Cloud Security Mechanisms Report: Infrastructure, Communication & More

Verified

Added on  2023/06/12

|16
|4256
|459
Report
AI Summary
This report provides a detailed analysis of cloud security mechanisms, addressing various aspects such as infrastructure as a service, communication challenges, peer-to-peer cloud computing, and heterogeneous cloud environments. It examines problems related to data breaches, interoperability, and security vulnerabilities, offering insights into potential solutions and future directions. The report also includes a use case to illustrate the practical application and influence of cloud security mechanisms in an industry setting. The document highlights the importance of standardization, open APIs, and robust security measures to ensure the confidentiality, integrity, and availability of cloud services. Desklib is your go-to source for solved assignments and study resources.
Document Page
Running head: CLOUD SECURITY MECHANISM
CLOUD SECURITY MECHANISM
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2CLOUD SECURITY MECHANSIM
Table of Contents
Introduction................................................................................................................................3
Article 1......................................................................................................................................3
Infrastructure as a cloud security...........................................................................................3
About the article.....................................................................................................................3
Problem..................................................................................................................................3
Address of the problem..........................................................................................................3
Article 2......................................................................................................................................4
Commination problem in the concept of the cloud................................................................4
About the article.....................................................................................................................4
Problem..................................................................................................................................4
Address of the problem..........................................................................................................4
Article 3......................................................................................................................................5
Promise to Peer to Peer Cloud computing.............................................................................5
About the article.....................................................................................................................5
Problem..................................................................................................................................5
Address of the problem..........................................................................................................5
Article 4......................................................................................................................................6
Heterogeneous cloud computing............................................................................................6
About the article.....................................................................................................................6
Problem..................................................................................................................................6
Address of the problem..........................................................................................................6
Document Page
3CLOUD SECURITY MECHANSIM
Use case......................................................................................................................................7
Conclusion..................................................................................................................................9
References................................................................................................................................10
Document Page
4CLOUD SECURITY MECHANSIM
Introduction
The cloud computing concept or technology can be considered as a technology which
is playing a very vital role in recent times. The central aspect which is linked to the idea of
the cloud computing with regards to the provider of cloud service is mainly hardware which
is extraneous which is connected to support to downtime on any of the device which is
situated in the network with any change in the user perspective. In this context, it should also
be taken into consideration that the user image should be able to be transferred to another
cloud. It can be stated here that though the concept of the cloud computing is based on the
aspect of providing better utilisation of the resources using the element of virtualisation
which would be helping the client in the workload. In these aspect, the security aspect are
also involved in the concept. In this paper the different elements which are related to the
aspect of security in the idea of cloud are majorly discussed and also the factors for the
prevention are taken into consideration. There are different types of security concern which
can be related to the theory of cloud computing which may include the sector of data breach
to leakage of the data
Article 1
Infrastructure as a cloud security
About the article
The infrastructure as a service architecture which is connected to the cloud industry
has reached a critical mass in the past few years. The primary emphasis of the article is one
the Many of the cloud providers give the service of platform as a service and the
infrastructure related service based on the concept of virtual system. For example, S3 is
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5CLOUD SECURITY MECHANSIM
entirely virtual machine taking into consideration the aspect which is associated with the idea
of Xen and sky tap which offers virtual lab management. The element which is related to the
part of redundancy, large cloud computing vendors provide the aspect of dismissal in their
system of the cloud which directly enables high availability in the server. Taking into
consideration the element which is related to the concept of redundancy, large cloud
computing vendors offer geographic redundancy in their system of cloud. This concept
directly enables the component of high level of accessibility of the single provider.
Problem
In the concept of the cloud computing the cloud providors always provide the
resources in the form of pooled resources which use the concept of the multi tenecy or the
virtualisation model, "with different physical and virtual resources dynamically assigned and
reassigned according to consumer demand" . The factor of the motivation directly lies in two
of the sector which are mainly the specialisation and the scale approach. .
Address of the problem
It can be stated here that the offering which is done form the point of view of the
cloud providers are very much specific. It always takes into consideration the aspect of
application, client and customer support in order to fulfil the needs. This severely blocks the
development of cloud systems by compelling merchant bolt in, which denies the capacity of
clients to look over. All the more imperatively, restrictive cloud APIs make it extremely
troublesome to coordinate cloud managements with a suggestion's own particular existing
inheritance structures (e.g. an on-start server farm for very intuitive modelling applications in
a pharmaceutical organisation). The extent which is related to the interoperability here
alludes both to the joins among various mists and the association between a cloud and a
Document Page
6CLOUD SECURITY MECHANSIM
suggestion's nearby frameworks. The essential objective of interoperability is to appreciate
the consistent information which is always authenticated and very much valabale when it is
required by the customer.
