SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Volume 1 Issue 5 (November 2014) ISSN: 2349-7009(P)
www.ijiris.com
_________________________________________________________________________________________________________
© 2014, IJIRIS- All Rights Reserved Page -66
Security Features of different Cloud Service Models: A Review
Gagandeep Kaur Sonal Chawla
Dept. of I.T DCSA
GGDSD College Chandigarh PU Chandigarh
Abstract-In these days cloud security is the main issue. As many users hesitate to adopt cloud computing due to security
concerns. So in this paper we have discussed various security features of different cloud service models. The security of
different clouds depends mainly upon the framework and programming practices that the developer uses in her application.
Keywords-Security,SaaS,PaaS,IaaS,Services
I. INTRODUCTION
Security is the main concern in cloud adoption. Even with the use of latest protocols, hackers and worms can attack a system and
create havoc within a few hours. Within a Cloud, the prospects for incursion are many and the rewards are rich. Architectures and
applications must be protected and security must be appropriate, emergent and adaptive. Now the question arises whether the
security be centralized or decentralized?
The Cloud Security can be centralized or decentralized. Let us take a simple web-application example: part of the application is
running decentralized in user’s browser (Ajax). The data may be stored in a single data-center i.e. centralized, but the database is
replicated on different virtual machines i.e. decentralized [1].Cloud Computing is the answer to the increasing demand of
entreprises as well as of consumers for ubiquitous information in a mobile world. It reflects new forms of communication and
collaboration and is far beyond the pros and cons of decentralized architectures.
Different cloud providers provide different benefits but despite various benefits offered by cloud based services, many users
hesitate in moving their IT systems to the cloud .This is due to many new security problems introduced by cloud environments.
The new security issues become major reasons for the lack of user trust in cloud based services .Cloud services can be categorized
in three different service models: Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) or Infrastructure-as-a-Service
(IaaS).This paper focus on security features of these different models.
II. CLOUD SERVICE MODELS
There are three cloud computing service models i.e Iaas, Saas and Paas.Each of these models has their own security features.
A. Infrastructure-as-a-Service (IaaS)
Infrastructure as a Service (IaaS) is a cloud model which allows organizations to outsource computing equipment and
resources such as servers, storage, networking as well as services, such as load balancing and content delivery
networks[2]. The IaaS provider owns and maintains the equipment while the organization rents out the specific services it
needs, usually on a "pay as you go" basis. Today, the more emphasis is on which IAAS providers to use rather than
whether or not to use IaaS services[3]. Using this service model, user manages his applications, data, operating system,
middleware and runtime [3]. The service provider manages user’s virtualization, servers, networking and storage[3].
Following are the different service providers of Iaas:
1)Amazon AWS:Today AWS cloud infrastructure has been considered one of the most flexible and secure cloud computing
environments available today[4].It protects your applications and data by highly secure facilities and infrastructure, and also
provide extensive network and security monitoring systems. These systems provide basic but important security measures such as
distributed denial of service (DDoS) protection and password brute-force detection on AWS Accounts.
2) Windows Azure: Azure must provide confidentiality, integrity, and availability of customer data, just like any other application
hosting platform. It must also provide transparent accountability to allow customers and their agents to track administration of
applications and infrastructure, by themselves and by Microsoft.
3)Google Compute Engine:Google Compute Engine is a service that provides virtual machines that run on Google infrastructure.
Google Compute Engine offers scale, performance, and value that allows you to easily launch large compute clusters on Google's
infrastructure[6].Google’s security strategy provides controls at multiple levels of data storage, access, and transfer.
B. Platform-as-a-Service(PaaS)
This cloud service model could be considered the second layer. In this service model, user manage applications and data and the
cloud vendor manages everything else. One popular Platform-as-a-Service is the Google app engine. In this model you pay for
what you use. For example a small business who is interested in application testing might find this model beneficial for
eliminating costs for up keeping the hardware. Examples are google app engine [3].Following are different service providers of
Paas:
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Volume 1 Issue 5 (November 2014) ISSN: 2349-7009(P)
www.ijiris.com
_________________________________________________________________________________________________________
© 2014, IJIRIS- All Rights Reserved Page -67
1) Engine Yard:Engine Yard is committed to maintaining a safe and secure platform for our customers, business partners, and the
broader community. Engine Yard has an in-house information security and compliance function that complements the controls
that IaaS provider, Amazon Web Services provides.
2) Red Hat OpenShift:Red Hat has a long history of managing the packages that make up Red Hat Enterprise Linux, including
industry-leading responsiveness to security vulnerabilities and managing its online presence on Linux systems.
3)Google App Engine:Google App Engine is a Platform as a Service (PaaS) offering that lets you build and run applications on
