SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 18
Various Security Issues and their Remedies in
Cloud Computing
Mridula Batra1
, Dr. Neha Gupta2
1
Research Scholar, Manav Rachna International University, Faridabad, India
2
Assistant Professor, Manav Rachna International University, Faridabad, India
Abstract—The services of cloud computing is expending
day by day. It has given shape to the theoretical
infrastructure for future computations. The computational
framework is running very fast worldwide towards cloud
based architecture, though cloud computing is becoming
very popular now a days but there are some other issues
which should be considered-one of the major issue is
security. In this paper, some major security issues has been
analyzed and main emphasis is to rectify those issues.
Keywords—Cloud Computing, Cloud services,
Infrastructure, Security.
I. INTRODUCTION TO CLOUD COMPUTING
Cloud computing is based on internet which compute
shared resources which are provided to computer and other
devices. Cloud computing emphasizes the utilization of
shared resources at its maximum and along with it performs
computational tasks for private or public networks. It is a
realistic method to practice reduction in cost benefits and
the future prospect of cloud computing is to establish data
centre that can invest variable cost instead of heavy capital
investment set up.
A. Categories of Cloud Computing
Private Cloud: - It is used to deliver services to individual or
personal users from databases designed for business data.
Such type of services are flexible as well as convenient
while maintaining its original control security and
managerial aspects.
Public Cloud: - In such type of clouds, services are
delivered by third-party who all are involved in delivering
cloud services with the help of internet.
Hybrid Cloud: - It is the mixture of private as well as public
cloud. Generally, organizations run all the applications have
the requirements of both public and private clouds. On
private clouds important and secure applications are
executed while public clouds are used for lengthy tasks and
they run as and when required.
B. Advantages of Cloud computing
Self-service provisioning:- Any type of data can be
retrieved as and when required for every type of
applications by just molding the assets available on cloud.
Scalability: - Organizations dealing with cloud data can
scale up and scale down with increase or decrease in
demand respectively.
Variable Priced environment:- Values for resources on
cloud are measured at a minute level, which help the users
to price for the resources they have utilized.
II. SERVICES OF CLOUD
Infrastructure as a Service (Iaas):- It gives large storage and
computational aspects of data over the Internet. It also
provides capabilities of services over every kind of network
(intranet or extranet). The exchange of service include
server space, storage system and sharing of network
resources.
TABLE I. COMPARISON BETWEEN THE THREE
SERVICES
Iaas Paas Saas
In this services
storage, database
management and
compute
capabilities area
offered.
This service
provides
design,
development,
build and test
applications.
This is internet
based
application and
offers the
services to end-
user.
Examples are:-
Amazon, GoGrid, 3
Tera.
Google’s App
Engine,
Force.com use
such types of
services.
Example of
SaaS are:-
Google,
Salesforce,
Microsoft
Platform as a Service (Paas):-- Platform is an environment
that provides services on which other higher user- oriented
applications can be created and executed, for example, a
web site developer develop its own application and share
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 19
space on internet to deploy its website by paying certain
amount.
Software as a Service (SaaS): It means sharing the
applications of the users of that cloud along with data as and
when demand is generated. Single instance of a service can
run on shared cloud and multiple instances run at end users
platform.
III. SECURITY AND PRIVACY
The major aspect to be considered while working on cloud
is data security. As cloud is a collection of user’s data
stored at cloud’s servers as well as on end user’s computers.
Authentication is the critical aspect in cloud computing.
Along with the security, privacy of the individual users
connected to the cloud servers should also be maintained.
Modification in data over the cloud should be done with the
permission of authenticated user.
In a cloud provider platform different users share the data
which is reside in the same data server, so the information
can be leaked and hackers can alter the data through a single
attack.
Maintenance of cloud security and privacy is a two-fold
issue. Users and cloud service providers both should aware
of terms and conditions for cloud data sharing and taking its
services. Generally, for protection, private clods are more
appropriate than public clouds.
A. Security issues in Cloud
The security prospects for cloud computing techniques are
very active and cosmic. The main security issues are:
Network Security:- In cloud computing problems occur
with network communications and configurations . The
solution of network is that we can use services on cloud as
an addition of customer’s own networks (intranet) , where
security and privacy are locally applied.
Loss of Governance:- In case of public cloud, client leaves
the control to the cloud provider for certain issues and at the
same time cloud service level agreements (SLA) may not
recommend an assurance to provide competence on the part
of the cloud provider , so this gap affects the security.
