threats in security of cloud computing

Topics: Cloud computing, Information security, Security Pages: 65 (13362 words) Published: December 16, 2013
Suman M R
VEDAVYASA INSTITUTE OF TECHNOLOGY

CLOUD SECURITY ISSUES AND MECHANISM

CHAPTER 1,
1.INTRODUCTION
Cloud computing is the delivSuman M R
VEDAVYASA INSTITUTE OF TECHNOLOGY

CLOUD SECURITY ISSUES AND MECHANISM

CHAPTER 1,
1.INTRODUCTION
Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers

and

other

devices

as

a utility (like

the electricity

grid)

over

a network (typically the Internet). A Cloud Service Provider (CSP) offers Cloud services out of one or more DCs, where compute, storage, and network resources are offered on-demand to Cloud Service Consumers (CSC). The infrastructure resources are offered via a service called the Infrastructure as a Service (IaaS), where a CSC can acquire and release resources on-demand and elastically (grow or shrink at will) and pay for the services or resources per use. In addition to the infrastructure resources, the software resources are also offered via Platform as a Service (PaaS) and Software as a Service (SaaS) in the same elastic, ondemand and pricing models. In the case of PaaS, software development and testing platforms and software middleware components are offered as on-demand resources. In the case of SaaS, full fill edged application products are offered as ondemand resources.

Typically, the level of security you get will be designed to meet the needs of the most risky client in the cloud. And, if you use the tools identified in this paper as a starting point, you will have a good idea of how comparable your cloud security versus internal security will be.

Dept of CSE

1

2008 Adimission

VEDAVYASA INSTITUTE OF TECHNOLOGY

CLOUD SECURITY ISSUES AND MECHANISM

CHAPTER 2
2.HOW SECURITY IS RELATED
In traditional computing paradigms, in a cloud computing environment, data and the application is controlled by the service provider. This leads to a natural concern about data safety and also its protection from internal as well as external threats. Despite of this, advantages such as- On demand infrastructure, pay as you go, reduced cost of maintenance, elastic scaling etc. are compelling reasons for enterprises to decide on cloud computing environments. Usually, in a cloud computing paradigm, data storage and computation are performed in a single datacenter. There can be various security related advantages in using a cloud computing environment. However, a single point of failure cannot be assumed for any data loss. The data may be located at several geographically distributed nodes in the cloud, There may be multiple points where a security breach can occur . Compared to a traditional in house computing, it might be difficult to track the security breach in a cloud computing environment. In this paper, we present the advantages and disadvantages (in the context of data security) of using a cloud environment.

Figure-2.1

Figure shows
Environment

by

a

typical Data Security Checkpoints in a Cloud Computing

major cloud service providers

to investigate the prominent

security issues.We investigate the security mechanisms that are used by major service providers. Our study supports that in the context of data security, trust is a major Dept of CSE
Suman M R
VEDAVYASA INSTITUTE OF TECHNOLOGY

CLOUD SECURITY ISSUES AND MECHANISM

CHAPTER 1,
1.INTRODUCTION
Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers

and

other

devices

as

a utility (like

the electricity

grid)

over

a network (typically the Internet). A Cloud Service Provider (CSP) offers Cloud services out of one or more DCs, where compute, storage, and network resources are offered on-demand to Cloud Service Consumers (CSC). The infrastructure resources are offered via a service called the...


References: [8]By Overview of Security processes(2008)
[9]http://www.iiit.ac.in
relations(1990).
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Security and privacy challenges in cloud computing Essay
  • Cloud Computing Security Threats Essay
  • Enhancement the Security in Cloud Computing Essay
  • Security Issues in Cloud Computing Essay
  • Essay about Security Risks in Cloud Computing
  • Cloud computing could minimize security threats Essay
  • Cloud Computing Essay
  • cloud computing Essay

Become a StudyMode Member

Sign Up - It's Free