Security Issues in Cloud Computing: Journal of Analysis and Computation (JAC)
Security Issues in Cloud Computing: Journal of Analysis and Computation (JAC)
ABSTRACT:
Cloud computing is architecture for providing computing service via the internet on demand and
pay per use access to a pool of shared resources namely networks, storage, servers, services and
applications, without physically acquiring them. So it saves managing cost and time for
organizations. Normally data was stored in Relational Databases on one or more servers located
inside the organization and the clients needed to request data from these server machines. This
paper presents detailed study of IAAS and its components. We present how security at IAAS layer
need to be handled carefully as delivery models- Platform as a Service and Software as a Service
are built upon IAAS layer. We focus how IAAS security issues- data protection & usage
monitoring, end-to-end logging & reporting, infrastructure hardening and end-to-end encryption
need to be resolved.
1. INTRODUCTION:
Cloud is referred as large pool that holds easily accessible and usable virtualized resources.
To manage variable load and optimum usage, these resources are reconfigured dynamically.
Cloud Computing is a distributed architecture that centralizes server resources on a scalable
platform so as to provide on demand computing resources and services. Cloud service providers
offer cloud platforms for their customers to use and create their web services, much like
internet service providers offer cone doubt, Cloud Computing has provided many exciting
services and features like flexibility, reliability, unlimited storage, portability and the quick
processing power but cloud security is still a big issue. Security issues including lack of trust,
the risk of malicious insiders, and the failing of cloud services have been discussed. High speed
broad band to access the internet.
1
D. Sakthipriya, R. Priya and S. Kalaivani
SECURITY ISSUES IN CLOUD COMPUTING
In IAAS model, Cloud Service Provider outsources storage, servers, hardware, networking
components, etc. to the consumer. CSP owns the equipment and responsible for housing,
running and maintaining it. In this model, consumer pays on per-use basis. Characteristics and
components of IAAS include: Policy-based services
1. Dynamic scaling
2. Automation of administrative tasks
3. Utility computing service and billing model
4. Internet connective
5. Desktop virtualization
2.2. BACK GROUND WORK:
Being the most trending technology of the age, the research is being done widely on Cloud
Computing and especially on cloud security. In December 2008, Cloud Security Alliance
(CSA) was formed with the aim to provide assured security within cloud computing
environment. CSA launched “Security Guidance for Critical Areas of Focus in Cloud
Computing” as their initial product to help users get better insight about clouds and the security
parameters. The Cloud computing interoperability Group and the Multi-Agency Cloud
Computing Forum have made lot of efforts to deliver efficient and effective controls to provide
information security in Cloud environment.
Different models of cloud computing
Generally cloud services can be divided into three categories: Software as a Service (SAAS),
Platform as a Service (PAAS), and Infrastructure as a Service (IAAS). Software-as-a-Service
(SAAS): SAAS can be described as a process by which Application Service Provider (ASP)
provide different software applications over the Internet. This makes the customer to get rid of
installing and operating the application on own computer and also eliminates the tremendous
load of software maintenance; continuing operation, safeguarding and support. SAAS vendor
advertently takes responsibility for deploying and managing the IT infrastructure (servers,
operating system software, databases, data center space, network access, power and cooling,
etc) and processes (infrastructure patches/upgrades, application patches/upgrades, backups,
etc.) required to run and manage the full solution. SAAS features a complete application
offered as a service on demand. Platform as a Service (PAAS): “PAAS is the delivery of a
computing platform and solution stack as a service without software downloads or installation
for developers, IT managers or end-users. It provides an infrastructure with a high level of
integration in order to implement and test cloud applications. The user does not manage the
infrastructure (including network, servers, operating systems and storage), but he controls
deployed applications and, possibly, their configurations. Examples of PAAS includes:
Force.com, Google App Engine and Microsoft Azure.