Responsibility Ambiguity:- If the responsibilities of the
consumer and the provider’s organizations are not clear to
each other, then important part of security protection are left
imprudent.
Isolation Failure:- This type of threat includes the
malfunctioning of storage space, system memory and
routing algorithms.
Compliance and Legal Risks:- If the cloud provider does
not provide the proof of their own compliance with the
significant necessities or it does not allow the cloud
consumer to do the audit then it may be put at risk.
Malicious Behavior of Insiders:- Damage can be occurred
because of the nasty actions of persons working inside the
company can cause huge damages to the data.
Business Failure of the Provider:- Sometimes the business
of the cloud provider may lead to failure because of such
failure such failures data may be unavailable to the
consumer.
B. Cloud Security Directions
Implement Effective Monitoring risk management and
dealing with complex processes existence:- Most of the
cloud service providers (both public and private clouds)
have their own policies and rules to ensure overall security
of all the users and their applications exist on that cloud.
Along with security management, they also focus on risk
management for different types of risks present on clouds.
Effective Audit Implementation Policy Management :-
Periodic report of all the transactions and utilization of
services over the clouds are maintained by cloud service
organization. There is a relevance and importance of these
reports to see the effectiveness and efficiency of services
provided.
There is certain important parts where certain types of
audits are conducted:
1. It understands the inside aspects of cloud service
provider which includes risks and checks on
various governmental policies.
2. Access to the corporate audit trail.
Management of users, roles and their applications:- Users
must be aware of cloud service provider’s proper
functionality of accessing user’s data and handling their
applications. Service providers have to build a faith in the
users for proper implementation of all the policies and
security issues. Cloud service providers allocate proper
authentication and responsibilities to the various users for
accessing cloud data.
Implantation of protection Policies for data and
information:- Clod is a collection of data from various
organizations distributed among multiple users over the
network, so proper protection of all the data and
information is required. Cloud service providers construct
cloud architectures in a way that both data and information
will be secured and protective from unauthorized users.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 20
Enforce privacy policies:- Privacy is very important all
around the world which includes rules and regulations
related to personal identification and acquiring storage
space and handling personal data and information. Privacy
means limiting the access of data to the authorized users.
Cloud service provider’s architecture should have
mechanism to implement the privacy of individual user and
proper authentication before accessing the data on clouds.
Manage security terms in the cloud SLA:- While designing
security terms and conditions, there should be a clear
demarcation between customer’s security responsibilities
and cloud service providers responsibilities. An agreement
should be clearly defined for all the terms and conditions
and duly signed by both parties.
IV. CONCLUSION
There are massive projections for cloud computing but
cloud computing is always surrounded by security threats
which are directly linked to its advantages. It is beneficial to
both the parties be it a business or the invader but security is
always a concern. So, we have discussed various security
threats and their probable solutions.
REFERENCES
[1] A. Agarwal, and A. Agarwal (2011), “The Security
Risks Associated with Cloud Computing.International
Journal of Computer Applications in Engineering
Sciences”, 1 (Special Issue on CNS),257-259.
[2] K. Hamlen, M. Kantarcioglu, L. Khan, and V.
Thuraisingham(2010),“Security Issues for
CloudComputing. International Journal of Information
Security and Privacy”, 4(2), 39-51.
doi:10.4018/jisp.2010040103.
[3] P. Ryan, and S. Falvey (2012), “ Trust in the clouds.
Computer Law and Security Reviews”, 28, 513-
21.http://dx.doi.org/10.1016/j.clsr.2012.07.002
[4] M. Okuhara, “Shiozaki, T. and Suzuki, T. (2010).
Security Architectures for Cloud Computing”,
FUJITSU Science Technology Journal, 46(4), 397–
402.
[5] Ahmed Monjur, Hossain Mohammad Ashraf, “Cloud
Computing And Security Issues In The Cloud”,
International Journal of Network Security & Its
Applications (IJNSA), Vol.6, No.1, January 2014.
[6] Red´ıgolo Fernando, Simpl´ıcio, “A quantitative
analysis of current securityconcerns and solutions for
cloud computing”,Journal of cloud computing:
Advances, Systems and Applications 2012, 1:11.
[7] N. Anand (2010), “The legal issues around cloud
computing”, http://www.labnol.org/internet/cloud-
computing-legal-issues/14120.
[8] I Brandic, S Dustdar , T Anstett , D Schumm , F
Leymann (2010), “Compliant Cloud Computing (C3):
Architecture and Language Support for User-driven
Compliance management in Clouds” , In: 2010 IEEE
3rd
International Conference on Cloud Computing. pp
244–251, http://dx. doi.org/10.1109/CLOUD.2010.42
[9] D Catteddu, G Hogben (2009), “Benefits, risks and
recommendations for information security” , Tech.
rep., European Network and Information Security
Agency,enisa.europa.eu/act/rm/files/deliverables/cloud
computing-risk-assessment.

