Premium Essay

Cloud Security Issues

In:

Submitted By Garner887
Words 4240
Pages 17
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/259072387

Cloud Computing Security Issues and Challenges
ARTICLE · JANUARY 2011

CITATIONS

READS

13

20,419

1 AUTHOR:
Ibikunle Ayoleke
Botswana International University of Science…
29 PUBLICATIONS 30 CITATIONS
SEE PROFILE

All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.

Available from: Ibikunle Ayoleke
Retrieved on: 13 February 2016

Kuyoro S. O., Ibikunle F. & Awodele O.

Cloud Computing Security Issues and Challenges
Kuyoro S. O.

afolashadeng@gmail.com

Department of Computer Science
Babcock University
Ilishan-Remo, 240001, Nigeria

Ibikunle F.

faibikunle2@yahoo.co.uk

Department of Computer Science
Covenant University
Otta, 240001, Nigeria

Awodele O.

delealways@yahoo.com

Department of Computer Science
Babcock University
Ilishan-Remo, 240001, Nigeria

Abstract
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers

Similar Documents

Premium Essay

Cloud Hooks: Security and Privacy Issues in Cloud Computing

...Proceedings of the 44th Hawaii International Conference on System Sciences - 2011 Cloud Hooks: Security and Privacy Issues in Cloud Computing Wayne A. Jansen, NIST Abstract In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the hook. The cloud hook formation provides a useful analogy for cloud computing, in which the most acute obstacles with outsourced services (i.e., the cloud hook) are security and privacy issues. This paper identifies key issues, which are believed to have long-term significance in cloud computing security and privacy, based on documented problems and exhibited weaknesses. • applications can be developed upon and deployed. It can reduce the cost and complexity of buying, housing, and managing hardware and software components of the platform. Infrastructure-as-a-Service (IaaS) enables a software deployment model in which the basic computing infrastructure of servers, software, and network equipment is provided as an on-demand service upon which a platform to develop and execute applications can be founded. It can be used to avoid buying, housing, and managing the basic hardware and software infrastructure components. 1. Introduction Cloud computing has been defined by NIST as a model for enabling convenient, on-demand...

Words: 7808 - Pages: 32

Premium Essay

Jaffa

...CLOUD COMPUTING JOURNOUL Introduction Cloud computing is a most vital kind of data establishment, it is a substitute arrangement of action to give prevalent, irrelevant exertion preparing and information organizations, supporting particular combinations of data application. The quick change of distributed computing has brought an arrangement of non-standard security risks, and set forth a substitute and higher enthusiasm to data security. Cloud computing and its Security Issues Cloud computing otherwise called distributed computing is reevaluating the on - interest utilization of remotely put and especially available processing assets for the client. Tragically, while the different budgetary and mechanical purposes of speculation are clear, the movement of key division requests to the cloud has been limited because of a vital centerpiece: the absence of quantifiable estimations to review the tradeoffs (characteristics, issues and the business concerns) of security. In spite of the conspicuous worth of estimations in extraordinary circumstances to study such tradeoffs, a formal and standard - based framework for the tending to of security estimations in the cloud is a much harder and is an open issue. Additionally considering the consistent examination with relationship like the cloud security union and European meanders like Abc4trust, Comifin and INSPIRE. This paper likewise shows the cruciall building bits of a proposed security estimations structure for parts, for example...

Words: 950 - Pages: 4

Premium Essay

Cloud Computing Challenges

...Cloud Computing – the Challenges!! ABSTRACT The word ‘cloud’ has become the hottest buzzword these days. Everything has started moving towards cloud and we could feel that ‘Cloud Computing’ as a revolutionary concept that is going to bring us to Internet ubiquity. At the same time there are also barriers to it. This paper discusses about various cloud-computing challenges, security challenges for cloud & security benefits of cloud. Table of Contents Introduction 4 Cloud Computing Challenges 4 Security Challenges 4 Data Security 5 Cloud Computing Security Issues 5 Security Benefits 6 Conclusion 7 Introduction Cloud Computing delivers information or services to customers who pay for what they use. The customer can be an external person or company who is paying for a service or information or an internal customer, such as the application proprietor who is using services that another division within the same company is offering, and who is being charged for consumption. There are two different types of clouds – Public cloud and Private cloud. In public cloud the information and services provided to the customer are from external sources and in private cloud customer gets the information from internal sources. With the public cloud, the customer does not own any storage or server and also no capital expenditure; the customers merely pay money for what they need on demand. With the private cloud, the customer is an internal customer so the company...

