SlideShare a Scribd company logo
1 of 10
Download to read offline
IJESM Volume 2, Issue 1 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
130
March
2013
Private cloud computing challenges and
Architecture for implementing effective
security
M.N.B.Gayathri
M.P.R.Sekhar
M.Adithya
Abstract
Cloud computing is a growing area of concern in the IT security community because cloud
architectures are literally popping up all over. Public clouds are available from Google.com,
Amazon.com, Microsoft, Oracle/Sun, and many other vendors. Private cloud technologies, where
the cloud software is loaded on local or in-house server hardware, are available from VMware,
Eucalyptus, Citrix, Microsoft, and there are thousands of vendors offering private cloud with all
sorts. With all of the hyperbole has come a large swell of early-adopters and developers. This
paper aims to provide an architectural blueprint for implementing effective security within a
private cloud environment.
Keywords: private cloud computing, private cloud environment, private cloud security
IJESM Volume 2, Issue 1 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
131
March
2013
Introduction
Implementing a private cloud environment requires IT departments to re-evaluate many aspects
of how they interact with their organization. Private cloud computing provides the ability to
allocate costs in a fair and metered manner to the service user in proportion to the user’s demand
for those services. Private cloud implementations also affect the way in which IT departments
need to view security. The chief change is that security can no longer be viewed as a discrete silo
that contains traditional capabilities such as authentication, authorization, auditing, and so on.
The security model shows that to approach any part of the cloud environment, the consumer or
provider must pass through the security wrapper. Additionally, all communication between
layers in the cloud model (for example, between infrastructure and platform layers) must also
pass through security controls. Security also applies to intra-layer communications, The
opportunity with the move to private or hybrid cloud architectures is that it gives you the chance
to re-examine the provisioning of security within your datacenter. We can take a holistic view of
the central importance of security and ensure that you achieve this goal within your private cloud
design. The following section defines the new security threats from the cloud and identifies the
private cloud security domains within the Cloud Security Alliance (CSA) model and suggests a
security model
Cloud Security Alliance Domains:
The Cloud Security Alliance (CSA) is an independent grouping consisting of over 120 corporate
members. CSA is becoming the focal point for security standards globally, aligning multiple,
disparate government policies on cloud security and putting forward standards for ratification by
international standards bodies.”
CSA has recently released Version 3 of their Security Guidance for Critical Areas of Focus in
Cloud Computing document. The CSA document defines fourteen security domains for both
private and public cloud. In contrast, this document covers the areas that these domains reference
by using the Microsoft private cloud security model.
Before diving deeper into the security architectural issues and challenges, we have to consider
the following points:
1. Defining the Private Cloud Security Problem Domain: Security is a universal component of
cloud service provisioning Key Security Differences in Private Cloud Environments are
o Security Responsibility
IJESM Volume 2, Issue 1 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
132
March
2013
o Security Attack Targets
o Shared Tenant Model
o Virtualization
Security Responsibility:
. Generally, the responsibility was aligned with ownership of the physical component, whether
that was a server, a networking device or the overall network infrastructure; if the IT department
owned and administered the server, then that department also managed and updated security on
that asset.
With cloud models, security responsibility has altered, in that departments may be responsible
for a portion of the security on the service that they pay for, depending on the service
provisioning model in use. Following figure shows the split of security responsibility for the
three main cloud provision models.
Figure: Division of security responsibility for private cloud service models
Security Attack Targets
Taking the private cloud reference model as the basis for analysis, we can identify threats to the
private cloud infrastructure and place these threats into appropriate places within the model. This
approach provides a basis for threat modeling and risk analysis.
Hence, we can classify attacks according to the layer or stack that the attack targets. Following
figure highlights the primary areas in the private cloud where these individual attack types can
target. Note that this diagram is not showing responsibilities but listing the different types of
attacks that might take place against the management stack, the infrastructure layer and so on.
IJESM Volume 2, Issue 1 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