More Related Content

What's hot

International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4sophiabelthome
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...iosrjce
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environmentsmlaij
 
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET Journal
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computingijtsrd
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computingMd. Hasibur Rashid
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 
OTechs Cloud computing security
OTechs Cloud computing securityOTechs Cloud computing security
OTechs Cloud computing securityOsman Suliman
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Editor IJARCET
 
Fundamental concepts and models
Fundamental concepts and modelsFundamental concepts and models
Fundamental concepts and modelsAsmaa Ibrahim
 

What's hot (19)

International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
 
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security Mechanism
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computing
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
OTechs Cloud computing security
OTechs Cloud computing securityOTechs Cloud computing security
OTechs Cloud computing security
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890
 
Fundamental concepts and models
Fundamental concepts and modelsFundamental concepts and models
Fundamental concepts and models
 

Viewers also liked

MongoDB_Spark
MongoDB_SparkMongoDB_Spark
MongoDB_SparkMat Keep
 
31 Best Growth Hacking Resources
31 Best Growth Hacking Resources31 Best Growth Hacking Resources
31 Best Growth Hacking ResourcesStephen Jeske
 
Cherry Tree's IT Services Newsletter March 2016
Cherry Tree's IT Services Newsletter March 2016Cherry Tree's IT Services Newsletter March 2016
Cherry Tree's IT Services Newsletter March 2016Elmer Baldwin
 
Optimizing your Sales Stack in 2016
Optimizing your Sales Stack in 2016Optimizing your Sales Stack in 2016
Optimizing your Sales Stack in 2016Gabe Larsen
 
Historia de una transformación ágil en Ferrer
Historia de una transformación ágil en FerrerHistoria de una transformación ágil en Ferrer
Historia de una transformación ágil en Ferrernetmind
 
How well are offshore IT firms doing in Healthcare ?
How well are offshore IT firms doing in Healthcare ?How well are offshore IT firms doing in Healthcare ?
How well are offshore IT firms doing in Healthcare ?Damo Consulting Inc.
 
Основные решения по созданию геоинформационной системы аэропорта - Esri
Основные решения по созданию геоинформационной системы аэропорта - EsriОсновные решения по созданию геоинформационной системы аэропорта - Esri
Основные решения по созданию геоинформационной системы аэропорта - EsriIevgen Vladimirov
 
Performance and Cost Analysis of Modern Public Cloud Services
Performance and Cost Analysis of Modern Public Cloud ServicesPerformance and Cost Analysis of Modern Public Cloud Services
Performance and Cost Analysis of Modern Public Cloud ServicesMd.Saiedur Rahaman
 
IT Geek Week 2016 - Introduction To Cloud Computing
IT Geek Week 2016 - Introduction To Cloud ComputingIT Geek Week 2016 - Introduction To Cloud Computing
IT Geek Week 2016 - Introduction To Cloud ComputingHaim Ateya
 
Milton Keynes - Smart City
Milton Keynes - Smart CityMilton Keynes - Smart City
Milton Keynes - Smart CityMatthew Clifton
 
Infrastructure To Cloud Transformation
Infrastructure To Cloud TransformationInfrastructure To Cloud Transformation
Infrastructure To Cloud TransformationMichael Graber
 
Can Innovation Labs Save The World?
Can Innovation Labs Save The World?Can Innovation Labs Save The World?
Can Innovation Labs Save The World?Paul Taylor
 
Nielsen paid-social-media-adv-report-2013
Nielsen paid-social-media-adv-report-2013Nielsen paid-social-media-adv-report-2013
Nielsen paid-social-media-adv-report-2013Aidelisa Gutierrez
 
