SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 28
A CHALLENGE FOR SECURITY AND SERVICE LEVEL AGREEMENT
IN CLOUD COMPUTINGE
R. Chawngsangpuii1
, Rohit Kumar Das2
, Vanlalhruaia3
1
Senior Asst. Professor, Department of Information Technology, Mizoram University, Mizoram, India
2
Lecturer, Department of Information Technology, Mizoram University, Mizoram, India
3
Assistant Professor, Department of Information Technology, Mizoram University, Mizoram, India
Abstract
One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over
the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical
position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the
Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are
connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a
protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and
grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more
convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of
distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be
kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic
managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This
paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus
has been made upon the service level agreement, issue and security prospectus over the cloud computing.
Keywords: Architecture, Cloud Computing, Cloud Security, Cloud Services Service Level Agreements
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Storing user data in clouds where clouds acts as a virtual
storage system is term as cloud computing and is an
emerging field in relation to computing. The basic idea is
that if a user wants to store data over the cloud, user simply
send data files over the internet that are stored in data server
through a web interface and when wants the data back from
the server, user need to send request to the server. The
server then sends back the data in which the user can
manipulate and update the data. Data centre acts as a house
for cloud storage system capable of storing different kind
and amount of data.
Infrastructure, platform, software and other resources are
providing scalable, feasible and flexible access to clouds for
the users to virtually store their data. In cloud computing,
network resources like servers, storage applications and
services are performing as opportune assets to the user for
meeting the demand of storage for cloud data. The
merchants that are providing access to cloud are known as
Cloud Service Providers (CSPs) [1]. Service Level
Agreements (SLA) is an agreement between the service
provider and their customer who agrees on the terms and
condition specified in the SLA and is been described in
detail later in the paper.
The primary types of cloud that CSPs want to provide to
their customer can be of three types:
 Public Cloud: Large industrial group or the general
public use this type of cloud and hence the name
public cloud. This type of cloud are generally own
and handle by the CSPs itself but the security
intensity is quit stumpy where as the advantage is that
the resources are provided by the CSPs so the set-up
is inexpensive and easy to use. Examples of public
clouds include Amazon Elastic Compute Cloud
(EC2), IBM's Blue Cloud, Sun Cloud, Google
AppEngine and Windows Azure Services Platform.
 Private Cloud: A private cloud is own and managed
by the organization it serves. This type of cloud
provides more control over the data that are stored
within the cloud, and it ensures high security level on
compare to public cloud, even though with greater
potential risk for data loss due to natural disaster.
Amazon's Elastic Compute Cloud (EC2) or Simple
Storage Service (S3) is the third-party host that can
provide this service.
 Hybrid Cloud: As the name suggest, hybrid cloud
are those which forms from the combination of public
and private cloud and takes the advantages like
stability, reliability, cost saving aspects from public
cloud system and maintainers and security aspects
from private cloud systems.
Cloud computing is regarded as one of the immerging topic
in the field of computing. The cost effectiveness, scalability
and reliability make it more attractive to use. Lots of issues
and challenges have been resolved. But how far it is secure
is still the prime question.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 29
Fig -1: Different types of Clouds providing by CSPs
2. RELATED WORK
The authors of [4] relate the issue regarding the security and
privacy to the user data. Data resiliency and reliability of
server have also been considered as cloud server can also go
downfall. The vulnerabilities of virtualization in cloud
computing infrastructure are described by the authors of [5].
The authors of [6] have provided some of security, cost
effectiveness and virtualization survey and the current
methods addressing them. The aspects of security,
comparison of trust/reputation models and privacy-
preservation schemes are described by the authors of [7].
3. ARCHITECTURE OF CLOUD COMPUTING
Cloud computing architecture consists of two parts: Front-
end (Users) and Back-end (Clouds). Users are connected to
cloud through Internet. The Internet acts as a middleware
and the connection of Internet can be of point-to-point or
peer-to-peer connection depending upon the type of cloud
they want to access. Front-end consists of users and the
application like web browser whereas the back-end consists
of cloud services like providing virtual servers, data storage
system, etc [2].
Fig -2: Conceptual diagram of cloud computing
There are certain layers which connects the user to server.
These are Application layer, Platform layer and
Infrastructure layer as shown in the figure below:
Fig -3: Cloud computing Architectural diagram
Each of the layers can be illustrate as:
 Software as a Service (SaaS): It forms the topmost
layer where with SaaS, everything is provided as an
application or service to the clients who eliminate the
need for installation of software or application
services in the client side; the only thing is that the
client needs to purchase the ability to access them as
define in SLA. Standard examples for this are
Salesforce.com and Hotmail which are web browser
based services.
 Platform as a Service (PaaS): It acts as middle layer
where with PaaS, using the cloud infrastructure like
operating system or software framework computing
platform is provided to the clients. Standard example
for PaaS can include Windows Azure and Google
Apps.
 Infrastructure as a Service (IaaS): It is the
bottommost layer and the function is to grant the
infrastructure based services virtually to the clients
