Manu Report 1
Manu Report 1
Chapter 1:
INTRODUCTION
In recent years, cloud computing has emerged as a transformative force, revolutionizing the
way businesses and individuals access, store, and manage data and applications. The
scalability, flexibility, and cost-efficiency offered by cloud services have propelled their
adoption across diverse sectors, promising unparalleled opportunities for innovation and
growth. However, this meteoric rise in cloud adoption has also brought to the forefront a
multitude of security challenges that must be addressed to ensure the integrity,
confidentiality, and availability of data in the cloud environment.This report aims to delve
into the intricate landscape of cloud computing and elucidate the myriad security issues that
accompany its widespread adoption. As organizations increasingly migrate their operations to
cloud infrastructures, understanding and mitigating these security risks become imperative to
safeguard sensitive information and maintain trust in the digital ecosystem. The report will
commence by providing a comprehensive overview of cloud computing, delineating its
fundamental concepts, service models, and deployment models. By establishing a
foundational understanding of cloud computing, readers will be equipped with the necessary
context to delve into the intricate interplay between cloud technologies and security concerns.
Subsequently, the report will scrutinize the diverse array of security challenges that permeate
the cloud computing paradigm. From data breaches and unauthorized access to insider threats
and compliance issues, the vulnerabilities inherent in cloud environments present
multifaceted challenges that necessitate robust defensive mechanisms and proactive risk
management strategies. Furthermore, the report will explore the evolving threat landscape
surrounding cloud computing, encompassing emerging trends such as ransomware attacks,
supply chain vulnerabilities, and the convergence of cloud security with other domains such
as artificial intelligence and Internet of Things (IoT).In addition to identifying the security
risks inherent in cloud computing, the report will also elucidate best practices and mitigation
strategies that organizations can adopt to fortify their defenses and cultivate a resilient
security posture in the cloud. Whether through encryption, access controls, threat monitoring,
or incident response protocols, proactive measures are indispensable in mitigating the
inherent risks of cloud computing. Moreover, the report will underscore the pivotal role of
regulatory compliance and industry standards in shaping the security landscape of cloud
computing. With frameworks such as GDPR, HIPAA, and SOC 2 exerting considerable
Chapter 2:
LITERATURE SURVEY
[1] J. Chavan, R. Patil, S. Patil, V. Gutte and S. Karande, "A Survey on Security Threats in
Cloud Computing Service Models," The advent of cloud computing has enabled many users
and organizations to make better use of system and business resources. Cloud computing's
primary benefits are its cheaper service costs and the absence of the requirement for users to
invest in expensive computing hardware. Because of the accessibility of its resources and
flexibility for user computing operations, individuals and organizations migrate their
programs, data, and resources to cloud storage services. A transition from localized to remote
computing has brought with it a plethora of security risks and challenges for both users and
service providers. However, there is one significant disadvantage to cloud computing: the
storage of your data is in the hands of a third party. Amongst the most daunting concerns in
providing powerful storage and processing as on-demand Services is the security threat posed
by resource sharing in Cloud computing. Increasing efficiency and better performance are
driving governments and organizations around the world to use cloud computing, either from
scratch or as part of existing infrastructure. Risk and challenges associated with cloud
computing, as well as the measures that can be taken to help shield the cloud from security
threats, are discussed in this paper.
[2] R. Mishra, M. Gupta and V. Rajpoot, "Identifing the Future Security Issues Methods for
Secure Data in the Cloud Computing," In the fast-growing world, Cloud Computing is an
important tool to store sensitive data in the cloud database in a secure manner. Cloud
Computing provides the largest resource allocation to cloud clients like a computer,
memories, operating system and application through the internet that passes across the world.
The major problem in every year IT sectors facing security issues and challenges for securing
the sensitive data in the cloud database. Though there are handling many techniques on
developing security in the cloud and this has made a very confusing state for the cloud users.
To overcome this problem, thispaper to identify the issues and challenges in the cloud using
the new method EIR. This paper also provides suggestions for future cloud challenges and
cloud users use these suggestions to aware of Cloud computing in the future also.
