This paper discusses the different elements related to security in cloud computing and factors for prevention. It covers articles on infrastructure, communication, peer-to-peer, and heterogeneous cloud computing.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CLOUD SECURITY MECHANISM CLOUD SECURITY MECHANISM Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2CLOUD SECURITY MECHANSIM Table of Contents Introduction................................................................................................................................3 Article 1......................................................................................................................................3 Infrastructure as a cloud security...........................................................................................3 About the article.....................................................................................................................3 Problem..................................................................................................................................3 Address of the problem..........................................................................................................3 Article 2......................................................................................................................................4 Commination problem in the concept of the cloud................................................................4 About the article.....................................................................................................................4 Problem..................................................................................................................................4 Address of the problem..........................................................................................................4 Article 3......................................................................................................................................5 Promise to Peer to Peer Cloud computing.............................................................................5 About the article.....................................................................................................................5 Problem..................................................................................................................................5 Address of the problem..........................................................................................................5 Article 4......................................................................................................................................6 Heterogeneous cloud computing............................................................................................6 About the article.....................................................................................................................6 Problem..................................................................................................................................6 Address of the problem..........................................................................................................6
3CLOUD SECURITY MECHANSIM Use case......................................................................................................................................7 Conclusion..................................................................................................................................9 References................................................................................................................................10
4CLOUD SECURITY MECHANSIM Introduction The cloud computing concept or technology can be considered as a technology which is playing a very vital role in recent times. The central aspect which is linked to the idea of the cloud computing with regards to the provider of cloud service is mainly hardware which is extraneous which is connected to support to downtime on any of the device which is situated in the network with any change in the user perspective. In this context, it should also be taken into consideration that the user image should be able to be transferred to another cloud. It can be stated here that though the concept of the cloud computing is based on the aspect of providing better utilisation of the resources using the element of virtualisation which would be helping the client in the workload. In these aspect, the security aspect are also involved in the concept. In this paper the different elements which are related to the aspect of security in the idea of cloud are majorly discussed and also the factors for the prevention are taken into consideration. There are different types of security concern which can be related to the theory of cloud computing which may include the sector of data breach to leakage of the data Article 1 Infrastructure as a cloud security About the article The infrastructure as a service architecture which is connected to the cloud industry has reached a critical mass in the past few years. The primary emphasis of the article is one theManyofthecloudprovidersgivetheserviceofplatformasaserviceandthe infrastructure related service based on the concept of virtual system. For example, S3 is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5CLOUD SECURITY MECHANSIM entirely virtual machine taking into consideration the aspect which is associated with the idea of Xen and sky tap which offers virtual lab management. The element which is related to the part of redundancy, large cloud computing vendors provide the aspect of dismissal in their system of the cloud which directly enables high availability in the server. Taking into consideration the element which is related to the concept of redundancy, large cloud computing vendors offer geographic redundancy in their system of cloud. This concept directly enables the component of high level of accessibility of the single provider. Problem In the concept of the cloud computing the cloud providors always provide the resources in the form of pooled resources which use the concept of the multi tenecy or the virtualisation model, "with different physical and virtual resources dynamically assigned and reassigned according to consumer demand" . The factor of the motivation directly lies in two of the sector which are mainly the specialisation and the scale approach. . Address of the problem It can be stated here that the offering which is done form the point of view of the cloud providers are very much specific. It always takes into consideration the aspect of application, client and customer support in order to fulfil the needs. This severely blocks the development of cloud systems by compelling merchant bolt in, which denies the capacity of clients to look over. All the more imperatively, restrictive cloud APIs make it extremely troublesome to coordinate cloud managements with a suggestion's own particular existing inheritance structures (e.g. an on-start server farm for very intuitive modelling applications in a pharmaceutical organisation). The extent which is related to the interoperability here alludes both to the joins among various mists and the association between a cloud and a
