Premium Essay

Cloud Computing Security

In:

Submitted By YasserRagab
Words 4691
Pages 19
Cloud Computing Security
Mohamed Y. Shanab, Yasser Ragab, Hamza nadim Computing & Information Technology AAST Cairo, Egypt {myshanab, yasseritc, hamzanadim }@gmail.com

Abstract-- In the past two decades, data has been growing in a huge scale making it almost impossible to store, maintain and keep all data on premises , thus emerged the idea of cloud computing and now it’s becoming one of the most used services used by firms, organizations and even governments. But its security risks are always a concern and a major setback. In this paper we talk about those risks and the most feared ones and what are the latest techniques to overcome them, we also discuss a solution on cloud computing based on a fully homomorphic encryption
Key Words -- Cloud computing , Cloud computing security, Challenges, Privacy, Reliability, Fully homomorphic encryption.

interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models." [1] II.
TOP BENEFITS OF CLOUD COMPUTING



Achieve economies of scale. increase volume output or productivity with fewer people. Your cost per unit, project or product plummets. Reduce spending on technology infrastructure. Maintain easy access to your information with minimal upfront spending. Pay as you go (weekly, quarterly or yearly), based on demand. Globalize your workforce on the cheap.People worldwide can access the cloud, provided they have an Internet connection. Streamline processes. Get more work done in less time with less people. Reduce capital costs. There’s no need to spend big money on hardware, software or licensing fees. Improve accessibility. You have access anytime, anywhere, making your life so much easier! Monitor projects more effectively. Stay within budget and ahead of completion cycle times.



I.

INTRODUCTION



In recent

Similar Documents

Premium Essay

Security Considerations for Cloud Computing

...Security Considerations for Cloud Computing Carlos Chandler Abstract Cloud computing is an emerging Information Technology (IT) model whereby a company utilizes a pay-per-use service for it computing needs rather than maintain a local data center run by its in-house IT department. By treating computing resources as a commodity or operating expense, it allows firms to focus less on IT and more on the core elements of the operations strategy. Because of advantages like this, its popularity has grown exponentially in recent years. However, cloud computing also has certain inherent risks in its present form. This paper seeks to understand the key advantages driving businesses to adopt this computing model in ever increasing numbers, while at the same time understanding what risks they are taking in doing so. To gain insight into these risks, this paper incorporates statistical research into what experts in the field believe to be the greatest down-sides to converting to this increasingly common IT model. Security Considerations for Cloud Computing What is Cloud Computing, Anyway? To begin, let us illustrate what cloud computing is. Imagine you run a cookie baking business that takes orders from around the country via an online store. To handle the orders, would your business buy a fleet of trucks and deliver its own shipments, or would you simply contract with UPS or FedEx to ship the orders on your behalf? Clearly the cost efficiencies in contracting the shipping...

Words: 1965 - Pages: 8

Premium Essay

Cloud Computing and Information Security

...Cloud Computing and Information Security Krystal Hagi Daytona State College Student Khagi1@yahoo.com Abstract In order to discuss the security of information in cloud computing, we must first cover what is Cloud Computing. There are many types of cloud computing services, such as, SaaS, PaaS, IaaS, public clouds, private clouds, and hybrid clouds Examples. They all work similarly but have not only different tools, but varying levels of security for various needs. These differing types of clouds and networks as a service offer off site data storage in a secured location, which in essence frees up space and virtual infrastructure for personal and/or business networks, and devices. There are advantages and disadvantages to cloud computing, just like any other product or service. The advantages being, storage for data, accessibility from virtually anywhere there is a network connection, automated management, security, apps, tools, etc. The disadvantages include monthly costs for space on the offsite network, security, involvement of a third party, no access to the physical structure - which means if the cloud server goes down, your data may not be accessible, etc. There is one instance with cloud computing that is both an advantage and a disadvantage, and that is the security. While a cloud may be more secure than your own network How?, personal or business, using cloud services puts the security out of your hands in both the physical and logical sense. Using a cloud, means the...

Words: 4955 - Pages: 20

Free Essay

Cloud Computing and Erp Security

...|RESEARCH PROPOSAL | |On | |CLOUD COMPUTING AND SECUTITY | |Submitted | |for Ph.D. Approval | | | | | |By Mr. MBANZABUGABO Jean Baptiste(BE,MSSE,MCA) | TABLE OF CONTENTS ABSTRACT..................................................................................................3 1. INTRODUCTION........................................................................................4 1. GENERAL OBJECTIVE OF THE STUDY.................................................................................................. 5 2. SPECIFIC OBJECTIVES .......................................................................5 2. LITERATURE REVIEW ...........................................................................6 3. METHODOLOGY...