133
March
2013
Figure: Security Threats to Private Cloud Architectures
Shared Tenant Model:
A key differentiator with public cloud environments is that the service is provided on a shared
tenant basis and multiple tenants use the same services. In private cloud terminology, a tenant is
a client, typically a business unit within the organization, who is using the private cloud to run
their applications and services.
The perception of a private cloud is that it is only hosting one organization, and in consequence,
security partitioning is not required. In consequence, a private cloud model may also be a shared
tenant model with similar requirements for effective security partitioning between different
business units as with public cloud implementations.
Virtualization:
Virtualization radically changes the way an organization secures and manages their data center.
As workloads are mobile and can move from host to host based on optimization algorithms that
require no human involvement, security policies linked to physical location are no longer
effective, so security policies must be independent of network or hardware topologies.
A key factor for implementing effective security in virtualized environments will be
virtualization of the security controls themselves. As these virtualized controls become available,
they should as a minimum meet the following criteria:
Fully integrate with the private cloud fabric
Provide separate configuration interfaces
Provide programmable, on-demand services in an elastic manner
IJESM Volume 2, Issue 1 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
134
March
2013
Consist of policies that govern logical attributes, rather than policies that are tied to
physical instances
Enable the creation of trust zones that can separate multiple tenants in a dynamic
environment
2. Cloud Security Challenges: To highlight the changes in security between traditional IT
systems and cloud-based environments, this paper takes four of the five the NIST cloud
computing definitions and analyses This paper considers each of these challenges in turn before
moving on to identify how to respond to these challenges.
Resource Pooling
Resource pooling is the mechanism by which cloud environments can increase utilization levels,
reduce costs and make use of cheaper resources, such as commoditized servers and inexpensive
hard disks. Resource pooling needs to be considered at all three service layers of the private
cloud model. But this resource pooling also requires significant consideration of the security
aspects from such a configuration.
With a private cloud implementation, a similar requirement for strict data partitioning as in
public cloud is not immediately obvious. If, however, you do need to protect data and
applications from access by authenticated users who are not authorized to view that information
or use those applications, then you do need to implement some form of partitioning within your
private cloud environment. Similarly, administrative rights need to be carefully controlled, as
you may want to give certain groups or business units the right to carry out limited
administrative actions on their resources.
With each pooled resource, you must ensure that each tenant’s data or applications are kept
partitioned from those belonging to other tenants. Any data that is exclusively owned by a
consumer should not leak to other sessions nor be accessible by other users or tenants, whether
maliciously or not. Partitioning and Role Based Access Control (RBAC) also applies to your
administrators, who should not have automatic access to tenant data. In the case where an
administrator does require access to tenant data, then that access must be carefully audited.
The following areas are those that need to be considered when planning for resource pooling:
Virtualization
Multi-Tenancy
Infrastructure security
IJESM Volume 2, Issue 1 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
135
March
2013
Platform security
Software security
Data protection
Service Level Agreements (SLAs)
On-Demand Self-Service:
The essence of cloud provisioning is that of self-service. When combined with rapid elasticity,
self-service enables cloud implementations to provide dynamic and timely responses to requests
for more or fewer resources. No longer is it necessary to go through a cumbersome process to
request a new server, development platform, or software – you can simply go to a self-service
portal and select what type of computing resource you want from a standardized service catalog.
The portal then provisions the environment, allocates resources from the shared pools, mounts
the environment, configures security, and then connects the consumer to the requested service.
When the requesting user indicates that the resources are no longer required, you must be able to
deprovision those resources, remove access, and destroy any residual data that might be present.
All resources must then be returned to the cloud in the same base state as all assets in the
respective resource pools. The destruction of residual data is particularly important. Cases have
