SlideShare a Scribd company logo
1 of 4
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 2 Pages: 2262-2265 (2014) ISSN : 0975-0290
2262
Securing Cloud from Cloud Drain
Niva Das
Department of Information Technology, University of Calcutta, Kolkata
Email: niva.cu@gmail.com
Tanmoy Sarkar
Neudesic India Pvt. Limited, Hyderabad, India
Email: tanmoy.sarkar@neudesic.com
-------------------------------------------------------------------ABSTRACT------------------------------------------------------------------
Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth
the need for computational power and storage is also increasing at a similar rate. Companies are investing a large
amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate
these issues, cloud computing is playing a major role [1]. The underlying concept of cloud computing dates back to
the ‘50s but the term entering into widespread usage can be traced to 2006 when Amazon.com announced the Elastic
Compute Cloud. In this paper, we will discuss about cloud security approaches. We have used the term “Cloud-
Drain” to define data leakage in case of security compromise.
Keywords - Security, Cloud Security, Cloud Drain.
------------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: July 26, 2014 Date of Acceptance: August 17,2014
------------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
In recent years cloud computing is perhaps the most
discussed topic as more and more companies are trying to
adapt and provide this service to its partners/clients. The
advantages of cloud computing is reduced maintenance, cost
efficiency, redundancy of data, scalability, increase in
storage. There are some disadvantages also like vendor
lock-in, downtime, limited control and increased
vulnerability. Cloud computing mainly provides three
models:
Infrastructure as a Service (IaaS) allows user to provision
their infrastructure resources to cloud. Platform as a Service
(PaaS) allows cloud providers to deliver the user
development environment services where user can develop
and run applications which are built in-house. Software as a
Service (SaaS) [13] allows the cloud provider to deliver the
capability to run their application on cloud. The applications
are accessible through thin client such as web browser Fig 1.
Figure 1
Cloud computing technology simplifies infrastructure
planning and provides business-owner the opportunity to
deploy applications on private, public, hybrid or community
clouds, based on their needs. With this advancement of
cloud where the customers can choose the type of cloud
suits, there business increases but there is increase of
security concerns and data leakage. Customers uploaded
there highly confidential data which if compromised will
drastically affect their business. Private cloud is always an
option where customer can manage their own security
policies and their resources. They will however need to
access the cloud using public networks. There are many
papers [2] [3] which do survey on cloud security, attacks
and its mitigation.
In this paper we are using a new term “cloud drain” to
acknowledge the security issues in cloud computing and
also discuss few of the mitigation problems.
II. LITERATURE REVIEW
Some methods have been suggested in literature for
handling security issues in organizations implementing
cloud computing
Maggi and Zanero [16] addressed countermeasures (anti-
viruses, intrusion detection systems), developed to mitigate
well-known security threats. The focus is mainly on
anomaly-based approaches which are mostly suited for
modern protection tools and not for earlier generation
intrusion detectors. The pattern-based changes (example:
from thin client connected to the main frame or powerful
workstations connecting to thin clients) are observed, which
cause some simultaneous changes in work environment and
generates new problems to security of Cloud Computing.
Ertaul et al. [17] discussed cloud computing features like
reduced total cost of ownership and scalability issues. They
claim that cloud computing also minimizes complexity and
provides service to customers. Virtualization is the
technique used to deal with quality of service (QOS). Usage
of cloud computing is considered to be unsafe in an
organization. For dealing with this type of situation, they
investigated a few major security issues with cloud
computing and also the existing countermeasures to those
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 2 Pages: 2262-2265 (2014) ISSN : 0975-0290
2263
security challenges. Advantages for implementing cloud
computing from a different point of view are also discussed.
Subashini and Kavitha [18] dealt with the security risks
faced in cloud computing. They provided empirical
evidence on security risks and issues encountered during
deployment of service delivery models in an organization.
The service models are placed in cloud and the empirical
validation was made in order to justify the safety of the
environment. Security was the main issue while there were
also complications with data protection and data privacy in a
