A Technical Seminar Report On: Department of Computer Science and Engineering
A Technical Seminar Report On: Department of Computer Science and Engineering
A Technical Seminar Report On: Department of Computer Science and Engineering
Bachelor of Technology
In
Submitted by
Y.SAI SNEHITH (18VE1A05J0)
(2018-2022)
I
SREYAS INSTITUTE OF ENGINEERING AND TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CERTIFICATE
This is to certify that the Technical Seminar Report on “SECURITY ISSUES IN CLOUD COMPUTING”
submitted by Y.SAI SNEHITH bearing Hall Ticket Number 18VE1A05J0 in partial fulfillment
of the requirements for the award of the degree of Bachelor of Technology in Computer Science
and Engineering from Jawaharlal Nehru Technological University, Kukatpally, Hyderabad for
the academic year 2021-2022 is a record of bonafide work carried out by her under our guidance
and Supervision.
II
ACKNOWLEDGEMENT
Y.SAI SNEHITH
(18VE1A05J0)
III
ABSTRACT
Cloud computing has become one of the most interesting topics in the IT world today.
Cloud model of computing as a resource has changed the landscape of computing as it
promises of increased greater reliability, massive scalability, and decreased costs have
attracted businesses and individuals alike. It adds capabilities to Information Technology’s.
Over the last few years, cloud computing has grown considerably in Information
Technology. As more and more information of individuals and companies are placed in the
cloud, there is a growing concern about the safety of information. Many Companies that
are considered to be giants in software industry like Microsoft are joining to develop Cloud
services [1]. Despite the hype about the cloud, customers are reluctant to deploy their
business in the cloud. Security issues is one of the biggest concerns that has been affecting
the growth of cloud computing. It adds complications with data privacy and data protection
continues to affect the market. Users need to understand the risk of data breaches in the
cloud environment. The paper highlights issues related to cloud computing.
IV
PAGE INDEX
Chapter-1 INTRODUCTION…………………………………………………..7
Chapter-4 IMPLEMENTATION……………………………………………..12
Chapter-7 REFERENCES…………………………………………………….18
V
FIGURE INDEX
VI
CHAPTER – 1
INTRODUCTION
Software Developers describe Cloud in a different way than a System Administrator, while a
Database Administrator may have different definition. Cloud means a wide range of scalable
services that users can access via an Internet connection. Providers like Microsoft, Amazon,
Google and many more provide various cloud-based services for which users can pay on the
basis of service subscription and consumption. Many providers offer a wide range of Cloud
services like Messaging, Social Computing, Storage, CRM, Identity management, Content
Management etc. Cloud computing is dependent on resource sharing. Using these internets
enabled devices, cloud computing permits the function of application software. Cloud computing
is also known as the cloud. Cloud computing serves a wide range of functions over the Internet
like storage. Taking advantage of resource sharing, cloud computing is able to achieve
consistency and economies of scale. Types of cloud computing can be classified on basis of two
models. Cloud computing service models and cloud computing deployment models. It is a file
backup shape. It also allows working on the same document for several jobs of different types.
Cloud computing simplifies usage by allowing overcoming the limitations of traditional
computer. Cloud computing also provides more agility because it allows faster access. These
hosted services are normally separated into three broad categories: Infrastructure-as-a-Service
(IaaS), Platform-as-a Service (PaaS) and Software-as-a-Service (SaaS). A cloud service is used
by clients as and when needed, usually on hourly basis. This pay as you go approach has made
the cloud flexible such that where end user can have services the way they desire at any point of
time and the cloud services is entirely monitored by the provider. There are some of the basic
security threats that have exploited the usage of Cloud Computing. An example of security threat
is botnets, the use of botnets to spread spam and malware. Of the 761 data breaches investigated
in 2010 by the U.S. Secret Service, almost 63% occurred at companies with 100 or fewer
employees. And a 2011 survey by security systems provider Symantec Corp. around 2,000 plus
small and midsize enterprises indicated that close to 73% had been breached by a cyber-attack.
One of the best features of cloud computing is pay-as-you-go model of computing as a resource.
This model of computing has enabled businesses and organizations in need of computing power
to purchase as many resources as they need without the need to put forth a large capital
investment in the IT infrastructure. Other advantages of cloud computing are scalability and
increased flexibility for a relatively constant price. . Cloud is the new trend in the evolution of
7
the distributed systems. The user does not need knowledge or expertise to control the
infrastructure of clouds, it provides abstraction.
CHAPTER – 2
LITERATURE SURVEY
Cloud hosting deployment models are classified by the proprietorship, size and access. It tells about
the nature of the cloud. Most of the organizations are willing to implement cloud since it reduces
the expenditure and controls cost of operation.
