Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and                  Applications (IJERA)...
Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and                   Applications (IJERA...
Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and                  Applications (IJERA)...
Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and                   Applications (IJERA...
Upcoming SlideShare
Loading in …5



Published on

IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 3, Issue 1, January -February 2013, pp.854-857 Security Issue Analysis in Cloud Computing Environment Vijay.G.R *, Dr.A.Rama Mohan Reddy** *(PhD scholar Department of Computer Science & Engg, JNTUA, Anantapur, A.P, India) ** (Professor, Dept. of CSE, SVU College of Engineering, Tirupati, A.P, India)ABSTRACT The growth in field of cloud computing are: (1) Private cloud: a cloud platform is dedicatedincreases threat security aspects. Security has for specific organization, (2) Public cloud availableremained a constant issue for Internet and to public users to register and use the availablenetworking, when we are talking about security infrastructure, and (3) Hybrid cloud: a private cloudcloud really effects. Lack of security is the only a that can extend to use resources in public clouds.problem or difficulty that must be overcome in Public cloud most vulnerable deployment modelwide adoption of cloud computing. Cloud because for public users to host their services whocomputing is surrounded by many security issues may be malicious securing data, and examining the utilization In providing a secure Cloud computing solution, aof cloud by the cloud computing vendors. Cloud major decision is to decide on the type of cloud to becomputing has brought lots of security challenges implemented. Currently there are three types of cloudfor the consumers and service providers. Our deployment models offered, namely, a public, privatework mainly provides the basic idea on Cloud and hybrid cloud.Computing with the Security Issue mainly faced in Public Cloud: A public cloud is a model whichboth larger and smaller scale organizations where allows users’ access to the cloud via interfaces usingCloud Computing is implemented and necessary mainstream web browsers. It’s typically based on asteps which can solve these problems to certain pay-per-use model, similar to a prepaid electricityextent. metering system which is flexible enough to cater forThis will enable researchers and security spikes in demand for cloud optimization.professionals to know about users and vendors Private Cloud: A private cloud is set up within anconcerns and critical analysis about the different organization’s internal enterprise datacenter. It isresearch type proposed. easier to align with security, compliance, and regulatory requirements, and provides moreKeywords :Cloud Computing, Security Issues enterprise control over deployment and use. Hybrid Cloud: A hybrid cloud is a private cloudI. INTRODUCTION linked to one or more external cloud services, As more facets of work and personal life centrally managed, provisioned as a single unit, andmove online and the Internet becomes a platform for circumscribed by a secure network. It providesvirtual human society, a new paradigm of large-scale virtual IT solutions through a mix of both public anddistributed computing has emerged. Web-based private clouds.companies, such as Google and Amazon, have builtweb infrastructure to deal with the internet-scale datastorage and computation. If we consider suchinfrastructure as a “virtual computer”, it demonstratesa possibility of new computing model, i.e., centralizethe data and computation on the “super computer”with unprecedented storage and computingcapability, which can be viewed as a simplest form ofcloud computing . Cloud Computing is a new termfor a long-held dream of computing as a utility ,which has recently emerged as a commercial reality.Cloud computing is a model for enabling on-demandnetwork access in order to share computing resourcessuch as network bandwidth, storage, applications, etcthat is able to be rapidly scalable with minimalservice provider management .The Cloud Computing model has three servicedelivery models and main three deployment models Fig 1: Cloud Computing Map 854 | P a g e