come to light of public cloud providers finding that tenant data from one session was not being
adequately purged, which enabled subsequent tenants to access this data.
The following areas are those that need to be considered when planning for on-demand self-
service:
Monitoring
Security Management, including templates and standardization
Infrastructure security
Management security
Incident response and forensics
Legal issues, such as compliance, data protection, and SLAs
Rapid Elasticity
Rapid elasticity enables organizations and business units to scale their operations up and down
quickly to meet demand Rapid elasticity enables organizations to cope with a variety of
variations in demand such as irregular spikes (such as might occur after an exceptional news
event) or regular patterns, like running month-end financial reports.
IJESM Volume 2, Issue 1 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
136
March
2013
There is a resource limit even in the most well-founded private cloud implementation. In
consequence, repeated requests to provisioning resources or an inability to deprovision resources
properly could lead to resource exhaustion.
The following areas are those that need to be considered when planning for rapid elasticity:
Monitoring
SLAs
Attacker profiles (authenticated attackers)
Infrastructure security
Broad Network Access
In private cloud environments, there is no absolute requirement to connect your data center to the
Internet, although not having this connectivity might adversely affect the potential benefits from
the private cloud implementation.
However the broad network access cloud characteristic requires IT departments to consider the
entirety of the client to service network journey. It is also requires consideration of the effect of
this requirement for universal access on management of the environment. Coping with broad
network access requires consideration of the following factors:
Perimeter network role and location
Identity and Access Management (IdAM)
Authentication
Authorization
Role-based access control (RBAC)
Federation
Auditing
Public network connectivity
Service delivery security
Endpoint protection
Connectivity to software, platform, and infrastructure layers
Client security
3. Private Cloud Reference Model Security Perspective:
When envisioning your route to the private cloud, a reference model can help you visualize
your complete environment. There is currently no universally accepted reference model for
IJESM Volume 2, Issue 1 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
137
March
2013
private cloud and several organizations that work in this area have published their own
model. Microsoft is no exception and has devoted significant investment into creating a
private cloud reference model that Enterprise Architects can use to create their design. Figure
below shows what a technology view might look like with a private cloud implementation
based on Microsoft technologies.
4. Private Cloud Security Model :
The private cloud security model uses the same design as the private cloud reference model but
replaces the capabilities with mechanisms for implementing security. Figure below shows how
these mechanisms tie in to the different layers of the private cloud reference model.
IJESM Volume 2, Issue 1 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
138
March
2013
Conclusion
Having a way to tell whether the mechanisms and capabilities in the private cloud are patched
properly would also be a useful part of the framework. People’s behavior can be tracked and
monitored; for instance whether people allow the automated patching software to run, or
updating anti-virus software whether people understand how to harden their virtual machines in
the cloud.
IJESM Volume 2, Issue 1 ISSN: 2320-0294
_________________________________________________________
A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A.
International Journal of Engineering, Science and Mathematics
http://www.ijmra.us
139
March
2013
Annotated Bibliography
1. Basta, A., & Halton, W. (2007). Computer Security and Penetration Testing (1st ed.). Delmar
Cengage Learning.
2. Berre, A. J., Roman, D., Landre, E., Heuvel, W. V. D., Skår, L. A., Udnæs, M., Lennon, R.,
et al. (2009). Towards best practices in designing for the cloud. In Proceeding of the 24th ACM
SIGPLAN conference companion on Object oriented programming systems languages and
applications (pp. 697-698). Orlando, Florida, USA: ACM. Retrieved from
http://portal.acm.org.library.capella.edu/citation.cfm?id=1639950.1639970
&coll=portal&dl=ACM&CFID=80867670&CFTOKEN=24312614
3. http://www.guardian.co.uk/technology/2008/sep/29/cloud.computing.richard.stallman
4. Cloud Security Alliance Guidance Version 2.1. (2009). . Cloud Security Alliance. Retrieved
from www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf
Hayes, B. (2008). Cloud computing. Commun. ACM, 51(7), 9-11. Retrieved from
http://portal.acm.org.library.capella.edu/ft_gateway.cfm?id=1364786&type=html&coll=portal&
dl=ACM&CFID=80867670&CFTOKEN=24312614
5. Milne, J(2010, February 9). Private cloud projects dwarf public initiatives. Retrieved
fromhttp://www.cbronline.com/news/private_cloud_projects_dwarf_public_initiatives_281009