Hybrid Cloud
It is a type of cloud computing, which is integrated. It could constitute an arrangement of two or
more cloud servers, i.e., either of the combination of private, public or community cloud that is
bound together but remain individual entities. Hybrid clouds are capable of crossing isolation and
overcoming boundaries by the provider; therefore, it cannot be simply categorized into public,
private or community cloud. It allows the user to increase the capacity as well as the capability by
assimilation, aggregation and customization with another cloud package / service. In a hybrid cloud,
the resources are managed either in-house or by external providers. It is an adaptation between two
platforms in which the workload exchanges between the private cloud and the public cloud as per
the needs and demand of organization. Resources which are non-critical like development and test
workloads can be housed in the public cloud that belongs to a third-party provider. While the
workloads that are critical or sensitive should be housed internally. Organizations may use the
hybrid cloud model for processing big data. Hybrid cloud hosting has features like scalability,
flexibility and security.
Community Cloud
It is a type of cloud hosting in which the setup is mutually shared between a lot of organizations
which belong to a particular community like banks and trading firms. It is a multi-tenant setup that
is shared among many organizations that belong to a group which has similar computing
apprehensions. Theses community members usually share similar performance and security
9
concerns. The main intention of the communities is to achieve business related objectives.
Community cloud can be managed internally or can be managed by third party providers and
hosted externally or internally. The cost is shared by specific organizations within the community;
therefore, community cloud has cost saving capacity. Organizations have realized that cloud
hosting has a lot of potential. To be the best one must select the right type of cloud hosting
Therefore, one need to know the business and analyze his/her demands. Once the appropriate type
of cloud hosting is selected, one can achieve business related goals easily.
CHAPTER – 3
SOFTWARE REQUIREMENTS SPECIFICATIONS
11
Platform as a Service (PaaS)
Platform as a service (PaaS) is a kind of cloud computing services that provides a platform that
allows customers to develop, run, and manage applications without the problem of building and
maintaining the infrastructure. One need not be bothered about lower-level elements of
Infrastructure, Network Topology, Security all this is done for you by the Cloud Service Provider.
With this technology, third-party providers can manage OS, virtualization, and the PaaS software
itself. Developers manage the applications. Applications using PaaS inherit cloud characteristic
such as scalability, multi-tenancy, SaaS enablement, high availability and more. Enterprises benefit
from this model because it reduces the amount of coding, automates business policy, and help in
migrating applications to hybrid model.
CHAPTER – 4
IMPLEMENTATION
Cloud service models not only provide different types of services to users but they also
reveal information which adds to security issues and risks of cloud computing systems. IaaS which
is located in the bottom layer, which directly provides the most powerful functionality of an entire
cloud. IaaS also enables hackers to perform attacks, e.g., brute-forcing cracking, that need high
computing power. Multiple virtual machines are supported by IaaS, gives an ideal platform for
hackers to launch attacks that require a large number of attacking instances. Loss of data is another
security risk of cloud models.
12
Fig4.1 Security problems in cc
Data in cloud models can be easily accessed by unauthorized internal employees, as well as
external hackers. The internal employees can easily access data intentionally or accidently.
External hackers may gain access to databases in such environments using hacking techniques like
session hijacking and network channel eavesdropping. Virus and Trojan can be uploaded to cloud
systems and can cause damage. It is important to identify the possible cloud threats in order to
implement a system which has better security mechanisms to protect cloud computing
environments.
13
Fig4.1.1 security attack
Data breaches
Cloud environments face many of the same threats as traditional corporate networks, but since a
large amount of data is stored on cloud servers, providers have become an attractive target. The
severity of the damage tends to depend on the sensitivity of the data that is exposed. Personal
financial information grabs the headlines, but breaches involving government information, trade
secrets can be more devastating. When a data breach takes place, a company may be subjected to
legal action. Breach investigations and customer notifications can rack up significant costs. Indirect
effects may include brand damage and loss of business can impact organizations future for years.
Account hijacking
Phishing, fraud, and software exploits are highly prevalent today, and cloud services add a new
dimension to the threat because attackers can eavesdrop on activities, manipulate transactions, and
modify data. Attackers may be able to use the cloud application to launch other attacks.
Organizations must prohibit sharing of account credentials between users and services and must
enable multifactor authentication schemes where available. Accounts, must be monitored so that
every transaction should be traced to a human owner. The key is to protect account credentials from
being stolen.
Inadequate diligence
Organizations accepting cloud computing without having complete understanding of the
environment and risks associated with it may encounter a great number of commercial, financial,
technical, legal, and compliance risks. Diligence is needed whether the organization is trying to
migrate to the cloud or merging with another company in the cloud. For example, organizations
that fail to examine a contract may not be aware of the provider’s liability in case of data loss or
breach. Operational and architectural issues could arise if an organization development team isn’t
familiar with cloud technologies as apps are deployed to a particular cloud. An organization should
do adequate research before moving to cloud computing because of the risk associated with it .