2.3. Platform as a service:
Platform as a Service (PAAS) is a way to rent hardware, operating systems, storage and
network capacity over an Internet. PAAS is an outgrowth of SAAS that allows hosted software
applications to be made available to consumer over an Internet. Developer gets many
advantages from PAAS. With PAAS, OS can be changed and upgraded as many times as
needed. PAAS allows geographically distributed teams to work together on software
development projects. CSP have crossed international boundaries for providing on-going and
demanded services to consumers.
3
D. Sakthipriya, R. Priya and S. Kalaivani
SECURITY ISSUES IN CLOUD COMPUTING
service providers to recollect his original data. No doubt it is very fast technique but it has its
own security issues.
4. SOFTWARE AS A SERVICE
Software as a service sometimes referred to as "software on demand," is software that is
deployed over an Internet. With SAAS, a provider licenses an application to customers either as
a service on demand, through a subscription, in a "pay-as- you-go" model, or at no charge. This
approach is the part of the utility computing model where all of the technology is in the "cloud"
accessed over the Internet as a service. SAAS was initially widely deployed for sales force
automation and Customer Relationship Management (CRM). Now it has become commonplace
for many business tasks, including computerized billing, invoicing, human resource
management, financials, document management, service desk management and collaboration .
4.1. Privacy
Cloud computing utilizes virtual computing technology. In this, user’s personal data
is kept on various virtual data centers which may cross international boundaries. This is
where data privacy protection may face controversy of various legal systems.
4.2. Security:
Where is your data more secure, on your local hard driver or on high security
servers in the cloud? Some argue that customer data is more secure when managed
internally, while others argue that cloud providers have a strong incentive to maintain
trust and as such employ a higher level of security. However, in the cloud, your data
will be distributed over these individual computers regardless of where your base
repository of data is ultimately stored
Reliability: Server in the cloud have the same problems as your own resident
servers. The cloud servers also experience downtimes and slowdowns, what the
difference is that users have a higher dependent on cloud service provider (CSP) in the
model of cloud computing. There is a big difference in the CSP’s service model, once
you select a particular CSP, you may be locked-in, thus bring a potential business
secure risk.
4.3 Open Standard:
In cloud computing, open standards are critical to grow. Many CSP provides well
documented APIs which are unique to their implementation and thus difficult to
interoperable. Towards the progress, there are many open standards are under
development; OGF’s Open Cloud Computing Interface is one of them.
4.4. Long Term Viability:
It should be sure that the data you put into the cloud will never become invalid
even your cloud computing provider go broke or get acquired and swallowed up by a
larger company. "Ask potential providers how you would get your data back and if it
would be in a format that you could import into a replacement application.
4.5 Compliance:
Numerous regulations pertain to the storage and use of data require regular reporting
and audit trails, cloud providers must enable their customers to comply appropriately
with these regulations. Managing Compliance and Security for Cloud Computing,
provides insight on how a top-down view of all IT resources within a cloud-based
location can deliver a stronger management and enforcement of compliance policies.
REFERENCES
[1] A. Kundu, C. D. Banerjee, P. Saha, “Introducing New Services in Cloud Computing Environment”,
International Journal of Digital Content Technology and its Applications, AICIT, Vol. 4, No. 5, pp. 143-
152, 2010. Lizhe Wang, Jie Tao, Kunze M., Castellanos A.C., Kramer D., Karl W., “Scientific Cloud
Computing: Early Definition and Experience,” 10th IEEE Int. Conference on High Performance
Computing and Communications, pp. 825-830, Dalian, China, Sep. 2008, ISBN: 978-0-7695-3352-0. R.
L Grossman, “The Case for Cloud Computing,” IT Professional, vol. 11.
[2] http://www.interoute.com/cloud-article/what-hybrid-cloud
[3] Messmer, Ellen (March 31, 2009). "Cloud Security Alliance formed to promote best practices".
Computer world. Retrieved May 02, 2014
[4] "Security Guidance for Critical Areas of Focus in Cloud Computing". Cloud Security Alliance.
Retrieved May 02, 2014
5
D. Sakthipriya, R. Priya and S. Kalaivani