Security Threats and Recent Countermeasures in Cloud Computing

Author(s):  
Anupama Mishra ◽  
Neena Gupta ◽  
Brij B. Gupta

The cloud is an appealing innovation that has driven, in record time, an extraordinary interest. It is right now one of the busiest regions of research in IT, due to its adaptability, vigor, and capacity to altogether lessen the expenses of administrations to clients on the web. Additionally, cloud stores all client information in server farms dispersed the world over. In this manner, security has turned into a foremost worry that anticipates numerous organizations to receive its administrations. Clients should store their information, a few of which are ordinarily secret or individual; in this way, the authors are exceptionally mindful to information honesty and classification amid exchange to a cloud server. This exploration chapter plans to build up an investigation on the different security threats engaged with distributed computing along with their recent countermeasures.

2018 ◽  
pp. 910-925
Author(s):  
Kashif Munir ◽  
Sellapan Palaniappan

Cloud computing is set of resources and services offered through the internet. Cloud services are delivered from data centers located throughout the world. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. In this chapter we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud environment. This chapter also discusses secure cloud architecture for organizations to strengthen the security.


Flowed enlisting gives a course to the business to deal with the figuring assets on the web. The term has made over late years, and can be utilized to outline the utilization of a pariah for your capacity and figuring needs.The mechanical improvement of distributed computing has helped the business to develop as well as the wellbeing of information has turned into a noteworthy issue. Numerous encryption procedures are utilized as a part of information security in cloud. They are especially powerful when the information is away state and in transmission state. Be that as it may, in handling state the information must be unscrambled so that the operations can be performed. Once the information is unscrambled it is accessible to the cloud supplier henceforth these customary encryption systems are insufficient to secure the information. The information will be protected if the operations are performed in the decoded information. This can be accomplished if the information is encoded utilizing homomorphic encryption strategies. This paper examines about the homomorphic encryption method, its disadvantages and future improvements. [19],[20],[21]


Internet offers bunch of services and resources, one of them is cloud computing. The centers which provide these services are located all around the world and this service has its own mainstream pros and cons. Cloud computing consists of taking cloud services from the internet and taking them away from the considerable firewall. This paper aims in enhancing specifications of cloud computing, review its security threats and address security concerns along with the cloud operations that needs security. Also, this paper addresses basic security models, qualities and prerequisites for cloud Computing


Author(s):  
Ms. Pooja Goyal ◽  
◽  
Dr. Sukhvinder Singh Deora ◽  

Cloud computing is an innovation that conveys administrations like programming, stage, and framework over the web. This computing structure is wide spread and dynamic, which chips away at the compensation per-utilize model and supports virtualization. Distributed computing is expanding quickly among purchasers and has many organizations that offer types of assistance through the web. It gives an adaptable and on-request administration yet at the same time has different security dangers. Its dynamic nature makes it tweaked according to client and supplier’s necessities, subsequently making it an outstanding benefit of distributed computing. However, then again, this additionally makes trust issues and or issues like security, protection, personality, and legitimacy. In this way, the huge test in the cloud climate is selecting a perfect organization. For this, the trust component assumes a critical part, in view of the assessment of QoS and Feedback rating. Nonetheless, different difficulties are as yet present in the trust the board framework for observing and assessing the QoS. This paper talks about the current obstructions present in the trust framework. The objective of this paper is to audit the available trust models. The issues like insufficient trust between the supplier and client have made issues in information sharing likewise tended to here. Besides, it lays the limits and their enhancements to help specialists who mean to investigate this point.


Author(s):  
Kashif Munir ◽  
Sellapan Palaniappan

Cloud computing is set of resources and services offered through the internet. Cloud services are delivered from data centers located throughout the world. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. In this chapter we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud environment. This chapter also discusses secure cloud architecture for organizations to strengthen the security.


This paper examines the figuring of cloud and imposing security over information in the available cloud data by investigating information over cloud and its viewpoints that are identified with every possible security. It provides subtleties of information to impose security policies and approaches that are utilized through the world to provide assurance of extreme information by reducing dangers. Accessibility of information in the cloud is productive for a number of applications that exists and presents information over various applications that required security provisions by utilizing virtualization over distributed computing that may become hazard information when a visitor OS is implemented over a hypervisor without possessing the firm quality of visitor OS which may comprises of security provision in the cloud.


Distributed computing is the best innovation today for every one of those individuals who needs to go with least speculation on foundation and needs to redistribute the weight of taking care of specialized issues to outsider by paying the charges for the administrations used. Today there is gigantic measure of interest from the customers to utilize cloud innovation as it gives various highlights and remove the heap of looking after foundation. This has made a tremendous measure of burden on servers . So it is must to deal with issues identified with load adjusting. This is essentially to see that the heap on a specific server is held most extreme to its edge level. So it can deal with the undertaking and furthermore can finish it in a quicker way. It limits the cost and time associated with the major computational models and improves appropriate usage of assets and framework execution. Numerous calculations are prescribed by different specialists from everywhere throughout the world to take care of the issue of burden adjusting. In this paper, we present another calculation named as combo calculation to address the issue of burden adjusting in a cloud situation. Catchphrases - Cloud registering improvement Load Balancing Network


CCIT Journal ◽  
2019 ◽  
Vol 12 (2) ◽  
pp. 138-148
Author(s):  
H. Abdul Hamid Arribathi ◽  
Dedeh Supriyanti ◽  
Lusyani Sunarya

Information technology is increasingly developing and has a positive impact on the world of education. The implementation of student counseling with a Knowledge Management System is one of the contributions of information technology in the world of education. Many benefits provided by the Student Counseling Knowledge Management System, in managing the knowledge needed by the counselor section to document student consultations. The development and implementation of a KMS counseling system costs more to employ professional staff to maintain and improve; KMS student counseling application; For this reason, it is necessary to design a Cloud Computing-based Student Counseling Knowledge Management System. The research method carried out in the first stage is to collect data and information about Knowledge Management and Student Counseling, and how to use it to create a Knowledge Management System Application, Student Counseling Based on cloud computing. Furthermore, conducting a literature study and literature review, system design is in the form of data architecture compounding, process design, network design, and user interface design. The design results of this system can facilitate educational institutions in conducting online cloud computing-based student counseling


Sign in / Sign up

Export Citation Format

Share Document