Pay as you go (weekly, quarterly or yearly), based on demand. Globalize your workforce on the cheap.People worldwide can access the cloud, provided they have an Internet connection....

Words: 4691 - Pages: 19

Premium Essay

Cloud Security Planning

...Cloud Security Planning Abstract Cloud systems as new online storage and computing systems provide great potentials to all businesses and organizations of creating new approach of storage and computing; cloud system guarantee that all your files and valuable data can be accessed and recovered from anywhere in the world, providing a new meaning of technology. Unfortunately and as to what happen with all emerging technologies there are new threats, risks, breaches, and problems arise with such technologies. They are considered challenges that vary from configuration problems to security breaches to harmful attacks; which may cost the company large losses and in some time financial disasters. In this case study we will try to identify the major threats that may affect the cloud security negatively which can be divided into three major categories: 1. Attackers and threats: where the attacks are no longer limited by breaching the data on someone’s personal computer. It became larger wider and involves more organized crimes. 2. Developed Structure technologies: the amount of data and information used today provides great challenges to system engineers and security designers to visualize and utilize their system to isolate and protect the data on them. 3. Regularity environment challenges: Most companies and IT departments are facing great challenges to meet the laws, legal requirements and consistency acquiescence especially with growth of demand on cloud systems. ...

Words: 2955 - Pages: 12

Premium Essay

Cloud Security Issues

...net/publication/259072387 Cloud Computing Security Issues and Challenges ARTICLE · JANUARY 2011 CITATIONS READS 13 20,419 1 AUTHOR: Ibikunle Ayoleke Botswana International University of Science… 29 PUBLICATIONS 30 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. Available from: Ibikunle Ayoleke Retrieved on: 13 February 2016 Kuyoro S. O., Ibikunle F. & Awodele O. Cloud Computing Security Issues and Challenges Kuyoro S. O. afolashadeng@gmail.com Department of Computer Science Babcock University Ilishan-Remo, 240001, Nigeria Ibikunle F. faibikunle2@yahoo.co.uk Department of Computer Science Covenant University Otta, 240001, Nigeria Awodele O. delealways@yahoo.com Department of Computer Science Babcock University Ilishan-Remo, 240001, Nigeria Abstract Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing...

Words: 4240 - Pages: 17

Premium Essay

Cloud Computing and Information Security

...Cloud Computing and Information Security Krystal Hagi Daytona State College Student Khagi1@yahoo.com Abstract In order to discuss the security of information in cloud computing, we must first cover what is Cloud Computing. There are many types of cloud computing services, such as, SaaS, PaaS, IaaS, public clouds, private clouds, and hybrid clouds Examples. They all work similarly but have not only different tools, but varying levels of security for various needs. These differing types of clouds and networks as a service offer off site data storage in a secured location, which in essence frees up space and virtual infrastructure for personal and/or business networks, and devices. There are advantages and disadvantages to cloud computing, just like any other product or service. The advantages being, storage for data, accessibility from virtually anywhere there is a network connection, automated management, security, apps, tools, etc. The disadvantages include monthly costs for space on the offsite network, security, involvement of a third party, no access to the physical structure - which means if the cloud server goes down, your data may not be accessible, etc. There is one instance with cloud computing that is both an advantage and a disadvantage, and that is the security. While a cloud may be more secure than your own network How?, personal or business, using cloud services puts the security out of your hands in both the physical and logical sense. Using a cloud, means the...

Words: 4955 - Pages: 20

Premium Essay

Security Considerations for Cloud Computing

...Security Considerations for Cloud Computing Carlos Chandler Abstract Cloud computing is an emerging Information Technology (IT) model whereby a company utilizes a pay-per-use service for it computing needs rather than maintain a local data center run by its in-house IT department. By treating computing resources as a commodity or operating expense, it allows firms to focus less on IT and more on the core elements of the operations strategy. Because of advantages like this, its popularity has grown exponentially in recent years. However, cloud computing also has certain inherent risks in its present form. This paper seeks to understand the key advantages driving businesses to adopt this computing model in ever increasing numbers, while at the same time understanding what risks they are taking in doing so. To gain insight into these risks, this paper incorporates statistical research into what experts in the field believe to be the greatest down-sides to converting to this increasingly common IT model. Security Considerations for Cloud Computing What is Cloud Computing, Anyway? To begin, let us illustrate what cloud computing is. Imagine you run a cookie baking business that takes orders from around the country via an online store. To handle the orders, would your business buy a fleet of trucks and deliver its own shipments, or would you simply contract with UPS or FedEx to ship the orders on your behalf? Clearly the cost efficiencies in contracting the shipping...