Google’s infrastructure. App Engine applications are easy to build, easy to maintain, and easy to scale as your traffic and data
storage needs change. With App Engine, there are no servers for you to maintain. You simply upload your application and it’s
ready to go.Google App Engine supports secure connections via HTTPS for URLs.
C.Software-as-a-Service(SaaS)
This is the final layer of the cloud services model. In Saas everything in your business is managed by the cloud vendor. As users
are using the same softwares so they should have compatibility and easier collaboration. User company need not to pay extra
licensing fees and new users can be easily added. Examples of this are online banking and email such as gmail and
hotmai[3].Following are Saas service providers:
1)Salesforce:Salesforce provides Software as a service and is a social enterprise known for its Salesforce customer relationship
management (CRM) product, which is composed of Sales Cloud, Service Cloud, Marketing Cloud, Salesforce.com's platform as a
service (PaaS) product is known as Force.com[3].
2) Amazon EC2:Amazon EC2 is also known as Amazon Elastic Compute cloud which provides resizable computing capacity in
Amazon Web Services cloud. Using Amazon EC2 it eliminates the need to invest on hardware upfront which saves money and
also helps in developing and deploying the application on faster pace[3].
III. SECURITY FEATURES OF DIFFERENT CLOUD PLATFORMS
Following table describes security features of different cloud platforms:
TABLE 1
Iaas Features
Amazon AWS Additional security services are[4]:
• Secure access – Customer access points, also called API endpoints, allow secure HTTP access
(HTTPS) so that you can establish secure communication sessions with your AWS services using
SSL.
• Built-in firewalls – You can control how accessible your instances are by configuring built-in
firewall rules – from totally public to completely private, or somewhere in between. And when your
instances reside within a Virtual Private Cloud (VPC) subnet, you can control egress as well as
ingress.
• Unique users – The AWS Identity and Access Management (IAM) tool allows you to control the level
of access your own users have to your AWS infrastructure services. With AWS IAM, each user can
have unique security credentials, eliminating the need for shared passwords or keys and allowing
the security best practices of role separation and least privilege.
• Multi-factor authentication (MFA) – AWS provides built-in support for multi-factor authentication
(MFA) for use with AWS Accounts as well as individual IAM user accounts
• Private Subnets – The AWS Virtual Private Cloud (VPC) service allows you to add another layer of
network security to your instances by creating private subnets and even adding an IPsec VPN tunnel
between your home network and your AWS VPC.
• Encrypted data storage – Customers can have the data and objects they store in Amazon S3,
Glacier, Redshift, and Oracle RDS encrypted automatically using Advanced Encryption Standard
(AES) 256, a secure symmetric-key encryption standard using 256-bit encryption keys.
• Dedicated connection option – The AWS Direct Connect service allows you to establish a dedicated
network connection from your premise to AWS. Using industry standard 802.1q VLANs, this
dedicated connection can be partitioned into multiple logical connections to enable you to access
both public and private IP environments within your AWS cloud.
• Security logs – AWS CloudTrail provides logs of all user activity within your AWS account. You can
see what actions were performed on each of your AWS resources and by whom.
• Isolated GovCloud – For customers who require additional measures in order to comply with US
ITAR regulations, AWS provides an entirely separate region called AWS GovCloud (US) that
provides an environment where customers can run ITAR-compliant applications, and provides
special endpoints that utilize only FIPS 140-2 encryption.
• CloudHSM – For customers who must use Hardware Security Module (HSM) appliances for
cryptographic key storage, AWS CloudHSM provides a highly secure and convenient way to store
and manage keys.
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Volume 1 Issue 5 (November 2014) ISSN: 2349-7009(P)
www.ijiris.com
_________________________________________________________________________________________________________
© 2014, IJIRIS- All Rights Reserved Page -68
• Trusted Advisor – Provided automatically when you sign up for premium support, the Trusted
Advisor service is a convenient way for you to see where you could use a little more security. It
monitors AWS resources and alerts you to security configuration gaps such as overly permissive
access to certain EC2 instance ports and S3 storage buckets, minimal use of role segregation using
IAM, and weak password policies.
Windows
Azure
Security Services are[5]:
• SSL Mutual Authentication for Internal Control Traffic:All communications between Azure internal
components are protected with SSL.
• Certificate and Private Key Management:To lower the risk of exposing certificates and private keys
to developers and administrators, they are installed via a separate mechanism than the code that
uses them. Certificates and private keys are uploaded via SMAPI or the Azure Portal as PKCS12
(PFX) files protected in transit by SSL.
• Access Control in Azure Storage:Azure Storage has a simple access control model. Each Azure
subscription can create one or more Storage Accounts. Each Storage Account has a single secret
key that is used to control access to all data in that Storage Account. This supports the typical
scenario where storage is associated with applications and those applications have full control over
their associated data.
• Least Privilege Customer Software:Running applications with least privilege is widely regarded as
an information security best practice. To align with the principle of least privilege, customers are
not granted administrative access to their VMs, and customer software in Azure is restricted to
running under a low-privilege account by default