Resume Murillo KerlinFV
Resume Murillo KerlinFVResume Murillo KerlinFV
Resume Murillo KerlinFVKerlin Murillo
 
SwagIQ Guidebook
SwagIQ GuidebookSwagIQ Guidebook
SwagIQ GuidebookKaren Lum
 
The Rise of Business Networks
The Rise of Business NetworksThe Rise of Business Networks
The Rise of Business NetworksDana Gardner
 

Viewers also liked (20)

MongoDB_Spark
MongoDB_SparkMongoDB_Spark
MongoDB_Spark
 
31 Best Growth Hacking Resources
31 Best Growth Hacking Resources31 Best Growth Hacking Resources
31 Best Growth Hacking Resources
 
Cherry Tree's IT Services Newsletter March 2016
Cherry Tree's IT Services Newsletter March 2016Cherry Tree's IT Services Newsletter March 2016
Cherry Tree's IT Services Newsletter March 2016
 
Optimizing your Sales Stack in 2016
Optimizing your Sales Stack in 2016Optimizing your Sales Stack in 2016
Optimizing your Sales Stack in 2016
 
Historia de una transformación ágil en Ferrer
Historia de una transformación ágil en FerrerHistoria de una transformación ágil en Ferrer
Historia de una transformación ágil en Ferrer
 
How well are offshore IT firms doing in Healthcare ?
How well are offshore IT firms doing in Healthcare ?How well are offshore IT firms doing in Healthcare ?
How well are offshore IT firms doing in Healthcare ?
 
Основные решения по созданию геоинформационной системы аэропорта - Esri
Основные решения по созданию геоинформационной системы аэропорта - EsriОсновные решения по созданию геоинформационной системы аэропорта - Esri
Основные решения по созданию геоинформационной системы аэропорта - Esri
 
Performance and Cost Analysis of Modern Public Cloud Services
Performance and Cost Analysis of Modern Public Cloud ServicesPerformance and Cost Analysis of Modern Public Cloud Services
Performance and Cost Analysis of Modern Public Cloud Services
 
Sweta kumari
Sweta kumariSweta kumari
Sweta kumari
 
IT Geek Week 2016 - Introduction To Cloud Computing
IT Geek Week 2016 - Introduction To Cloud ComputingIT Geek Week 2016 - Introduction To Cloud Computing
IT Geek Week 2016 - Introduction To Cloud Computing
 
Milton Keynes - Smart City
Milton Keynes - Smart CityMilton Keynes - Smart City
Milton Keynes - Smart City
 
Scaling the Netflix API
Scaling the Netflix APIScaling the Netflix API
Scaling the Netflix API
 
Infrastructure To Cloud Transformation
Infrastructure To Cloud TransformationInfrastructure To Cloud Transformation
Infrastructure To Cloud Transformation
 
Building IoT solutions in Milton Keynes | Sarah Gonsalves | June 2015
Building IoT solutions in Milton Keynes | Sarah Gonsalves | June 2015Building IoT solutions in Milton Keynes | Sarah Gonsalves | June 2015
Building IoT solutions in Milton Keynes | Sarah Gonsalves | June 2015
 
Can Innovation Labs Save The World?
Can Innovation Labs Save The World?Can Innovation Labs Save The World?
Can Innovation Labs Save The World?
 
Nielsen paid-social-media-adv-report-2013
Nielsen paid-social-media-adv-report-2013Nielsen paid-social-media-adv-report-2013
Nielsen paid-social-media-adv-report-2013
 
Resume Murillo KerlinFV
Resume Murillo KerlinFVResume Murillo KerlinFV
Resume Murillo KerlinFV
 
SwagIQ Guidebook
SwagIQ GuidebookSwagIQ Guidebook
SwagIQ Guidebook
 
La función del community manager
La función del community managerLa función del community manager
La función del community manager
 
The Rise of Business Networks
The Rise of Business NetworksThe Rise of Business Networks
The Rise of Business Networks
 

Similar to Various Security Issues and their Remedies in Cloud Computing

Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud ComputingIRJET Journal
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms IJECEIAES
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 

Similar to Various Security Issues and their Remedies in Cloud Computing (20)

Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
 
G0314043
G0314043G0314043
G0314043
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