6CLOUD SECURITY MECHANSIM suggestion's nearby frameworks. The essential objective of interoperability is to appreciate the consistent information which is always authenticated and very much valabale when it is required by the customer. Future The infrastructure which is related to the concept of the cloud computing can be consideredoneofthedynamicaspectswhichplayaroleinanyorganisationwho implemented the process. The provisioning of the infrastructure can be sometimes related to the aspect of license which should be taken into consideration by the cloud providers. Article 2 Communication problem in the concept of the cloud About the article The central aspect which can be related to the element of confidentiality mainly means that the data of the user are kept secured. It can be referred to as an aspect which holds all the data of the user very much achieved in the concept of cloud computing which would be directly allowing other user to also indulge in these type of activity. The approach which can be used for the idea of the confidentiality are the process of encryption and the method of access control. Problem The aspect which is related to the communication between the cloud services and on the aspect of the on premises concept for example ERP system can be considered as indispensable and crucial to directly run the business. Poor conecpt which is related to the interoperability such as branded APIs and overly complicated or ambiguous data structures. For example as stated by (Rimal, Choi and Lumb 2016) “it is highly likely that an SME may
7CLOUD SECURITY MECHANSIM use Gmail for the email services andSalesForce.com for the HRservice.This means that the many features(e.g. address book,calendar, appointment booking,etc.) in the email system must connect to the HR employee directory residing in the HR system”. Address of the problem SUN has as of late propelled the concept which is related to the aspect of Sun cloud platform under the permit which is applied by the creative common factor. An outstanding obligation of the stage which is planned (in-advance) the cloud API. It characterises an arrangement of bright and straightforward Serene Web administrations interfaces, through which cloud shoppers can manage the concept of the clouds peripherals, counting figure, stockpiling parts in a brought together way. Utilizing the HTTP as the application convention and JSON for asset portrayal, the open cloud API characterises the crucial accompanying asset writes: Cloud, Virtual Data Center, Bunch, Virtual Machine, Private Virtual Network, Public Address, Storage Volume, and Volume Snapshot. These builds share a specific level of closeness with the interior engineering outline of Eucalyptus. Indeed, the venture is eager to endeavouring endeavours to guarantee the similarity between Sun cloud API and the Eucalyptus. This is lined up with DEBII's on-going examination in giving a lightweight PaaS open API utilising Restful Web administrations. Notice additionally that the idea of Virtual Data Center, which speaks to the centre element to instantiate the Sun Open Cloud, is comparable relating to the aspect of the private cloud which is Virtual. Future In the future the aspect of the communication should be taken into consideration. This is due to the factor that in most of the cases it is seen that the cloud providers do not give access to the data of the customer of the user. This can create a big problem for the user due
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8CLOUD SECURITY MECHANSIM to the factor that the data can be of high importance and the denial of the access can be very much harmful for the user. Article 3 Promise to Peer to Peer Cloud computing About the article In the not so distant past, any start-up wanting to make the following enormous thing on the Internet needed to put sizable measures of cash in registering equipment, arrange availability, land to house the gear, and specialised staff to continue everything working all day, every day. The inescapable postponements in getting this supported, planned, and set up could without much of a stretch eradicate any aggressive edge the organisation may have had at the start. Today, a similar start-up could have its item up and running in the cloud in a matter of days, if not hours, with zero in advance interest in servers and comparable apparatus. Furthermore, the organisation wouldn't need to pay for any more figuring oomph than it needs at any given time, because most cloud-specialist co-ops allocate registering assets progressively as per genuine request. With the processing framework outside of anyone's ability to see and out of brain, a start-up can focus its consideration on propelling and enhancing its item. This brings down the obstructions to section, letting anybody with an Internet association and a charge card tap a similar world-class processing assets as a noteworthy organisation. Problem The standardisation process will be robust to advance when these enormous players try not to approach to achieve accord. An utilised cloud API inside the scholarly world is the