More Related Content

What's hot

Software security risk mitigation using object oriented design patterns
Software security risk mitigation using object oriented design patternsSoftware security risk mitigation using object oriented design patterns
Software security risk mitigation using object oriented design patternseSAT Journals
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
 
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...IRJET Journal
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspectseSAT Publishing House
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computingijcsa
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueeSAT Journals
 
A Study of SAAS Model for Security System
A Study of SAAS Model for Security SystemA Study of SAAS Model for Security System
A Study of SAAS Model for Security SystemIJSRD
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
 
System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingSystem and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingBiagio Botticelli
 
A Study of Database Protection Techniques
A Study of Database Protection TechniquesA Study of Database Protection Techniques
A Study of Database Protection TechniquesIJSRED
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...cscpconf
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...IJNSA Journal
 
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET Journal
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 

What's hot (20)

Software security risk mitigation using object oriented design patterns
Software security risk mitigation using object oriented design patternsSoftware security risk mitigation using object oriented design patterns
Software security risk mitigation using object oriented design patterns
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
 
Methodology for Deriving and Integrating Countermeasures Design Models for El...
Methodology for Deriving and Integrating Countermeasures Design Models for El...Methodology for Deriving and Integrating Countermeasures Design Models for El...
Methodology for Deriving and Integrating Countermeasures Design Models for El...
 
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
H1803025360
H1803025360H1803025360
H1803025360
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation technique
 
A Study of SAAS Model for Security System
A Study of SAAS Model for Security SystemA Study of SAAS Model for Security System
A Study of SAAS Model for Security System
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingSystem and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration Testing
 
A Study of Database Protection Techniques
A Study of Database Protection TechniquesA Study of Database Protection Techniques
A Study of Database Protection Techniques
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
 
CC_ SECURITY ISSUES by a_khoshnoudi @IUST
 CC_ SECURITY ISSUES  by a_khoshnoudi @IUST CC_ SECURITY ISSUES  by a_khoshnoudi @IUST
CC_ SECURITY ISSUES by a_khoshnoudi @IUST
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
 
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 

Similar to Private Cloud Security Architecture Blueprint

Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implicationseSAT Publishing House
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Publishing House
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Journals
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...IJAAS Team
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...ijcnes
 
Blueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone ModelingBlueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone ModelingITIIIndustries
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challengespaperpublications3
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsSwathi Rampur
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
 
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...rahulmonikasharma
 
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYijsrd.com
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architectureijsrd.com
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4sophiabelthome
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
Services, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computingServices, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computingeSAT Journals
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Journals
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 

Similar to Private Cloud Security Architecture Blueprint (20)

Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implications
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...
 
Blueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone ModelingBlueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone Modeling
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
 
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Services, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computingServices, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computing
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 

More from IJESM JOURNAL

SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...
SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...
SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...IJESM JOURNAL
 
Comparative study of Terminating Newton Iterations: in Solving ODEs
Comparative study of Terminating Newton Iterations: in Solving ODEsComparative study of Terminating Newton Iterations: in Solving ODEs
Comparative study of Terminating Newton Iterations: in Solving ODEsIJESM JOURNAL
 
ON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATION
ON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATIONON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATION
ON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATIONIJESM JOURNAL
 
HOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNS
HOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNSHOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNS
HOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNSIJESM JOURNAL
 
STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...
STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...
STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...IJESM JOURNAL
 
Implementation Of TPM with Case study
Implementation Of TPM with Case studyImplementation Of TPM with Case study
Implementation Of TPM with Case studyIJESM JOURNAL
 
DIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTION
DIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTIONDIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTION
DIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTIONIJESM JOURNAL
 
Vocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech SynthesizerVocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech SynthesizerIJESM JOURNAL
 
Green supply chain management in Indian Electronics & Telecommunication Industry
Green supply chain management in Indian Electronics & Telecommunication IndustryGreen supply chain management in Indian Electronics & Telecommunication Industry
Green supply chain management in Indian Electronics & Telecommunication IndustryIJESM JOURNAL
 
BER Performance Analysis of Open and Closed Loop Power Control in LTE
BER Performance Analysis of Open and Closed Loop Power Control in LTEBER Performance Analysis of Open and Closed Loop Power Control in LTE
BER Performance Analysis of Open and Closed Loop Power Control in LTEIJESM JOURNAL
 
Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...
Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...
Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...IJESM JOURNAL
 
