Académique Documents
Professionnel Documents
Culture Documents
I. INTRODUCTION
Internet has been a driving force to various technologies that
have been developed. Cloud computing is seen as a trend in
the present day scenario with almost all the organizations
trying to make an entry into it [1]. The advantages of using
cloud computing are reduced hardware and maintenance
cost, accessibility around the globe, and flexibility. Fig. 1
shows the basic cloud platform and the various applications
that cloud providers contribute to the consumers.
Software Development,
Applications.
comprising
Mobile
B. Data Remnants
In a cloud organization, records are repeatedly relocated to
style the pre-eminent usage of resources which means that
initiatives might not constantly recognize their data location
[17]. This may be correct about any cloud prototype, but is
typically accurate in the public cloud. To compromise the
greatest cost savings, industries want service providers to
enhance resource convention.
Also, if data is relocated, remaining data may be left behind
which can be accessed by illegal handlers [18]. This
unauthorized access is considered unpreventable in public
cloud till date. However, new security practices must be
introduced to relocate data without any remnants in the old
location.
C. Adaptable Limits
A cloud organization produces an adaptable limit. Additional
sections and users throughout the organization can deliver
computer resources, and a cloud portal can also be stretched
to exterior sources such as associates [19]. However, with
this amplified access comes an increased risk of data
outflow. In addition, businesses are tackled with handling
and safeguarding a dissimilar set of mobile equipment, often
developed by the employee. With this tendency towards
consumerization, the cloud is often used for consistent
access to requests and data on wandering endpoints. Security
must provide a stability of stretchy access and data guard
[20].
D. Unencrypted data
Un-encrypt are apparently a weakness for delicate data. Data
encryption helps to address outward threats, threats from
spiteful insiders, and the need for supervisory agreement
[21]. With data encryption issues, such as data remnants and
an adaptable limit become relatively less because even if the
data is accessed by an unlicensed consumer, it cannot be
interpreted. However, many out dated encryption
clarifications can permit customers to a vulnerable situation
in the cloud. If there is no solution to provide policy-based
management methodologies with identity and integritybased server authentication, unlicensed servers may obtain
the encrypted data [22].
E. Shared multi-tenant environments of the public cloud
The multi-tenant construction of the public cloud raises fears
about the grasping of an industrys cloud data, or sharing
their storage dimensions. And with these apprehensions
there comes a craving for prominence [23]. One customer in
this environment should not be allowed to access the data of
another resident.
F. Control and availability
C. Port Scanning
D. Data Protection
Encryption is merely a resolution for protection in a multitenant atmosphere, endorsing that ones data cannot be
observed by others. In addition, self-defending VMs can
shield in contradiction of inter- VM attacks and other
vulnerabilities in a public cloud.
Cloud computing is a lean-to virtualization, adding
computerization to a virtual background. Progressions in
virtualization tools empower initiatives to acquire more
computing power of the physical servers. The outdated data
center impression is dwindling to permit cost savings and
promote IT solutions through merging of servers. Service
providers have discovered that they can use virtualization to
enable multi-tenant instead of single-tenant or singlepurpose physical servers. The thorough and well configured
public cloud can have different altitudes of controls and
ensure security. A smart reaction to the risk of data position
is to select several cloud services and store different data in
different clouds, thereby reducing the risk of data location.
VIII. Conclusion
Cloud computing moves the application software and data
bases to servers in large data centers on the internet, where
the management of the data and services are not fully
trustworthy. This unique attribute raises many new security
challenges in areas such as software and data security,
recovery, and privacy, as well as legal issues in areas such as
regulatory compliance and auditing, all of which have not
been well understood.
There are many new technologies emerging at a rapid rate,
each with technological advancements and with the potential
of making human lives easier. However, one must be very
careful to understand the security risks and challenges posed
in utilizing these technologies. Cloud computing is no
exception.
In this paper key security considerations and challenges
which are currently faced in Cloud Computing are
highlighted.
Cloud Computing is a new phenomenon which is set to
revolutionize the way we use the internet, though there is
much to be cautious about. Cloud computing has the
potential to become a front runner in promoting a secure,
virtual and economically viable IT solution in the upcoming
periods provided the challenges and issues are eradicated by
formulating better security mechanisms.
Cloud computing is a typical amendment of outdated
computing. It is tough to associate one feature of the system
with another. While outmoded computing, allows a designer
to be slacker about security, cloud computing condition
insists a good developer facing these difficulties directly.
When the provider finds solutions to these difficulties, the
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]