9CLOUD SECURITY MECHANSIM Eucalyptus venture [14], which mirrors the notable restrictive cloud task. Despite the fact that a Eucalyptus IaaS cloud buyer can undoubtedly associate with the EC2 cloud without generous re-improvement, it can't illuminate the general issue that needs an open API consented to by various kinds of Cloud suppliers (Krutz and Vines 2016) Address of the problem DDoS (Distributed Denial of Service) attack can be considered as a problem relating to the concept of the cloud computing. The notable DDoS has the potential of disruting the conecpt of the cloud computing, not taking into consideration the problemwhich is alternative to relieve this. The virtual machine security will characterise the respectability and level of protection of a cloud condition to more unusual degree. Validation and Bookkeeping and additionally utilising falls of the safe guarding aspect- they can be very much considered asacomponentofsecurityworriesfordistributedcomputing.Alongtheselines,in distributed computing con content, a security concern is continuously some compose of hazard. However, any risk can't be indiscriminately judged to be a security concern. Allotment of obligations among the gatherings engaged with a cloud registering long run to a circumstance with security vulnerabilities (Rimal, Choi and Lumb 2016). Future The concept of peer to peer computing would be enhancing the sector of the business for most of the organisation due to the factor that it would be establishing a sense of responsibility for the user and they would easily indulge the overall business aspect in the concept of the cloud without any interventions. Article 4
10CLOUD SECURITY MECHANSIM Heterogeneous cloud computing About the article It mainly states in two different forms which are mostly legal constraints and the aspect of trust of the user. The consideration should be taken into different phases of the design aspect. The key challenges which should be taken into account in this aspect mainly involve the issue which is related to the software engineering to design the cloud services in such a way to decrease the privacy-related risk factors. The following tips would be ensuring the aspect of the cloud computing privacy aspect (Díaz, Martín and Rubio 2016). Problem WhilethepreviouslymentionedarrangementsbyandlargehandlewithIaaS interoperabilityissues,fewexaminationshaveconcentratedonotheradministration arrangement models. SaaS interoperability frequently includes diverse application spaces, for example, CRM and ERP. An area that is quite compelling to our examination gather at DEBII is the information mining research group. In the current KDD09 panel discussion , a specialist gathering relating to the aspect of raising the issue of building up an information mining standard on the cloud, with a specific spotlight on "the down to earth utilization of factual calculations, solid creation organization of models and the coordination of predictive examination" over diverse information mining-based SaaS mists. Capable advancement in this heading is the advancement of the Predictive Model Mark-up Language (PMML), a bit by bit acknowledged standard that enables clients to trade predictive models among different programming instruments (Rimal, Choi and Lumb 2016). Address of the problem
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
11CLOUD SECURITY MECHANSIM As distributed computing typically implies utilising open networks and in this manner in which the information of the transmitting is directly presented to the customers, digital attacks frame are expected for cloud processing. Security and protection both are worries in distributed computing because of the idea of such registering approach (Bisong and Rahman, 2011). The method by which allocated computing is finished has made it inclined to both data security and arrange security issues (Rakhmi, Sahoo and Mehfuz, 2013; Qaisar and Khawaja, 2012). Outsider association may develop as a hazard for cloud condition alongside other security dangers innate in virtual machine viewpoints (Hashizume et al., 2013). Components like delicate product bugs, social designing, human blunders make the security for cloud a powerfully challenging one (Kim, 2016). Interruption recognition is the most critical part inconsistent system observing to decrease security dangers. On the off chance that the contemporary IDSs (Intrusion recognition Systems) are wasteful, the resultant outcome may be hidden security break for cloud condition (Westphall et al., 2011) Future The aspect of heterogeneous cloud computing can be advantageous in a way that which directly impact the aspect of the data quality which is achieved from the aspectof the cloud computing approach. The main factor by which most of the organisation should move towards the concept of the cloud computing is to maximize the profit by means of the quality of the service which is given to them from the cloud providers. Use case The following points would directly explain how the cloud computing concept would be beneficial for the any business sector.
12CLOUD SECURITY MECHANSIM Cost reduction:in the concept of cloud computing there are different types of advantage which can be achieved from the concept. Most of the organisation tend to move to the concept of cloud computing to achieve the same. The main focus point which is related to the cost reduction is the aspect of less maintenance cost attached to the concept. In most of the cases organisation tend to employ professional IT expert to resolve the problem which is related to the maintenance sector. In the concept of cloud computing the provisioning of the maintenance is done from the end of the cloud providers. In most of the cases the need of different types of platform arise which may involve cost. In this aspect the cloud computing architecture provides the basic framework of the software’s which can be used according to the requirement of the organisation. The concept of cloud computing also gives the provision of pay as per use feature which directly means that the organisation only pay for the service they would be using. This can be considered one of the most advantage sector which is related to the concept of cloud computing. In this context it can be stated even that the resources which are used by the organisation can be scaled up and scaled down according to the need of the organisation. In most of the cases the organisation finds the concept very much advantageous. Ease of use and convenience:The concept of ease of use mainly focus on the aspect that the cloud can be accessed from anywhere and at any time. In most of the situations it is seen the data of the user which are very much crucial are usually stored in the concept of the cloud computing. The user or the customer always wants the data to be retrieved whenever they are willing to do so. The cloud providers gives this provision of the concept. The infrastructure of the cloud can be considered as one of the sectors which should be accessed at any time during the day so that the organisations can take advantage of the concept.