The Political, Legal & Technological Environment in Global Scenario
The Political, Legal & Technological Environment in Global ScenarioThe Political, Legal & Technological Environment in Global Scenario
The Political, Legal & Technological Environment in Global ScenarioIJESM JOURNAL
 
SUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHP
SUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHPSUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHP
SUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHPIJESM JOURNAL
 
FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...
FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...
FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...IJESM JOURNAL
 
INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...
INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...
INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...IJESM JOURNAL
 
MATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEM
MATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEMMATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEM
MATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEMIJESM JOURNAL
 
INTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATION
INTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATIONINTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATION
INTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATIONIJESM JOURNAL
 
Vocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech SynthesizerVocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech SynthesizerIJESM JOURNAL
 
ANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATE
ANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATEANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATE
ANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATEIJESM JOURNAL
 
APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...
APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...
APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...IJESM JOURNAL
 

More from IJESM JOURNAL (20)

SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...
SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...
SEMI-PARAMETRIC ESTIMATION OF Px,y({(x,y)/x >y}) FOR THE POWER FUNCTION DISTR...
 
Comparative study of Terminating Newton Iterations: in Solving ODEs
Comparative study of Terminating Newton Iterations: in Solving ODEsComparative study of Terminating Newton Iterations: in Solving ODEs
Comparative study of Terminating Newton Iterations: in Solving ODEs
 
ON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATION
ON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATIONON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATION
ON HOMOGENEOUS TERNARY QUADRATIC DIOPHANTINE EQUATION
 
HOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNS
HOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNSHOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNS
HOMOGENOUS BI-QUADRATIC WITH FIVE UNKNOWNS
 
STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...
STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...
STUDY OF RECESSIONAL PATTERN OF GLACIERS OF DHAULIGANGA VALLEY, UTTRAKHAND, I...
 
Implementation Of TPM with Case study
Implementation Of TPM with Case studyImplementation Of TPM with Case study
Implementation Of TPM with Case study
 
DIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTION
DIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTIONDIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTION
DIFFERENTIAL OPERATORS AND STABILITY ANALYSIS OF THE WAGE FUNCTION
 
Vocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech SynthesizerVocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech Synthesizer
 
Green supply chain management in Indian Electronics & Telecommunication Industry
Green supply chain management in Indian Electronics & Telecommunication IndustryGreen supply chain management in Indian Electronics & Telecommunication Industry
Green supply chain management in Indian Electronics & Telecommunication Industry
 
BER Performance Analysis of Open and Closed Loop Power Control in LTE
BER Performance Analysis of Open and Closed Loop Power Control in LTEBER Performance Analysis of Open and Closed Loop Power Control in LTE
BER Performance Analysis of Open and Closed Loop Power Control in LTE
 
Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...
Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...
Rainfall Trends and Variability in Tamil Nadu (1983 - 2012): Indicator of Cli...
 
The Political, Legal & Technological Environment in Global Scenario
The Political, Legal & Technological Environment in Global ScenarioThe Political, Legal & Technological Environment in Global Scenario
The Political, Legal & Technological Environment in Global Scenario
 
SUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHP
SUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHPSUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHP
SUPPLIER SELECTION AND EVALUATION – AN INTEGRATED APPROACH OF QFD & AHP
 
FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...
FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...
FURTHER CHARACTERIZATIONS AND SOME APPLICATIONS OF UPPER AND LOWER WEAKLY QUA...
 
INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...
INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...
INVARIANCE OF SEPARATION AXIOMS IN ISOTONIC SPACES WITH RESPECT TO PERFECT MA...
 
MATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEM
MATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEMMATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEM
MATHEMATICAL MODELLING OF POWER OUTPUT IN A WIND ENERGY CONVERSION SYSTEM
 
INTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATION
INTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATIONINTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATION
INTRODUCING AN INTEGRATING FACTOR IN STUDYING THE WAGE EQUATION
 
Vocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech SynthesizerVocal Translation For Muteness People Using Speech Synthesizer
Vocal Translation For Muteness People Using Speech Synthesizer
 
ANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATE
ANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATEANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATE
ANALYTICAL STUDY OF WAVE MOTION OF A FALLING LIQUID FILM PAST A VERTICAL PLATE
 
APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...
APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...
APPLICATION OF THE METHOD OF VARIATION OF PARAMETERS: MATHEMATICAL MODEL FOR ...
 

