SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 687
Cloud Computing: Its Applications and Security Issues (A Major
Challenge in Cloud Computing Applications)
Prof. Mayuri B. Dandwate1, Prof. Rutuja V. Kotkar2
1, 2Assistant professor,PIRENS Institute of Computer Technology(PICT), LONI.
---------------------------------------------------------------------***---------------------------------------------------------------------
ABSTRACT: In this modern technologies world everything
becomes terribly immense and a lot of reliable .We makes our
documentation on one computer and that we will access and
obtain this on alternative system however this will be
happened with the assistance of net. The fast improvement of
the capability of on-line property gave birth to cloud
computing. information and processes can be done on-line
while not the necessity of any native package or consumer. As
long because the user is aware of the method and has the
proper security credentials, he might access the system and
create the required changes, however there are major
challenges and security problems in cloud computing that
creates accessing somewhat tough. During this paper we tend
to give a introduction to cloud computing and discussing and
overcome this security problems that being returning in cloud
computing applications.
KEYWORDS: Cloud computing, Hybrid Cloud, Security
issues, SaaS, IaaS, PaaS.
1.INTRODUCTION:
1.1 Cloud Computing:
It simply, means that "Internet Computing." the web is often
envisioned as clouds; therefore the term “cloud computing”
for computation done through the web. With Cloud
Computing users will access information resources via the
web from anyplace, for as long as they have, without fear
regarding any maintenance or management of actual
resources. Besides, databases in cloud ar terribly dynamic
and scalable. Cloud computing is in contrast to grid
computing, utility computing, or involuntary computing. In
fact, it's a really freelance platform in terms of computing.
the simplest example of cloud computing is Google Apps
wherever any application may be accessed employing a
browser and it may be deployed on thousands of computer
through the web.
1.2 Styles of cloud computing services:
IT individuals point out 3 totally different forms of cloud
computing, wherever totally different services are being
provided for you.
Infrastructure as a Service (IaaS) means that you are
shopping for access to raw computing hardware over
Infobahn, like servers or storage. Since you purchase what
you would like and pay-as-you-go, typically this can be often
remarked as utility computing. Standard net hosting could
be a straightforward example of IaaS, you pay a monthly
subscription or a per-megabyte/gigabyte fee to possess a
hosting company servesup filesfor your web site from their
servers.
Software as a Service (SaaS) means that you utilize a whole
application running on somebody else's system. Web-based
email and Google Documents maybe the known examples.
Zoho is another well-known SaaS supplier giving a range of
workplace applications on-line.
Platform as a Service (PaaS) means that you develop
applications victimization Web-based tools in order that
they run on computer program and hardware provided by
another company. Force.com (from salesforce.com) and the
Google App Engine are examples of PaaS.
1.3 Form of clouds:
Public cloud:
A public cloud is one supported the quality cloudcomputing
model, within which a service supplier makesresources,like
applications and storage, out there to the final public over
the web. Cloud services could also be free or offered on a
pay-per-usage model.
The main advantages of employing a public cloud service
are:
1) Easy and cheap set-up as a result of hardware,
application and information measure prices and coated
by the supplier.
2) Scalability to fulfill wants.
3) No wasted resources
Private cloud:
Private cloud (also known as internal cloud or company
cloud) could be a selling term for a proprietary computing
design that has hosted services to a restricted range of
individuals behind a firewall.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 688
Hybrid cloud:
A hybrid cloud surroundings consisting of multiple internal
and/or external suppliers are going to be typical for many
enterprises. it's a cloud computing surroundings within
which a company providesand manages some resourcesin-
house and has others provided outwardly. for instance, a
company would possibly use a public cloud service, like
Amazon's Elastic calculate Cloud (EC2) for general
computing however store client information inside its own
information center.
2. RESOLUTION OF SECURITY PROBLEMSINCLOUD
COMPUTING:
As new technologies emerge, they usually tend to create on
the success of previousdevelopments. Cloud computingand
storage, enjoy years of development andtestingofenormous
scale infrastructure. the foremost vital deduct is cloud
storage is for everybody and each organization. From
massive to tiny, teams to individual, the employment of grid
infrastructure may be deployed for optimum come and
potency. In response, Stone soft has known 5 ways that IT
groups will shield themselves against cloud security threats
and attacks, whereas serving to make sure the success of
their cloud computing methods. They include:
2.1 UNITED ID:
Inherent in an exceedingly cloud computing surroundingsis
that the want for employeesto log into multiple applications
and services. This presents a formidable security pitfall, as
organizations could lose management over their ability to
confirm sturdy authentication at the user level. To mitigate
this risk, organizations want “single sign-on” capabilities –
like those provided by the Stone Gate SSL VPN – that change
usersto access multiple applications and services, aswell as
those set outside of the organization within the publiccloud,
through one login. With this ability, organizations will
contour security management and guarantee sturdy
authentication inside the cloud.
2.2 Always-on property:
When the bulk of associate organization’s important
business information is keep within the cloud, network
period will finish off business operations. Access to cloud
services should be continuously out there, even throughout
maintenance, so requiring high availableness technologies
and capabilities like active cluster, dynamic server load
leveling and ISP load leveling inside the network
infrastructure. Organizations ought to ask for technologies
that are engineered into their network solutions, instead of
purchase them as standalone merchandise to confirm
effectiveness, easy management and reduced network
prices.