Future
The infrastructure which is related to the concept of the cloud computing can be
considered one of the dynamic aspects which play a role in any organisation who
implemented the process. The provisioning of the infrastructure can be sometimes related to
the aspect of license which should be taken into consideration by the cloud providers.
Article 2
Communication problem in the concept of the cloud
About the article
The central aspect which can be related to the element of confidentiality mainly
means that the data of the user are kept secured. It can be referred to as an aspect which holds
all the data of the user very much achieved in the concept of cloud computing which would
be directly allowing other user to also indulge in these type of activity. The approach which
can be used for the idea of the confidentiality are the process of encryption and the method of
access control.
Problem
The aspect which is related to the communication between the cloud services and on
the aspect of the on premises concept for example ERP system can be considered as
indispensable and crucial to directly run the business. Poor conecpt which is related to the
interoperability such as branded APIs and overly complicated or ambiguous data structures.
For example as stated by (Rimal, Choi and Lumb 2016 ) “it is highly likely that an SME may
Document Page
7CLOUD SECURITY MECHANSIM
use Gmail for the email services and SalesForce.com for the HR service. This means that
the many features (e.g. address book, calendar, appointment booking, etc.) in the email
system must connect to the HR employee directory residing in the HR system”.
Address of the problem
SUN has as of late propelled the concept which is related to the aspect of Sun cloud
platform under the permit which is applied by the creative common factor. An outstanding
obligation of the stage which is planned (in-advance) the cloud API. It characterises an
arrangement of bright and straightforward Serene Web administrations interfaces, through
which cloud shoppers can manage the concept of the clouds peripherals, counting figure,
stockpiling parts in a brought together way. Utilizing the HTTP as the application convention
and JSON for asset portrayal, the open cloud API characterises the crucial accompanying
asset writes: Cloud, Virtual Data Center, Bunch, Virtual Machine, Private Virtual Network,
Public Address, Storage Volume, and Volume Snapshot. These builds share a specific level
of closeness with the interior engineering outline of Eucalyptus. Indeed, the venture is eager
to endeavouring endeavours to guarantee the similarity between Sun cloud API and the
Eucalyptus. This is lined up with DEBII's on-going examination in giving a lightweight PaaS
open API utilising Restful Web administrations. Notice additionally that the idea of Virtual
Data Center, which speaks to the centre element to instantiate the Sun Open Cloud, is
comparable relating to the aspect of the private cloud which is Virtual.
Future
In the future the aspect of the communication should be taken into consideration. This
is due to the factor that in most of the cases it is seen that the cloud providers do not give
access to the data of the customer of the user. This can create a big problem for the user due
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8CLOUD SECURITY MECHANSIM
to the factor that the data can be of high importance and the denial of the access can be very
much harmful for the user.
Article 3
Promise to Peer to Peer Cloud computing
About the article
In the not so distant past, any start-up wanting to make the following enormous thing
on the Internet needed to put sizable measures of cash in registering equipment, arrange
availability, land to house the gear, and specialised staff to continue everything working all
day, every day. The inescapable postponements in getting this supported, planned, and set up
could without much of a stretch eradicate any aggressive edge the organisation may have had
at the start.
Today, a similar start-up could have its item up and running in the cloud in a matter of
days, if not hours, with zero in advance interest in servers and comparable apparatus.
Furthermore, the organisation wouldn't need to pay for any more figuring oomph than it
needs at any given time, because most cloud-specialist co-ops allocate registering assets
progressively as per genuine request.
With the processing framework outside of anyone's ability to see and out of brain, a
start-up can focus its consideration on propelling and enhancing its item. This brings down
the obstructions to section, letting anybody with an Internet association and a charge card tap
a similar world-class processing assets as a noteworthy organisation.
Problem
The standardisation process will be robust to advance when these enormous players
try not to approach to achieve accord. An utilised cloud API inside the scholarly world is the
Document Page
9CLOUD SECURITY MECHANSIM
Eucalyptus venture [14], which mirrors the notable restrictive cloud task. Despite the fact that
a Eucalyptus IaaS cloud buyer can undoubtedly associate with the EC2 cloud without
generous re-improvement, it can't illuminate the general issue that needs an open API
consented to by various kinds of Cloud suppliers (Krutz and Vines 2016)
Address of the problem
DDoS (Distributed Denial of Service) attack can be considered as a problem relating
to the concept of the cloud computing. The notable DDoS has the potential of disruting the
conecpt of the cloud computing, not taking into consideration the problem which is
alternative to relieve this. The virtual machine security will characterise the respectability and
level of protection of a cloud condition to more unusual degree. Validation and Bookkeeping
and additionally utilising falls of the safe guarding aspect- they can be very much considered
as a component of security worries for distributed computing. Along these lines, in
distributed computing con content, a security concern is continuously some compose of
hazard. However, any risk can't be indiscriminately judged to be a security concern.