13CLOUD SECURITY MECHANSIM Reliability:since the concept of the cloud computing re taken into consideration by most of the organisation in recent times it can be stated that the concept has to be very much reliable. This is due to the factor that most of the data of the organisation which are critical data are stored in the concept of the cloud. In most of the cases the user do not have idea upon who is in charge of the data and who has the overall control of the data (Díaz, Martín and Rubio 2016). The providers of the cloud should provide a form a service which would be directly helping the user or the customer to feel safe that their data are in the hand of the reliable service. In some of the situation it is seen that it is not made clear by the cloud providers on who would be in charge of the data and the security mechanism which is involved into the concept. It should their role to take into consideration the aspects so that the user or the customers feel safe to indulge into the aspect. Sharing and collaboration:The concept of cloud computing can be considered as sharing point where one resource is usually shared by one or more user depending upon the need of the user. In most of the cases multi tenancy aspects are achieved which directly help in the aspect of accessing more than one resource by more than one user at a particular instant of time. The concept of collaboration also plays a vital role in this aspect. The user and the customers directly pay for the resources which are used by them and it can be stated that most of the user are aware of the concept that the resources are used by one or more customers at a particular time instant. Security and privacy:In the concept of the cloud the data of the user or the customers are usually shared. In most of the situation the user or the organisation are unaware of who is in charge of the charge and who has the overall control over the data. The cloud providers should always have a clear speech in this context regarding the security aspects which are involved into the concept. It can be stated here that most of the user or the customers store their crucial data in the concept of the cloud and if any type of hackers
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
14CLOUD SECURITY MECHANSIM involved into the concept it can be a huge loss for the organisation. In most of the cases it is taken into consideration that virus and other types of attacks can result In the loss of the data of the user which can form different types of ethical aspects involved into the concept. Conclusion The report can be concluded on a note that there are different types of security aspects which can be involved into the concept of cloud computing. In most of the cases the security aspect is related to the storage of the data of the customer or the user. The report gives a direct overview of the different types of cloud security mechanism which can be applied into the concept taking into consideration some of the organizations who have implemented the concept. Cloud computing like any other form of technology have flaws involved into the concept which has to be rectified and researcher’s workers are focusing on the aspect how the issues can be resolved. It can be stated here that the concept in the years to come would be playing a dominating role.
15CLOUD SECURITY MECHANSIM References Aazam, M., Khan, I., Alsaffar, A.A. and Huh, E.N., 2014, January. Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved. InApplied Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference on(pp. 414-419). IEEE. Alam, M.I., Pandey, M. and Rautaray, S.S., 2015. A comprehensive survey on cloud computing.International Journal of Information Technology and Computer Science,2, pp.68-79. Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and challenges.Information sciences,305, pp.357-383. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I. and Zaharia, M., 2016. A view of cloud computing. Communications of the ACM,53(4), pp.50-58. Buyya, R., Yeo, C.S. and Venugopal, S., 2017, September. Market-oriented cloud computing: Vision,hype,andrealityfordeliveringitservicesascomputingutilities.InHigh Performance Computing and Communications, 20. HPCC'08. 10th IEEE International Conference on(pp. 5-13). Ieee. Díaz, M., Martín, C. and Rubio, B., 2016. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing.Journal of Network and Computer Applications,67, pp.99-117. Fang, Y., Wang, F. and Ge, J., 2016, October. A task scheduling algorithm based on load balancing in cloud computing. InInternational Conference on Web Information Systems and Mining(pp. 271-277). Springer, Berlin, Heidelberg.
16CLOUD SECURITY MECHANSIM Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues.Information Systems,47, pp.98-115. Krutz, R.L. and Vines, R.D., 2016. Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Rimal, B.P., Choi, E. and Lumb, I., 2016, August. A taxonomy and survey of cloud computingsystems.InINC,IMSandIDC,2009.NCM'09.FifthInternationalJoint Conference on(pp. 44-51). Ieee. Rittinghouse,J.W.andRansome,J.F.,2016.Cloudcomputing:implementation, management, and security. CRC press. Sanaei, Z., Abolfazli, S., Gani, A. and Buyya, R., 2014. Heterogeneity in mobile cloud computing: taxonomy and open challenges.IEEE Communications Surveys & Tutorials, 16(1), pp.369-392. Shen, Z., Li, L., Yan, F. and Wu, X., 2014, May. Cloud computing system based on trusted computing platform. InIntelligent Computation Technology and Automation (ICICTA), 2010 International Conference on(Vol. 1, pp. 942-945). IEEE. Sridhar, S., 2016. Cloud computing.computing. Wang, N., Liang, H., Jia, Y., Ge, S., Xue, Y. and Wang, Z., 2016. Cloud computing research in the IS discipline: A citation/co-citation analysis.Decision Support Systems,86, pp.35-47. Zhang, Z. and Zhang, X., 2018, May. A load balancing mechanism based on ant colony and complex network theory in open cloud computing federation. InIndustrial Mechatronics and Automation (ICIMA), 2010 2nd International Conference on(Vol. 2, pp. 240-243). IEEE.