Words: 1970 - Pages: 8

Premium Essay

Cloud Computing

...Dublin Institute of Technology ARROW@DIT Dissertations School of Computing 2010-09-01 Cloud Computing:Strategies for Cloud Computing Adoption Faith Shimba Dublin Institute of Technology, faith.shimba@gmail.com Recommended Citation Shimba, F.:Cloud Computing:Strategies for Cloud Computing Adoption. Masters Dissertation. Dublin, Dublin Institute of Technology, 2010. This Dissertation is brought to you for free and open access by the School of Computing at ARROW@DIT. It has been accepted for inclusion in Dissertations by an authorized administrator of ARROW@DIT. For more information, please contact yvonne.desmond@dit.ie, arrow.admin@dit.ie. This work is licensed under a Creative Commons AttributionNoncommercial-Share Alike 3.0 License School of Computing Dissertations Dublin Institute of Technology Year  Cloud Computing:Strategies for Cloud Computing Adoption Faith Shimba Mr. Dublin Institute of Technology, faith.shimba@student.dit.ie This paper is posted at ARROW@DIT. http://arrow.dit.ie/scschcomdis/1 — Use Licence — Attribution-NonCommercial-ShareAlike 1.0 You are free: • to copy, distribute, display, and perform the work • to make derivative works Under the following conditions: • Attribution. You must give the original author credit. • Non-Commercial. You may not use this work for commercial purposes. • Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical...

Words: 35464 - Pages: 142

Premium Essay

Cloud Computing

...SECURITY PROBLEMS FOR CLOUD - BASED COMPUTING Journal Article Review Narasimha Raju, Bhargava Salaka SECURITY PROBLEMS FOR CLOUD - BASED COMPUTING Journal Article Review Narasimha Raju, Bhargava Salaka 2014 2014 Introduction Cloud computing is a most important kind of information establishment, it is an alternate arrangement of activity to give prevalent, insignificant exertion preparing and data organizations, supporting distinctive assortments of information application. The fast change of distributed computing has brought a plan of non-standard security dangers, and put forth an alternate and higher enthusiasm to information security. Cloud computing and its Security Issues Cloud Computing also known as distributed computing is rethinking the on - demand use of remotely put and particularly available processing assets to the customer. Tragically, while the various budgetary and mechanical purposes of investment are clear, the migration of key division orders to the cloud has been confined due to a noteworthy centerpiece: the absence of quantifiable estimations to survey the tradeoffs (attributes, issues and the commercial concerns) of security. Despite the obvious worth of estimations in unique circumstances to survey such tradeoffs, a formal and standard - based system for the having a tendency to of security estimations in the cloud is a much harder and is an open issue. Moreover considering the constant investigation with relationship like the cloud security...

Words: 1000 - Pages: 4

Premium Essay

Secured Authenticated Framework for Mobile Clouding

...Abstract Cloud computing is creates many challenges in the information technology world every day. In present situations use of resources using mobile phones becomes one of the essential things for everybody. The demands of the user in internet increasing day by day. But every wireless hand held devices don't have that much of resource availability and required facility. So, cloud computing is a better solution to give support resource consuming applications. If the mobiles are integrated with the cloud then user can get more facilities with resources required and big storage space for storing his private data. With addition to the benefits of cloud, there is a chance to face the security and privacy issues of the user data. This paper discuss important concepts of cloud computing and general security issues happened in mobile side as well as cloud and also describes basic idea of Kerberos. The aim of this paper is to propose the strong authenticated framework when mobiles are connected to cloud. We have proposed the improvement in the mobile cloud based framework for better security and privacy. Keywords: mobile cloud computing applications, security of data, Kerberos 2. Introduction and literature survey Rapid development in the mobile devices and cloud computing has creating some attention to everyone in the IT industry. Consider the development of security in almost everywhere over Internet; mobile devices are also not the exceptions to deal with respect to the security. In this...

Words: 2780 - Pages: 12

Premium Essay

Managment

...A review on cloud computing security issues & challanges F. A. Alvi1, Ψ, B.S Choudary2 ,N. Jaferry3 , E.Pathan4 1 Department of Computer Systems Engineering, QUEST Nawabshah, Sindh, Pakistan 2 Department of Computer Systems Engineering, MUET Jamshoro, Sindh, Pakistan 3 Department of Computer Systems Engineering, QUEST Nawabshah, Sindh, Pakistan 4 Department of Electronic Engineering, QUEST Nawabshah, Sindh, Pakistan Abstract The new developments in the field of information technology offered the people enjoyment, comforts and convenience. Cloud computing is one of the latest developments in the IT industry also known as on-demand computing. It provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructures. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. This technology has the capacity to admittance a common collection of resources on request. It is proving extremely striking to cash-strapped IT departments that are wanted to deliver better services under pressure. When this cloud is made available for the general customer on pay per use basis, then it is called public cloud. When customer develops their own applications and run their own internal infrastructure then is called private cloud. Integration and consolidation of public and private cloud is called hybrid cloud. But having many advantages for...