that include hardware for storing client data and the
network resources, etc for which charges are applied
only when the clients are access to those virtual
resources, hence making the task cost economical and
prompt. Standard example includes GoGrid and
Google cloud storage.
4. SERVICE LEVEL AGREEMENT
Service Level Agreement (SLA) is a documenting process
which includes some protocol and is sited between the client
and cloud service provider (CSPs). Services to the clients
are provided based upon the agreements which are agreed
by both client and CSPs. SLA can be of both informal
contract of legal contract between two parties [8].
The objectives of SLA Agreement are to:
 Provide clear reference to service ownership,
accountability, roles and responsibilities.
 Provide a mechanism for review and change to the
service levels over the course of the contract.
 Present a clear, concise and measurable description of
service provision to the customer.
 Match perceptions of expected service provision with
actual service support & delivery.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 30
 Provide an ongoing reporting mechanism for
measuring the expected performance standards
Service Level Agreement can be divided based on different
levels:
 Service-based SLA: Based on the agreement, the
service provider provides services to all the
customers
 Customer-based SLA: Based on the agreement,
services are provided with an individual customer
groups.
 Multi-level SLA: The SLA is split into the different
levels, each addressing different set of customers for
the same services, in the same SLA.
5. SECURITY ISSUE RELATED TO CLOUD
COMPUTING
As with advancement of technology, it comes with
disadvantage also. Till date there are lots of issue which has
been taken care. Despite the consequences, Security is
regarded as one of major issue which need more attention
from both the cloud providers and their customer’s point of
view. Cloud Service Providers (CSPs) furnish different
security level to all the services it provides [3] [5].
The following are some of the important aspects related to
security measures:
 Restriction to user access: As the data are moving
out from the clients to the cloud, the level of risk
increase in terms of management, multiple
placements etc. The enterprise client may want to
store huge amount of data in cloud. After storing
those data, the enterprise client possibly will want to
manipulate that data. Now, multiple accesses to those
may create problem in handling those data for the
CSP as well. Therefore, access to those valuable data
must be restricted to some of the user only.
 Malicious attack to client’s data: The third party
attack to the client data from a former employee or a
business partner can cause harm. The passive attacker
can have increasing levels of access to more critical
systems and eventually to data.
 Isolation of client’s data: CSP store their client data
in alongside manner. Data integrity is one of the
major concerns. CSP ensures that the client data are
well maintained. But as multiple data are stored in a
shared cloud, there is a possibility of getting data
conflict though CSP provided proper encryption.
 Long-term viability of client’s data: Ideally, the
CSPs will never go broke or get acquired and
swallowed up by a larger company. But the client
must be sure that data will remain available even after
such an event.
Shared technology vulnerabilities to client’s data: To
provide a scalable way to access data, CSPs share
infrastructure, platforms, and applications. The shared
infrastructure may include CPU caches or GPUs which are
not specifically designed for multi inhabitant architecture
(IaaS), re-deployable platforms (PaaS), or multi-customer
applications (SaaS), the threat of shared vulnerabilities
exists in all delivery models.
6. CONCLUSION
Cloud computing is an emerging paradigm which provide a
feasible way to store data virtually over the internet without
the need of any physical infrastructure. The service level
agreement plays an important role in cloud computing for
which it has been included in this paper. One of the major
issue or challenge is refer to be the security meadow as in
cloud computing system is shared between many users for
which crucial measures are needed to protect the client data.
REFERENCES
[1]. Abdulelah Almishal and Ahmed E. Youssef, “Cloud
Service Providers: A Comparative Study”, International
Journal of Computer Applications & Information
Technology Vol. 5, Issue II, ISSN: 2278-7720, 2014
[2]. W. Tsai, X. Sun, J. Balasooriya, “Service-Oriented
Cloud Computing Architecture”, 7th IEEE International
Conference on Information Technology, 2010
[3]. Dinadayalan, P., S. Jegadeeswari, and D. Gnanambigai,
“Data Security Issues in Cloud Environment and Solutions”,
Computing and Communication Technologies (WCCCT),
2014 World Congress on. IEEE, 2014
[4]. Yashpalsinh Jadeja and Kirit Modi, “Cloud Computing
- Concepts, Architecture and Challenges”, International
Conference on Computing, Electronics and Electrical
Technologies [ICCEET], 2012
[5]. P.Purniemaa, R. Jagadeesh Kannan and N.Jaisankar,
“Security Threat and Attack in Cloud Infrastructure: A
Survey”, The International Journal of Computer Science &
Applications (TIJCSA) ISSN – 2278-1080, Vol. 2 No. 06,
2013
[6]. Nandini Mishra , Kanchan khushwha, Ritu chasta and
Er. Abhishek Choudhary, “Technologies of Cloud
Computing – Architecture Concepts based on Security and
its Challenges”, International Journal of Advanced Research
in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, ISSN: 2278 – 1323, 2013
[7]. Fei Hu, Meikang Qiu, Jiayin Li, Travis Grant, Draw
Tylor, Seth McCaleb, Lee Butler and Richard Hamner, “A
Review on Cloud Computing: Design Challenges in
Architecture and Security”, Journal of Computing and
Information Technology - CIT 19, 2011
[8]. Patel, Pankesh, Ajith H. Ranabahu, and Amit P. Sheth,
“Service level agreement in cloud computing”, 2009
BIOGRAPHIES
R. Chawngsangpuii received her M.Sc
degree in Computer Science from
Bharathiar University, Coimbatore, India.
Her interest for area of research work is in
Cloud Computing and Grid Computing.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 31
Rohit Kumar Das received his M.Tech
degree in Information Technology from
Assam University, Silchar, India. His
interest for area of research work is in
Network Security and Wireless Networking.
Vanlalhruaia received his M.Tech degree in
Information Technology from Tezpur
University, Tezpur, India. His interest for
area of research work is in Cloud
Computing and Network Security