Various Security Issues and their Remedies in Cloud Computing

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 18 Various Security Issues and their Remedies in Cloud Computing Mridula Batra1 , Dr. Neha Gupta2 1 Research Scholar, Manav Rachna International University, Faridabad, India 2 Assistant Professor, Manav Rachna International University, Faridabad, India Abstract—The services of cloud computing is expending day by day. It has given shape to the theoretical infrastructure for future computations. The computational framework is running very fast worldwide towards cloud based architecture, though cloud computing is becoming very popular now a days but there are some other issues which should be considered-one of the major issue is security. In this paper, some major security issues has been analyzed and main emphasis is to rectify those issues. Keywords—Cloud Computing, Cloud services, Infrastructure, Security. I. INTRODUCTION TO CLOUD COMPUTING Cloud computing is based on internet which compute shared resources which are provided to computer and other devices. Cloud computing emphasizes the utilization of shared resources at its maximum and along with it performs computational tasks for private or public networks. It is a realistic method to practice reduction in cost benefits and the future prospect of cloud computing is to establish data centre that can invest variable cost instead of heavy capital investment set up. A. Categories of Cloud Computing Private Cloud: - It is used to deliver services to individual or personal users from databases designed for business data. Such type of services are flexible as well as convenient while maintaining its original control security and managerial aspects. Public Cloud: - In such type of clouds, services are delivered by third-party who all are involved in delivering cloud services with the help of internet. Hybrid Cloud: - It is the mixture of private as well as public cloud. Generally, organizations run all the applications have the requirements of both public and private clouds. On private clouds important and secure applications are executed while public clouds are used for lengthy tasks and they run as and when required. B. Advantages of Cloud computing Self-service provisioning:- Any type of data can be retrieved as and when required for every type of applications by just molding the assets available on cloud. Scalability: - Organizations dealing with cloud data can scale up and scale down with increase or decrease in demand respectively. Variable Priced environment:- Values for resources on cloud are measured at a minute level, which help the users to price for the resources they have utilized. II. SERVICES OF CLOUD Infrastructure as a Service (Iaas):- It gives large storage and computational aspects of data over the Internet. It also provides capabilities of services over every kind of network (intranet or extranet). The exchange of service include server space, storage system and sharing of network resources. TABLE I. COMPARISON BETWEEN THE THREE SERVICES Iaas Paas Saas In this services storage, database management and compute capabilities area offered. This service provides design, development, build and test applications. This is internet based application and offers the services to end- user. Examples are:- Amazon, GoGrid, 3 Tera. Google’s App Engine, Force.com use such types of services. Example of SaaS are:- Google, Salesforce, Microsoft Platform as a Service (Paas):-- Platform is an environment that provides services on which other higher user- oriented applications can be created and executed, for example, a web site developer develop its own application and share
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 19 space on internet to deploy its website by paying certain amount. Software as a Service (SaaS): It means sharing the applications of the users of that cloud along with data as and when demand is generated. Single instance of a service can run on shared cloud and multiple instances run at end users platform. III. SECURITY AND PRIVACY The major aspect to be considered while working on cloud is data security. As cloud is a collection of user’s data stored at cloud’s servers as well as on end user’s computers. Authentication is the critical aspect in cloud computing. Along with the security, privacy of the individual users connected to the cloud servers should also be maintained. Modification in data over the cloud should be done with the permission of authenticated user. In a cloud provider platform different users share the data which is reside in the same data server, so the information can be leaked and hackers can alter the data through a single attack. Maintenance of cloud security and privacy is a two-fold issue. Users and cloud service providers both should aware of terms and conditions for cloud data sharing and taking its services. Generally, for protection, private clods are more appropriate than public clouds. A. Security issues in Cloud The security prospects for cloud computing techniques are very active and cosmic. The main security issues are: Network Security:- In cloud computing problems occur with network communications and configurations . The solution of network is that we can use services on cloud as an addition of customer’s own networks (intranet) , where security and privacy are locally applied. Loss of Governance:- In case of public cloud, client leaves the control to the cloud provider for certain issues and at the same time cloud service level agreements (SLA) may not recommend an assurance to provide competence on the part of the