Security Issues and Challenges in Cloud Computing
2014, International Conference on Information Engineering, Management and Security 2014
Sign up for access to the world's latest research
Abstract
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider Interaction. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
Related papers
Journal of Network and Computer Applications, 2011
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. It extends Information Technology's (IT) existing capabilities. In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. The advent of an advanced model should not negotiate with the required functionalities and capabilities present in the current model. A new model targeting at improving features of an existing model must not risk or threaten other important features of the current model. The architecture of cloud poses such a threat to the security of the existing technologies when deployed in a cloud environment. Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment. In this paper, a survey of the different security risks that pose a threat to the cloud is presented. This paper is a survey more specific to the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system.
2013 10th International Conference on Information Technology: New Generations, 2013
Cloud computing is a revolutionary way of storing and accessing data with five essential characteristics, three service models, and four deployment models. Businesses have realized the tremendous potentiality and benefits of cloud computing and have accepted the technology, but still a small amount of scepticism hovers around. In defiance of its potential characteristics, the organizations risk their sensitive data by storing it in the cloud. In this paper, we have identified various privacy and security challenges associated with the novelty of cloud computing. The security and privacy challenge listed in this paper perceives demand for implementation of sophisticated technologies to deal with them.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023
The most technological trend in the IT world is cloud computing, and because of its youth, both its users and its manufacturers have certain concerns. Looking over its literature, we can observe that the primary issues are trust, privacy, and security. That makes a significant barrier for users to use. Hence, to determine whether cloud computing would be accepted, we decided to assess various issues, including security. In this article, the security paradigm was the central issue, focusing on privacy safeguards and the need for trustworthiness to implement cloud computing. As a by-product, we have suggested radical innovations for enhancing security, reducing risks, improving trust, and protecting consumers, which are crucial for the adoption of cloud computing.
The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies and it has more advantage characters such as large scale computation and data storage, virtualization, high expansibility, high reliability and low price service.
arXiv (Cornell University), 2013
Cloud computing is a new computing paradigm which allows sharing of resources on remote server such as hardware, network, storage using internet and provides the way through which application, computing power, computing infrastructure can be delivered to the user as a service. Cloud computing unique attribute promise cost effective Information Technology Solution (IT Solution) to the user. All computing needs are provided by the Cloud Service Provider (CSP) and they can be increased or decreased dynamically as required by the user. As data and Application are located at the server and may be beyond geographical boundary, this leads a number of concern from the user prospective. The objective of this paper is to explore the key issues of cloud computing which is delaying its adoption.
International Journal of Advanced Computer Science and Applications, 2013
Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-you-go services to users. Cloud has boomed high in business and other industries for its advantages like multi-tenancy, resource pooling, storage capacity etc. In spite of its vitality, it exhibits various security flaws including loss of sensitive data, data leakage and few others related to cloning, resource pooling and so on. As far as security issues are concerned, a very wide study has been reviewed which signifies threats with service and deployment models of cloud. In order to comprehend these threats, this study is presented so as to effectively refine the crude security issues under various areas of cloud. This study also aims at revealing different security threats under the cloud models as well as network concerns to stagnate the threats within cloud, facilitating researchers, cloud providers and end users for noteworthy analysis of threats.
IAEME, 2019
Cloud computing is pools of virtualized resources that are easily usable. Now a day's people are accustomed to store their personal data in cloud. Cloud computing store, Manage and process data which is hosted on the internet using Servers. In the earlier days, security concerns deter many organizations from using cloud computing services. Cloud computing presents another level of risk because essential Services are often outsourced to a third party vendor, which makes it harder to uphold data Security and privacy. In this paper, we accentuate on the area of cloud computing, identify the various threats related to the cloud computing.
2014
Cloud Computing is an internet based computing where virtual shared servers provide software, infrastructure, platform, devices and other resources and hosting to customer on a pay –as—you-use basis. Users can access these services available on “Internet Cloud “without having any previous known how on managing the resources involved. But the major issue in the cloud computing is security. Several concerns which identify security requirements in cloud computing. This paper brings out an introductory review on cloud computing,various services and security challenges in cloud computing. Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for both Cloud providers and consumers as well. Infrastructure as a Service (IaaS) serves as the foundation layer for the other delivery models, and a lack of security in this layer will certainly affect the other delivery models, i.e., PaaS, and SaaS that are built upon IaaS layer. This paper presents an elaborat...