continuous manner that affected the market.
Md. Tanzim Khorshed et al [19] boast that cloud computing
helps reduce cost of services and improves business
outcomes. But to market this and popularize its use by IT
user community, there are many security risks to be solved.
They also mentioned that cloud services pose an attractive
target for cyber-attacks and criminal activities. This is due to
the fact that these services have sensitive information from
many organizations and individuals, stored in their
repositories.
Iliana Iankoulova et al [20] have performed a systematic
review to identify which security requirements need to be
further researched. From this review they found that
nonrepudiation, physical protection, recovery and
prosecution are the least researched in security areas.
Integrity, access control and security auditing are the most
popular addition to security requirements; solutions to these
identified challenges were also mentioned. Vasudevan et al.
[9] described a novel multipath approach of data
communication to improve security; this will be relevant to
transfer of data to and fro from the cloud. Christodorescu et
al. [11] provided a thorough analysis of cloud security and
provided how it is different from virtualization security
issues.
III. CLOUD DRAIN
The term cloud-drain is used to signify the data leakage in
case of security compromise in cloud computing. Intrusion
plays a major role in this part. An intrusion consists of an
attack exploiting a security flaw and a consequent breach
which is the resulting violation of the explicit or implicit
security policy of the system. Here we discuss about
intrusion techniques and how they will effectively allow
cloud drain possible. Intrusion Detection techniques could
be used to prevent a great deal of intrusion which affects
the stored data in the cloud. [21] [22] and [24]. Neural
networks and application in Cloud Security is also a well-
researched area [23].
Cloud systems are susceptible to all typical network and
computer security attacks. The targets that are possibly
vulnerable are the protocol stack; network devices;
processes running in kernel space, such as operating system
daemons; and processes running outside kernel space, such
as cloud middleware, cloud applications, and any non-
cloud applications running with either root or user
privileges. Classification of cloud intrusions is given as
follows:
1) Unauthorized Access: A break-in committed by an
intruder who can pose as a legitimate cloud user if the
credentials is obtained by stealing, brute force or careless
disclosure, then it can cause devastating results. Man-in-
the- middle attack can also be a possibility to gain
illegitimate user access. During 2010, only 4 million user
accounts were compromised by hackers; in 2011 hackers
penetrated 174 million accounts (thanks, Anonymous),
according to the Data Breach Investigations
Report published by Verizon in March[10].
2) Network Attack: Attacks performed with the help of
tools or exploit scripts that target vulnerabilities existent in
cloud protocols, services and applications. They may
appear in the form of DOS attacks, probes, and worms, and
may leave their traces at several locations of cloud’s
organization.
3) Data Security: Data in cloud is stored in different
geographical locations. Cloud providers are providing
maximum security to these places. But since the consumers
are unaware of physical locations, data breach is always a
possible and valuable data may disappear without a trace. A
malicious user of a Virtual Machine (VM) or careless cloud
provider could be responsible for data loss. Also, natural
disaster can cause data loss if data is not properly
distributed. Data duplication in a remote cloud at periodic
interval is a possible solution to mitigate such issues.
The Cloud Security Alliance found the below few
mentioned threats that can lead to cloud drain:
Failures in Provider Security, Attacks by Customers,
Unavailability and Untrustworthiness Issues, Legal and
Regulatory Issues, Data Loss, Account hack.
All these threat can lead to cloud drain and drastically
affect the cloud consumers. Fundamentally the cloud
security model involves of cloud providers, service
providers and cloud consumers. Each entity has their own
security policies and management. So, before engaging to
cloud services, all the three entities need to negotiate and
come to an agreement. The security gap can be explored in
more detail and leads to security attacks which in turn may
lead to cloud drain.
IV. CLOUD DRAIN PREVENTION
Securing VM’s operating system, repositories and network
can prevent cloud drain in physical servers. Many tenants
VM’s are sharing the same infrastructure and may lead to
security vulnerabilities. One potential risk has to do with
the potential to compromise a virtual machine. Virtual
machine compromise can cause major impact and
destruction. This requires an additional degree of network
isolation and enhanced detection by security monitoring.
For this, hypervisors are used because at present there are