cloud provider , so this gap affects the security. Responsibility Ambiguity:- If the responsibilities of the consumer and the provider’s organizations are not clear to each other, then important part of security protection are left imprudent. Isolation Failure:- This type of threat includes the malfunctioning of storage space, system memory and routing algorithms. Compliance and Legal Risks:- If the cloud provider does not provide the proof of their own compliance with the significant necessities or it does not allow the cloud consumer to do the audit then it may be put at risk. Malicious Behavior of Insiders:- Damage can be occurred because of the nasty actions of persons working inside the company can cause huge damages to the data. Business Failure of the Provider:- Sometimes the business of the cloud provider may lead to failure because of such failure such failures data may be unavailable to the consumer. B. Cloud Security Directions Implement Effective Monitoring risk management and dealing with complex processes existence:- Most of the cloud service providers (both public and private clouds) have their own policies and rules to ensure overall security of all the users and their applications exist on that cloud. Along with security management, they also focus on risk management for different types of risks present on clouds. Effective Audit Implementation Policy Management :- Periodic report of all the transactions and utilization of services over the clouds are maintained by cloud service organization. There is a relevance and importance of these reports to see the effectiveness and efficiency of services provided. There is certain important parts where certain types of audits are conducted: 1. It understands the inside aspects of cloud service provider which includes risks and checks on various governmental policies. 2. Access to the corporate audit trail. Management of users, roles and their applications:- Users must be aware of cloud service provider’s proper functionality of accessing user’s data and handling their applications. Service providers have to build a faith in the users for proper implementation of all the policies and security issues. Cloud service providers allocate proper authentication and responsibilities to the various users for accessing cloud data. Implantation of protection Policies for data and information:- Clod is a collection of data from various organizations distributed among multiple users over the network, so proper protection of all the data and information is required. Cloud service providers construct cloud architectures in a way that both data and information will be secured and protective from unauthorized users.
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 20 Enforce privacy policies:- Privacy is very important all around the world which includes rules and regulations related to personal identification and acquiring storage space and handling personal data and information. Privacy means limiting the access of data to the authorized users. Cloud service provider’s architecture should have mechanism to implement the privacy of individual user and proper authentication before accessing the data on clouds. Manage security terms in the cloud SLA:- While designing security terms and conditions, there should be a clear demarcation between customer’s security responsibilities and cloud service providers responsibilities. An agreement should be clearly defined for all the terms and conditions and duly signed by both parties. IV. CONCLUSION There are massive projections for cloud computing but cloud computing is always surrounded by security threats which are directly linked to its advantages. It is beneficial to both the parties be it a business or the invader but security is always a concern. So, we have discussed various security threats and their probable solutions. REFERENCES [1] A. Agarwal, and A. Agarwal (2011), “The Security Risks Associated with Cloud Computing.International Journal of Computer Applications in Engineering Sciences”, 1 (Special Issue on CNS),257-259. [2] K. Hamlen, M. Kantarcioglu, L. Khan, and V. Thuraisingham(2010),“Security Issues for CloudComputing. International Journal of Information Security and Privacy”, 4(2), 39-51. doi:10.4018/jisp.2010040103. [3] P. Ryan, and S. Falvey (2012), “ Trust in the clouds. Computer Law and Security Reviews”, 28, 513- 21.http://dx.doi.org/10.1016/j.clsr.2012.07.002 [4] M. Okuhara, “Shiozaki, T. and Suzuki, T. (2010). Security Architectures for Cloud Computing”, FUJITSU Science Technology Journal, 46(4), 397– 402. [5] Ahmed Monjur, Hossain Mohammad Ashraf, “Cloud Computing And Security Issues In The Cloud”, International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, January 2014. [6] Red´ıgolo Fernando, Simpl´ıcio, “A quantitative analysis of current securityconcerns and solutions for cloud computing”,Journal of cloud computing: Advances, Systems and Applications 2012, 1:11. [7] N. Anand (2010), “The legal issues around cloud computing”, http://www.labnol.org/internet/cloud- computing-legal-issues/14120. [8] I Brandic, S Dustdar , T Anstett , D Schumm , F Leymann (2010), “Compliant Cloud Computing (C3): Architecture and Language Support for User-driven Compliance management in Clouds” , In: 2010 IEEE 3rd International Conference on Cloud Computing. pp 244–251, http://dx. doi.org/10.1109/CLOUD.2010.42 [9] D Catteddu, G Hogben (2009), “Benefits, risks and recommendations for information security” , Tech. rep., European Network and Information Security Agency,enisa.europa.eu/act/rm/files/deliverables/cloud computing-risk-assessment.