Cloud Computing: Security Threats and Solutions Nityendra Nath Shukla 1 and Vijander Singh 2 Department of computer science Amity University Rajasthan, India e-mail 1 : [email protected]e-mail 2 : [email protected]Abstract Virtualization plays a major role in the handling of cloud technology. Cloud computing uses virtualization to the maximum extent to give cost- effective services to the customer. But, it leads to a major flaw the current cloud industry is facing. The issue related to security in cloud has always been a hot topic for research and debate between the technocrats. This paper identifies the problems in security in cloud computing and tries to magnify it in terms of cloud computing based on the analysis of security threats of a cloud and also the technical components are taken into account. Keywords: cloud computing, security problems, threats, cloud service user and cloud service provider. INTRODUCTION According to the National Institute of Standards and Technology (NIST), cloud computing is “... a model for providing on demand and convenient shared pool of resources to the customers. Networks, servers, services, storage, and so on can be the example of resources.[3] It can be instantly released with minimal management effort or service-provider interaction”. Cloud computing is a service where computing is given as a commodity, much similar to electricity or cable television. It is essential for the service provider to optimize cloud computing for everyone in the business of cloud, both from a cost perspective and a sustainability perspective. It is our objective to argue that the stakeholders could benefit from Operations Research due to the nature of the problems they face, and that similarly the OR community could benefit from an emerging field which has the potential to drive new research questions.[2] The providers are aiming to expand their on-promise infrastructure, by developing capacity on demand. Cloud computing simply extends an enterprise’s capability to meet the computing demands of its everyday operation.[1] Cloud offers flexibility and choice, mobility and scalability, all coupled with potential cost savings, there is significant benefit on using cloud computing. However, the area is causing organizations to hesitate most when it comes to moving business workloads into public cloud is security. The high dependency of security architecture and functions on the reference architecture makes this paper show the reference architecture first and the security issues concerning this architecture. 2 Cloud computing: A technical look on components The components are shown in the Figure A, key functions of a cloud management system is divided into four layers. Each layer includes a set of functions: The service delivery Layer manages the service demand , service catalog, levels of services. The Software Layer includes LCMS, SIS, ERP, LMS and others. The Platform Layer includes DBMS, Virtualized OS and Web services. The Infrastructure Layer includes Hyper visor, network, Storage and Supporting Infrastructure. Other functions such as Management, Privacy and Security are considered as cross-layer functions that covers all the layers. The foremost principle of this Nityendra Nath Shukla et al, Int.J.Computer Technology & Applications,Vol 5 (3),929-932 IJCTA | May-June 2014 Available [email protected]929 ISSN:2229-6093
4
Embed
Cloud Computing: Security Threats and Solutions - … · Cloud Computing: Security Threats and Solutions . ... on-premise to cloud resources. ... Utility Framework and Optimal Provisioning”,
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.