Security Issues in cloud Computing Research Papers (original) (raw)
In this work, we employ a key access control management scheme which effortlessly transitions any organization-like security policy to state of the art cloud level security. Offering a very flexible, secure, and hierarchical key access... more
In this work, we employ a key access control management scheme which effortlessly transitions any organization-like security policy to state of the art cloud level security. Offering a very flexible, secure, and hierarchical key access mechanism for institutions that deal with mission-critical data. The scheme also minimizes concerns about moving critical data to the public cloud and ensures only the users with sufficient permission from equal or higher privileged members can access the key by the use of topological ordering of a directed graph which includes self-loop. The main overheads such as public and private storage needs are restricted to a level that is tolerable, and the derivation of key is computationally fast and efficient. From a security perspective, the proposed scheme would be resistant to collaboration attacks and would provide key in distinguishability security. Since the key isn't stored anywhere so, the problem of a data breach is eliminated.
Cloud computing is a distributed computing environment that provides on demand services to the users for deploying their computational needs in a virtualized environment without the knowledge of technical infrastructure. Due to... more
Cloud computing is a distributed computing environment that provides on demand services to the users for deploying their computational needs in a virtualized environment without the knowledge of technical infrastructure. Due to reliability, scalability, high performance and low band width most of the organizations are running their applications in cloud. The cloud service providers provide the services to the registered cloud users on payment basic across the glove. The cloud services are basically categorized as SaaS, PaaS, and IaaS. The services are available to the users depending on cloud deployment and the SLA (service level agreements) between the service providers and the users. Providing security to the users and trust into cloud environment is the responsibility of the cloud service providers. The main objective of this paper is to provide a clear idea about the cloud service models and outline the security issues in the service models.
Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications,development of customized computer... more
Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications,development of customized computer software, and creation of a “realistic” network environment. In previous years, the number of people using cloud services has dramatically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Real world cloud attacks were included to demonstrate the techniques that hackers used against cloud computing systems. In addition,countermeasures to cloud security breaches are presented.
Along with this, few of security issues and challenges are also highlighted.
Honeypots are security defence tools. They are fake hosts designed to lure attackers away from real systems and capture malware threat analytics and attacker behaviour data for later analysis. The efficacy of a honeypot in attack... more
Honeypots are security defence tools. They are fake hosts designed to lure attackers away from real systems and capture malware threat analytics and attacker behaviour data for later analysis. The efficacy of a honeypot in attack mitigation and collecting attack behaviour
analysis lies in its ability to obfuscate itself as a real system. Attackers are often successful in
identifying honeypots because of the limitations inherent to fake systems. Honeypots are a
vital part of the defence against attacks on computer networks. Their ability to lure attackers
away from real targets makes them a crucial security tool. However, attackers are coming up
with new ways of identifying and taking over honeypots. In the never-ending race against
novel attacks, honeypots and how we use them must also be further developed.
This project solves some of the inherent limitations of honeypots by designing, building and
evaluating a novel honeypot deployment concept leveraging cloud technologies. This new
concept, a small, substantial contribution in the field, shifts the approach of deploying
honeypots into the cloud. It is a new development in how honeypots are used and deployed
in the cloud reducing the maintenance costs of honeypots in mitigating attacks by relying on
resources that do not exist when the attack is started.
In section one of the project, the efficacy of common honeypots is researched, and gaps are
identified in the literature to explore the state of the art of honeypot development and to
pinpoint the issues with common honeypots, how attackers can identify them and the lack of
research in leveraging the possibilities of the cloud in honeypot deployment. Section two
breaks down the issues identified to honeypot believability, security, availability, automation
and resource usage, setting the objectives to deploy honeypots in a resource-aware, timely
and stealthy manner to resist identification by attackers by making honeypots
indistinguishable from legitimate hosts. A novel, dynamic honeypot deployment concept is
designed and implemented on a cloud platform in section three. Tests are set up, executed,
and test results are captured in section four to prove the feasibility of the novel honeypot
deployment design. Section five contains the analysis of the test results, and section 6
concludes the project. In section seven, further research opportunities of interest are
discussed.
Cloud computing is a revolutionary modern computing platform in the field of information technology. It has promptly became famous and considered the emerging field of recent times due to its potential for better utilization of computer... more
Cloud computing is a revolutionary modern computing platform in the field of information technology. It has promptly became famous and considered the emerging field of recent times due to its potential for better utilization of computer resources like flexible IT architecture, scalability, availability, fault tolerance, computational power, computational platforms, storage and applications and to cut down costs of operations and supports. Nevertheless the security is the biggest threat to its consumers and more research needs to be done to deal with this security breach. In this paper, the better understanding of cloud computing and their security is discussed. And I investigated the major cloud computing security challenges, examined their compromised attributes and delivers the most threaten attribute to cloud computing.