Google Compute
Engine
• Google corporate security policies
• Organizational security: Google’s security organization is broken down into several teams that focus
on information security, global security auditing, and compliance, as well as physical security for
protection of Google’s hardware infrastructure. These teams work together to address Google’s
overall global computing environment
• Data asset management: Google’s data assets - comprising customer and end-user assets as well as
corporate data assets - are managed under security policies and procedures.
• Access control: In order to secure Google’s vast data assets, Google employs a number of
authentication and authorization controls that are designed to protect against unauthorized access.
• Personnel security: Google has policies, procedures, and infrastructure to handle both physical
security of its data centers as well as the environment from which the data centers operate
Paas
Engine Yard • Shared Responsibility: An Engine Yard Cloud customer cluster is isolated from other customer
clusters, and
is a self-contained environment that includes compute, storage, and database services.
Unlike some other cloud providers, no functionality is shared between virtualized instances. In our
single tenancy model, customers own and operate their own instances, including full administrative
access - much like a server that is racked in a data center[7].
• Risk Assessments: Engine Yard performs regular risk assessments. The scope of these assessments
varies, and, depending on the need, is performed either in house, or by a third- party. Engine Yard
has recently conducted a penetration test against the product dashboard; our platform services APIs,
as well as a general IT business/ security processes review.
 Security Policy Management: Policies are important for setting the tone and direction of the
organization, establishing clear responsibilities, and demonstrating accountability to our
stakeholders. Engine Yard takes information security seriously and has established Information
Security policies like: Information security objective and scope
 Internet usage
Information security roles and responsibilities
Red Hat
openshift
• SELinux
• Process, network, and storage separation
• Statefull and stateless inspection firewall
• Proactive monitoring of capacity limits (CPU, disk, memory, etc.)
• Intrusion detection (files, ports, back doors, etc.)
• Port monitoring
• Pam namespace
• Security compliance frameworks
• RPM verification and vulnerabilities updated
• Remote logging
• Encrypted communications (SSH, SSL, etc.)
Google App
Engine
• Google corporate security policies
• Organizational security: Google’s security organization is broken down into several teams that focus
on information security, global security auditing, and compliance, as well as physical security for
protection of Google’s hardware infrastructure. These teams work together to address Google’s
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Volume 1 Issue 5 (November 2014) ISSN: 2349-7009(P)
www.ijiris.com
_________________________________________________________________________________________________________
© 2014, IJIRIS- All Rights Reserved Page -69
IV. CONCLUSION
As different cloud services have different features, so the users of the cloud should use the services according to their requirement.
They can get the benefit of the service according to the need. In this paper we have discussed different cloud service models and
security features provided by different types of cloud service providers. So the security of different clouds depends mainly upon
the framework and programming practices that the developer uses. However to attract the users there is need to improve the trust
issue of the users. Our work on cloud security is based on SaaS that includes developing a secure storage system for increasing the
security over cloud. To obtain an efficient and scalable system we use cryptographic tools to protect the data on cloud. To
implement our security system we will use Google App Engine cloud.
V REFERENCES
[1] http://elastic-security.com/2011/02/09/is-cloud-computing-centralized-or-decentralized-part-4/
[2] http://www.tomsitpro.com/articles/iaas-providers,1-1560.html
[3] http://www.internationaljournalssrg.org/IJCSE/Volume7/IJCSE-V7N1P108.pdf. Cloud Computing for Business: Models and
Platforms by Gagandeep Kaur and Dr. Sonal Chawla
[4] http://aws.amazon.com/security/
[5] http://blogs.msdn.com/b/usisvde/archive/2012/03/08/windows-azure-security-best-practices-part-2-what-azure-provides-out-
of-the-box.aspx
[6] https://cloud.google.com/compute/docs/
[7] https://www.engineyard.com/commitment-to-cloud-security
[8]http://www.datacenterknowledge.com/archives/2014/02/05/amazon-aws-understanding-users-role-shared-security-model/
overall global computing environment
• Data asset management: Google’s data assets - comprising customer and end-user assets as well as
corporate data assets - are managed under security policies and procedures.
• Access control: In order to secure Google’s vast data assets, Google employs a number of
authentication and authorization controls that are designed to protect against unauthorized access.
• Personnel security: Google has policies, procedures, and infrastructure to handle both physical
security of its data centers as well as the environment from which the data centers operate
Saas
Salesforce • Access control and physical security
• Environmental controls
• Power
• Network
Amazon EC2 Administrators do not have access to customer instances and cannot log into the Guest OS. EC2
Administrators with a business need are required to use their individual cryptographically strong Secure
Shell [SSH] keys to gain access to a host. All such accesses are logged and routinely audited. While the data
at rest in Simple Storage Service [S3] is not encrypted by default, users can encrypt their data before it is
uploaded to Amazon S3, so that it is not accessed or tampered with by any unauthorized party.