[3] Deepika, R. Kumar and Dalip, "Security Enabled Framework to Access Information in
Cloud Environment," This paper proposed a Security Enabled Framework to Access the
Information in Cloud Environment (SEFAI) which is designed by using the various secure
encrypted algorithms to provide information security while accessing information from the
cloud. There are several security issues that have emerged while service delivery models are
used in the cloud system. With the advancements in cloud computing day by day different
cloud based services are used by cloud users like AWS (Amazon Web Services), Microsoft
Azure, Google etc. The security issues are very important during the time of accessing
information from cloud. To resolve the security issue a novel framework is designed by using
cryptography algorithms. The designed framework takes less encryption and decryption time
in comparison of existing framework that was “Security Algorithms for Cloud Computing
(SACC)” [1]. The proposed framework in this paper provides more security to the data in
cloud environment and prevent the unauthorized users to access the information.
tried to draw the circumstantial and controversial debate on the security and privacy system
of cloud computing. Primary research has been conducted with 65 cloud computing experts
to understand whether a cloud computing security technique is highly secure or not. An
online survey has been conducted with them where they provided their opinions based on the
security and privacy system of cloud computing. Findings showed that no particular
technology is available which can provide maximum security. Although the respondents
agreed that blockchain is a more secure cloud computing technology; however, the
blockchain also has certain threats which need to be addressed. The study has found essential
encryption systems that can be integrated to strengthen security; however, continuous
improvement is required.
[6] P. K. Goel and A. Singhal, "Security Issues and Threats in Cloud Computing: Problems
and Solutions," Cloud computing has emerged as a transformative technology,
revolutionizing how organizations handle data, applications, and services. However, along
with its benefits, cloud computing presents unique security challenges. This research paper
explores the various security issues, threats, and potential solutions in cloud computing
environments. By examining current trends, industry best practices, and emerging
technologies, this paper provides a comprehensive framework for organizations to establish
and maintain robust security measures in the cloud.
[7] Z. Balani and H. Varol, "Cloud Computing Security Challenges and Threats," In today’s
sophisticated life, technology covers all aspects of our daily life, and that creates an
environment for the attackers to access and attack a targeted organisation easily with the
lowest cost. However, it is difficult for the organisation to detect it easily. Cloud computing,
users can store data across the network in an online environment. Moreover, the data can be
accessed everywhere across the world. Most people, especially users who do not know
enough about the increasing number of attacks and the development of technology, are
concerned about keeping their data in clouds because security is a critical issue. In the study
of this paper, some methods and techniques are provided to protect data in an online
environment. These methods and techniques have the lowest costs and can be employed by
every user as an easy way to defend themselves against attackers.
[8] D. Sitaram et al., "Orchestration Based Hybrid or Multi Clouds and Interoperability
Standardization," In the present scenario, hybrid or multi-cloud environments are most
suitable for Enterprises and Communities (like Government of India) for cloud bursting,
disaster recovery, migration, and there is growing need for unified monitoring and
management, however, it's challenging to setup a viable hybrid/multi-cloud environment.
Currently, there are multiple solutions available in the market with limited success due to
hidden drawbacks, for instance, vendor-lock-in, portability issues in migration, security
threats and expensive in the long run and also, unfortunately, interoperability standardization
is still work in progress. In this paper, we explore few hybrid/multi cloud use cases and
demonstrate how these can be accomplished with our Federated Cloud Services Framework
(middleware), which is built upon OpenStack [5], an open source cloud and by leveraging
existing OpenStack functionalities.
[10] F. Ghaffari, H. Gharaee and A. Arabsorkhi, "Cloud Security Issues Based on People,
Process and Technology Model: A Survey," Combination of utility computing and World
Wide Web is base of the cloud computing. The intrinsic features of cloud computing have
produced many competitive and computing benefits. The development of cloud computing
and the expansion of service providers in this area has led to increase in investment in cloud
computing. Large number of users on the one hand and increasing the number of sensitive
data on cloud environments on the other hand, caused a dramatic growth in the motivation of
malicious activities and as a result of security challenges. Solving the cloud computing
security challenges need to proper knowledge of the security issues and the scope of their
resolution. Security is a long-term product of interaction between people, process and
technology. This categorization is based on possible solutions to security issues. Thus, the
division of threats in these three areas can help the managers and security sectors to solve the
security problems. Hence, in this paper, along with the comprehensive identification of cyber
security challenges, we try to address these threats to categories of people, process, and
technologies, in order to find cost effective, efficient and feasible security solutions based on
this basis.