Cloud computing is not a new technology; it is a new way of delivering computing resources. Elastic cloud computing enables services to be deployed and accessed globally on demand with little maintenance by providing QoS as per service... more
Cloud computing is not a new technology; it is a new way of delivering computing resources. Elastic cloud computing enables services to be deployed and accessed globally on demand with little maintenance by providing QoS as per service level agreement (SLA) of customer. The Cloud-based DDoS attacks or outside DDoS attacks can make ostensibly legitimate requests for a service to generate an economic Distributed Denial of Service (eDDoS) -- where the elastic nature of the cloud allows scaling of service beyond the economic means of the purveyor to pay their cloud-based service bills. Attacks mimicking legitimate users are on the climb. For cloud computing to remain attractive, the DDoS threat is to be addressed before it triggers the billing mechanism. This problem can be addressed by using reactive/on-demand in-cloud eDDoS mitigation service for mitigating the application-layer and network-layer DDOS attacks with the help of an efficient client-puzzle approach.
Cloud computing offers significant features such as resource pooling, scalability, on-demand self service, availability, and reliability to organizations to improve their quality of services. For example by using cloud computing services... more
Cloud computing offers significant features such as resource pooling, scalability, on-demand self service, availability, and reliability to organizations to improve their quality of services. For example by using cloud computing services in healthcare it is possible to reach large population of people in isolated geographical areas which will assist in saving their lives in critical situations. It enables the use of latest technologies through its various service delivery and deployment models via the internet on pay-per-use billing pattern. However, cloud computing has dark side when it comes to security and privacy considerations. Critical industries such as healthcare and banking are reluctant to trust cloud computing due to the fear of losing their sensitive data, as it resides on the cloud with no knowledge of data location and lack of transparency of Cloud Service Providers (CSPs) mechanisms used to secure their data and applications which have created a barrier against adopting this agile computing paradigm. This paper addresses cloud computing security concerns that must be considered in order to adopt cloud services in information critical industries.
Cloud computing is an internet-based computing service in which large groups of remote severs are networked to allow centralized data storage and online access to computer services or resources. Cloud service provider can enable a pay as... more
Cloud computing is an internet-based computing service in which large groups of remote severs are networked to allow centralized data storage and online access to computer services or resources. Cloud service provider can enable a pay as you-go model, where customers are charged based on the type of resources and per usage. This paper will give a about different security aspect of cloud environment that provides virtual hardware and software to its user.
Cloud computing provides exceptional flexibility of sharing of resources among millions of user across the globe covering small business to large enterprise. It also provides an infrastructure to compile and process the complex scientific... more
Cloud computing provides exceptional flexibility of sharing of resources among millions of user across the globe covering small business to large enterprise. It also provides an infrastructure to compile and process the complex scientific data for various data mining applications. It offers numerous benefits that help small and medium scale businesses to extract computing services at very affordable cost. As the consumption of cloud services is increasing, various security issues came into existence. In this paper we collect the information regarding number of security issues and categorize them.
The study of the mind and how we behave regarding certain things is tied to psychology. Psychology in itself is merely a field of study that studies the scientific nature of the mental states and processes of the mind. American... more
The study of the mind and how we behave regarding certain things is tied to psychology. Psychology in itself is merely a field of study that studies the scientific nature of the mental states and processes of the mind. American Psychological Association defines psychology as the study of the mind and behavior. The question of how our minds affect our physical processes is a topic of great concern in psychology. Asserts that psychology is considered mainly a" hub science," having hefty connections to social sciences, medical science, and education. The interactions involve the mutuality between our internal and external states, and what extends from it plays an essential role in shaping the manifestations of our life's endeavors. The outfits of psychology determine how we handle tools, people, processes, etc., even in our places of work; the way we address our fellow workers, devices, and tools has almost everything to do with our psychological makeup.
Along with this, few of security issues and challenges are also highlighted.
ABSTRACT Cloud computing offers significant features such as resource pooling, scalability, on-demand self service, availability, and reliability to organizations to improve their quality of services. For example by using cloud computing... more
ABSTRACT Cloud computing offers significant features such as resource pooling, scalability, on-demand self service, availability, and reliability to organizations to improve their quality of services. For example by using cloud computing services in healthcare it is possible to reach large population of people in isolated geographical areas which will assist in saving their lives in critical situations. It enables the use of latest technologies through its various service delivery and deployment models via the internet on pay-per-use billing pattern. However, cloud computing has dark side when it comes to security and privacy considerations. Critical industries such as healthcare and banking are reluctant to trust cloud computing due to the fear of losing their sensitive data, as it resides on the cloud with no knowledge of data location and lack of transparency of Cloud Service Providers (CSPs) mechanisms used to secure their data and applications which have created a barrier against adopting this agile computing paradigm. This paper addresses cloud computing security concerns that must be considered in order to adopt cloud services in information critical industries.
the demand of cloud computing is increasing due to the ease and economy offered by this technology. The beneficiary of cloud computing is the whole humanity. Nowadays, this technology is the ultimate storage location for individual as... more
the demand of cloud computing is increasing due to the ease and economy offered by this technology. The beneficiary of cloud computing is the whole humanity. Nowadays, this technology is the ultimate storage location for individual as well as business organizations. The fruits provided by cloud setup are not free from thorn; it has various security issues like DNS attacks, virtualization attacks etc. If these threats are not addressed in due course of time, it can reduce the gradient of the popularity curve of this blossoming technology. This paper provides a comprehensive study about trust, security and privacy issues that are prevailing in cloud computing and also provide the ways to mitigate these issues.