Words: 6240 - Pages: 25

Premium Essay

Cloud Hooks: Security and Privacy Issues in Cloud Computing

...- 2011 Cloud Hooks: Security and Privacy Issues in Cloud Computing Wayne A. Jansen, NIST Abstract In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the hook. The cloud hook formation provides a useful analogy for cloud computing, in which the most acute obstacles with outsourced services (i.e., the cloud hook) are security and privacy issues. This paper identifies key issues, which are believed to have long-term significance in cloud computing security and privacy, based on documented problems and exhibited weaknesses. • applications can be developed upon and deployed. It can reduce the cost and complexity of buying, housing, and managing hardware and software components of the platform. Infrastructure-as-a-Service (IaaS) enables a software deployment model in which the basic computing infrastructure of servers, software, and network equipment is provided as an on-demand service upon which a platform to develop and execute applications can be founded. It can be used to avoid buying, housing, and managing the basic hardware and software infrastructure components. 1. Introduction Cloud computing has been defined by NIST as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources...

Words: 7808 - Pages: 32

Premium Essay

The Effects of Cloud Computing on Enterprises N Terms of Cost and Security

...Concept of cloud computing was started in 2000s. Once this was introduced it has created a new business model and platform for many online business and technologies. To store any kind of data local servers will be used. But in today’s world with internet, the practice of using servers and networks on internet for storing, processing and managing any kind of data online is the concept of cloud computing (Margaret Rouse, 2015). Through this, both its platform and type of applications can be described, cloud computing provides its services in several layers to its users. By using this technology and internet applications can be run based on large data centers and servers. Cloud computing has gone through number of several phases including grid and utility computing (Margaret Rouse, 2015). Many enterprises have already started to implement cloud computing by knowing the potential of this technology. In 2012 according to IDG reports, (IDG ENTERPRISE MARKETING, 2016) the usage of cloud computing was 12% and by 2014 the number increased to 69% with the humongous change. The main reasons for many of enterprises to adopt to this technology was its cost and the flexibility to run any application faster than by the traditional method. Few features in could computing and its business functions like data analytics, data and storage management content management, conferencing solutions and collaborations. By 2015, 24% of enterprises used cloud computing for standardizing their IT budgets...

Words: 1234 - Pages: 5

Premium Essay

Cloud Computing

...What’s New About Cloud Computing Security? Yanpei Chen Vern Paxson Randy H. Katz Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2010-5 http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html January 20, 2010 Copyright © 2010, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. What’s New About Cloud Computing Security? Yanpei Chen, Vern Paxson, Randy H. Katz CS Division, EECS Dept. UC Berkeley {ychen2, vern, randy}@eecs.berkeley.edu ABSTRACT While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hats”. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new” is so only relative to “traditional” computing of the past several...

Words: 5878 - Pages: 24

Premium Essay

Jaffa

...CLOUD COMPUTING JOURNOUL Introduction Cloud computing is a most vital kind of data establishment, it is a substitute arrangement of action to give prevalent, irrelevant exertion preparing and information organizations, supporting particular combinations of data application. The quick change of distributed computing has brought an arrangement of non-standard security risks, and set forth a substitute and higher enthusiasm to data security. Cloud computing and its Security Issues Cloud computing otherwise called distributed computing is reevaluating the on - interest utilization of remotely put and especially available processing assets for the client. Tragically, while the different budgetary and mechanical purposes of speculation are clear, the movement of key division requests to the cloud has been limited because of a vital centerpiece: the absence of quantifiable estimations to review the tradeoffs (characteristics, issues and the business concerns) of security. In spite of the conspicuous worth of estimations in extraordinary circumstances to study such tradeoffs, a formal and standard - based framework for the tending to of security estimations in the cloud is a much harder and is an open issue. Additionally considering the consistent examination with relationship like the cloud security union and European meanders like Abc4trust, Comifin and INSPIRE. This paper likewise shows the cruciall building bits of a proposed security estimations structure for parts, for example...

Words: 950 - Pages: 4

Premium Essay

Cloud Technology

...Cloud Computing Introduction Cloud computing is the idea of deploying groups of remote servers and software networks that allows remote access to computer resources. Cloud computing is the term that describes the delivery of computer as service rather than a product. The internet is like a cloud. Cloud computing users use the services of the computing. They don’t have ideas about the location of the computer infrastructure. Cloud computing provides computation, software, data access, and storage resources to its users. If businesses look for the computing services without establishing computing infrastructure, the cloud can be the solution to achieve the objective. How Cloud Computing works? Cloud computing changed the way of computer uses. It changed the concepts of use web and store the data. Cloud computing is the structure which was used by the sites like Google, Facebook, Twitter, Dropbox. Let’s consider that the cloud consists layers. There is the back-end layers and the front-end layers. Front-end is the public part and users can interact with the front end layer. For example, when we access on Google Drive, the public user interface is visible to us. The back-end consists of hardware and software architecture that delivers the data to the front-end. There are many computers integrated to work together in the cloud technology. The front-end application can use all available computer power to provide the services to end users. Cloud computing uses the network...