Recently uploaded

Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxEran Akiva Sinbar
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaPraksha3
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...lizamodels9
 
Temporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of MasticationTemporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of Masticationvidulajaib
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2John Carlo Rollon
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 

Recently uploaded (20)

Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
 
Temporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of MasticationTemporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of Mastication
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 

Private Cloud Security Architecture Blueprint

  • 1. IJESM Volume 2, Issue 1 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 130 March 2013 Private cloud computing challenges and Architecture for implementing effective security M.N.B.Gayathri M.P.R.Sekhar M.Adithya Abstract Cloud computing is a growing area of concern in the IT security community because cloud architectures are literally popping up all over. Public clouds are available from Google.com, Amazon.com, Microsoft, Oracle/Sun, and many other vendors. Private cloud technologies, where the cloud software is loaded on local or in-house server hardware, are available from VMware, Eucalyptus, Citrix, Microsoft, and there are thousands of vendors offering private cloud with all sorts. With all of the hyperbole has come a large swell of early-adopters and developers. This paper aims to provide an architectural blueprint for implementing effective security within a private cloud environment. Keywords: private cloud computing, private cloud environment, private cloud security
  • 2. IJESM Volume 2, Issue 1 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 131 March 2013 Introduction Implementing a private cloud environment requires IT departments to re-evaluate many aspects of how they interact with their organization. Private cloud computing provides the ability to allocate costs in a fair and metered manner to the service user in proportion to the user’s demand for those services. Private cloud implementations also affect the way in which IT departments need to view security. The chief change is that security can no longer be viewed as a discrete silo that contains traditional capabilities such as authentication, authorization, auditing, and so on. The security model shows that to approach any part of the cloud environment, the consumer or provider must pass through the security wrapper. Additionally, all communication between layers in the cloud model (for example, between infrastructure and platform layers) must also pass through security controls. Security also applies to intra-layer communications, The opportunity with the move to private or hybrid cloud architectures is that it gives you the chance to re-examine the provisioning of security within your datacenter. We can take a holistic view of the central importance of security and ensure that you achieve this goal within your private cloud design. The following section defines the new security threats from the cloud and identifies the private cloud security domains within the Cloud Security Alliance (CSA) model and suggests a security model Cloud Security Alliance Domains: The Cloud Security Alliance (CSA) is an independent grouping consisting of over 120 corporate members. CSA is becoming the focal point for security standards globally, aligning multiple, disparate government policies on cloud security and putting forward standards for ratification by international standards bodies.” CSA has recently released Version 3 of their Security Guidance for Critical Areas of Focus in Cloud Computing document. The CSA document defines fourteen security domains for both private and public cloud. In contrast, this document covers the areas that these domains reference by using the Microsoft private cloud security model. Before diving deeper into the security architectural issues and challenges, we have to consider the following points: 1. Defining the Private Cloud Security Problem Domain: Security is a universal component of cloud service provisioning Key Security Differences in Private Cloud Environments are o Security Responsibility
  • 3. IJESM Volume 2, Issue 1 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 132 March 2013 o Security Attack Targets o Shared Tenant Model o Virtualization Security Responsibility: . Generally, the responsibility was aligned with ownership of the physical component, whether that was a server, a networking device or the overall network infrastructure; if the IT department owned and administered the server, then that department also managed and updated security on that asset. With cloud models, security responsibility has altered, in that departments may be responsible for a portion of the security on the service that they pay for, depending on the service provisioning model in use. Following figure shows the split of security responsibility for the three main cloud provision models. Figure: Division of security responsibility for private cloud service models Security Attack Targets Taking the private cloud reference model as the basis for analysis, we can identify threats to the private cloud infrastructure and place these threats into appropriate places within the model. This approach provides a basis for threat modeling and risk analysis. Hence, we can classify attacks according to the layer or stack that the attack targets. Following figure highlights the primary areas in the private cloud where these individual attack types can target. Note that this diagram is not showing responsibilities but listing the different types of attacks that might take place against the management stack, the infrastructure layer and so on.