Cloud computing is an architecture for providing computing service via the internet on demand and pay per use access to a pool of shared resources namely networks, storage, servers, services and applications, without physically acquiring them. So it saves managing cost and time for organizations. Many industries, such as banking, healthcare and education are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern based on the resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied etc. Cloud computing is a completely internet dependent technology where client data is stored and maintain in the data center of a cloud provider like Google, Amazon, Salesforce.som and Microsoft etc. Limited control over the data may incur various security issues and threats which include data leakage, insecure interface, sharing of resources, data availability and inside attacks. There are various research challenges also there for adopting cloud computing such as well managed service level agreement (SLA), privacy, interoperability and reliability. This research paper outlines what cloud computing is, the various cloud models and the main security risks and issues that are currently present within the cloud computing industry. This research paper also analyzes the key research and challenges that presents in cloud computing and offers best practices to service providers as well as enterprises hoping to leverage cloud service to improve their bottom line in this severe economic climate.
IJCSMC, 2022
In today’s era almost all the organizations are preferring to use cloud as their primary storage. Once the organization uploads its data to cloud, then the organization has no control over it. Then comes the security challenges in handling data to cloud service providers. While selecting a Cloud Service Provider we need to be aware about that service provider before giving our data because as from now you will not have all the control. This paper gives a better understanding on the concept of cloud computing and the risks that came up after outsourcing data handling tasks. Section 1 is Introduction, Section 2 discusses on various Service Models in Cloud Computing, Section 3 contains Cloud Deployment Models, Section 4 focuses on Security Issues and Challenges in Cloud Computing.
Security Issues and Challenges in Cloud Computing
K. Lakshmi
Assistant Professor, ChristuJyothi Institute of Technology & Science,
Warangal, Telangana, India
Abstract
Cloud computing is a model for enabling ubiquitous, convenient, on-demand nety access to a shared pool of configurable computing resources such as networks, servers, storag? dications, and services that can be rapidly provisioned and released with minimal management ef service provider Interaction. Despite the potential gains achieved from the cloud computing, the of dations are slow in accepting it due to security issues and challenges associated with it. Security of the major issues which hamper the growth of cloud. The idea of handing over important to another company is worrisome; such that the consumers need to be vigilant in understanding the of data breaches in this new environment. This paper introduces a detailed analysis of the d computing security issues and challenges focusing on the cloud computing types and the service d pes.
Keywords: Cloud computing, on-demand network access, secur?
FIGURE 1: Results of IDC survey ranking security challenges, 2008 [1]
Despite of all the hype surrounding the cloud, customers are still reluctant to deploy their business in the cloud. Security issues in cloud computing has played a major role in slowing down its acceptance, in fact security ranked first as the greatest challenge issue of cloud computing as depicted in figure 1
From one point of view, security could improve due to centralization of data and increased security-focused resources. On the other hand concerns persist about loss of control over certain sensitive data, and the lack of security for stored kernels entrusted to cloud providers. If those providers have not done good, securing their own environments, the consumers could be in trouble. Measuring the quality of ound providers’ approach to security is difficult because many cloud providers will not expose their in eporture to customers. This work is a survey more specific to the different security issues and, eassociated challenges that has emanated in the cloud computing system.