More Related Content

What's hot

Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computingeSAT Journals
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computingeSAT Publishing House
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
 
An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...IJCSIS Research Publications
 
A study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloudA study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloudeSAT Journals
 
A study on security responsibilities and adoption in
A study on security responsibilities and adoption inA study on security responsibilities and adoption in
A study on security responsibilities and adoption ineSAT Publishing House
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...ijcncs
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmijcncs
 
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...ijcncs
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsEswar Publications
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
Toward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and PerformanceToward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and Performanceijccsa
 

What's hot (18)

Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computing
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computing
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...An Effective User Requirements and Resource Management in an Academic Cloud -...
An Effective User Requirements and Resource Management in an Academic Cloud -...
 
A study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloudA study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloud
 
A study on security responsibilities and adoption in
A study on security responsibilities and adoption inA study on security responsibilities and adoption in
A study on security responsibilities and adoption in
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithm
 
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS Clouds
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
Toward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and PerformanceToward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and Performance
 

Viewers also liked

Improved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boostImproved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boosteSAT Journals
 
Effects of solidification time on mechanical properties and wear behaviour of...
Effects of solidification time on mechanical properties and wear behaviour of...Effects of solidification time on mechanical properties and wear behaviour of...
Effects of solidification time on mechanical properties and wear behaviour of...eSAT Journals
 
Feasibility study of mtbe physical adsorption from polluted water on gac, pac...
Feasibility study of mtbe physical adsorption from polluted water on gac, pac...Feasibility study of mtbe physical adsorption from polluted water on gac, pac...
Feasibility study of mtbe physical adsorption from polluted water on gac, pac...eSAT Journals
 
Data reduction techniques for high dimensional biological data
Data reduction techniques for high dimensional biological dataData reduction techniques for high dimensional biological data
Data reduction techniques for high dimensional biological dataeSAT Journals
 
A new conceptual algorithm for adaptive route changing in urban environments
A new conceptual algorithm for adaptive route changing in urban environmentsA new conceptual algorithm for adaptive route changing in urban environments
A new conceptual algorithm for adaptive route changing in urban environmentseSAT Journals
 