no documented attacks against hypervisors, reducing the
likelihood of attack. So, the vulnerability of the hypervisor
and the probability of an attack are low [4].
Data security [5] is another important aspect in cloud
computing. Many organizations [7] and researchers [6] [8]
have implemented encryption for data security; but they
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 2 Pages: 2262-2265 (2014) ISSN : 0975-0290
2264
often overlooked inherent weaknesses in key management
and data access.
If encryption keys are not protected, they are susceptible to
theft by malevolent hackers. Vulnerability also lies in the
access control model; thus, if keys are appropriately
protected but access is not sufficiently controlled or robust;
malicious or compromised personnel can attempt to access
sensitive data by assuming the identity of an authorized
user.
First, we need to make sure that data is not readable and
that the solution offers strong key management. Second,
implement access policies that ensure only authorized users
can gain access to sensitive information, so that even
privileged users such as root user cannot view sensitive
information [15]. Third, incorporate security intelligence
that generates log information, which can be used for
behavioral analysis to provide alerts that trigger when users
are performing actions outside of the norm.
Use advance automatic switches which provides packet rate
inspection and bogus IP filtering (Bogon filtering).
Intelligent hardware that is Application Front end hardware
device is placed on the network which analyzes the data
packets entering the network system and identifies that
whether they are based on priority, regular or dangerous.
DoS attacks [12] and Malware-Injection Attack Solution is
to deploy a Hypervisor in the provider’s side. This
Hypervisor will be considered the mainly secured and
complicated part of the cloud system whose protection
cannot be breached by any means. The Hypervisor is
responsible for arrangement of all the Instances. It cannot
be denied that there are risks associated with sharing the
same physical infrastructure between a set of multiple
users, even one being malicious can cause threats to the
others using the same infrastructure [14], and hence
security with respect to hypervisor is of great concern as all
the guest systems are controlled by it for avoiding a
flooding attack; our projected approach is to categorize all
the servers in the cloud system as a cluster of fleet of
servers. Each fleet of servers will be elected for particular
type of job, in this; all servers in the fleet will have inside
communication along with themselves through message
passing. So when a server is loaded, a latest server will be
installed in the fleet and the name server, which has the
entire records of the existing states of the servers, will
renew the target for the requests with the latest included
server.[10]
V. CONCLUSION
Although security researches are done in many fields like
Ad-hoc networks [25] [26], mobile computing [27], sensor
networks [28], radio networks etc. but cloud computing is
always exposed to security threats varying from network
level threats to application level threats. In order to keep
the Cloud secure, these security threats need to be
controlled. Moreover data residing in the cloud is also
prone to a number of threats and various issues like:
confidentiality and integrity of data should be considered
while buying storage services from a cloud service
provider. Inspecting of the Cloud regularly needs to be
done to safeguard the cloud against external threats and
avoid cloud drain
REFERENCES
[1] http://thecloudtutorial.com/nistcloudcomputingdefiniti
on.html
[2] Bhadauria, Rohit, Rituparna Chaki, Nabendu Chaki,
and Sugata Sanyal. “A survey on security issues in
cloud computing.” arXiv preprint arXiv: 1109.5388
(2011).
[3] Rohit Bhadauria, Sugata Sanyal , “Survey on Security
Issues in Cloud Computing and Associated Mitigation
Techniques”, arXiv preprint arXiv: 1204.0764
(2012).
[4] http://technet.microsoft.com/en-
us/magazine/hh641415.aspx
[5] Sugata Sanyal, Parthasarathy P. Iyer , “Inter-Cloud
Data Security Strategies”, arXiv preprint arXiv:
1303.1417 (2013).
[6] Sugata Sanyal, Parthasarathy P. Iyer , “Cloud
Computing -- An Approach with Modern
Cryptography”, arXiv preprint arXiv: 1303.1048
(2013).
[7] http://whoswholegal.com/news/features/article/18246/
cloud-computing-data-protection/
[8] R. A. Vasudevan, A. Abraham, S. Sanyal,
D.P.Agarwal, “Jigsaw-based secure data transfer over
computer networks”, Int. Conference on Information
Technology: Coding and Computing, pp. 2-6, vol.1,
April, 2004.
[9] R. A. Vasudevan, S. Sanyal, “A Novel Multipath
Approach to Security in Mobile Ad Hoc Networks
(MANETs)”, Int. Conference on Computers and
Devices for Communication, CODEC’04, Kolkata,
India
[10] http://www.networkcomputing.com/careers-and-
certifications/the-biggest-cloud-computing-security-
risk-is-impossible-to-eliminate/d/d-id/1233828?
[11] M. Christodorescu, R. Sailer, D. L. Schales, D.