More Related Content

What's hot

Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stackRishabh Agarwal
 
Harvard Extension School: Cloud Security Final Project - HIPAA Compliance Aud...
Harvard Extension School: Cloud Security Final Project - HIPAA Compliance Aud...Harvard Extension School: Cloud Security Final Project - HIPAA Compliance Aud...
Harvard Extension School: Cloud Security Final Project - HIPAA Compliance Aud...Ts. Mohd Shahrul Zharif Bin Sharudin
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingRitesh Dwivedi
 
Secured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWSSecured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWSGaurav "GP" Pal
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computingsashi799
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityGahya Pandian
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
 

What's hot (20)

Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
Harvard Extension School: Cloud Security Final Project - HIPAA Compliance Aud...
Harvard Extension School: Cloud Security Final Project - HIPAA Compliance Aud...Harvard Extension School: Cloud Security Final Project - HIPAA Compliance Aud...
Harvard Extension School: Cloud Security Final Project - HIPAA Compliance Aud...
 
Azure security
Azure  securityAzure  security
Azure security
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Secured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWSSecured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWS
 
Cloud Computing - Introduction
Cloud Computing - IntroductionCloud Computing - Introduction
Cloud Computing - Introduction
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 

Viewers also liked

Research on the Development of Cultural Industry in Shandong Province
Research on the Development of Cultural Industry in Shandong ProvinceResearch on the Development of Cultural Industry in Shandong Province
Research on the Development of Cultural Industry in Shandong ProvinceAM Publications,India
 
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETsSRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETsAM Publications,India
 
Benefits of Automated Testing Over Manual Testing
Benefits of Automated Testing Over Manual Testing Benefits of Automated Testing Over Manual Testing
Benefits of Automated Testing Over Manual Testing AM Publications,India
 
A Pilot Study on Current and Future Trends in E-learning, Distance Learning a...
A Pilot Study on Current and Future Trends in E-learning, Distance Learning a...A Pilot Study on Current and Future Trends in E-learning, Distance Learning a...
A Pilot Study on Current and Future Trends in E-learning, Distance Learning a...AM Publications,India
 
VANCL logistics operations mode selection analysis
VANCL logistics operations mode selection analysisVANCL logistics operations mode selection analysis
VANCL logistics operations mode selection analysisAM Publications,India
 
Adapting E- learning using Multiagent System
Adapting E- learning using Multiagent SystemAdapting E- learning using Multiagent System
Adapting E- learning using Multiagent SystemAM Publications,India
 
Material Flow Management for Treating Waste from Medical Activity
Material Flow Management for Treating Waste from Medical ActivityMaterial Flow Management for Treating Waste from Medical Activity
Material Flow Management for Treating Waste from Medical ActivityAM Publications,India
 
Mathematical foundations of Multithreaded programming concepts in Java lang...
Mathematical foundations of Multithreaded   programming concepts in Java lang...Mathematical foundations of Multithreaded   programming concepts in Java lang...
Mathematical foundations of Multithreaded programming concepts in Java lang...AM Publications,India
 
Literature Review: Convey the Data in Massive Parallel Computing
Literature Review: Convey the Data in Massive Parallel ComputingLiterature Review: Convey the Data in Massive Parallel Computing
Literature Review: Convey the Data in Massive Parallel ComputingAM Publications,India
 
Green Computing and Sustainable Environment – Introduction of E-documents and...
Green Computing and Sustainable Environment – Introduction of E-documents and...Green Computing and Sustainable Environment – Introduction of E-documents and...
Green Computing and Sustainable Environment – Introduction of E-documents and...AM Publications,India
 
The Analysis of the Reasons and Measurements for Job-hopping of Enterprises i...
The Analysis of the Reasons and Measurements for Job-hopping of Enterprises i...The Analysis of the Reasons and Measurements for Job-hopping of Enterprises i...
The Analysis of the Reasons and Measurements for Job-hopping of Enterprises i...AM Publications,India
 
Factors Favoring Intercultural Sensitivity
Factors Favoring Intercultural SensitivityFactors Favoring Intercultural Sensitivity
Factors Favoring Intercultural SensitivityAM Publications,India
 
SURVEY ON BIG DATA PROCESSING USING HADOOP, MAP REDUCE
SURVEY ON BIG DATA PROCESSING USING HADOOP, MAP REDUCESURVEY ON BIG DATA PROCESSING USING HADOOP, MAP REDUCE
SURVEY ON BIG DATA PROCESSING USING HADOOP, MAP REDUCEAM Publications,India
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksAM Publications,India
 
Big Data: Review, Classification and Analysis Survey
Big Data: Review, Classification and Analysis  SurveyBig Data: Review, Classification and Analysis  Survey
Big Data: Review, Classification and Analysis SurveyAM Publications,India
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingAM Publications,India
 