2.3 Multi-layer review:
The rise of the cloud computing surroundings and accrued
sophistication of threats has created a desire for a correct
bedded defense comprised of perimeter protection and
intrusion detection and hindrance capabilities inside the
network. instead of implementing first-generation firewalls
to shield the cloud at the perimeter, Stone soft recommends
the readying of virtual next generation firewall appliances–
just like the Stone Gate Virtual Next info Firewall – that
integrate advanced firewall and IPS capabilities for deep
traffic review. this may enable organizations to examine all
levels of traffic, from basic net browsing to peer-to-peer
applications and encrypted net traffic within the SSL tunnel.
extra IPS appliancesought to be enforced to shieldnetworks
from internal attacks that threaten access to the cloud.
2.4 Centralized Management:
Human error continues to be the best network security
threat facing each physical and virtual computing
environments. As firms deploy extra network devices to
secure their virtual networks, they exponentially increase
this risk as device management, observation and
configuration become a lot of tedious and fewer organized.
For this reason, Stone soft recommends firms use one
management console to manage, monitor and piece all
devices – physical, virtual and third-party.
2.5 Virtual Desktop Protection:
More and a lot of organizations ar deployingvirtualdesktops
to comprehend the price and administration advantages.
However, these desktops ar even as – if less – vulnerable
than their physical counterparts. To adequately shield
virtual desktops, organizations ought to isolate them from
alternative network segments and implementdeepreviewat
the network level to stop each internal and external threats.
Those organizations ought to deploy a multi-pronged
approach to security by implementing IPS technology that
forestalls prohibited internal access, protects the shoppers
from malicious servers, moreover as providing secure
remote access capabilities through information science sec
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 689
or SSL VPN that protects against unauthorized external
access.
2.6 Information Storage Location:
Cloud compliance is tough as a result of {you do you are
doing} not understand wherever you information are set.
Not solely will a company not understand what's being
finished its information, it should not even understand
World Health Organization the suppliers ar. Cloud
computing models ignore theseissuesandcreatecompliance
and verification of compliance tough.
2.7 Security and privacy:
First among cloud computing information storage problems
is security and privacy indeed, package as a Services (SaaS)
supplier could also be counting on alternative external
suppliers for its backbone, infrastructure, and information
storage. Cloud merchandiser usessecretwritingforsecuring
information at rest and in transit. The cloud service supplier
ought to encipher information on storage devices the least
bit times so as to stop information breaches. firms ought to
confirm that their information is protected oncetransmitted
over the web by continuously being encrypted and
documented by the cloud supplier.
3.CLOUD COMPUTING APPLICATIONS:
The applications of cloud computingaremuchlimitless.With
the proper middleware, a cloud ADPS might execute all the
programs a traditional computermight run. There are some
advantages and applications in cloud computingthatcreates
it totally different from alternative concepts:
3.1 Shoppers would be able to access their applications and
information from anyplace at any time. theymightaccessthe
cloud ADPS victimization any computer joined to the web.
information would not be confined to a tough drive on one
user'scomputer or maybe a corporation'sinternal network.
3.2 It might bring hardware prices down. Cloud computing
systems would cut back the necessityforadvancedhardware
on the consumer aspect. you would not havetobecompelled
to obtain the quickest computer with the foremost memory,
as a result of the cloud system would beware of these wants
for you. Instead, you may obtain a reasonable computer
terminal. The terminal might include a monitor, input
devices sort of a keyboard and mouse and merely enough
process power to run the middleware necessary to attach to
the cloud system.
3.3 Firms that have confidence computers ought to confirm
they need the proper package in situ to realize goals. Cloud
computing systems provide these organizations company-
wide access to computer applications.thebusinesseshaven't
got to shop for a group of package or package licenses for
each worker.
Figure-2: Uses of Cloud Computing
3.4 Servers and digital storage devices take up area. Some
firms rent physical area to store servers and databases as a
result of they do not have it out there on website. Cloud
computing offers these firms the choice of storing
information on somebody else's hardware, removing the
necessity for physical area on the front.
3.5 Firmswould possibly save cash thereonsupport.efficient
hardware would, in theory, have fewer issues than a
network of heterogeneous machines and operational
systems.
3.6 If the cloud ADPS's face could be a grid computing
system, then the consumer might make the most of the
whole network's process power. Often, scientists and
researcherswork with calculations therefore advanced that
it'd take years for individual computers to complete them.
On a grid ADPS, the consumer might send the calculation to
the cloud for process. The cloud systemwouldfaucetintothe
process power of all out there computers on the rear finish,
considerably dashing up the calculation.
4.CONCLUSION:
Cloud computing could be a higher thought as a result of we
are able to access our files, pictures and something through
the web, however there are some security problems in
victimization these applications .We have to beat these
security problems and once this we are able to used any
cloud computing applications that’s makescloud computing
higher possibility.
5.REFRENCES:
[1]http://blog.animoto.com/2008/04/21/amazon-ceo-jeff-
bezos-onanimoto/
[2]searchcloudcomputing.techtarget.com/definition/cloud-
computing
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 690
[3]www.infoworld.com/.../cloud-computing/what-cloud-
computing
[4]“Let it rise – A special report on company IT”, The
Economist, Oct twenty fifth, 2008
[5]Jeff Cogswell, “RightScale eases developing on Amazon
EC2” eweek.com, Oct twenty first, 2008
[6]Peter Wayner, “Cloud versus cloud – A guided tour of
Amazon,
[7]James Staten, “Is Cloud Computing prepared for the
Enterprise?”