Chapter 3:
3.1 METHODOLOGY
Today computers are used by the government sectors, industries, military, railway everyone.
A group of computers works as a single computer to provide and data and other applications
to user on the internet. A network which is already available in the Cloud of computer that
works as the IP address in the server that connects the several systems. These provide a vast
storage capability and large scale group of collaboration. In order to solving the problems
like analyzing risk in medical facilities and financial sectors, even in computer games the
users may trap through web. The large networking group of servers uses only low-cost
customer PC technology. It includes specialized data connections that processed chores of
them. Our main responsibility having making sure that all our employee have correct and
right software and hardware for their jobs. Everyone can buy the computer but it is not
enough Whenever you are having a new opportunity you have to buy software which is
having different versions or make sure your current software license allows to other user.
Web-based service which entertains all the programs that the user need for his job. It could
be called cloud computing and it can change the entire computer industry. Local computers
have to do very heavy jobs when it comes to running applications .Instead of that the network
can handles them both hardware and software users , which can as simple as web browser
and the server will take care of it by running all the programs. The software and storage does
not exist on your computer for security reasons. It’s on the services cloud computing.
3.2:
ARCHITECTURE OF CLOUD
Individual users connect the computer from the cloud server. From the user cloud is seen as a
single application. The hardware is the cloud server and the operations done by the cloud
server is invisible. The user collects the information from the interface and it is connected to
service management and the services provided for the management is server and internally
the server is connected to web application. It is the part of front—end application and it gives
the correct source of information. The services could retrieve the necessary information from
the cloud and web application so that it either creates or opens the application. After the
application is launched the system checks the functions of the cloud so that the resources are
partitioned to the particular user.
1. Client Devices: At the edge of the architecture are the client devices, such as desktop
computers, laptops, smartphones, and tablets, which users utilize to access cloud services and
resources through web browsers or specialized applications.
2. Frontend Services: The frontend services layer comprises various interfaces and
applications that facilitate user interaction with the cloud environment. This includes web
portals, APIs (Application Programming Interfaces), and command-line interfaces (CLIs)
through which users can provision, manage, and monitor cloud resources.
3. Backend Infrastructure: The backend infrastructure forms the backbone of the cloud
environment, consisting of a distributed network of servers, storage devices, and networking
equipment housed in data centers. These resources are responsible for hosting and processing
user data and applications.
dynamically allocated to users as needed. This enables resource pooling, isolation, and
efficient utilization of hardware resources across multiple users or tenants.
7. Storage Services: Cloud storage services provide scalable and durable storage solutions for
storing various types of data, including files, databases, and multimedia content. These
services typically offer features such as redundancy, encryption, and data lifecycle
management to ensure data integrity and availability.
9. Security and Compliance: Security and compliance mechanisms are integrated throughout
the cloud architecture to protect data, applications, and infrastructure from cyber threats,
unauthorized access, and data breaches. This includes identity and access management
(IAM), encryption, network security controls, and compliance frameworks that govern data
protection and privacy.
Chapter 4:
Anywhere access to your documents: When you are in the cloud, there is no need to
take your documents with you. Instead, you can access your actual PC from anywhere
that there is Internet access available.
Latest version availability: One more thing in relation with documents is that when
you edit one document at the office and then you go somewhere else and open it, the
latest version will be displayed since as I already aforementioned all the work is done
centrally in the cloud.
Use your computer from anywhere: This is one of the biggest advantages of cloud
computing. Basically, when you use this technology, you are not limited to work on a
single PC. You just use your “cloud PC” from anywhere and any PC and your
existing applications and documents follow you through the cloud. Move to a portable
device, and your applications and documents are still available.
LIMITATIONS
Internet connection is required: It is impossible to work if your Internet connection is
down. Since you are using Internet to connect to your “cloud PC”, if there is no
Internet connection simply you cannot connect.