Environmental impact due to the doubling of green house gases through global ...
Environmental impact due to the doubling of green house gases through global ...Environmental impact due to the doubling of green house gases through global ...
Environmental impact due to the doubling of green house gases through global ...eSAT Journals
 
Efficient reconfigurable architecture of baseband demodulator in sdr
Efficient reconfigurable architecture of baseband demodulator in sdrEfficient reconfigurable architecture of baseband demodulator in sdr
Efficient reconfigurable architecture of baseband demodulator in sdreSAT Journals
 
Analysis of problems of biomass grinder integrated with briquetting plant
Analysis of problems of biomass grinder integrated with briquetting plantAnalysis of problems of biomass grinder integrated with briquetting plant
Analysis of problems of biomass grinder integrated with briquetting planteSAT Journals
 
Automatic test packet generation in network
Automatic test packet generation in networkAutomatic test packet generation in network
Automatic test packet generation in networkeSAT Journals
 
Studies on seasonal variation of ground water quality using multivariate anal...
Studies on seasonal variation of ground water quality using multivariate anal...Studies on seasonal variation of ground water quality using multivariate anal...
Studies on seasonal variation of ground water quality using multivariate anal...eSAT Journals
 
Hydrologic modeling of detention pond
Hydrologic modeling of detention pondHydrologic modeling of detention pond
Hydrologic modeling of detention pondeSAT Journals
 
Dynamic solar powered robot using dc dc sepic topology
Dynamic solar powered robot using   dc dc sepic topologyDynamic solar powered robot using   dc dc sepic topology
Dynamic solar powered robot using dc dc sepic topologyeSAT Journals
 
A survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methodsA survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methodseSAT Journals
 
A survey on full reference image quality assessment algorithms
A survey on full reference image quality assessment algorithmsA survey on full reference image quality assessment algorithms
A survey on full reference image quality assessment algorithmseSAT Journals
 
Behaviour of 3 d rc frames with masonry infill under earthquake loads an ana...
Behaviour of 3 d rc frames with masonry infill under earthquake loads  an ana...Behaviour of 3 d rc frames with masonry infill under earthquake loads  an ana...
Behaviour of 3 d rc frames with masonry infill under earthquake loads an ana...eSAT Journals
 
Simulation of incremental conductance mppt with direct control method using c...
Simulation of incremental conductance mppt with direct control method using c...Simulation of incremental conductance mppt with direct control method using c...
Simulation of incremental conductance mppt with direct control method using c...eSAT Journals
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
 
Analysis and design of high rise building frame using staad pro
Analysis and design of high rise building frame using staad proAnalysis and design of high rise building frame using staad pro
Analysis and design of high rise building frame using staad proeSAT Journals
 

Viewers also liked (18)

Improved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boostImproved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boost
 
Effects of solidification time on mechanical properties and wear behaviour of...
Effects of solidification time on mechanical properties and wear behaviour of...Effects of solidification time on mechanical properties and wear behaviour of...
Effects of solidification time on mechanical properties and wear behaviour of...
 
Feasibility study of mtbe physical adsorption from polluted water on gac, pac...
Feasibility study of mtbe physical adsorption from polluted water on gac, pac...Feasibility study of mtbe physical adsorption from polluted water on gac, pac...
Feasibility study of mtbe physical adsorption from polluted water on gac, pac...
 
Data reduction techniques for high dimensional biological data
Data reduction techniques for high dimensional biological dataData reduction techniques for high dimensional biological data
Data reduction techniques for high dimensional biological data
 
A new conceptual algorithm for adaptive route changing in urban environments
A new conceptual algorithm for adaptive route changing in urban environmentsA new conceptual algorithm for adaptive route changing in urban environments
A new conceptual algorithm for adaptive route changing in urban environments
 
Environmental impact due to the doubling of green house gases through global ...
Environmental impact due to the doubling of green house gases through global ...Environmental impact due to the doubling of green house gases through global ...
Environmental impact due to the doubling of green house gases through global ...
 