More Related Content

What's hot

Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
paperpublications3
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Dhaval Dave
 
Cloud security and services
Cloud security and servicesCloud security and services
Cloud security and services
Jas Preet
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
 

What's hot (20)

A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Cloud security
Cloud security Cloud security
Cloud security
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud security and services
Cloud security and servicesCloud security and services
Cloud security and services
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 

Similar to Cloud Computing: Its Applications and Security Issues (A Major Challenge in Cloud Computing Applications)

Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
IAEME Publication
 

Similar to Cloud Computing: Its Applications and Security Issues (A Major Challenge in Cloud Computing Applications) (20)

IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Ey35869874
Ey35869874Ey35869874
Ey35869874
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing Review
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

Cloud Computing: Its Applications and Security Issues (A Major Challenge in Cloud Computing Applications)

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 687 Cloud Computing: Its Applications and Security Issues (A Major Challenge in Cloud Computing Applications) Prof. Mayuri B. Dandwate1, Prof. Rutuja V. Kotkar2 1, 2Assistant professor,PIRENS Institute of Computer Technology(PICT), LONI. ---------------------------------------------------------------------***--------------------------------------------------------------------- ABSTRACT: In this modern technologies world everything becomes terribly immense and a lot of reliable .We makes our documentation on one computer and that we will access and obtain this on alternative system however this will be happened with the assistance of net. The fast improvement of the capability of on-line property gave birth to cloud computing. information and processes can be done on-line while not the necessity of any native package or consumer. As long because the user is aware of the method and has the proper security credentials, he might access the system and create the required changes, however there are major challenges and security problems in cloud computing that creates accessing somewhat tough. During this paper we tend to give a introduction to cloud computing and discussing and overcome this security problems that being returning in cloud computing applications. KEYWORDS: Cloud computing, Hybrid Cloud, Security issues, SaaS, IaaS, PaaS. 1.INTRODUCTION: 1.1 Cloud Computing: It simply, means that "Internet Computing." the web is often envisioned as clouds; therefore the term “cloud computing” for computation done through the web. With Cloud Computing users will access information resources via the web from anyplace, for as long as they have, without fear regarding any maintenance or management of actual resources. Besides, databases in cloud ar terribly dynamic and scalable. Cloud computing is in contrast to grid computing, utility computing, or involuntary computing. In fact, it's a really freelance platform in terms of computing. the simplest example of cloud computing is Google Apps wherever any application may be accessed employing a browser and it may be deployed on thousands of computer through the web. 1.2 Styles of cloud computing services: IT individuals point out 3 totally different forms of cloud computing, wherever totally different services are being provided for you. Infrastructure as a Service (IaaS) means that you are shopping for access to raw computing hardware over Infobahn, like servers or storage. Since you purchase what you would like and pay-as-you-go, typically this can be often remarked as utility computing. Standard net hosting could be a straightforward example of IaaS, you pay a monthly subscription or a per-megabyte/gigabyte fee to possess a hosting company servesup filesfor your web site from their servers. Software as a Service (SaaS) means that you utilize a whole application running on somebody else's system. Web-based email and Google Documents maybe the known examples. Zoho is another well-known SaaS supplier giving a range of workplace applications on-line. Platform as a Service (PaaS) means that you develop applications victimization Web-based tools in order that they run on computer program and hardware provided by another company. Force.com (from salesforce.com) and the Google App Engine are examples of PaaS. 1.3 Form of clouds: Public cloud: A public cloud is one supported the quality cloudcomputing model, within which a service supplier makesresources,like applications and storage, out there to the final public over the web. Cloud services could also be free or offered on a pay-per-usage model. The main advantages of employing a public cloud service are: 1) Easy and cheap set-up as a result of hardware, application and information measure prices and coated by the supplier. 2) Scalability to fulfill wants. 3) No wasted resources Private cloud: Private cloud (also known as internal cloud or company cloud) could be a selling term for a proprietary computing design that has hosted services to a restricted range of individuals behind a firewall.