Words: 1233 - Pages: 5

Premium Essay

Cloud Computing

...overview advantage and challenges Overview Silver Lining or storm ahead The future of cloud computing Effective use of cloud computing in education institutions Cloud Computing for beginner Cloud computing Challenges and future directions http://www.businesswire.com/news/home/20110622006602/en/Future-Cloud-Computing-Survey-Reveals-Drivers-Cloud Cloud Computing GAP Task Force http://inews.berkeley.edu/articles/Spring2009/cloud-computing Table of contents 2 0 Relevant Resources 4 0 Relevant Resources 4 1 General guidelines of community design 6 2 Attracting new members 7 2.1 Methods of persuasion of a potential user 7 2.2 Encouraging users to invite friends 8 2.3 Entry barrier 9 2.4 Guidance for new members 9 3 Structure of the community 12 3.1 Member profiles 12 3.2 Member connections 13 3.3 Adding connections 15 3.4 Member reputation 16 3.5 Paid membership 18 3.6 Fake members 18 3.7 Lurkers 18 4 Encouraging user participation 20 4.1 Using uniqueness 20 4.2 Using controversy 20 4.3 Using individual recognition 21 4.4 By discouraging low quality contributions (moderation) 21 4.5 Using goal setting 23 4.6 Using E-Mail notifications 24 4.7 By showing the activity of community 24 5 Stimulating Social Interactions 26 5.1 By common Interests 26 5.3 By common current life transitions 27 5.4 By shared experience 28 5.5 By shared education 29 5.6 By showing the distance 29 5.7 By service: Photo Albums 30 5.8 By service: Profile watching 30 ...

Words: 10084 - Pages: 41

Premium Essay

Inf 103 the Future of Cloud Computing

...The Future of Cloud Computing Wesley Rhoades INF 103 Computer Literacy Anjit Bose, MBA December 2, 2013 Imagine a world where everything is ran by a network of computers centralized in one specific location. Businesses no longer required hardware and software to store their data on. Students didn’t have to sit in a classroom behind a desk listening to a teacher lecture them for an hour at a time. Imagine the money you would save just for the commuting alone. Warehouses that make and ship goods for companies could all be tracked by a bar code and becomes accessible wherever there is an internet connection. This is the future of cloud computing. Cloud computing has become another popular term after Web 2.0. However, there are dozens of different definitions for cloud computing and there seems to be no consensus on what a cloud is. On the other hand, cloud computing is not a completely new concept; it has intricate connection to the relatively new but thirteen-year established grid computing paradigm, and other relevant technologies such as utility computing, cluster computing, and distributed systems in general. This paper strives to compare and contrast cloud computing with grid computing from various angles and give insights into the essential characteristics of both. Cloud computing is something that a great many people have spent a good amount of time pondering. We’re seeing a new trend in software deployment and flexibility goal sets, and as a result, the future...

Words: 1735 - Pages: 7

Premium Essay

Member

...Red Cloud Rising: Cloud Computing in China by Leigh Ann Ragland, Joseph McReynolds, Matthew Southerland, and James Mulvenon Research Report Prepared on Behalf of the U.S.-China Economic and Security Review Commission September 5, 2013 Revised March 22, 2014 After the publication of this report on September 5, 2013, Microsoft brought to the authors’ attention new information about its partnership with Chinese company 21Vianet. The original version of the report inaccurately characterized certain aspects of the Microsoft-21Vianet partnership. A revised discussion of this partnership is provided on pages 32-34. The authors would like to thank Microsoft for their assistance in clarifying the details of 21Vianet’s Windows Azure service. Disclaimer: This research report was prepared at the request of the Commission to support its deliberations. Posting of the Report to the Commission's website is intended to promote greater public understanding of the issues addressed by the Commission in its ongoing assessment of U.S.-China economic relations and their implications for U.S. security, as mandated by Public Law 106-398 and Public Law 108-7. However, it does not necessarily imply an endorsement by the Commission or any individual Commissioner of the views or conclusions expressed in this commissioned research report. i About Defense Group Incorporated Defense Group Inc. (DGI) performs work in the national interest, advancing public safety and national security through innovative...