16
DoS attacks
DoS attacks have been around for a long time and have gained prominence again thanks to cloud
computing because they often affect availability. Systems may run slow or simply time out. These
DoS attacks consume large amounts of processing power, a bill the customer may ultimately have
to pay. High-volume DDoS attacks are very common, but organizations should also be aware of
asymmetric and application-level DoS attacks, which target Web server and database
vulnerabilities. Cloud providers are better poised to handle DoS attacks than their customers. The
key here is to have a plan to mitigate the attack before it occurs, so administrators have access to
those resources when they need them.
The table below shows represents the schematic diagram showing the hierarchy other cloud
computing with security challenges on both the cloud computing models: Deployment and Service
models
CHAPTER – 5
CONCLUSION
Cloud Computing is a new concept that presents quite a number of benefits for its users. But it also
raises some security problems which may affect its usage. Understanding about the vulnerabilities
existing in Cloud Computing will help organizations to make the shift towards using the Cloud.
17
Since Cloud Computing leverages many technologies and it also inherits their security issues.
Traditional web applications, virtualizations have been looked over but some of the solutions
offered by cloud are immature or inexistent. We have presented security issues for cloud models:
IaaS, PaaS, and IaaS, which differ depending on the model. As described in this paper, storage and
networks are the biggest security concerns in Cloud Computing. Virtualization that allows multiple
users to share a physical server is a major concern for cloud users. Virtual networks are target for
some attacks. We have focused on this distinction, where we consider important to understand
these issues. Another core element of cloud computing is multitenancy.
CHAPTER – 6
FUTURE SCOPE
In short, the cloud of the future is going to be a digital fortress, more robust and resilient
than ever. Cloud security will be more intelligent, more automated, and more discerning,
driven by advances in AI, machine learning, quantum computing, and other transformative
technologies.
Cloud Security's future encompasses many high-end advancements and capabilities using
modern technologies such as IoT (Internet of Things) and AI (Artificial Intelligence). Small
and medium-sized businesses are likely to combine cloud services from different service
providers, which will change the way we do the job. Expanding cloud adoption by almost
all types of companies will improve smart workflows and reduce dependency on foreigners.
One thing is for sure: Cloud adoption will increase day by day to offer benefits to both
businesses and consumers. Technologies will improve faster and they would also need the
cloud to manage and simplify their work.
There will probably be more integration into real technologies like modes of transportation,
smart elevators, restaurant automation, autonomous cars, etc. Cloud computing will be
necessary for every type of job and professional requirement.
18
CHAPTER – 7
REFERENCES
Lizhe Wang, Jie Tao, Kunze M., Castellanos A.C., Kramer D., Karl W.,
“Scientific Cloud Computing: Early Definition and Experience,” 10th IEEE Int.
Conference on High Performance
Computing and Communications, pp. 825830, Dalian, China, Sep. 2008, ISBN:
9780-7695-3352-0.
B. R. Kandukuri, R. Paturi V, A. Rakshit, “Cloud Security Issues”, In Proceedings of
IEEE International Conference on Services
Computing, pp. 517-520, 2009
National Institute of Standards and Technology, NIST Definition of Cloud
Computing, Sept 2011.
Jamil and H. Zaki, “Security Issues in
Cloud Computing and Countermeasures,”
International
Journal of Engineering Science and Technology, Vol. 3 No. 4, pp. 2672-2676, April
2011
http://www.infoworld.com/article/3041078
Rittinghouse JW, Ransome JF: Security in the Cloud. In Cloud Computing.
Implementation, Management, and
Security, CRC Press; 2009.
Garfinkel T, Rosenblum M: When virtual is harder than real: Security challenges in
virtual machine-based computing environments. In Proceedings of the 10th
conference on Hot Topics in Operating Systems, Santa Fe, NM. volume 10. CA,
USA: USENIX Association Berkeley; 2005:227–229.
19
Morsy MA, Grundy J, Müller I: An analysis of the Cloud Computing Security
problem. In Proceedings of APSEC 2010 Cloud Workshop. Sydney, Australia:
APSEC; 2010.
Farzad Sabahi, “Cloud Computing Security Threats and Responses”, 978-1-61284-
486-
2, IEEE, 2011, pp: 245 – 249.
Intel IT Centre, “Preparing your Virtualized
Data Centre for the Cloud”, pp: 1 – 20
Rajnish Choubey, Rajshree Dubey, Joy Bhattacharjee, “A Survey on Cloud
Computing Security”.
20