Sgandurra, D. Zamboni. “Cloud Security is not (just)
Virtualization Security”, CCSW '09 Proc.2009 ACM
workshop on Cloud computing security, P. 97-102
Nov. 13, 2009, Chicago, Illinois, USA
[12] Aman Bakshi, Yogesh B. Dujodwala, “Securing cloud
from DDoS Attacks using Intrusion Detection System
in Virtual Machine”, ICCSN ’10 Proceeding of the
2010 Second International Conference on
Communication Software and networks, pp. 260-264,
2010, IEEE Computer Society, USA, 2010. ISBN:
978-0-7695-3961-4.
[13] Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi
LoIacon, “On technical Security Issues in Cloud
Computing”, Proc. of IEEE International Conference
on Cloud Computing (CLOUD-II, 2009), pp. 109-116,
India, 2009.
[14] Shantanu Pal, Sunirmal Khatua, Nabendu Chaki,
Sugata Sanyal, “A New Trusted and Collaborative
Agent Based Approach for Ensuring Cloud Security”,
Annals of Faculty Engineering Hunedoara
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 2 Pages: 2262-2265 (2014) ISSN : 0975-0290
2265
International Journal of Engineering (Archived copy),
scheduled for publication in vol. 10, issue 1, January
2012. ISSN: 1584-2665.
[15] Sudharsan Sundararajan, Hari Narayanan, Vipin
Pavithran, Kaladhar Vorungati, Krishnashree
Achuthan, “Preventing Insider attacks in the Cloud”,
Communications in Computer and Information
Science, vol. 190, issue. 5, pp. 488-500, 2011. DOI:
10.1007/978-3-642-22709-7_48
[16] F. Maggi and S. Zanero. “Rethinking security in a
cloudy world. Technical report”, Technical report,
Dipartimento di Elettronica e Informazione,
Politecnico di Milano, 2010
[17] L. Ertaul, S. Singhal, and G. Saldamli. “Security
challenges in cloud computing.” California State
University, East Bay Academic paper-
http://www.mcs.csueastbay.edu/lertaul/Cloudpdf,
2009
[18] S. Subashini and V. Kavitha. “A survey on security
issues in service delivery models of cloud computing.
“,Journal of Network and Computer Applications,
34(1):1{11, January 2011
[19] Md. Tanzim Khorshed, A. B. M. Ali, and Saleh A.
Wasimi. “A survey on gaps, threat remediation
challenges and some thoughts for proactive attack
detection in cloud computing.”, Future Generation
Computer Systems, 2012.
[20] Iliana Iankoulova and Maya Daneva. “Cloud
computing security requirements: A systematic
review.”, In Research Challenges in Information
Science(RCIS), 2012 Sixth International Conference
on, pages 1{7, 2012}
[21] Animesh Kr Trivedi, Rishi Kapoor, Rajan Arora,
Sudip Sanyal and Sugata Sanyal. “RISM - Reputation
Based Intrusion Detection System for Mobile Ad hoc
Networks”, Third International Conference on
Computers and Devices for Communications,
CODEC-06, pp. 234-237. Institute of Radio Physics
and Electronics, University of Calcutta, December
18-20, 2006, Kolkata, India
[22] Ajith Abraham, Ravi Jain, Sugata Sanyal and Sang
Yong Han, “SCIDS: A Soft Computing Intrusion
Detection System”, 6th International Workshop on
Distributed Computing (IWDC-2004), A. Sen et al
(Eds.). Springer Verlag, Germany, Lecture Notes in
Computer Science, Vol. 3326. ISBN: 3-540-24076-4,
pp. 252-257, 2004.
[23] Zhihua Cui, Chunxia Yang, Sugata Sanyal; “Training
Artificial Neural Networks using
APPM”; International Journal of Wireless and
Mobile Computing; Editor-in-Chief: Zhihua Cui;
Vol.5, Nos. 2, 2012, pp.168-174. ISSN (Online):1741-
1092 ISSN:1741-
1084.DOI:10.1504/IJWMC.2012.046787
[24] Sampada Chavan, Khusbu Shah, Neha Dave,
Sanghamitra Mukherjee, Ajith Abraham and Sugata
Sanyal, “Adaptive Neuro-Fuzzy Intrusion Detection
Systems”, IEEE International Conference on
Information Technology: Coding and
Computing,2004.(ITCC ’04), Proceedings of ITCC
2004, Vol. 1, pp. 70-74, April, 2004, Las Vegas,
Nevada.
[25] P. Rathod, N. Mody, D. Gada, R. Gogri, Z. Dedhia,
S. Sanyal, and A. Abraham, "Security Scheme for
Malicious Node Detection in Mobile Ad Hoc
Networks," Lecture Notes in Computer Science,
2004, vol. 3326, pp. 541-542.
[26] J. Kataria, P. S. Dhekne and S. Sanyal, "A Scheme
to Control Flooding of Fake Route Requests in Ad-
hoc Networks," International Conference on
Computers and Devices for Communications,
CODEC-06, 2006
[27] D. P. Agrawal, H. Deng, R. Poosarla, and S. Sanyal,
“Secure Mobile Computing,” The 5th International
Workshop on Distributed Computing IWDC 2003,
pp. 265-278, Kolkata, India, Dec. 2003.
[28] .Koustubh Kulkarni, Sudip Sanyal, “Dynamic
Reconfiguration of Wireless Sensor Networks”,
International Journal of Computer Science and
Applications Vol. 6, No. 4, pp 16–42, 2009.
[29] S. Sanyal , R. Bhadauria and C. Ghosh, "Secure
Communication in Cognitive Radio, " International
Conference on Computers and Devices for
Communications, CODEC-2009, 2009
Authors Biography
Niva Das has done her M.Tech from
University of Calcutta, Kolkata. She has
done her specialization on Information
Technology. Her research interests are
security and networking.
Tanmoy Sarkar has done his M.Tech
(Gold Medalist) from Jadavpur University,
Kolkata. He has done his specialization in
Distributed and Mobile computing. His
research interests are security, sensor
networks and mobile computing.