Efficient reconfigurable architecture of baseband demodulator in sdr
Efficient reconfigurable architecture of baseband demodulator in sdrEfficient reconfigurable architecture of baseband demodulator in sdr
Efficient reconfigurable architecture of baseband demodulator in sdr
 
Analysis of problems of biomass grinder integrated with briquetting plant
Analysis of problems of biomass grinder integrated with briquetting plantAnalysis of problems of biomass grinder integrated with briquetting plant
Analysis of problems of biomass grinder integrated with briquetting plant
 
Automatic test packet generation in network
Automatic test packet generation in networkAutomatic test packet generation in network
Automatic test packet generation in network
 
Studies on seasonal variation of ground water quality using multivariate anal...
Studies on seasonal variation of ground water quality using multivariate anal...Studies on seasonal variation of ground water quality using multivariate anal...
Studies on seasonal variation of ground water quality using multivariate anal...
 
Hydrologic modeling of detention pond
Hydrologic modeling of detention pondHydrologic modeling of detention pond
Hydrologic modeling of detention pond
 
Dynamic solar powered robot using dc dc sepic topology
Dynamic solar powered robot using   dc dc sepic topologyDynamic solar powered robot using   dc dc sepic topology
Dynamic solar powered robot using dc dc sepic topology
 
A survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methodsA survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methods
 
A survey on full reference image quality assessment algorithms
A survey on full reference image quality assessment algorithmsA survey on full reference image quality assessment algorithms
A survey on full reference image quality assessment algorithms
 
Behaviour of 3 d rc frames with masonry infill under earthquake loads an ana...
Behaviour of 3 d rc frames with masonry infill under earthquake loads  an ana...Behaviour of 3 d rc frames with masonry infill under earthquake loads  an ana...
Behaviour of 3 d rc frames with masonry infill under earthquake loads an ana...
 
Simulation of incremental conductance mppt with direct control method using c...
Simulation of incremental conductance mppt with direct control method using c...Simulation of incremental conductance mppt with direct control method using c...
Simulation of incremental conductance mppt with direct control method using c...
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
 
Analysis and design of high rise building frame using staad pro
Analysis and design of high rise building frame using staad proAnalysis and design of high rise building frame using staad pro
Analysis and design of high rise building frame using staad pro
 

Similar to A challenge for security and service level agreement in cloud computinge

Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Journals
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachIRJET Journal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Servicesijtsrd
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloudeSAT Publishing House
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technologyeSAT Journals
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technologyeSAT Publishing House
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET Journal
 
Services, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computingServices, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computingeSAT Journals
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspectseSAT Publishing House
 

Similar to A challenge for security and service level agreement in cloud computinge (20)

Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing Approach
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutions
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technology
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technology
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
 
Services, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computingServices, security challenges and security policies in cloud computing
Services, security challenges and security policies in cloud computing
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxhublikarsn
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...ssuserdfc773
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 

Recently uploaded (20)

fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 

A challenge for security and service level agreement in cloud computinge

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 28 A CHALLENGE FOR SECURITY AND SERVICE LEVEL AGREEMENT IN CLOUD COMPUTINGE R. Chawngsangpuii1 , Rohit Kumar Das2 , Vanlalhruaia3 1 Senior Asst. Professor, Department of Information Technology, Mizoram University, Mizoram, India 2 Lecturer, Department of Information Technology, Mizoram University, Mizoram, India 3 Assistant Professor, Department of Information Technology, Mizoram University, Mizoram, India Abstract One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus has been made upon the service level agreement, issue and security prospectus over the cloud computing. Keywords: Architecture, Cloud Computing, Cloud Security, Cloud Services Service Level Agreements --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Storing user data in clouds where clouds acts as a virtual storage system is term as cloud computing and is an emerging field in relation to computing. The basic idea is that if a user wants to store data over the cloud, user simply send data files over the internet that are stored in data server through a web interface and when wants the data back from the server, user need to send request to the server. The server then sends back the data in which the user can manipulate and update the data. Data centre acts as a house for cloud storage system capable of storing different kind and amount of data. Infrastructure, platform, software and other resources are providing scalable, feasible and flexible access to clouds for the users to virtually store their data. In cloud computing, network resources like servers, storage applications and services are performing as opportune assets to the user for meeting the demand of storage for cloud data. The merchants that are providing access to cloud are known as Cloud Service Providers (CSPs) [1]. Service Level Agreements (SLA) is an agreement between the service provider and their customer who agrees on the terms and condition specified in the SLA and is been described in detail later in the paper. The primary types of cloud that CSPs want to provide to their customer can be of three types:  Public Cloud: Large industrial group or the general public use this type of cloud and hence the name public cloud. This type of cloud are generally own and handle by the CSPs itself but the security intensity is quit stumpy where as the advantage is that the resources are provided by the CSPs so the set-up is inexpensive and easy to use. Examples of public clouds include Amazon Elastic Compute Cloud (EC2), IBM's Blue Cloud, Sun Cloud, Google AppEngine and Windows Azure Services Platform.  Private Cloud: A private cloud is own and managed by the organization it serves. This type of cloud provides more control over the data that are stored within the cloud, and it ensures high security level on compare to public cloud, even though with greater potential risk for data loss due to natural disaster. Amazon's Elastic Compute Cloud (EC2) or Simple Storage Service (S3) is the third-party host that can provide this service.  Hybrid Cloud: As the name suggest, hybrid cloud are those which forms from the combination of public and private cloud and takes the advantages like stability, reliability, cost saving aspects from public cloud system and maintainers and security aspects from private cloud systems. Cloud computing is regarded as one of the immerging topic in the field of computing. The cost effectiveness, scalability and reliability make it more attractive to use. Lots of issues and challenges have been resolved. But how far it is secure is still the prime question.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 29 Fig -1: Different types of Clouds providing by CSPs 2. RELATED WORK The authors of [4] relate the issue regarding the security and privacy to the user data. Data resiliency and reliability of server have also been considered as cloud server can also go downfall. The vulnerabilities of virtualization in cloud computing infrastructure are described by the authors of [5]. The authors of [6] have provided some of security, cost effectiveness and virtualization survey and the current methods addressing them. The aspects of security, comparison of trust/reputation models and privacy- preservation schemes are described by the authors of [7]. 3. ARCHITECTURE OF CLOUD COMPUTING Cloud computing architecture consists of two parts: Front- end (Users) and Back-end (Clouds). Users are connected to cloud through Internet. The Internet acts as a middleware and the connection of Internet can be of point-to-point or peer-to-peer connection depending upon the type of cloud they want to access. Front-end consists of users and the application like web browser whereas the back-end consists of cloud services like providing virtual servers, data storage system, etc [2]. Fig -2: Conceptual diagram of cloud computing There are certain layers which connects the user to server. These are Application layer, Platform layer and Infrastructure layer as shown in the figure below: Fig -3: Cloud computing Architectural diagram Each of the layers can be illustrate as:  Software as a Service (SaaS): It forms the topmost layer where with SaaS, everything is provided as an application or service to the clients who eliminate the need for installation of software or application services in the client side; the only thing is that the client needs to purchase the ability to access them as define in SLA. Standard examples for this are Salesforce.com and Hotmail which are web browser based services.  Platform as a Service (PaaS): It acts as middle layer where with PaaS, using the cloud infrastructure like operating system or software framework computing platform is provided to the clients. Standard example for PaaS can include Windows Azure and Google Apps.  Infrastructure as a Service (IaaS): It is the bottommost layer and the function is to grant the infrastructure based services virtually to the clients that include hardware for storing client data and the network resources, etc for which charges are applied only when the clients are access to those virtual resources, hence making the task cost economical and prompt. Standard example includes GoGrid and Google cloud storage. 