Object Tracking System Using Motion Detection and Sound Detection
Object Tracking System Using Motion Detection and Sound DetectionObject Tracking System Using Motion Detection and Sound Detection
Object Tracking System Using Motion Detection and Sound DetectionAM Publications,India
 
Research on Retail E-Commerce Logistics operation mode of china
Research on Retail E-Commerce Logistics operation mode of chinaResearch on Retail E-Commerce Logistics operation mode of china
Research on Retail E-Commerce Logistics operation mode of chinaAM Publications,India
 

Viewers also liked (18)

Research on the Development of Cultural Industry in Shandong Province
Research on the Development of Cultural Industry in Shandong ProvinceResearch on the Development of Cultural Industry in Shandong Province
Research on the Development of Cultural Industry in Shandong Province
 
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETsSRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
 
Benefits of Automated Testing Over Manual Testing
Benefits of Automated Testing Over Manual Testing Benefits of Automated Testing Over Manual Testing
Benefits of Automated Testing Over Manual Testing
 
A Pilot Study on Current and Future Trends in E-learning, Distance Learning a...
A Pilot Study on Current and Future Trends in E-learning, Distance Learning a...A Pilot Study on Current and Future Trends in E-learning, Distance Learning a...
A Pilot Study on Current and Future Trends in E-learning, Distance Learning a...
 
VANCL logistics operations mode selection analysis
VANCL logistics operations mode selection analysisVANCL logistics operations mode selection analysis
VANCL logistics operations mode selection analysis
 
Adapting E- learning using Multiagent System
Adapting E- learning using Multiagent SystemAdapting E- learning using Multiagent System
Adapting E- learning using Multiagent System
 
Material Flow Management for Treating Waste from Medical Activity
Material Flow Management for Treating Waste from Medical ActivityMaterial Flow Management for Treating Waste from Medical Activity
Material Flow Management for Treating Waste from Medical Activity
 
Mathematical foundations of Multithreaded programming concepts in Java lang...
Mathematical foundations of Multithreaded   programming concepts in Java lang...Mathematical foundations of Multithreaded   programming concepts in Java lang...
Mathematical foundations of Multithreaded programming concepts in Java lang...
 
Literature Review: Convey the Data in Massive Parallel Computing
Literature Review: Convey the Data in Massive Parallel ComputingLiterature Review: Convey the Data in Massive Parallel Computing
Literature Review: Convey the Data in Massive Parallel Computing
 
Green Computing and Sustainable Environment – Introduction of E-documents and...
Green Computing and Sustainable Environment – Introduction of E-documents and...Green Computing and Sustainable Environment – Introduction of E-documents and...
Green Computing and Sustainable Environment – Introduction of E-documents and...
 
The Analysis of the Reasons and Measurements for Job-hopping of Enterprises i...
The Analysis of the Reasons and Measurements for Job-hopping of Enterprises i...The Analysis of the Reasons and Measurements for Job-hopping of Enterprises i...
The Analysis of the Reasons and Measurements for Job-hopping of Enterprises i...
 
Factors Favoring Intercultural Sensitivity
Factors Favoring Intercultural SensitivityFactors Favoring Intercultural Sensitivity
Factors Favoring Intercultural Sensitivity
 
SURVEY ON BIG DATA PROCESSING USING HADOOP, MAP REDUCE
SURVEY ON BIG DATA PROCESSING USING HADOOP, MAP REDUCESURVEY ON BIG DATA PROCESSING USING HADOOP, MAP REDUCE
SURVEY ON BIG DATA PROCESSING USING HADOOP, MAP REDUCE
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
 
Big Data: Review, Classification and Analysis Survey
Big Data: Review, Classification and Analysis  SurveyBig Data: Review, Classification and Analysis  Survey
Big Data: Review, Classification and Analysis Survey
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image Watermarking
 
Object Tracking System Using Motion Detection and Sound Detection
Object Tracking System Using Motion Detection and Sound DetectionObject Tracking System Using Motion Detection and Sound Detection
Object Tracking System Using Motion Detection and Sound Detection
 
Research on Retail E-Commerce Logistics operation mode of china
Research on Retail E-Commerce Logistics operation mode of chinaResearch on Retail E-Commerce Logistics operation mode of china
Research on Retail E-Commerce Logistics operation mode of china
 

Similar to Security Features of different Cloud Service Models: A Review

A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
 
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceEditor Jacotech
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture serviceeSAT Publishing House
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architectureeSAT Journals
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4kongara
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Mervat Bamiah
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderSalesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderIRJET Journal
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 

Similar to Security Features of different Cloud Service Models: A Review (20)

A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Cloud Computing-notes.doc
Cloud Computing-notes.docCloud Computing-notes.doc
Cloud Computing-notes.doc
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-Service
 