More Related Content

What's hot

Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsEswar Publications
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in theIJNSA Journal
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challengespaperpublications3
 
Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing IJECEIAES
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computingijtsrd
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
Services, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computingServices, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computingeSAT Journals
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4sophiabelthome
 

What's hot (18)

Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS Clouds
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in the
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Outsourcing control
Outsourcing controlOutsourcing control
Outsourcing control
 
Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
G033030035
G033030035G033030035
G033030035
 
Services, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computingServices, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computing
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
489 493
489 493489 493
489 493
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 

Viewers also liked

Depo-Provera: It’s Detrimental Effects on Bone Health
Depo-Provera: It’s Detrimental Effects on Bone HealthDepo-Provera: It’s Detrimental Effects on Bone Health
Depo-Provera: It’s Detrimental Effects on Bone HealthJessica Brown M.S. RT (R)(M)
 
201509 VGM GIC fund LKY Laurentien Kok.PDF
201509 VGM  GIC fund LKY Laurentien Kok.PDF201509 VGM  GIC fund LKY Laurentien Kok.PDF
201509 VGM GIC fund LKY Laurentien Kok.PDFLaurentien K.A. Kok
 
Formatting an apa open office writer document
Formatting an apa open office writer documentFormatting an apa open office writer document
Formatting an apa open office writer documentTamara Mitchell
 
Managing information technology in small business
Managing information technology in small businessManaging information technology in small business
Managing information technology in small businessTutika Praveen Sai Kumar
 

Viewers also liked (7)

CV KMS current
CV KMS currentCV KMS current
CV KMS current
 
Depo-Provera: It’s Detrimental Effects on Bone Health
Depo-Provera: It’s Detrimental Effects on Bone HealthDepo-Provera: It’s Detrimental Effects on Bone Health
Depo-Provera: It’s Detrimental Effects on Bone Health
 
201509 VGM GIC fund LKY Laurentien Kok.PDF
201509 VGM  GIC fund LKY Laurentien Kok.PDF201509 VGM  GIC fund LKY Laurentien Kok.PDF
201509 VGM GIC fund LKY Laurentien Kok.PDF
 
201609 VGM Black and Whites.PDF
201609 VGM Black and Whites.PDF201609 VGM Black and Whites.PDF
201609 VGM Black and Whites.PDF
 
Formatting an apa open office writer document
Formatting an apa open office writer documentFormatting an apa open office writer document
Formatting an apa open office writer document
 
Ocr efr
Ocr efrOcr efr
Ocr efr
 
Managing information technology in small business
Managing information technology in small businessManaging information technology in small business
Managing information technology in small business
 

Similar to Securing Cloud from Cloud Drain

SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...AJASTJournal
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Associate Professor in VSB Coimbatore
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingYolanda Ivey
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr_editor
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewEswar Publications
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...Claire Webber
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldCiente
 

Similar to Securing Cloud from Cloud Drain (20)

SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Cloud security
Cloud securityCloud security
Cloud security
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Securing Cloud from Cloud Drain