2. Related Works
Gartner 2008 identified seven security issues that need to be addressed ore enterprises consider switching to the cloud computing model. They are as follows: (1) per a user access - information transmitted from the client through the Internet poses a certain d risk, because of issues of data ownership; enterprises should spend time getting to know their pry and their regulations as much as possible before assigning some trivial applications first to test th er, (2) regulatory compliance - clients are accountable for the security of their solution, as they e oose between providers that allow to be audited by 3 rd party organizations that check levels of so and providers that don’t (3) data location depending on contracts, some clients might never k what country or what jurisdiction their data is located (4) data segregation - encrypted informationin multiple companies may be stored on the same hard disk, so a mechanism to separate data sith be deployed by the provider. (5) recovery - every provider should have a disaster recovery pry to protect user data (6) investigative support - if a client suspects faulty activity from the provide not have many legal ways pursue an investigation (7) longterm viability - refers to the ability a contract and all data if the current provider is bought out by another firm.[2] The Cloud Compa Use Case Discussion Group discusses the different Use Case scenarios and related requirements that may exist in the cloud model. They consider use cases from different perspectives include customers, developers and security engineers.[3] ENISA investigated the different security risks to adopting cloud computing along with the affected assets, the risks likelihood, impacts, a rterabilities in the cloud computing may lead to such risks.[4] Balachandra et al, 2009 discussed theity SLA’s specification and objectives related to data locations, segregation and data recovery. amir et al, 2010 discussed high level security concerns in the cloud computing model such as data uurity, payment and privacy of sensitive information.[6] Bernd et al, 2010 discuss the security su babilities existing in the cloud platform. The authors grouped the possible vulnerabilities into techno related, cloud characteristics-related, security controls related.[7] Subashini et al discuss the scurt challenges of the cloud service delivery model, focusing on the SaaS model.[8] Ragovind et al, (2010) discussed the management of security in Cloud computing focusing on Gartner’s list on cloud security issues and the findings from the International Data Corporation enterprise.[9] Morsy et al, 2010 investigated cloud computing problems from the cloud architecture, cloud offered characteristics, cloud stakeholders, and cloud service delivery models perspectives.[10] A recent survey by Cloud Security Alliance (CSA)&IEEE indicates that enterprises across sectors are eager to adopt cloud computing but that security are needed both to accelerate cloud adoption on a wide scale and to respond to regulatory drivers. It also details that cloud computing is shaping the future of IT but the absence of a compliance environment is
having dramatic impact on cloud computing growth.[11] Several studies have been carried out relating to security issues in cloud computing but this work presents a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing deployment types and the service delivery types.
3. Security Issues in Cloud Computing
A. Deployment of cloud services:
Cloud services are typically made available via a private cloud, community cloud, public cht hybrid cloud as shown fig2.
It is set up within an organization of the real enterprise datacenter. In the private cloud, scalable resources and virtual applications provide the cloud vendor are pooled together and available for cloud users to share and use. Utilization of private cloud can be much more secure than that of the public cloud because of its specified ied exposure. Only the Organization and designated stakeholders may have access to operate on a specific Private cloud.
C. Public cloud
The deployment of a public cloud computing system is characterized on the one hand by the public availability of the cloud service offering and on the other hand by the public network that is used to commute the with the cloud service. In addition, public cloud portfolios employ techniques for resource othi esion; however, these are transparent for end users and represent a potential threat to the security of the system.
D. Hybrid cloud
A hybrid cloud service deployment model implements the required processes by combining the cloud services of different cloud computing systems, e.g. private and public cloud services. The hybrid model is also suitable for enterprises in which the transition to full outsourcing has already been completed, for instance, to combine community cloud services with public cloud services.
E. Cloud Service Models
Following on the cloud deployment models, the next security consideration relates to the various Cloud computing service delivery models. The three main cloud service delivery models are: Infrastructure-as-aService (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).
(i) Infrastructure as a Service (IaaS)
Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components. The s of rovider owns the equipment and is responsible for housing, running and maintaining it. The client a dily pays on a per-use basis.IaaS has many characteristics and components such as Utility servic, and piling model, Automation of administrative tasks, Dynamic scaling, Desktop, policy-based services, and riet connectivity.
(ii) Platform as a Service (PaaS)
Platform as a Service (PaaS) is a way to rent hardware, operating sys 0 large and network capacity over the Internet. The service delivery model allows the customer to rualized servers and associated services for running existing applications or developing and testing cimes.
Platform as a Service (PaaS) is an outgrowth of Software as a se (SaaS), a software distribution model in which hosted software applications are made available. sstomers over the Internet. PaaS has several advantages for developers. With PaaS, operating system cures can be changed and upgraded frequently.