  • 4. IJESM Volume 2, Issue 1 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 133 March 2013 Figure: Security Threats to Private Cloud Architectures Shared Tenant Model: A key differentiator with public cloud environments is that the service is provided on a shared tenant basis and multiple tenants use the same services. In private cloud terminology, a tenant is a client, typically a business unit within the organization, who is using the private cloud to run their applications and services. The perception of a private cloud is that it is only hosting one organization, and in consequence, security partitioning is not required. In consequence, a private cloud model may also be a shared tenant model with similar requirements for effective security partitioning between different business units as with public cloud implementations. Virtualization: Virtualization radically changes the way an organization secures and manages their data center. As workloads are mobile and can move from host to host based on optimization algorithms that require no human involvement, security policies linked to physical location are no longer effective, so security policies must be independent of network or hardware topologies. A key factor for implementing effective security in virtualized environments will be virtualization of the security controls themselves. As these virtualized controls become available, they should as a minimum meet the following criteria: Fully integrate with the private cloud fabric Provide separate configuration interfaces Provide programmable, on-demand services in an elastic manner
  • 5. IJESM Volume 2, Issue 1 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 134 March 2013 Consist of policies that govern logical attributes, rather than policies that are tied to physical instances Enable the creation of trust zones that can separate multiple tenants in a dynamic environment 2. Cloud Security Challenges: To highlight the changes in security between traditional IT systems and cloud-based environments, this paper takes four of the five the NIST cloud computing definitions and analyses This paper considers each of these challenges in turn before moving on to identify how to respond to these challenges. Resource Pooling Resource pooling is the mechanism by which cloud environments can increase utilization levels, reduce costs and make use of cheaper resources, such as commoditized servers and inexpensive hard disks. Resource pooling needs to be considered at all three service layers of the private cloud model. But this resource pooling also requires significant consideration of the security aspects from such a configuration. With a private cloud implementation, a similar requirement for strict data partitioning as in public cloud is not immediately obvious. If, however, you do need to protect data and applications from access by authenticated users who are not authorized to view that information or use those applications, then you do need to implement some form of partitioning within your private cloud environment. Similarly, administrative rights need to be carefully controlled, as you may want to give certain groups or business units the right to carry out limited administrative actions on their resources. With each pooled resource, you must ensure that each tenant’s data or applications are kept partitioned from those belonging to other tenants. Any data that is exclusively owned by a consumer should not leak to other sessions nor be accessible by other users or tenants, whether maliciously or not. Partitioning and Role Based Access Control (RBAC) also applies to your administrators, who should not have automatic access to tenant data. In the case where an administrator does require access to tenant data, then that access must be carefully audited. The following areas are those that need to be considered when planning for resource pooling: Virtualization Multi-Tenancy Infrastructure security
  • 6. IJESM Volume 2, Issue 1 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 135 March 2013 Platform security Software security Data protection Service Level Agreements (SLAs) On-Demand Self-Service: The essence of cloud provisioning is that of self-service. When combined with rapid elasticity, self-service enables cloud implementations to provide dynamic and timely responses to requests for more or fewer resources. No longer is it necessary to go through a cumbersome process to request a new server, development platform, or software – you can simply go to a self-service portal and select what type of computing resource you want from a standardized service catalog. The portal then provisions the environment, allocates resources from the shared pools, mounts the environment, configures security, and then connects the consumer to the requested service. When the requesting user indicates that the resources are no longer required, you must be able to deprovision those resources, remove access, and destroy any residual data that might be present. All resources must then be returned to the cloud in the