  2. 2. Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 3, Issue 1, January -February 2013, pp.854-857Hybrid Clouds provide more secure control of the In their mechanism, numbers of intrusion detectorsdata and applications and allows various parties to were dispatched on the whole topology of theaccess information over the Internet. Figure1 explains networking system through multi-layers and multi-about different cloud models and services also, there stages deployment. Those information security issuesare 5 major technical characteristics of cloud related with the application and service of cloudcomputing: (i) large scale computing resources (ii) computing would be experimented and discussed.high scalability & elastic (iii) shared resource pool The experiments included the equipment security of(virtualized and physical resource) (iv) dynamic the client side termination, the threats of web site andresource scheduling and (v) general purpose. webpage, the detection and diagnosis andSpecifically, cloud computing provides computing surveillance of intrusion, the access and security ofresources as on demand services that are hosted database in the cloud side, the detection of systemremotely, accessed over the Internet, and generally leakage and the monitor of real-time repairingbilled on a per-use basis. process, the management of server system, the management of mobile e-commerce processing, andII. LITERATURE REVIEW the integrated analysis of associated security A numerous researches have been presented information and issues. Chang-Lung Tsai et al. [2]in the literature for cloud computing and its security proposed a mechanism that was not only focused onissues. A brief review of some recent researches is find out some solutions, but also focused on developpresented here. In the last few years, cloud some feasible information security techniques orcomputing has grown from being a promising products for the application and service of cloudbusiness concept to one of the fast growing segments computing.of the IT industry. But as more and more information Cloud computing technology was a new concept ofon individuals and companies are placed in the cloud, providing dramatically scalable and virtualizedconcerns were beginning to grow about just how safe resources, bandwidth, software and hardware onan environment it was. Despite of all the hype demand to consumers. Consumers could typicallysurrounding the cloud, enterprise customers were still requests cloud services via a web browser or webreluctant to deploy their business in the cloud. service. Using cloud computing, consumers couldSecurity was one of the major issues which reduces safe cost of hardware deployment, software licensesthe growth of cloud computing and complications and system maintenance. On the other hand, it alsowith data privacy and data protection continue to has a few security issues. Danish Jamil et al. [3]plague the market. The advent of an advanced model introduced four cloud security problems, which areshould not negotiate with the required functionalities XML Signature Element Wrapping, Browserand capabilities present in the current model. A new Security, Cloud Malware Injection Attack andmodel targeting at improving features of an existing Flooding Attacks, and also gives the possiblemodel must not risk or threaten other important countermeasures.features of the current model. The architecture of Cloud computing moved away from personalcloud poses such a threat to the security of the computers and the individual enterprise applicationexisting technologies when deployed in a cloud server to services provided by the cloud ofenvironment. Cloud service users need to be vigilant computers. The emergence of cloud computing hasin understanding the risks of data breaches in that made a tremendous impact on the Informationnew environment. S. Subashini et al. [1] proposed a Technology (IT) industry over the past few years.survey of the different security risks that pose a threat Currently IT industry needs Cloud computingto the cloud. services to provide best opportunities to real world.Cloud computing has become one of the most Cloud computing was in initial stages, with manysignificant information security issues in recent years. issues still to be addressed. The objective of that wasThat was due to the dramatically emerging to explore the different issues of cloud computingapplications and required services of cloud and identify important research opportunities in thiscomputing. However, in order to safely utilize and increasingly important area. V. Krishna Reddy et al.enjoy the benefit of cloud computing through [4] presented different design challenges categorizedwired/wireless networking, sufficient assurance of under security challenges, Data Challenges,information security such as confidentiality, Performance challenges and other Designauthentication, non repudiation, and integrity was the Challenges. The figure 2 explains the cloudmost critical factor for adoption. In order to well computing architectures, which containsunderstand the security of cloud computing, (i) Five Different Characteristics - On demand selfexperimental platform based on kernel-based virtual service, Broad network access, Resource pooling,machine has established. Besides, a dynamic Rapid Elasticity and Measure Service.intrusion detection system for strengthening the (ii) Three Delivery Models- IaaS, PaaS and application of cloud computing was (iii)Four Deployment Models- Public, Private,implemented. Community and Hybrid. 855 | P a g e