Allotment of obligations among the gatherings engaged with a cloud registering long run to a
circumstance with security vulnerabilities (Rimal, Choi and Lumb 2016).
Future
The concept of peer to peer computing would be enhancing the sector of the business
for most of the organisation due to the factor that it would be establishing a sense of
responsibility for the user and they would easily indulge the overall business aspect in the
concept of the cloud without any interventions.
Article 4
Document Page
10CLOUD SECURITY MECHANSIM
Heterogeneous cloud computing
About the article
It mainly states in two different forms which are mostly legal constraints and the
aspect of trust of the user. The consideration should be taken into different phases of the
design aspect. The key challenges which should be taken into account in this aspect mainly
involve the issue which is related to the software engineering to design the cloud services in
such a way to decrease the privacy-related risk factors. The following tips would be ensuring
the aspect of the cloud computing privacy aspect (Díaz, Martín and Rubio 2016).
Problem
While the previously mentioned arrangements by and large handle with IaaS
interoperability issues, few examinations have concentrated on other administration
arrangement models. SaaS interoperability frequently includes diverse application spaces, for
example, CRM and ERP. An area that is quite compelling to our examination gather at
DEBII is the information mining research group. In the current KDD09 panel discussion , a
specialist gathering relating to the aspect of raising the issue of building up an information
mining standard on the cloud, with a specific spotlight on "the down to earth utilization of
factual calculations, solid creation organization of models and the coordination of predictive
examination" over diverse information mining-based SaaS mists. Capable advancement in
this heading is the advancement of the Predictive Model Mark-up Language (PMML), a bit
by bit acknowledged standard that enables clients to trade predictive models among different
programming instruments (Rimal, Choi and Lumb 2016).
Address of the problem
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11CLOUD SECURITY MECHANSIM
As distributed computing typically implies utilising open networks and in this manner
in which the information of the transmitting is directly presented to the customers, digital
attacks frame are expected for cloud processing. Security and protection both are worries in
distributed computing because of the idea of such registering approach (Bisong and Rahman,
2011). The method by which allocated computing is finished has made it inclined to both data
security and arrange security issues (Rakhmi, Sahoo and Mehfuz, 2013; Qaisar and Khawaja,
2012). Outsider association may develop as a hazard for cloud condition alongside other
security dangers innate in virtual machine viewpoints (Hashizume et al., 2013). Components
like delicate product bugs, social designing, human blunders make the security for cloud a
powerfully challenging one (Kim, 2016). Interruption recognition is the most critical part
inconsistent system observing to decrease security dangers. On the off chance that the
contemporary IDSs (Intrusion recognition Systems) are wasteful, the resultant outcome may
be hidden security break for cloud condition (Westphall et al., 2011)
Future
The aspect of heterogeneous cloud computing can be advantageous in a way that
which directly impact the aspect of the data quality which is achieved from the aspectof the
cloud computing approach. The main factor by which most of the organisation should move
towards the concept of the cloud computing is to maximize the profit by means of the quality
of the service which is given to them from the cloud providers.
Use case
The following points would directly explain how the cloud computing concept would
be beneficial for the any business sector.
Document Page
12CLOUD SECURITY MECHANSIM
Cost reduction: in the concept of cloud computing there are different types of
advantage which can be achieved from the concept. Most of the organisation tend to move to
the concept of cloud computing to achieve the same. The main focus point which is related to
the cost reduction is the aspect of less maintenance cost attached to the concept. In most of
the cases organisation tend to employ professional IT expert to resolve the problem which is
related to the maintenance sector. In the concept of cloud computing the provisioning of the
maintenance is done from the end of the cloud providers. In most of the cases the need of
different types of platform arise which may involve cost. In this aspect the cloud computing
architecture provides the basic framework of the software’s which can be used according to
the requirement of the organisation. The concept of cloud computing also gives the provision
of pay as per use feature which directly means that the organisation only pay for the service
they would be using. This can be considered one of the most advantage sector which is
related to the concept of cloud computing. In this context it can be stated even that the
resources which are used by the organisation can be scaled up and scaled down according to
the need of the organisation. In most of the cases the organisation finds the concept very
much advantageous.
Ease of use and convenience: The concept of ease of use mainly focus on the aspect
that the cloud can be accessed from anywhere and at any time. In most of the situations it is
seen the data of the user which are very much crucial are usually stored in the concept of the
cloud computing. The user or the customer always wants the data to be retrieved whenever
they are willing to do so. The cloud providers gives this provision of the concept. The
infrastructure of the cloud can be considered as one of the sectors which should be accessed
at any time during the day so that the organisations can take advantage of the concept.
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]