1376842823 2982373
1376842823  29823731376842823  2982373
1376842823 2982373
 
1376842823 2982373
1376842823  29823731376842823  2982373
1376842823 2982373
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture service
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderSalesforce.com – A Cloud Provider
Salesforce.com – A Cloud Provider
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 

Recently uploaded

Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 

Recently uploaded (20)

Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 

Security Features of different Cloud Service Models: A Review

  • 1. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Volume 1 Issue 5 (November 2014) ISSN: 2349-7009(P) www.ijiris.com _________________________________________________________________________________________________________ © 2014, IJIRIS- All Rights Reserved Page -66 Security Features of different Cloud Service Models: A Review Gagandeep Kaur Sonal Chawla Dept. of I.T DCSA GGDSD College Chandigarh PU Chandigarh Abstract-In these days cloud security is the main issue. As many users hesitate to adopt cloud computing due to security concerns. So in this paper we have discussed various security features of different cloud service models. The security of different clouds depends mainly upon the framework and programming practices that the developer uses in her application. Keywords-Security,SaaS,PaaS,IaaS,Services I. INTRODUCTION Security is the main concern in cloud adoption. Even with the use of latest protocols, hackers and worms can attack a system and create havoc within a few hours. Within a Cloud, the prospects for incursion are many and the rewards are rich. Architectures and applications must be protected and security must be appropriate, emergent and adaptive. Now the question arises whether the security be centralized or decentralized? The Cloud Security can be centralized or decentralized. Let us take a simple web-application example: part of the application is running decentralized in user’s browser (Ajax). The data may be stored in a single data-center i.e. centralized, but the database is replicated on different virtual machines i.e. decentralized [1].Cloud Computing is the answer to the increasing demand of entreprises as well as of consumers for ubiquitous information in a mobile world. It reflects new forms of communication and collaboration and is far beyond the pros and cons of decentralized architectures. Different cloud providers provide different benefits but despite various benefits offered by cloud based services, many users hesitate in moving their IT systems to the cloud .This is due to many new security problems introduced by cloud environments. The new security issues become major reasons for the lack of user trust in cloud based services .Cloud services can be categorized in three different service models: Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) or Infrastructure-as-a-Service (IaaS).This paper focus on security features of these different models. II. CLOUD SERVICE MODELS There are three cloud computing service models i.e Iaas, Saas and Paas.Each of these models has their own security features. A. Infrastructure-as-a-Service (IaaS) Infrastructure as a Service (IaaS) is a cloud model which allows organizations to outsource computing equipment and resources such as servers, storage, networking as well as services, such as load balancing and content delivery networks[2]. The IaaS provider owns and maintains the equipment while the organization rents out the specific services it needs, usually on a "pay as you go" basis. Today, the more emphasis is on which IAAS providers to use rather than whether or not to use IaaS services[3]. Using this service model, user manages his applications, data, operating system, middleware and runtime [3]. The service provider manages user’s virtualization, servers, networking and storage[3]. Following are the different service providers of Iaas: 1)Amazon AWS:Today AWS cloud infrastructure has been considered one of the most flexible and secure cloud computing environments available today[4].It protects your applications and data by highly secure facilities and infrastructure, and also provide extensive network and security monitoring systems. These systems provide basic but important security measures such as distributed denial of service (DDoS) protection and password brute-force detection on AWS Accounts. 2) Windows Azure: Azure must provide confidentiality, integrity, and availability of customer data, just like any other application hosting platform. It must also provide transparent accountability to allow customers and their agents to track administration of applications and infrastructure, by themselves and by Microsoft. 3)Google Compute Engine:Google Compute Engine is a service that provides virtual machines that run on Google infrastructure. Google Compute Engine offers scale, performance, and value that allows you to easily launch large compute clusters on Google's infrastructure[6].Google’s security strategy provides controls at multiple levels of data storage, access, and transfer. B. Platform-as-a-Service(PaaS) This cloud service model could be considered the second layer. In this service model, user manage applications and data and the cloud vendor manages everything else. One popular Platform-as-a-Service is the Google app engine. In this model you pay for what you use. For example a small business who is interested in application testing might find this model beneficial for eliminating costs for up keeping the hardware. Examples are google app engine [3].Following are different service providers of Paas:
  • 2. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Volume 1 Issue 5 (November 2014) ISSN: 2349-7009(P) www.ijiris.com _________________________________________________________________________________________________________ © 2014, IJIRIS- All Rights Reserved Page -67 1) Engine Yard:Engine Yard is committed to maintaining a safe and secure platform for our customers, business partners, and the broader community. Engine Yard has an in-house information security and compliance function that complements the controls that IaaS provider, Amazon Web Services provides. 2) Red Hat OpenShift:Red Hat has a long history of managing the packages that make up Red Hat Enterprise Linux, including industry-leading responsiveness to security vulnerabilities and managing its online presence on Linux systems. 3)Google App Engine:Google App Engine is a Platform as a Service (PaaS) offering that lets you build and run applications on Google’s infrastructure. App Engine applications are easy to build, easy to maintain, and easy to scale as your traffic and data storage needs change. With App Engine, there are no servers for you to maintain. You simply upload your application and it’s ready to go.Google App Engine supports secure connections via HTTPS for URLs. C.Software-as-a-Service(SaaS) This is the final layer of the cloud services model. In Saas everything in your business is managed by the cloud vendor. As users are using the same softwares so they should have compatibility and easier collaboration. User company need not to pay extra licensing fees and new users can be easily added. Examples of this are online banking and email such as gmail and hotmai[3].Following are Saas service providers: 1)Salesforce:Salesforce provides Software as a service and is a social enterprise known for its Salesforce customer relationship management (CRM) product, which is composed of Sales Cloud, Service Cloud, Marketing Cloud, Salesforce.com's platform as a service (PaaS) product is known as Force.com[3]. 2) Amazon EC2:Amazon EC2 is also known as Amazon Elastic Compute cloud which provides resizable computing capacity in Amazon Web Services cloud. Using Amazon EC2 it eliminates the need to invest on hardware upfront which saves money and also helps in developing and deploying the application on faster pace[3]. III. SECURITY FEATURES OF DIFFERENT CLOUD PLATFORMS Following table describes security features of different cloud platforms: TABLE 1 Iaas Features Amazon AWS Additional security services are[4]: • Secure access – Customer access points, also called API endpoints, allow secure HTTP access (HTTPS) so that you can establish secure communication sessions with your AWS services using SSL. • Built-in firewalls – You can control how accessible your instances are by configuring built-in firewall rules – from totally public to completely private, or somewhere in between. And when your instances reside within a Virtual Private Cloud (VPC) subnet, you can control egress as well as ingress. • Unique users – The AWS Identity and Access Management (IAM) tool allows you to control the level of access your own users have to your AWS infrastructure services. With AWS IAM, each user can have unique security credentials, eliminating the need for shared passwords or keys and allowing the security best practices of role separation and least privilege. • Multi-factor authentication (MFA) – AWS provides built-in support for multi-factor authentication (MFA) for use with AWS Accounts as well as individual IAM user accounts • Private Subnets – The AWS Virtual Private Cloud (VPC) service allows you to add another layer of network security to your instances by creating private subnets and even adding an IPsec VPN tunnel between your home network and your AWS VPC. • Encrypted data storage – Customers can have the data and objects they store in Amazon S3, Glacier, Redshift, and Oracle RDS encrypted automatically using Advanced Encryption Standard (AES) 256, a secure symmetric-key encryption standard using 256-bit encryption keys. • Dedicated connection option – The AWS Direct Connect service allows you to establish a dedicated network connection from your premise to AWS. Using industry standard 802.1q VLANs, this dedicated connection can be partitioned into multiple logical connections to enable you to access both public and private IP environments within your AWS cloud. • Security logs – AWS CloudTrail provides logs of all user activity within your AWS account. You can see what actions were performed on each of your AWS resources and by whom. • Isolated GovCloud – For customers who require additional measures in order to comply with US ITAR regulations, AWS provides an entirely separate region called AWS GovCloud (US) that provides an environment where customers can run ITAR-compliant applications, and provides special endpoints that utilize only FIPS 140-2 encryption. • CloudHSM – For customers who must use Hardware Security Module (HSM) appliances for cryptographic key storage, AWS CloudHSM provides a highly secure and convenient way to store and manage keys.
  • 3. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Volume 1 Issue 5 (November 2014) ISSN: 2349-7009(P) www.ijiris.com _________________________________________________________________________________________________________ © 2014, IJIRIS- All Rights Reserved Page -68 • Trusted Advisor – Provided automatically when you sign up for premium support, the Trusted Advisor service is a convenient way for you to see where you could use a little more security. It monitors AWS resources and alerts you to security configuration gaps such as overly permissive access to certain EC2 instance ports and S3 storage buckets, minimal use of role segregation using IAM, and weak password policies. Windows Azure Security Services are[5]: • SSL Mutual Authentication for Internal Control Traffic:All communications between Azure internal components are protected with SSL. • Certificate and Private Key Management:To lower the risk of exposing certificates and private keys to developers and administrators, they are installed via a separate mechanism than the code that uses them. Certificates and private keys are uploaded via SMAPI or the Azure Portal as PKCS12 (PFX) files protected in transit by SSL. • Access Control in Azure Storage:Azure Storage has a simple access control model. Each Azure subscription can create one or more Storage Accounts. Each Storage Account has a single secret key that is used to control access to all data in that Storage Account. This supports the typical scenario where storage is associated with applications and those applications have full control over their associated data. • Least Privilege Customer Software:Running applications with least privilege is widely regarded as an information security