(iii) Softwas a Service
Software as a Service (SaaS) is a software di tion model in which applications are hosted by a vendor or service provider and made available to sers over a network, typically the Internet.SaaS is becoming an increasingly prevalent delivery mo 0 riderlying technologies that support Web services and serviceoriented architecture (SOA) mure and new developmental approaches, such as Ajax, become popular. Meanwhile, broadband service become increasingly available to support user access from more areas around the world.
Fig. 2 The following are the additional services provided by the cloud.
4. Computing Challenges in Cloud
A. Security: The current adoption of cloud computing is associated with numerous challenges because users are still skeptical about its authenticity. The cloud acts as a big black box, nothing inside the cloud is visible to the clients and Clients have no idea or control over what happens inside a cloud Even if the cloud provider is honest, it can have malicious system admins who can tamper with the VMs and violate confidentiality and integrity Clouds are still subject to traditional data confidentiality, integrity, availaing, and privacy issues, plus some additional attacks.
B. Costing Model: Pricing is the process of determining what a service provider will recep 22 m an end user in exchange for their services. The pricing process can be as follows: fixed in which customer is charged the same amount all the time dynamic, in which the price charged changes 2 rically or market dependent in which the customer is charged based on the real time market conditio
C. Service Level Agreement (SLA): Although cloud consumers do not have 0 rrol Over the underlying computing resources, they do need to ensure the quality, availability, 2 rlity, and performance of these resources when consumers have migrated their core business functio their entrusted cloud. In other words, it is vital for consumers to obtain guarantees from providers 2 twice delivery. Typically, these are provided through Service Level Agreements (SLAs) negotiated by the providers and consumers. The very first issue is the definition of SLA specifications in such way that has an appropriate level of granularity, namely the tradeoffs between expressiveness and 2 orplicatedness, so that they can cover most of the consumer expectations and is relatively simple to 2 lighted, verified, evaluated, and enforced by the resource allocation mechanism on the cloud. In 2 tion, different cloud offerings (IaaS, PaaS, and SaaS) will need to define different SLA meta speciffions. This also raises a number of implementation problems for the cloud providers. Furthermore, 2 tited SLA mechanisms need to constantly incorporate user feedback and customization features inta the SLA evaluation framework.
D. What to migrate: Based on a sur (simple size =244 ) conducted by IDC in 2008, the seven IT systems/applications being migrated 2 cloud are: IT Management Applications (26.2%),Collaborative Applications (25.4%), Personal (25%), Business Applications (23.4%),Applications Development and Deployment (28%), Server Capacity ( 15.6% ), and Storage Capacity ( 15.5% ). This result reveals that organizations 2 wive security/privacy concerns in moving their data on to the Cloud. Currently, peripheral fun 2 such as IT management and personal applications are the easiest IT systems to move. Organizations 2 conservative in employing laaS compared to SaaS. This is partly because marginal functions 22 on outsourced to the Cloud, and core activities are kept in-house. The survey also shows that in thesars’ time, 31.5% of the organization will move their Storage Capacity to the cloud. However this s is still relatively low compared to Collaborative Applications ( 46.3% ) at that time.
Conclusion
22 cloud computing can be seen as a new phenomenon which is set to revolutionize the way we use Internet, there is much to be cautious about. There are many new technologies emerging at a rapid rate, each with technological advancements and with the potential of making human’s lives easier. However, one must be very careful to understand the security risks and challenges posed in utilizing these technologies. Cloud computing is no exception. In this paper key security considerations and challenges which are currently faced in the Cloud computing are highlighted. Cloud computing has the potential to become a frontrunner in promoting a secure, virtual and economically viable IT solution in the future.
References
- Gens. (2009, Feb.). “New IDC IT Cloud Services Survey: Top Benefits and Challenges”,IDC eXchange, Available: [http://blogs.idc.com/ie/?p=730](http://blogs.idc.com/ie/?p=730) [Feb. 18, 2010].