  • 1. Int. J. Advanced Networking and Applications Volume: 6 Issue: 2 Pages: 2262-2265 (2014) ISSN : 0975-0290 2262 Securing Cloud from Cloud Drain Niva Das Department of Information Technology, University of Calcutta, Kolkata Email: niva.cu@gmail.com Tanmoy Sarkar Neudesic India Pvt. Limited, Hyderabad, India Email: tanmoy.sarkar@neudesic.com -------------------------------------------------------------------ABSTRACT------------------------------------------------------------------ Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues, cloud computing is playing a major role [1]. The underlying concept of cloud computing dates back to the ‘50s but the term entering into widespread usage can be traced to 2006 when Amazon.com announced the Elastic Compute Cloud. In this paper, we will discuss about cloud security approaches. We have used the term “Cloud- Drain” to define data leakage in case of security compromise. Keywords - Security, Cloud Security, Cloud Drain. ------------------------------------------------------------------------------------------------------------------------------------------------------ Date of Submission: July 26, 2014 Date of Acceptance: August 17,2014 ------------------------------------------------------------------------------------------------------------------------------------------------------ I. INTRODUCTION In recent years cloud computing is perhaps the most discussed topic as more and more companies are trying to adapt and provide this service to its partners/clients. The advantages of cloud computing is reduced maintenance, cost efficiency, redundancy of data, scalability, increase in storage. There are some disadvantages also like vendor lock-in, downtime, limited control and increased vulnerability. Cloud computing mainly provides three models: Infrastructure as a Service (IaaS) allows user to provision their infrastructure resources to cloud. Platform as a Service (PaaS) allows cloud providers to deliver the user development environment services where user can develop and run applications which are built in-house. Software as a Service (SaaS) [13] allows the cloud provider to deliver the capability to run their application on cloud. The applications are accessible through thin client such as web browser Fig 1. Figure 1 Cloud computing technology simplifies infrastructure planning and provides business-owner the opportunity to deploy applications on private, public, hybrid or community clouds, based on their needs. With this advancement of cloud where the customers can choose the type of cloud suits, there business increases but there is increase of security concerns and data leakage. Customers uploaded there highly confidential data which if compromised will drastically affect their business. Private cloud is always an option where customer can manage their own security policies and their resources. They will however need to access the cloud using public networks. There are many papers [2] [3] which do survey on cloud security, attacks and its mitigation. In this paper we are using a new term “cloud drain” to acknowledge the security issues in cloud computing and also discuss few of the mitigation problems. II. LITERATURE REVIEW Some methods have been suggested in literature for handling security issues in organizations implementing cloud computing Maggi and Zanero [16] addressed countermeasures (anti- viruses, intrusion detection systems), developed to mitigate well-known security threats. The focus is mainly on anomaly-based approaches which are mostly suited for modern protection tools and not for earlier generation intrusion detectors. The pattern-based changes (example: from thin client connected to the main frame or powerful workstations connecting to thin clients) are observed, which cause some simultaneous changes in work environment and generates new problems to security of Cloud Computing. Ertaul et al. [17] discussed cloud computing features like reduced total cost of ownership and scalability issues. They claim that cloud computing also minimizes complexity and provides service to customers. Virtualization is the technique used to deal with quality of service (QOS). Usage of cloud computing is considered to be unsafe in an organization. For dealing with this type of situation, they investigated a few major security issues with cloud computing and also the existing countermeasures to those
  • 2. Int. J. Advanced Networking and Applications Volume: 6 Issue: 2 Pages: 2262-2265 (2014) ISSN : 0975-0290 2263 security challenges. Advantages for implementing cloud computing from a different point of view are also discussed. Subashini and Kavitha [18] dealt with the security risks faced in cloud computing. They provided empirical evidence on security risks and issues encountered during deployment of service delivery models in an organization. The service models are placed in cloud and the empirical validation was made in order to justify the safety of the environment. Security was the main issue while there were also complications with data protection and data privacy in a continuous manner that affected the market. Md. Tanzim Khorshed et al [19] boast that cloud computing helps reduce cost of services and improves business outcomes. But to market this and popularize its use by IT user community, there are many security risks to be solved. They also mentioned that cloud services pose an attractive target for cyber-attacks and criminal activities. This is due to the fact that these services have sensitive information from many organizations and individuals, stored in their repositories. Iliana Iankoulova et al [20] have performed a systematic review to identify which security requirements need to be further researched. From this review they found that nonrepudiation, physical protection, recovery and prosecution are the least researched in security areas. Integrity, access control and security auditing are the most popular addition to security requirements; solutions to these identified challenges were also mentioned. Vasudevan et al. [9] described a novel multipath approach of data communication to improve security; this will be relevant to transfer of data to and fro from the cloud. Christodorescu et al. [11] provided a thorough analysis of cloud security and provided how it is different from virtualization security issues. III. CLOUD DRAIN The term cloud-drain is used to signify the data leakage in case of security compromise in cloud computing. Intrusion plays a major role in this part. An intrusion consists of an attack exploiting a security flaw and a consequent breach which is the resulting violation of the explicit or implicit security policy of the system. Here we discuss about