same base state as all assets in the respective resource pools. The destruction of residual data is particularly important. Cases have come to light of public cloud providers finding that tenant data from one session was not being adequately purged, which enabled subsequent tenants to access this data. The following areas are those that need to be considered when planning for on-demand self- service: Monitoring Security Management, including templates and standardization Infrastructure security Management security Incident response and forensics Legal issues, such as compliance, data protection, and SLAs Rapid Elasticity Rapid elasticity enables organizations and business units to scale their operations up and down quickly to meet demand Rapid elasticity enables organizations to cope with a variety of variations in demand such as irregular spikes (such as might occur after an exceptional news event) or regular patterns, like running month-end financial reports.
  • 7. IJESM Volume 2, Issue 1 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 136 March 2013 There is a resource limit even in the most well-founded private cloud implementation. In consequence, repeated requests to provisioning resources or an inability to deprovision resources properly could lead to resource exhaustion. The following areas are those that need to be considered when planning for rapid elasticity: Monitoring SLAs Attacker profiles (authenticated attackers) Infrastructure security Broad Network Access In private cloud environments, there is no absolute requirement to connect your data center to the Internet, although not having this connectivity might adversely affect the potential benefits from the private cloud implementation. However the broad network access cloud characteristic requires IT departments to consider the entirety of the client to service network journey. It is also requires consideration of the effect of this requirement for universal access on management of the environment. Coping with broad network access requires consideration of the following factors: Perimeter network role and location Identity and Access Management (IdAM) Authentication Authorization Role-based access control (RBAC) Federation Auditing Public network connectivity Service delivery security Endpoint protection Connectivity to software, platform, and infrastructure layers Client security 3. Private Cloud Reference Model Security Perspective: When envisioning your route to the private cloud, a reference model can help you visualize your complete environment. There is currently no universally accepted reference model for
  • 8. IJESM Volume 2, Issue 1 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 137 March 2013 private cloud and several organizations that work in this area have published their own model. Microsoft is no exception and has devoted significant investment into creating a private cloud reference model that Enterprise Architects can use to create their design. Figure below shows what a technology view might look like with a private cloud implementation based on Microsoft technologies. 4. Private Cloud Security Model : The private cloud security model uses the same design as the private cloud reference model but replaces the capabilities with mechanisms for implementing security. Figure below shows how these mechanisms tie in to the different layers of the private cloud reference model.
  • 9. IJESM Volume 2, Issue 1 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 138 March 2013 Conclusion Having a way to tell whether the mechanisms and capabilities in the private cloud are patched properly would also be a useful part of the framework. People’s behavior can be tracked and monitored; for instance whether people allow the automated patching software to run, or updating anti-virus software whether people understand how to harden their virtual machines in the cloud.
  • 10. IJESM Volume 2, Issue 1 ISSN: 2320-0294 _________________________________________________________ A Quarterly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories Indexed & Listed at: Ulrich's Periodicals Directory ©, U.S.A., Open J-Gage, India as well as in Cabell’s Directories of Publishing Opportunities, U.S.A. International Journal of Engineering, Science and Mathematics http://www.ijmra.us 139 March 2013 Annotated Bibliography 1. Basta, A., & Halton, W. (2007). Computer Security and Penetration Testing (1st ed.). Delmar Cengage Learning. 2. Berre, A. J., Roman, D., Landre, E., Heuvel, W. V. D., SkÃ¥r, L. A., Udnæs, M., Lennon, R., et al. (2009). Towards best practices in designing for the cloud. In Proceeding of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications (pp. 697-698). Orlando, Florida, USA: ACM. Retrieved from http://portal.acm.org.library.capella.edu/citation.cfm?id=1639950.1639970 &coll=portal&dl=ACM&CFID=80867670&CFTOKEN=24312614 3. http://www.guardian.co.uk/technology/2008/sep/29/cloud.computing.richard.stallman 4. Cloud Security Alliance Guidance Version 2.1. (2009). . Cloud Security Alliance. Retrieved from www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf Hayes, B. (2008). Cloud computing. Commun. ACM, 51(7), 9-11. Retrieved from http://portal.acm.org.library.capella.edu/ft_gateway.cfm?id=1364786&type=html&coll=portal& dl=ACM&CFID=80867670&CFTOKEN=24312614 5. Milne, J(2010, February 9). Private cloud projects dwarf public initiatives. Retrieved fromhttp://www.cbronline.com/news/private_cloud_projects_dwarf_public_initiatives_281009