Words: 1965 - Pages: 8

Free Essay

Cloud Computing and Erp Security

...|RESEARCH PROPOSAL | |On | |CLOUD COMPUTING AND SECUTITY | |Submitted | |for Ph.D. Approval | | | | | |By Mr. MBANZABUGABO Jean Baptiste(BE,MSSE,MCA) | TABLE OF CONTENTS ABSTRACT..................................................................................................3 1. INTRODUCTION........................................................................................4 1. GENERAL OBJECTIVE OF THE STUDY.................................................................................................. 5 2. SPECIFIC OBJECTIVES .......................................................................5 2. LITERATURE REVIEW ...........................................................................6 3. METHODOLOGY...

Words: 6240 - Pages: 25

Premium Essay

Cloud Hooks: Security and Privacy Issues in Cloud Computing

...Proceedings of the 44th Hawaii International Conference on System Sciences - 2011 Cloud Hooks: Security and Privacy Issues in Cloud Computing Wayne A. Jansen, NIST Abstract In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the hook. The cloud hook formation provides a useful analogy for cloud computing, in which the most acute obstacles with outsourced services (i.e., the cloud hook) are security and privacy issues. This paper identifies key issues, which are believed to have long-term significance in cloud computing security and privacy, based on documented problems and exhibited weaknesses. • applications can be developed upon and deployed. It can reduce the cost and complexity of buying, housing, and managing hardware and software components of the platform. Infrastructure-as-a-Service (IaaS) enables a software deployment model in which the basic computing infrastructure of servers, software, and network equipment is provided as an on-demand service upon which a platform to develop and execute applications can be founded. It can be used to avoid buying, housing, and managing the basic hardware and software infrastructure components. 1. Introduction Cloud computing has been defined by NIST as a model for enabling convenient, on-demand...

Words: 7808 - Pages: 32

Premium Essay

The Effects of Cloud Computing on Enterprises N Terms of Cost and Security

...Concept of cloud computing was started in 2000s. Once this was introduced it has created a new business model and platform for many online business and technologies. To store any kind of data local servers will be used. But in today’s world with internet, the practice of using servers and networks on internet for storing, processing and managing any kind of data online is the concept of cloud computing (Margaret Rouse, 2015). Through this, both its platform and type of applications can be described, cloud computing provides its services in several layers to its users. By using this technology and internet applications can be run based on large data centers and servers. Cloud computing has gone through number of several phases including grid and utility computing (Margaret Rouse, 2015). Many enterprises have already started to implement cloud computing by knowing the potential of this technology. In 2012 according to IDG reports, (IDG ENTERPRISE MARKETING, 2016) the usage of cloud computing was 12% and by 2014 the number increased to 69% with the humongous change. The main reasons for many of enterprises to adopt to this technology was its cost and the flexibility to run any application faster than by the traditional method. Few features in could computing and its business functions like data analytics, data and storage management content management, conferencing solutions and collaborations. By 2015, 24% of enterprises used cloud computing for standardizing their IT budgets...

Words: 1234 - Pages: 5

Premium Essay

Juice

...white pAper: cloud Securit y Securing the Cloud for the Enterprise A Joint White Paper from Symantec and VMware White Paper: Cloud Security Securing the Cloud for the Enterprise for A Joint White Paper from Symantec and VMware Contents Executive summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.0 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1 1.2 1.3 1.4 Enterprise computing trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Transitions in the journey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Evolving threat and compliance landscape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 A security strategy for the cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.0 Key elements of cloud security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 5327 - Pages: 22