Low-speed connections are not recommended: This is not a very important
disadvantage since everybody today has at least 1 Mbps connection at work and at
home. However, it is important to mention that cloud computing cannot work with
slow Internet connections such as dial-up since web-based applications often require
a lot of bandwidth to download, as do large documents.
Sometimes is slow: Also, with fast connections, sometimes you might experience
delays since web-based applications can sometimes be slower than accessing a
similar software program on your desktop PC. The reasons for that are because of the
demanding upload and download bandwidth that web applications need.
Stored data might not be secure: Data is stored “in the cloud”. However, where
exactly is the cloud and is it really secure? These are questions arising for users that
have confidential data.
Your data is 100% in the cloud: All the data that you had until now on your local PC,
it is stored in the cloud. Theoretically, data stored in the cloud is safe since a cloud
hosting company uses several ways of backup in order ensure that on any case the
data will not be lost. However, if your data is missing (even one in a million), you
have no physical or local backup of your data.
Chapter 5:
APPLICATIONS
Cloud is analogical to internet. Cloud computing is internet based computing where
virtual shared servers provided software, infrastructure, platform, devices and other
resources and hosting to customers on a pay-as- you-use basis. Cloud computing
customers do not own the physical infrastructure rather they rent the usage from a third
party provider. They use resources as a service for performing a task and pay only for
what they are utilizing. IT organization vendors provide services to the customers which
are in turn utilized by customers on pay-per –use basis. Customers can access these
services provided by vendors using web-browser. Huge amount of data is stored in many
cloud servers and the collection of servers forms a Data center. The services provided by
vendors can be classified in three models that actually depict how services are being
provided to the customers. Service models are service oriented architecture that tells us
about the different level of abstraction. They are as follows:-
Platform as a Service (PaaS) : Paas supplies all the resources required to build
applications and services completely by using internet without having to download or
install software. PaaS services include application design, development and hosting.
Other services include collaboration, web service integration, DB integration,
security, scaling etc. Users don’t have to worry about purchasing hardware and
software or hire experts for management of the software and hardware, it provides
flexibility in installing software on system, scalability is a another advantage of the
PaaS. A downfall of the PaaS is the lack of interoperability and portability among
providers.
Software as a Service (SaaS) Software as a service is the model in which an
application is hosted as a service to customers who access it via the internet. It
provides us the facility of using different software application, operating system and
resources without the need of installing them on your own machine, upgrading and
buying licensees.
Infrastructure as Service (IaaS) This model is responsible for providing virtualized
computing resources, network resources with IaaS users assemble their own virtual
cluster on which they are responsible for installing, maintaining and executing their
own virtual cluster on which they are responsible for installing, maintaining and
executing their own software stack. IaaS uses different tools for virtualizing and
converting physical resources to logical resources that can be provisioned and
published to customers as needed.
5.1
Classification of Cloud Computing Deployment Models
We can classify the cloud computing system in 4 categories, they are as follows:
Public Cloud: In this deployment model services and infrastructures are made
available to different types of customers and used publicly by general people/users.
This type of cloud is managed by cloud services provider offering services to the
consumers on pay-per- use Cloud Computing Services and its Application 109 basis.
Consumers are considered authorized by default, so security and privacy are big
issues in it. Examples of public cloud are Amazon EC2, Google App Engine etc.
Private Cloud: In this type of cloud the computing resources are used and operated
exclusively by one organization owing that cloud. It is more secured than public
clouds because their users are trusted users inside the organization. Examples of
private cloud are IBM cloud, Microsoft cloud, any private institutional cloud etc.
Community Cloud: In community model the infrastructure is shared by several
organizations with the same policy and compliance considerations. This helps to
further reduce cost as compared to a private cloud, as it is shared by large groups.
Various state level government departments requiring access to the same data relating
to roads, hospitals, electrical stations infrastructures use community model for
gathering information.
Hybrid Cloud: This deployment model helps business to take advantage of secured
applications and data hosting on private cloud, while still enjoying cost benefits. An
organization may store sensitive client data in house on a private cloud application,
but inter-connect that application to a billing application provided on a public cloud
as a software service.
