An Overview and Study of Security Issues & Challenges in Cloud Computing
An Overview and Study of Security Issues & Challenges in Cloud Computing
Broad network access. Capabilities are available over the network and accessed through standard mechanisms that
promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs).
Resource pooling. The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant
model, with different physical and virtual resources dynamically assigned and reassigned according to consumer
demand. There is a sense of location independence in that the customer generally has no control or knowledge over
the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g.,
country, state, or datacenter). Examples of resources include storage, processing, memory, network bandwidth, and
virtual machines.
Measured Service. Cloud systems automatically control and optimize resource use by leveraging a metering
capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and
active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the
provider and consumer of the utilized service.
Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud
infrastructure consumer-created or acquired applications created using programming languages and tools supported
by the provider. The consumer does not manage or control the underlying cloud infrastructure including network,
servers, operating systems, or storage, but has control over the deployed applications and possibly application
hosting environment configurations.
Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage,
networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary
software, which can include operating systems and applications. The consumer does not manage or control the
underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly
limited control of select networking components (e.g., host firewalls).
Deployment Models:
Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization
or a third party and may exist on premise or off premise.
Community cloud. The cloud infrastructure is shared by several organizations and supports a specific community
that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be
managed by the organizations or a third party and may exist on premise or off premise.
Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned
by an organization selling cloud services.
Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that
remain unique entities but are bound together by standardized or proprietary technology that enables data and
application portability (e.g., cloud bursting for load-balancing between clouds).
REFERENCES
[1] Ricardo vilaca, Rui oliveira 2009. Clouder: A Flexible Large Scale Decentralized Object Store. Architecture
Overview. Proceeding of WDDDM ’09
[2] Michael Miller. 2009. Cloud Computing-Web Based Application that change the way you collaborate online.
Publishing of QUE, 2nd print.
[3] National Institute Of Standard and technology. csrc.nist.gov/groups/ SNS/cloud-computing/cloud-def-v15.doc,
2009
[4] Open Security Architecture http://www.opensecurityarchitecture.org/
[5] Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud Security and Privacy : An Enterprise perspective of Risks
[6] GregBoss, Padma Malladi, Dennis Quan, Linda Legregni and Harold hall 2007. Cloud Computing. Available from
www.ibm.com/developerworks/websphere/zones/hipods/.
[7] Anthony T.Velte, Toby J.Velte and Robert Elsenpeter 2010. Cloud Computing- A Practical Approach. Publishing
of Tata McGRAW Hil.
[8] Nils Gruschka and Meiko Jensen, “Attack Surfaces: A Taxonomy for Attacks on Cloud Services”. IEEE rd
International Confrence on Cloud Computing,2010.
[9] M. Casassa-Mont, S. Pearson and P. Bramhall, “Towards Accountable Management of Identity and Privacy: Sticky
olicies and Enforceable Tracing Services”, Proc. DEXA 2003, IEEE Computer Society, 2003, pp. 377-382
[10] https://www.pcisecuritystandards.org/index.shtml
[11] http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_ Security_Standard, 24 January 2010
[12] J. Salmon, “Clouded in uncertainty – the legal pitfalls of cloud computing”, Computing, 24 Sept 2008,
http://www.computing.co.uk/computing/features/2226701/clouded-uncertainty-4229153
[13] Krešimir Popović, Željko Hocenski,” Cloud computing security issues and challenges”, MIPRO 2010, May 24-28,
2010, Opatija, Croatia
[14] Gartner: Seven cloud-computing security risks, 02 July 2008,http://www.infoworld.com/d/security-
central/gartnerseven-cloud-computing-security-risks-853?page=0,0
[15] Wikipedia, 6 February 2010, http://en.wikipedia.org/wiki/Risk_management
[16] Wikipedia, 27 January 2010, http://en.wikipedia.org/wiki/Risk_assessment
[17] D.Catteddu, Giles Hogben : European Network and Information Security Agency, November 2009,
http://www.enisa.europa.eu/act/rm/files/deliverables/cloudcomputing-risk-assessmen
AUTHORS PROFILE
Rajesh Piplode has received his Master of Philosophy in Computer Science (M.Phil.-CS) from Institute of Computer
Science, Vikram University. He is presently working as Guest lecturer in Department of Computer Science, Govt.
Holkar(Autonomous) Science Collage, Indore - India. His research interest includes Security in-Coloud computing,
Wireless Mesh Network and Information Technology based education.
Dr. Umesh Kumar Singh obtained his Ph.D. in Computer Science from Devi Ahilya University, Indore-INDIA. He is
currently Reader (Director) in Institute of Computer Science, Vikram University, Ujjain-INDIA. He served as professor
in Computer Science and Principal in Mahakal Institute of Computer Sciences (MICS-MIT), Ujjain. He is formally
Director I/C of Institute of Computer Science, Vikram University Ujjain. He has served as Engineer (E&T) in education
and training division of CMC Ltd., New Delhi in initial years of his career. He has authored a book on “Internet and Web
technology “and his various research papers are published in national and international journals of repute. Dr. Singh is
reviewer of International Journal of Network Security (IJNS), IJCSIS, ECKM Conferences and various Journals of
Computer Science. His research interest includes network security, secure electronic commerce, client-server computing
and IT based education.