best practice. To align with the principle of least privilege, customers are not granted administrative access to their VMs, and customer software in Azure is restricted to running under a low-privilege account by default Google Compute Engine • Google corporate security policies • Organizational security: Google’s security organization is broken down into several teams that focus on information security, global security auditing, and compliance, as well as physical security for protection of Google’s hardware infrastructure. These teams work together to address Google’s overall global computing environment • Data asset management: Google’s data assets - comprising customer and end-user assets as well as corporate data assets - are managed under security policies and procedures. • Access control: In order to secure Google’s vast data assets, Google employs a number of authentication and authorization controls that are designed to protect against unauthorized access. • Personnel security: Google has policies, procedures, and infrastructure to handle both physical security of its data centers as well as the environment from which the data centers operate Paas Engine Yard • Shared Responsibility: An Engine Yard Cloud customer cluster is isolated from other customer clusters, and
is a self-contained environment that includes compute, storage, and database services. Unlike some other cloud providers, no functionality is shared between virtualized instances. In our single tenancy model, customers own and operate their own instances, including full administrative access - much like a server that is racked in a data center[7]. • Risk Assessments: Engine Yard performs regular risk assessments. The scope of these assessments varies, and, depending on the need, is performed either in house, or by a third- party. Engine Yard has recently conducted a penetration test against the product dashboard; our platform services APIs, as well as a general IT business/ security processes review.  Security Policy Management: Policies are important for setting the tone and direction of the organization, establishing clear responsibilities, and demonstrating accountability to our stakeholders. Engine Yard takes information security seriously and has established Information Security policies like: Information security objective and scope  Internet usage Information security roles and responsibilities Red Hat openshift • SELinux • Process, network, and storage separation • Statefull and stateless inspection firewall • Proactive monitoring of capacity limits (CPU, disk, memory, etc.) • Intrusion detection (files, ports, back doors, etc.) • Port monitoring • Pam namespace • Security compliance frameworks • RPM verification and vulnerabilities updated • Remote logging • Encrypted communications (SSH, SSL, etc.) Google App Engine • Google corporate security policies • Organizational security: Google’s security organization is broken down into several teams that focus on information security, global security auditing, and compliance, as well as physical security for protection of Google’s hardware infrastructure. These teams work together to address Google’s
  • 4. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Volume 1 Issue 5 (November 2014) ISSN: 2349-7009(P) www.ijiris.com _________________________________________________________________________________________________________ © 2014, IJIRIS- All Rights Reserved Page -69 IV. CONCLUSION As different cloud services have different features, so the users of the cloud should use the services according to their requirement. They can get the benefit of the service according to the need. In this paper we have discussed different cloud service models and security features provided by different types of cloud service providers. So the security of different clouds depends mainly upon the framework and programming practices that the developer uses. However to attract the users there is need to improve the trust issue of the users. Our work on cloud security is based on SaaS that includes developing a secure storage system for increasing the security over cloud. To obtain an efficient and scalable system we use cryptographic tools to protect the data on cloud. To implement our security system we will use Google App Engine cloud. V REFERENCES [1] http://elastic-security.com/2011/02/09/is-cloud-computing-centralized-or-decentralized-part-4/ [2] http://www.tomsitpro.com/articles/iaas-providers,1-1560.html [3] http://www.internationaljournalssrg.org/IJCSE/Volume7/IJCSE-V7N1P108.pdf. Cloud Computing for Business: Models and Platforms by Gagandeep Kaur and Dr. Sonal Chawla [4] http://aws.amazon.com/security/ [5] http://blogs.msdn.com/b/usisvde/archive/2012/03/08/windows-azure-security-best-practices-part-2-what-azure-provides-out- of-the-box.aspx [6] https://cloud.google.com/compute/docs/ [7] https://www.engineyard.com/commitment-to-cloud-security [8]http://www.datacenterknowledge.com/archives/2014/02/05/amazon-aws-understanding-users-role-shared-security-model/ overall global computing environment • Data asset management: Google’s data assets - comprising customer and end-user assets as well as corporate data assets - are managed under security policies and procedures. • Access control: In order to secure Google’s vast data assets, Google employs a number of authentication and authorization controls that are designed to protect against unauthorized access. • Personnel security: Google has policies, procedures, and infrastructure to handle both physical security of its data centers as well as the environment from which the data centers operate Saas Salesforce • Access control and physical security • Environmental controls • Power • Network Amazon EC2 Administrators do not have access to customer instances and cannot log into the Guest OS. EC2 Administrators with a business need are required to use their individual cryptographically strong Secure Shell [SSH] keys to gain access to a host. All such accesses are logged and routinely audited. While the data at rest in Simple Storage Service [S3] is not encrypted by default, users can encrypt their data before it is uploaded to Amazon S3, so that it is not accessed or tampered with by any unauthorized party.