- J. Brodkin. (2008, Jun.). “Gartner: Seven cloud-computing security risks.” InfoWorld, Available: [http://www.infoworld.com/d/security-central/gartner-seven-cloudcomputingsecurityrisks853?page=o,1](http://www.infoworld.com/d/security-central/gartner-seven-cloudcomputingsecurityrisks853?page=o,1) [Mar. 13, 2009].
- Cloud Computing Use Case Discussion Group. “Cloud Computing UseCases Version 3.0,” 2010.
- ENISA. (2009, Feb) “Cloud computing: benefits, risks and recommendations for information security.” Available: http://www.enisa.europa.eu/act/rm/files/deliverables/cts-computingriskassessment [Jul. 10, 2010].
- R. K. Balachandra, P. V. Ramakrishna and A. Rakshit."Cloud Security Issues."In PROCINT IEEE International Conference on Services Computing, 2009, pp 517-520.
- P. Kresimir and H. Zeljko “Cloud computing security issues and challenges.” 2010. 19th International Conference on Advances in Human-oriented and Perspectives on Mechanisms, Technologies, and Services, 2010, pp. 344-349.
- B. Grobauer, T. Walloschek and E. Stöcker, “Understanding Cloud Containing Vulnerabilities,” IEEE Security and Privacy, vol. 99, 2010.
- S. Subashini, and V. Kavitha. (2010) “A survey on security issues in service delivery models of cloud computing.” J Network ComputAppIdoi:10.1016/j.jnca.2010.07.049911-010.
- S. Ramgovind, M. M. Eloff, E. Smith. “The Management of the Internet in Cloud Computing” InPROC 2010 IEEE International Conference on Cloud Computing 2010.
- A. Morsy, J. Grundy and Müller I. “An Analysis of the Cloud Computing Security Problem” In PROC APSEC 2010 Cloud Workshop. 2010.
- Cloud Security Alliance (CSA). Available: http://www.ciadsecurityalliance.org [Mar.19,2010]
References (11)
- Proceedings of The Intl. Conf. on Information, Engineering, Management and Security 2014 [ICIEMS 2014] 133 ICIEMS 2014 ISBN : 978-81-925233-3-0 www.edlib.asdf.res.in / www.iciems.in
- Gens. (2009, Feb.). "New IDC IT Cloud Services Survey: Top Benefits and Challenges",IDC eXchange, Available: <http://blogs.idc.com/ie/?p=730> [Feb. 18, 2010].
- J. Brodkin. (2008, Jun.). "Gartner: Seven cloud-computing security risks." InfoWorld, Available: <http://www.infoworld.com/d/security-central/gartner-seven-cloudcomputingsecurityrisks- 853?page=0,1> [Mar. 13, 2009].
- Cloud Computing Use Case Discussion Group. "Cloud Computing UseCases Version 3.0,"2010.
- ENISA. (2009, Feb) "Cloud computing: benefits, risks and recommendations for information security." Available: http://www.enisa.europa.eu/act/rm/files/deliverables/cloud- computingriskassessment [Jul. 10, 2010].
- R. K. Balachandra, P. V. Ramakrishna and A. Rakshit."Cloud Security Issues."In PROC'09 IEEE International Conference on Services Computing, 2009, pp 517-520.
- P. Kresimir and H. Zeljko "Cloud computing security issues and challenges." In PROCThird International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, 2010, pp. 344-349.
- B. Grobauer, T. Walloschek and E. Stöcker, "Understanding Cloud Computing Vulnerabilities," IEEE Security and Privacy, vol. 99, 2010.
- S. Subashini, and V. Kavitha. (2010) "A survey on security issues in service delivery models of cloud computing." J Network ComputAppldoi:10.1016/j.jnca.2010.07.006. Jul.,2010.
- S. Ramgovind, M. M. Eloff, E. Smith. "The Management of Security in Cloud Computing" InPROC 2010 IEEE International Conference on Cloud Computing 2010.
- A. Morsy, J. Grundy and Müller I. "An Analysis of the Cloud Computing Security Problem" In PROC APSEC 2010 Cloud Workshop. 2010.