Premium Essay

Secured Authenticated Framework for Mobile Clouding

...Abstract Cloud computing is creates many challenges in the information technology world every day. In present situations use of resources using mobile phones becomes one of the essential things for everybody. The demands of the user in internet increasing day by day. But every wireless hand held devices don't have that much of resource availability and required facility. So, cloud computing is a better solution to give support resource consuming applications. If the mobiles are integrated with the cloud then user can get more facilities with resources required and big storage space for storing his private data. With addition to the benefits of cloud, there is a chance to face the security and privacy issues of the user data. This paper discuss important concepts of cloud computing and general security issues happened in mobile side as well as cloud and also describes basic idea of Kerberos. The aim of this paper is to propose the strong authenticated framework when mobiles are connected to cloud. We have proposed the improvement in the mobile cloud based framework for better security and privacy. Keywords: mobile cloud computing applications, security of data, Kerberos 2. Introduction and literature survey Rapid development in the mobile devices and cloud computing has creating some attention to everyone in the IT industry. Consider the development of security in almost everywhere over Internet; mobile devices are also not the exceptions to deal with respect to the security. In this...

Words: 2780 - Pages: 12

Premium Essay

Cloud Computing

...Top Threats to Cloud Computing V1.0 Prepared by the Cloud Security Alliance March 2010 Top Threats to Cloud Computing V1.0 Introduction The permanent and official location for the Cloud Security Alliance Top Threats research is: http://www.cloudsecurityalliance.org/topthreats © 2010 Cloud Security Alliance. All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud Security Alliance “Top Threats to Cloud Computing” at http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf subject to the following: (a) the Guidance may be used solely for your personal, informational, non-commercial use; (b) the Guidance may not be modified or altered in any way; (c) the Guidance may not be redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote portions of the Guidance as permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions to the Cloud Security Alliance “Top Threats to Cloud Computing” Version 1.0 (2010). Copyright © 2010 Cloud Security Alliance 2 Top Threats to Cloud Computing V1.0 Table of Contents Introduction................................................................................................................................... 2 Foreword........................................................................................................................................ 4 Executive...

Words: 3759 - Pages: 16

Premium Essay

Cloude Computing

...Cloud Computing and Security ITM 5600 Thomas Payne Webster University Cloud Computing and Security The National Institute of Standards and Technology (NIST) define cloud computing this way. “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics (On-demand self-service, Broad network access, Resource pooling, Rapid elasticity, Measured Service); three service models (Cloud Software as a Service (SaaS), Cloud Platform as a Service (PaaS), Cloud Infrastructure as a Service (IaaS)); and, four deployment models (Private cloud, Community cloud, Public cloud, Hybrid cloud). Key enabling technologies include: (1) fast wide-area networks, (2) powerful, inexpensive server computers, and (3) high-performance virtualization for commodity hardware” (National Institue of Standards and Technology, 2011). There is a lot to take in from that lengthy definition. This may explain why there is so much ambiguity and “hand wringing” surrounding cloud computing. Major companies and government alike have started to embrace cloud services and architecture. This hasn’t been an easy transition, however many higher level managers are not aware or just not informed on...

Words: 4426 - Pages: 18

Premium Essay

Don't Know

...Cloud computing: benefits, risks and recommendations for information security Cloud computing is a new way of delivering computing resources, not a new technology. Computing services ranging from data storage and processing to software, such as email handling, are now available instantly, commitment-free and on-demand. Since we are in a time of belt-tightening, this new economic model for computing has found fertile ground and is seeing massive global investment. According to IDC’s analysis, the worldwide forecast for cloud services in 2009 will be in the order of $17.4bn1. The estimation for 2013 amounts to $44.2bn, with the European market ranging from €971m in 2008 to €6,005m in 2013 2. The key conclusion of ENISA’s 2009 paper on Cloud Computing: benefits, risks and recommendations for information security3 is that the cloud’s economies of scale and flexibility are both a friend and a foe from a security point of view. The massive concentrations of resources and data present a more attractive target to attackers, but cloud-based defences can be more robust, scalable and cost-effective. ENISA’s paper allows an informed assessment of the security risks and benefits of using cloud computing - providing security guidance for potential and existing users of cloud computing. The new economic model has also driven technical change in terms of: Scale: commoditisation and the drive towards economic efficiency have led to massive concentrations of the hardware resources required to provide...

Words: 2434 - Pages: 10