Words: 4903 - Pages: 20

Premium Essay

Cloud Computing and Information Security

...Cloud Computing and Information Security Krystal Hagi Daytona State College Student Khagi1@yahoo.com Abstract In order to discuss the security of information in cloud computing, we must first cover what is Cloud Computing. There are many types of cloud computing services, such as, SaaS, PaaS, IaaS, public clouds, private clouds, and hybrid clouds Examples. They all work similarly but have not only different tools, but varying levels of security for various needs. These differing types of clouds and networks as a service offer off site data storage in a secured location, which in essence frees up space and virtual infrastructure for personal and/or business networks, and devices. There are advantages and disadvantages to cloud computing, just like any other product or service. The advantages being, storage for data, accessibility from virtually anywhere there is a network connection, automated management, security, apps, tools, etc. The disadvantages include monthly costs for space on the offsite network, security, involvement of a third party, no access to the physical structure - which means if the cloud server goes down, your data may not be accessible, etc. There is one instance with cloud computing that is both an advantage and a disadvantage, and that is the security. While a cloud may be more secure than your own network How?, personal or business, using cloud services puts the security out of your hands in both the physical and logical sense. Using a cloud, means the...

Words: 4955 - Pages: 20

Premium Essay

Cloud Computing

...Introduction Cloud computing has the potential to change the face of the Information Technology (IT) industry. Industry experts maintain that the cloud will eventually become a primary component of computing activities conducted over the Internet. Presently, major corporations like Google, Amazon, Microsoft, and IBM have embraced this trend and are using the technology to enhance IT supported services. As the number of benefits and potential uses of the technology grows, the funding earmarked for assessments and implementation of cloud services will likely multiply. Cloud computing consists of immense benefits that allows end users to utilize services that include infrastructure, applications, data storage capacity. Last year, the Brookings Institution released a study that endorses the benefits of cloud computing to the government. The writer of the study, Darrell West, who is the vice president and director of government studies at Brookings, stated in the paper, “that agencies that have moved to the cloud generally enjoyed 25percent to 50 percent savings on their IT cost. For the federal government as a whole, this translates into billions in cost savings, depending on the scope of the transition” (West, 2011). Cloud computing consist of a network of servers that run services that are operated as shared platforms. The characteristics of cloud computing include on-demand services, pay-per-use services, broadband network access, multi-tenancy, rapid elasticity and scalability...

Words: 2173 - Pages: 9

Premium Essay

The Future of Cloud Computing

...the recent years, cloud computing frameworks such as Amazon Web Services, Google AppEngine and Windows Azure have become increasingly popular among IT organizations and developers. We have seen a phenomenal increase in the usage and deployment of smartphone platforms and applications worldwide. We further identify research gaps covering critical aspects of how MCC can be realized and effectively utilized at scale. These include improved resource allocation in the MCC environment through efficient task distribution and offloading, security and privacy. Mobile cloud computing has recently attracted significant attention from both academia and industry. According to a recent study from Heavy Reading [9] the direct revenue of mobile cloud market will grow to about $68 billion by 2017. It is expected to achieve $1 trillion for the broader mobile cloud market. A similar forecast has also been made by ABI research , which predicts that the number of mobile cloud computing subscribers (like mobile users and mobile application providers) worldwide is expected to grow rapidly over the next five years, rising from 42.8 million subscribers in 2008, (approximately 1.1 % of all mobile subscribers) to over 998 million in 2014 (nearly 19 %). Security and privacy are challenging issues for MCC applications such as m-commerce, m-health and mobile social network applications. These applications are naturally resource intensive in terms of computation and storage. Using cloud computing resources...

Words: 1082 - Pages: 5

Premium Essay

Cloud Computing Issues

...“Current Security Issues in Cloud Computing”. As of today, cloud computing is a flexible, cost-efficient, and established transfer platform for giving business or user IT services on the internet. Yet, cloud computing presents an additional level of risk because crucial services are time and again outsourced to a moderator. This makes it more difficult to uphold data security, privacy, support data, service availability, and validate compliance. It is my goal to discuss some of the current issues involved with the cloud and how important that they are to everyone. What is Cloud? Cloud computing is a capable computing regular where computing resources in big data points are made accessible as services over the internet. It has become a renowned IT by presenting a professional atmosphere for data storage capability. It is a standard for computing and is provides a striking, enormous, significant asset that contains any subscription-based or pay-per-use service over the web. Cloud is on-demand admission to virtualized IT services and products. Places like Amazon and Google are presently giving such services, by charging customers by means of an on-demand strategy. Being that consumers put their sensitive information on the clouds public domains, huge problems for cloud implementation are lack of security and access control. The key obstacle is that the doubtful info drifts as service providers can access numerous computer-generated mechanisms in clouds. The cloud takes virtual...