4. SERVICE LEVEL AGREEMENT Service Level Agreement (SLA) is a documenting process which includes some protocol and is sited between the client and cloud service provider (CSPs). Services to the clients are provided based upon the agreements which are agreed by both client and CSPs. SLA can be of both informal contract of legal contract between two parties [8]. The objectives of SLA Agreement are to:  Provide clear reference to service ownership, accountability, roles and responsibilities.  Provide a mechanism for review and change to the service levels over the course of the contract.  Present a clear, concise and measurable description of service provision to the customer.  Match perceptions of expected service provision with actual service support & delivery.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 30  Provide an ongoing reporting mechanism for measuring the expected performance standards Service Level Agreement can be divided based on different levels:  Service-based SLA: Based on the agreement, the service provider provides services to all the customers  Customer-based SLA: Based on the agreement, services are provided with an individual customer groups.  Multi-level SLA: The SLA is split into the different levels, each addressing different set of customers for the same services, in the same SLA. 5. SECURITY ISSUE RELATED TO CLOUD COMPUTING As with advancement of technology, it comes with disadvantage also. Till date there are lots of issue which has been taken care. Despite the consequences, Security is regarded as one of major issue which need more attention from both the cloud providers and their customer’s point of view. Cloud Service Providers (CSPs) furnish different security level to all the services it provides [3] [5]. The following are some of the important aspects related to security measures:  Restriction to user access: As the data are moving out from the clients to the cloud, the level of risk increase in terms of management, multiple placements etc. The enterprise client may want to store huge amount of data in cloud. After storing those data, the enterprise client possibly will want to manipulate that data. Now, multiple accesses to those may create problem in handling those data for the CSP as well. Therefore, access to those valuable data must be restricted to some of the user only.  Malicious attack to client’s data: The third party attack to the client data from a former employee or a business partner can cause harm. The passive attacker can have increasing levels of access to more critical systems and eventually to data.  Isolation of client’s data: CSP store their client data in alongside manner. Data integrity is one of the major concerns. CSP ensures that the client data are well maintained. But as multiple data are stored in a shared cloud, there is a possibility of getting data conflict though CSP provided proper encryption.  Long-term viability of client’s data: Ideally, the CSPs will never go broke or get acquired and swallowed up by a larger company. But the client must be sure that data will remain available even after such an event. Shared technology vulnerabilities to client’s data: To provide a scalable way to access data, CSPs share infrastructure, platforms, and applications. The shared infrastructure may include CPU caches or GPUs which are not specifically designed for multi inhabitant architecture (IaaS), re-deployable platforms (PaaS), or multi-customer applications (SaaS), the threat of shared vulnerabilities exists in all delivery models. 6. CONCLUSION Cloud computing is an emerging paradigm which provide a feasible way to store data virtually over the internet without the need of any physical infrastructure. The service level agreement plays an important role in cloud computing for which it has been included in this paper. One of the major issue or challenge is refer to be the security meadow as in cloud computing system is shared between many users for which crucial measures are needed to protect the client data. REFERENCES [1]. Abdulelah Almishal and Ahmed E. Youssef, “Cloud Service Providers: A Comparative Study”, International Journal of Computer Applications & Information Technology Vol. 5, Issue II, ISSN: 2278-7720, 2014 [2]. W. Tsai, X. Sun, J. Balasooriya, “Service-Oriented Cloud Computing Architecture”, 7th IEEE International Conference on Information Technology, 2010 [3]. Dinadayalan, P., S. Jegadeeswari, and D. Gnanambigai, “Data Security Issues in Cloud Environment and Solutions”, Computing and Communication Technologies (WCCCT), 2014 World Congress on. IEEE, 2014 [4]. Yashpalsinh Jadeja and Kirit Modi, “Cloud Computing - Concepts, Architecture and Challenges”, International Conference on Computing, Electronics and Electrical Technologies [ICCEET], 2012 [5]. P.Purniemaa, R. Jagadeesh Kannan and N.Jaisankar, “Security Threat and Attack in Cloud Infrastructure: A Survey”, The International Journal of Computer Science & Applications (TIJCSA) ISSN – 2278-1080, Vol. 2 No. 06, 2013 [6]. Nandini Mishra , Kanchan khushwha, Ritu chasta and Er. Abhishek Choudhary, “Technologies of Cloud Computing – Architecture Concepts based on Security and its Challenges”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, ISSN: 2278 – 1323, 2013 [7]. Fei Hu, Meikang Qiu, Jiayin Li, Travis Grant, Draw Tylor, Seth McCaleb, Lee Butler and Richard Hamner, “A Review on Cloud Computing: Design Challenges in Architecture and Security”, Journal of Computing and Information Technology - CIT 19, 2011 [8]. Patel, Pankesh, Ajith H. Ranabahu, and Amit P. Sheth, “Service level agreement in cloud computing”, 2009 BIOGRAPHIES R. Chawngsangpuii received her M.Sc degree in Computer Science from Bharathiar University, Coimbatore, India. Her interest for area of research work is in Cloud Computing and Grid Computing.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 31 Rohit Kumar Das received his M.Tech degree in Information Technology from Assam University, Silchar, India. His interest for area of research work is in Network Security and Wireless Networking. Vanlalhruaia received his M.Tech degree in Information Technology from Tezpur University, Tezpur, India. His interest for area of research work is in Cloud Computing and Network Security