intrusion techniques and how they will effectively allow cloud drain possible. Intrusion Detection techniques could be used to prevent a great deal of intrusion which affects the stored data in the cloud. [21] [22] and [24]. Neural networks and application in Cloud Security is also a well- researched area [23]. Cloud systems are susceptible to all typical network and computer security attacks. The targets that are possibly vulnerable are the protocol stack; network devices; processes running in kernel space, such as operating system daemons; and processes running outside kernel space, such as cloud middleware, cloud applications, and any non- cloud applications running with either root or user privileges. Classification of cloud intrusions is given as follows: 1) Unauthorized Access: A break-in committed by an intruder who can pose as a legitimate cloud user if the credentials is obtained by stealing, brute force or careless disclosure, then it can cause devastating results. Man-in- the- middle attack can also be a possibility to gain illegitimate user access. During 2010, only 4 million user accounts were compromised by hackers; in 2011 hackers penetrated 174 million accounts (thanks, Anonymous), according to the Data Breach Investigations Report published by Verizon in March[10]. 2) Network Attack: Attacks performed with the help of tools or exploit scripts that target vulnerabilities existent in cloud protocols, services and applications. They may appear in the form of DOS attacks, probes, and worms, and may leave their traces at several locations of cloud’s organization. 3) Data Security: Data in cloud is stored in different geographical locations. Cloud providers are providing maximum security to these places. But since the consumers are unaware of physical locations, data breach is always a possible and valuable data may disappear without a trace. A malicious user of a Virtual Machine (VM) or careless cloud provider could be responsible for data loss. Also, natural disaster can cause data loss if data is not properly distributed. Data duplication in a remote cloud at periodic interval is a possible solution to mitigate such issues. The Cloud Security Alliance found the below few mentioned threats that can lead to cloud drain: Failures in Provider Security, Attacks by Customers, Unavailability and Untrustworthiness Issues, Legal and Regulatory Issues, Data Loss, Account hack. All these threat can lead to cloud drain and drastically affect the cloud consumers. Fundamentally the cloud security model involves of cloud providers, service providers and cloud consumers. Each entity has their own security policies and management. So, before engaging to cloud services, all the three entities need to negotiate and come to an agreement. The security gap can be explored in more detail and leads to security attacks which in turn may lead to cloud drain. IV. CLOUD DRAIN PREVENTION Securing VM’s operating system, repositories and network can prevent cloud drain in physical servers. Many tenants VM’s are sharing the same infrastructure and may lead to security vulnerabilities. One potential risk has to do with the potential to compromise a virtual machine. Virtual machine compromise can cause major impact and destruction. This requires an additional degree of network isolation and enhanced detection by security monitoring. For this, hypervisors are used because at present there are no documented attacks against hypervisors, reducing the likelihood of attack. So, the vulnerability of the hypervisor and the probability of an attack are low [4]. Data security [5] is another important aspect in cloud computing. Many organizations [7] and researchers [6] [8] have implemented encryption for data security; but they
  • 3. Int. J. Advanced Networking and Applications Volume: 6 Issue: 2 Pages: 2262-2265 (2014) ISSN : 0975-0290 2264 often overlooked inherent weaknesses in key management and data access. If encryption keys are not protected, they are susceptible to theft by malevolent hackers. Vulnerability also lies in the access control model; thus, if keys are appropriately protected but access is not sufficiently controlled or robust; malicious or compromised personnel can attempt to access sensitive data by assuming the identity of an authorized user. First, we need to make sure that data is not readable and that the solution offers strong key management. Second, implement access policies that ensure only authorized users can gain access to sensitive information, so that even privileged users such as root user cannot view sensitive information [15]. Third, incorporate security intelligence that generates log information, which can be used for behavioral analysis to provide alerts that trigger when users are performing actions outside of the norm. Use advance automatic switches which provides packet rate inspection and bogus IP filtering (Bogon filtering). Intelligent hardware that is Application Front end hardware device is placed on the network which analyzes the data packets entering the network system and identifies that whether they are based on priority, regular or dangerous. DoS attacks [12] and Malware-Injection Attack Solution is to deploy a Hypervisor in the provider’s side. This Hypervisor will be considered the mainly secured and complicated part of the cloud system whose protection cannot be breached by any means. The Hypervisor is responsible for arrangement of all the Instances. It cannot be denied that there are risks associated with sharing the same physical infrastructure between a set of multiple users, even one being malicious can cause threats to the others using the same infrastructure [14], and hence security with respect to hypervisor is of great concern as all the guest systems are controlled by it for avoiding a flooding attack; our projected approach is to categorize all the servers in the cloud system as a cluster of fleet of servers. Each fleet of servers will be elected for particular type of job, in this; all servers in the fleet will have inside communication along with themselves through message passing. So when a server is loaded, a latest server will be installed in the fleet and the name server, which has the entire records of the existing states of the servers, will renew the target for the requests with the latest included server.