Chapter 6:
CONCLUSION
In the realm of cloud computing, where agility, scalability, and accessibility converge, the
promise of innovation is profound. Yet, as organizations increasingly embrace the cloud as
the cornerstone of their digital infrastructure, the imperative to confront and mitigate security
challenges looms ever larger. This report has traversed the intricate landscape of cloud
computing and delved into the multifaceted security issues that accompany its proliferation.
From data breaches and insider threats to regulatory compliance and emerging attack vectors,
the vulnerabilities inherent in cloud environments pose formidable obstacles to the integrity
and confidentiality of data. However, amidst these challenges lies opportunity. By fostering a
deeper understanding of the risks and employing proactive measures, organizations can
fortify their defenses and cultivate a resilient security posture in the cloud. Through
encryption, access controls, threat monitoring, and compliance frameworks, stakeholders can
navigate the complexities of cloud security with confidence and vigilance. Furthermore,
collaboration and partnership within the industry are indispensable in addressing the evolving
threat landscape and advancing collective knowledge and expertise. By sharing best
practices, exchanging insights, and leveraging collective intelligence, the cloud community
can collectively strengthen defenses and stay ahead of emerging threats. As technology
continues to evolve and the boundaries of the cloud expand, the journey towards robust cloud
security is ongoing. It requires continuous vigilance, adaptation, and investment in both
technological solutions and human expertise. By embracing a holistic approach to security
that integrates people, processes, and technology, organizations can harness the
transformative potential of cloud computing while safeguarding their most valuable assets. In
closing, the future of cloud computing security hinges not only on technological innovation
but also on a shared commitment to vigilance, collaboration, and resilience. By embracing
this ethos, stakeholders can navigate the complexities of cloud security with confidence,
enabling a future where the cloud remains a catalyst for innovation, growth, and prosperity.
REFERENCES
1. J. Chavan, R. Patil, S. Patil, V. Gutte and S. Karande, "A Survey on Security
Threats in Cloud Computing Service Models," 2022 6th International Conference
on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2022
2. R. Mishra, M. Gupta and V. Rajpoot, "Identifing the Future Security Issues
Methods for Secure Data in the Cloud Computing," 2021 5th International
Conference on Information Systems and Computer Networks (ISCON), Mathura,
India, 2021
3. Deepika, R. Kumar and Dalip, "Security Enabled Framework to Access
Information in Cloud Environment," 2022 International Conference on Machine
Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON), Faridabad,
India, 2022
4. S. Kumari, K. Solanki, S. Dalal and A. Dhankhar, "Analysis Of Cloud Computing
Security Threats and Countermeasures," 2022 10th International Conference on
Reliability, Infocom Technologies and Optimization (Trends and Future Directions)
(ICRITO), Noida, India, 2022,
5. M. Lourens, A. Naureen, S. K. Guha, S. Ahamad, Dharamvir and V. Tripathi,
"Circumstantial Discussion on Security and Privacy Protection using Cloud
Computing Technology," 2022 2nd International Conference on Advance Computing
and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 2022
6. P. K. Goel and A. Singhal, "Security Issues and Threats in Cloud Computing:
Problems and Solutions," 2023 3rd International Conference on Advancement in
Electronics & Communication Engineering (AECE), GHAZIABAD, India, 2023,
7. Z. Balani and H. Varol, "Cloud Computing Security Challenges and Threats," 2020
8th International Symposium on Digital Forensics and Security (ISDFS), Beirut,
Lebanon, 2020
8. D. Sitaram et al., "Orchestration Based Hybrid or Multi Clouds and Interoperability
Standardization," 2018 IEEE International Conference on Cloud Computing in
Emerging Markets (CCEM), Bangalore, India, 2018,
9. A. Tubaishat, "Security in Cloud Computing: State-of-the-Art, Key Features,
Challenges, and Opportunities," 2019 IEEE 4th International Conference on
Computer and Communication Systems (ICCCS), Singapore, 2019,
10. F. Ghaffari, H. Gharaee and A. Arabsorkhi, "Cloud Security Issues Based on People,
Process and Technology Model: A Survey," 2019 5th International Conference on