Words: 2156 - Pages: 9

Premium Essay

Cloud Computing

...What’s New About Cloud Computing Security? Yanpei Chen Vern Paxson Randy H. Katz Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2010-5 http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html January 20, 2010 Copyright © 2010, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. What’s New About Cloud Computing Security? Yanpei Chen, Vern Paxson, Randy H. Katz CS Division, EECS Dept. UC Berkeley {ychen2, vern, randy}@eecs.berkeley.edu ABSTRACT While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hats”. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new” is so only relative to “traditional” computing of the past several...

Words: 5878 - Pages: 24

Premium Essay

Cis 500 Case Study - Cloud Computer

...for Decision Making Abstract Cloud computing is not strange to people at all. People use their iPhone and their iPad App to store their important files. Microsoft 2013 users use the SkyDrive to store their files and they can access anywhere and anytime. Major venders such as Google, Amazon, and Microsoft have provided Cloud Computing services. This paper discusses the Amazon Web Services (AWS) and evaluates the scalability, dependability, manageability, and adaptability of Amazon Elastic Compute Cloud, Amazon Simple Storage Service, and RightScale. Moreover, this paper examines the security concerns for cloud-based services and assesses scalability, reliability, and cost issues. Assess how Ericsson benefitted from Amazon Web Service (AWS) in terms of cost reduction, automated software updates, remote access, and on-demand availability Ericsson is one of the world’s leading providers of technology and services to telecom operators. There are reasons how Ericsson success like that. According to the Amazon Web Services (AWS) Case study, Ericsson uses AWS such as Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3), and RightScale for provisioning and auto-scale functionality. AWS give many benefits to Ericsson. For example, Ericsson saves money to invest to build on-premises infrastructure by using AWS. Ericsson also saves the time to build and install the infrastructure. Some of the technical benefits of cloud computing include automation...

Words: 1257 - Pages: 6

Premium Essay

Don't Know

...Cloud computing: benefits, risks and recommendations for information security Cloud computing is a new way of delivering computing resources, not a new technology. Computing services ranging from data storage and processing to software, such as email handling, are now available instantly, commitment-free and on-demand. Since we are in a time of belt-tightening, this new economic model for computing has found fertile ground and is seeing massive global investment. According to IDC’s analysis, the worldwide forecast for cloud services in 2009 will be in the order of $17.4bn1. The estimation for 2013 amounts to $44.2bn, with the European market ranging from €971m in 2008 to €6,005m in 2013 2. The key conclusion of ENISA’s 2009 paper on Cloud Computing: benefits, risks and recommendations for information security3 is that the cloud’s economies of scale and flexibility are both a friend and a foe from a security point of view. The massive concentrations of resources and data present a more attractive target to attackers, but cloud-based defences can be more robust, scalable and cost-effective. ENISA’s paper allows an informed assessment of the security risks and benefits of using cloud computing - providing security guidance for potential and existing users of cloud computing. The new economic model has also driven technical change in terms of: Scale: commoditisation and the drive towards economic efficiency have led to massive concentrations of the hardware resources required to provide...

Words: 2434 - Pages: 10

Premium Essay

Cloude Computing

...Cloud Computing and Security ITM 5600 Thomas Payne Webster University Cloud Computing and Security The National Institute of Standards and Technology (NIST) define cloud computing this way. “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics (On-demand self-service, Broad network access, Resource pooling, Rapid elasticity, Measured Service); three service models (Cloud Software as a Service (SaaS), Cloud Platform as a Service (PaaS), Cloud Infrastructure as a Service (IaaS)); and, four deployment models (Private cloud, Community cloud, Public cloud, Hybrid cloud). Key enabling technologies include: (1) fast wide-area networks, (2) powerful, inexpensive server computers, and (3) high-performance virtualization for commodity hardware” (National Institue of Standards and Technology, 2011). There is a lot to take in from that lengthy definition. This may explain why there is so much ambiguity and “hand wringing” surrounding cloud computing. Major companies and government alike have started to embrace cloud services and architecture. This hasn’t been an easy transition, however many higher level managers are not aware or just not informed on...

Words: 4426 - Pages: 18