[10] V. CONCLUSION Although security researches are done in many fields like Ad-hoc networks [25] [26], mobile computing [27], sensor networks [28], radio networks etc. but cloud computing is always exposed to security threats varying from network level threats to application level threats. In order to keep the Cloud secure, these security threats need to be controlled. Moreover data residing in the cloud is also prone to a number of threats and various issues like: confidentiality and integrity of data should be considered while buying storage services from a cloud service provider. Inspecting of the Cloud regularly needs to be done to safeguard the cloud against external threats and avoid cloud drain REFERENCES [1] http://thecloudtutorial.com/nistcloudcomputingdefiniti on.html [2] Bhadauria, Rohit, Rituparna Chaki, Nabendu Chaki, and Sugata Sanyal. “A survey on security issues in cloud computing.” arXiv preprint arXiv: 1109.5388 (2011). [3] Rohit Bhadauria, Sugata Sanyal , “Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques”, arXiv preprint arXiv: 1204.0764 (2012). [4] http://technet.microsoft.com/en- us/magazine/hh641415.aspx [5] Sugata Sanyal, Parthasarathy P. Iyer , “Inter-Cloud Data Security Strategies”, arXiv preprint arXiv: 1303.1417 (2013). [6] Sugata Sanyal, Parthasarathy P. Iyer , “Cloud Computing -- An Approach with Modern Cryptography”, arXiv preprint arXiv: 1303.1048 (2013). [7] http://whoswholegal.com/news/features/article/18246/ cloud-computing-data-protection/ [8] R. A. Vasudevan, A. Abraham, S. Sanyal, D.P.Agarwal, “Jigsaw-based secure data transfer over computer networks”, Int. Conference on Information Technology: Coding and Computing, pp. 2-6, vol.1, April, 2004. [9] R. A. Vasudevan, S. Sanyal, “A Novel Multipath Approach to Security in Mobile Ad Hoc Networks (MANETs)”, Int. Conference on Computers and Devices for Communication, CODEC’04, Kolkata, India [10] http://www.networkcomputing.com/careers-and- certifications/the-biggest-cloud-computing-security- risk-is-impossible-to-eliminate/d/d-id/1233828? [11] M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, D. Zamboni. “Cloud Security is not (just) Virtualization Security”, CCSW '09 Proc.2009 ACM workshop on Cloud computing security, P. 97-102 Nov. 13, 2009, Chicago, Illinois, USA [12] Aman Bakshi, Yogesh B. Dujodwala, “Securing cloud from DDoS Attacks using Intrusion Detection System in Virtual Machine”, ICCSN ’10 Proceeding of the 2010 Second International Conference on Communication Software and networks, pp. 260-264, 2010, IEEE Computer Society, USA, 2010. ISBN: 978-0-7695-3961-4. [13] Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi LoIacon, “On technical Security Issues in Cloud Computing”, Proc. of IEEE International Conference on Cloud Computing (CLOUD-II, 2009), pp. 109-116, India, 2009. [14] Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata Sanyal, “A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security”, Annals of Faculty Engineering Hunedoara
  • 4. Int. J. Advanced Networking and Applications Volume: 6 Issue: 2 Pages: 2262-2265 (2014) ISSN : 0975-0290 2265 International Journal of Engineering (Archived copy), scheduled for publication in vol. 10, issue 1, January 2012. ISSN: 1584-2665. [15] Sudharsan Sundararajan, Hari Narayanan, Vipin Pavithran, Kaladhar Vorungati, Krishnashree Achuthan, “Preventing Insider attacks in the Cloud”, Communications in Computer and Information Science, vol. 190, issue. 5, pp. 488-500, 2011. DOI: 10.1007/978-3-642-22709-7_48 [16] F. Maggi and S. Zanero. “Rethinking security in a cloudy world. Technical report”, Technical report, Dipartimento di Elettronica e Informazione, Politecnico di Milano, 2010 [17] L. Ertaul, S. Singhal, and G. Saldamli. “Security challenges in cloud computing.” California State University, East Bay Academic paper- http://www.mcs.csueastbay.edu/lertaul/Cloudpdf, 2009 [18] S. Subashini and V. Kavitha. “A survey on security issues in service delivery models of cloud computing. “,Journal of Network and Computer Applications, 34(1):1{11, January 2011 [19] Md. Tanzim Khorshed, A. B. M. Ali, and Saleh A. Wasimi. “A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing.”, Future Generation Computer Systems, 2012. [20] Iliana Iankoulova and Maya Daneva. “Cloud computing security requirements: A systematic review.”, In Research Challenges in Information Science(RCIS), 2012 Sixth International Conference on, pages 1{7, 2012} [21] Animesh Kr Trivedi, Rishi Kapoor, Rajan Arora, Sudip Sanyal and Sugata Sanyal. “RISM - Reputation Based Intrusion Detection System for Mobile Ad hoc Networks”, Third International Conference on Computers and Devices for Communications, CODEC-06, pp. 234-237. Institute of Radio Physics and Electronics, University of Calcutta, December 18-20, 2006, Kolkata, India [22] Ajith Abraham, Ravi Jain, Sugata Sanyal and Sang Yong Han, “SCIDS: A Soft Computing Intrusion Detection System”, 6th International Workshop on Distributed Computing (IWDC-2004), A. Sen et al (Eds.). Springer Verlag, Germany, Lecture Notes in Computer Science, Vol. 3326. ISBN: 3-540-24076-4, pp. 252-257, 2004. [23] Zhihua Cui, Chunxia Yang, Sugata Sanyal; “Training Artificial Neural Networks using APPM”; International Journal of Wireless and Mobile Computing; Editor-in-Chief: Zhihua Cui; Vol.5, Nos. 2, 2012, pp.168-174. ISSN (Online):1741- 1092 ISSN:1741- 1084.DOI:10.1504/IJWMC.2012.046787 [24] Sampada Chavan, Khusbu Shah, Neha Dave, Sanghamitra Mukherjee, Ajith Abraham and Sugata Sanyal, “Adaptive Neuro-Fuzzy Intrusion Detection Systems”, IEEE International Conference on Information Technology: Coding and Computing,2004.(ITCC ’04), Proceedings of ITCC 2004, Vol. 1, pp. 70-74, April, 2004, Las Vegas, Nevada. [25] P. Rathod, N. Mody, D. Gada, R. Gogri, Z. Dedhia, S. Sanyal, and A. Abraham, "Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks," Lecture Notes in Computer Science, 2004, vol. 3326, pp. 541-542. [26] J. Kataria, P. S. Dhekne and S. Sanyal, "A Scheme to Control Flooding of Fake Route Requests in Ad- hoc Networks," International Conference on Computers and Devices for Communications, CODEC-06, 2006 [27] D. P. Agrawal, H. Deng, R. Poosarla, and S. Sanyal, “Secure Mobile Computing,” The 5th International Workshop on Distributed Computing IWDC 2003, pp. 265-278, Kolkata, India, Dec. 2003. [28] .Koustubh Kulkarni, Sudip Sanyal, “Dynamic Reconfiguration of Wireless Sensor Networks”, International Journal of Computer Science and Applications Vol. 6, No. 4, pp 16–42, 2009. [29] S. Sanyal , R. Bhadauria and C. Ghosh, "Secure Communication in Cognitive Radio, " International Conference on Computers and Devices for Communications, CODEC-2009, 2009 Authors Biography Niva Das has done her M.Tech from University of Calcutta, Kolkata. She has done her specialization on Information Technology. Her research interests are security and networking. Tanmoy Sarkar has done his M.Tech (Gold Medalist) from Jadavpur University, Kolkata. He has done his specialization in Distributed and Mobile computing. His research interests are security, sensor networks and mobile computing.