  3. 3. Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 3, Issue 1, January -February 2013, pp.854-857Krishna Chaitanya et al. [5] provided the basic idea III.CRITICAL EVALUATIONon Cloud Computing. It also deals with the SecurityIssue mainly faced in the Industry where Cloud R Context of Problem Research TypeComputing is implemented and necessary steps ef Research Discussedwhich could solve these problems to certain extent.The prominence of the place of cloud computing in 1 Service Different Theoreticalfuture converged networks was incontestable. delivery Security risks studyThat was due to the obvious advantages of the cloud models survey that pose aas a medium of storage with ubiquity of access in Cloud threat to theplatforms and minimal hardware requirements on the Computing cloud.user end. Secure delivery of data to and from thecloud is however a serious issue that needs to be 2. Security in Security Theoreticaladdressed. Enterprise Techniques study Cloud for applications in cloud 3. Web Security Cloud Theoretical issues in Security study cloud problems, computing. 4. Research Security Theoretical Issues in Challenge, study Cloud Data Computing Challenges Performance Challenges 5. Study of Security Theoretical Security Issue mainly study Issues in faced in the Cloud Industry. Computing 6. The Potential Security Theoretical of issues study Homeomorphi affecting and c Encryption proposed Fig 2: Cloud Environment Architecture in cloud homomorphi smAderemi A. Atayero et al. [6] presented the security encryption.issues affecting cloud computing and proposed the 7. Challenges Focusing on Theoreticaluse of homomorphic encryption as a panacea for and Security the types of studydealing with these serious security concerns vis-à-vis Issues in Cloudthe access to cloud data. Cloud ComputingCloud computing was a set of IT services that were Computing and serviceprovided to a customer over a network on a leased servicebasis and with the ability to scale up or down their deliveries.service requirements. Usually cloud computingservices were delivered by a third party provider whoowns the infrastructure. It advantages to mention but IV. CONCLUSIONa few include scalability, resilience, flexibility, In this study different security issuesefficiency and outsourcing non-core activities. research papers were studied briefly. In both largerDespite the potential gains achieved from the cloud and smaller scale organizations they are using cloudcomputing, the organizations were slow in accepting computing environment because of large advantageit due to security issues and challenges associated of cloud computing. The cloud computing haswith it Security was one of the major issues which different security issues in threats in user view, onehamper the growth of cloud. Kuyoro S. O et al. [7] can say that lack of security is the only worthintroduced a detailed analysis of the cloud computing mentioning disadvantage of cloud computing. Thesecurity issues and challenges focusing on the cloud bond between service providers and users iscomputing types and the service delivery types. necessary for providing better cloud security. 856 | P a g e
  4. 4. Vijay.G.R, Dr.A.Rama Mohan Reddy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 3, Issue 1, January -February 2013, pp.854-857In this paper we analyse the security issues, threatsand challenges in wide acceptance of cloudcomputing, because there may be loss of data andprivacy. Researchers Scholars and IT securityprofessionals must press forward towards practicalachievements in security and privacy to users. Ourstudy identifies top security concerns of cloudcomputing, these concerns are security risks,techniques, problems, challenges and security issuesof cloud computing and its services.REFERENCES[1]. S. Subashini and V. Kavitha ,A survey on security issues in service delivery models of cloud computing., Journal of Network and Computer Applications, Vol. 34, No. 1, Jul, 2010[2]. Chang-Lung Tsai and Uei-Chin Li, Information Security of Cloud Computing for Enterprises, Advances on Information Sciences and Service Sciences. Vol. 3, No. 1, pp. 132- 142, Feb 2011[3]. Danish Jamil, Hassan Zaki, Security Issues In Cloud Computing And Countermeasures, International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp. 2672-2676, April 2011[4]. V. Krishna Reddy, B. Thirumala Rao, Dr. L.S.S. Reddy and P. Sai Kiran , Research Issues in Cloud Computing, Global Journal of Computer Science and Technology, Vol. 11 No. 11 July 2011[5]. Krishna Chaitanya.Y, Bhavani Shankar.Y, Kali Rama Krishna.V andV Srinivasa Rao, Study of security issues in Cloud Computing, International Journal of Computer Science and Technology ,Vol. 2, No. 3, Sept 2011[6]. Aderemi A. Atayero, Oluwaseyi Feyisetan , Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption, Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No. 10, October 2011[7]. Kuyoro S. O, Ibikunle.F and Awodele O, Challenges and Security Issues in Cloud Computing International Journal of Computer Networks, Vol. 3, No. 5, pp. 247- 255, 2011 857 | P a g e