Words: 25160 - Pages: 101

Premium Essay

Increasing Attacks on Cloud Platforms

...STUDENT NUMBER: 066275 CLOUD COMPUTING SECURITY TERM PAPER TWO Living with Increasing Attacks on Cloud Computing Platforms Cloud Computing is an on demand, flexible and cost friendly delivery platform that has provided IT consumers and organizations services such as networks, storage, servers and applications over the Internet. Its importance is increasing as a large number of industrial and technological communities are rapidly adopting it. The benefits such as low cost and convenience of cloud computing services have significantly changed our day to days activities, however, there are numerous security issues facing cloud computing making it difficult to maintain data security and privacy, support data and service availability and demonstrate compliance. These issue also make cloud vulnerable to exploitation by attackers. The three cloud services models used today are Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS).Iaas provides the most dynamic functionality since it is based as the underlying layer in cloud. It widens the resilience for users to design a practical environment that includes virtual machines running with different operating systems. This may pose as a vulnerability since an attacker could lease these virtual machines, analyze their configurations, find their vulnerabilities, and attack other customers’ virtual machines within the same cloud. Brute force and Distributed denial of service (DDoS) attacks could...

Words: 1310 - Pages: 6

Premium Essay

Cloud Computing

...Contents Introduction 1 Management Information System 1 Cloud Computing 3 Defining Cloud Computing 3 Cloud Service Models 4 Infrastructure as a Service (IaaS) 4 Platform-as-a-Service (PaaS) 4 Software -as-a-Service (SaaS) 5 Cloud Delivery Models 5 Public Cloud 5 Private Cloud 6 Hybrid Cloud 6 Challenges and Outstanding Issues 6 Loss of IT-control 7 Data Management 7 Privacy and Legal 7 Performance and QoS 8 Security 9 Conclusion 11 Introduction : Information recognized as essential for human life , where it helps to make choices and decisions in every activity . Nowadays, organizations needs information to be able to achieve its goals and maintain for survive. In business , management requires to planning , directing , controlling , making decisions and solving problems in efficient and effective way . information systems helps managers to do these functions by providing timely , accurate and relevant information . for this reason organizations investing in information systems and technology in order to achieve the most important objectives for any business through improving businesses operations efficiency and productivity which leads to customer returning and purchasing more and gaining high profits. Also , it enables to create new products and services such as ; iTunes music service . in same context , it helps mangers to make decisions with real time information which is reflected on organization's performance. As a result , firms...

Words: 3624 - Pages: 15

Premium Essay

Computing Trends - Research Skills

...Review 8 References 14 Research Skills 1. Research Proposal 2.1. Rationale and Context Cambridge City Government is an institution that is currently facing problems with the management of its information transfer over the internet. This is seen in the need to align data, particularly revenue streams, incomes and expenditures. In fact, the situation is worsened by an increasing city population, as well as amenities complexities that are placing a strain on the available internet facilities that serve the institution. As such, the proposed research study intends to analyse the role that cloud computing could play in solving the information transfer problems that face the government. The research results will act as the blueprint for the city administrators to develop and implement networking management approaches that will address its needs. I assume that if cloud computing is determined to be advantageous for the government, then its implementation will make it easier for the institution to meet its information management needs. This proposal describes the approach to research that will be adopted for the proposed study. Kenrick et al. (2010, pp. 293-294) argue that the cognitively driven constructs and context of any research would aid it in accepting the intellectual journey applied in the identification of the research problem. In this respect, it is better to understand the context of the research and the cognitively driven constructs that make up the search for...

Words: 3423 - Pages: 14

Premium Essay

Cloud Computing

...Cloud Computing Introduction This term paper will describe the characteristics of Cloud Computing and services associated with it. It will cover how businesses deploy services such as Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), as well as some of the benefits and challenges of Cloud Computing. Cloud Computing Definition - Cloud Computing is basically servers providing specific services to businesses and individuals over the internet. Characteristics * Shared Infrastructure — is when data centers use virtualization software on existing servers. This cuts down on total cost of infrastructure, storage, and networking bandwidth. * Dynamic Provisioning —Server computing instances or virtual machines are provisioned dynamically from a centralized console using automated software. The amount of services provided are determined by current demand requirements. * Network Access — One thing I like about Cloud Computing is the ability to access your account from anywhere, from any device. As long as you have an internet connection, you can use your pc, tablet, laptop, or mobile devices. An example is using iCloud storage to backup and restore your iphone. * Managed Metering — Another thing I like about Cloud Computing is you are only billed for what you use. Metering is used to optimize the service, provide reporting, and billing information. Service Models Once a cloud is established, how...

Words: 957 - Pages: 4