The growth of cloud computing over the years has been phenomenal with users and organizations alike relying more and more on the services offered on the cloud. Outages, however, have been a thorn in the flesh for service providers over... more
The growth of cloud computing over the years has been phenomenal with users and organizations alike relying more and more on the services offered on the cloud. Outages, however, have been a thorn in the flesh for service providers over the years. The objective of this study was to determine whether checkpointing can be proactively used as a counter to security issues. FTCloudSim was used as a simulator to test the effect of checkpointing on data losses caused by security breaches. The simulator was set up to create checkpoints at recommended intervals thus saving images of the state of cloudlets periodically. Outages were then randomly injected during the simulation. Results showed that checkpointing recovered 93% of the tasks using both service availability and execution availability as parametric measures. The results show that checkpointing can effectively be used in cloud computing infrastructure as a suitable measure against data losses caused by security breaches.
The SHAMEL Exam is the second important exam in Jordan; accordingly, the preservation of confidentiality and security are the most important priorities of the exam managers. Recently, AL-Balqa Applied University (BAU) in Jordan has... more
The SHAMEL Exam is the second important exam in Jordan; accordingly, the preservation of confidentiality and security are the most important priorities of the exam managers. Recently, AL-Balqa Applied University (BAU) in Jordan has computerized the exam and one of the suggestions was to utilize the cloud computing applications. However, cloud computing entails many security concerns that may have impacts on the exam information security. This research discusses the current use the cloud computing in many life aspects and then concentrate on online exams aspect; also, this research clarifies the tangible and intangible risks associated with cloud computing adoption. Then, the research examined a specific case study related to the subject matter. Finally, this research explores the level of understanding risks and methods may be used to reduce it and help in protecting data from unauthorized persons.
When all the top layers of security fail, the last and most important layer which is data security layer must not fail. Breaching this layer of security compromises the CIA triad principle of confidentiality, integrity and availability.... more
When all the top layers of security fail, the last and most important layer which is data security layer must not fail. Breaching this layer of security compromises the CIA triad principle of confidentiality, integrity and availability. However, increasing security also reduces the efficiency and usability of a system. This paper discusses the basics of cloud computing, and its main challenge; security. This paper's main focus is on the security challenges of cloud computing and examines various cryptographic techniques implemented by giant cloud providers and proposes an algorithm to encrypt data in transit from the user to the cloud to ensure data security to guard against data breach by Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by suggesting more works that is to be done on the proposed cryptography algorithm to ensure data security and protection in all the three various states of data.
The growth of cloud computing over the years has been phenomenal with users and organizations alike relying more and more on the services offered on the cloud. Outages, however, have been a thorn in the flesh for service providers over... more
The growth of cloud computing over the years has been phenomenal with users and organizations alike relying more and more on the services offered on the cloud. Outages, however, have been a thorn in the flesh for service providers over the years. The objective of this study was to determine whether checkpointing can be proactively used as a counter to security issues. FTCloudSim was used as a simulator to test the effect of checkpointing on data losses caused by security breaches. The simulator was set up to create checkpoints at recommended intervals thus saving images of the state of cloudlets periodically. Outages were then randomly injected during the simulation. Results showed that checkpointing recovered 93% of the tasks using both service availability and execution availability as parametric measures. The results show that checkpointing can effectively be used in cloud computing infrastructure as a suitable measure against data losses caused by security breaches.
The SHAMEL Exam is the second important exam in Jordan; accordingly, the preservation of confidentiality and security are the most important priorities of the exam managers. Recently, AL-Balqa Applied University (BAU) in Jordan has... more
The SHAMEL Exam is the second important exam in Jordan; accordingly, the preservation of
confidentiality and security are the most important priorities of the exam managers. Recently, AL-Balqa
Applied University (BAU) in Jordan has computerized the exam and one of the suggestions was to utilize
the cloud computing applications. However, cloud computing entails many security concerns that may have
impacts on the exam information security. This research discusses the current use the cloud computing in
many life aspects and then concentrate on online exams aspect; also, this research clarifies the tangible
and intangible risks associated with cloud computing adoption. Then, the research examined a specific
case study related to the subject matter. Finally, this research explores the level of understanding risks and
methods may be used to reduce it and help in protecting data from unauthorized persons.