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 688 Hybrid cloud: A hybrid cloud surroundings consisting of multiple internal and/or external suppliers are going to be typical for many enterprises. it's a cloud computing surroundings within which a company providesand manages some resourcesin- house and has others provided outwardly. for instance, a company would possibly use a public cloud service, like Amazon's Elastic calculate Cloud (EC2) for general computing however store client information inside its own information center. 2. RESOLUTION OF SECURITY PROBLEMSINCLOUD COMPUTING: As new technologies emerge, they usually tend to create on the success of previousdevelopments. Cloud computingand storage, enjoy years of development andtestingofenormous scale infrastructure. the foremost vital deduct is cloud storage is for everybody and each organization. From massive to tiny, teams to individual, the employment of grid infrastructure may be deployed for optimum come and potency. In response, Stone soft has known 5 ways that IT groups will shield themselves against cloud security threats and attacks, whereas serving to make sure the success of their cloud computing methods. They include: 2.1 UNITED ID: Inherent in an exceedingly cloud computing surroundingsis that the want for employeesto log into multiple applications and services. This presents a formidable security pitfall, as organizations could lose management over their ability to confirm sturdy authentication at the user level. To mitigate this risk, organizations want “single sign-on” capabilities – like those provided by the Stone Gate SSL VPN – that change usersto access multiple applications and services, aswell as those set outside of the organization within the publiccloud, through one login. With this ability, organizations will contour security management and guarantee sturdy authentication inside the cloud. 2.2 Always-on property: When the bulk of associate organization’s important business information is keep within the cloud, network period will finish off business operations. Access to cloud services should be continuously out there, even throughout maintenance, so requiring high availableness technologies and capabilities like active cluster, dynamic server load leveling and ISP load leveling inside the network infrastructure. Organizations ought to ask for technologies that are engineered into their network solutions, instead of purchase them as standalone merchandise to confirm effectiveness, easy management and reduced network prices. 2.3 Multi-layer review: The rise of the cloud computing surroundings and accrued sophistication of threats has created a desire for a correct bedded defense comprised of perimeter protection and intrusion detection and hindrance capabilities inside the network. instead of implementing first-generation firewalls to shield the cloud at the perimeter, Stone soft recommends the readying of virtual next generation firewall appliances– just like the Stone Gate Virtual Next info Firewall – that integrate advanced firewall and IPS capabilities for deep traffic review. this may enable organizations to examine all levels of traffic, from basic net browsing to peer-to-peer applications and encrypted net traffic within the SSL tunnel. extra IPS appliancesought to be enforced to shieldnetworks from internal attacks that threaten access to the cloud. 2.4 Centralized Management: Human error continues to be the best network security threat facing each physical and virtual computing environments. As firms deploy extra network devices to secure their virtual networks, they exponentially increase this risk as device management, observation and configuration become a lot of tedious and fewer organized. For this reason, Stone soft recommends firms use one management console to manage, monitor and piece all devices – physical, virtual and third-party. 2.5 Virtual Desktop Protection: More and a lot of organizations ar deployingvirtualdesktops to comprehend the price and administration advantages. However, these desktops ar even as – if less – vulnerable than their physical counterparts. To adequately shield virtual desktops, organizations ought to isolate them from alternative network segments and implementdeepreviewat the network level to stop each internal and external threats. Those organizations ought to deploy a multi-pronged approach to security by implementing IPS technology that forestalls prohibited internal access, protects the shoppers from malicious servers, moreover as providing secure remote access capabilities through information science sec
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 689 or SSL VPN that protects against unauthorized external access. 2.6 Information Storage Location: Cloud compliance is tough as a result of {you do you are doing} not understand wherever you information are set. Not solely will a company not understand what's being finished its information, it should not even understand World Health Organization the suppliers ar. Cloud computing models ignore theseissuesandcreatecompliance and verification of compliance tough. 2.7 Security and privacy: First among cloud computing information storage problems is security and privacy indeed, package as a Services (SaaS) supplier could also be counting on alternative external suppliers for its backbone, infrastructure, and information storage. Cloud merchandiser usessecretwritingforsecuring information at rest and in transit. The cloud service supplier ought to encipher information on storage devices the least bit times so as to stop information breaches. firms ought to confirm that their information is protected oncetransmitted over the web by continuously being encrypted and documented by the cloud supplier. 3.CLOUD COMPUTING APPLICATIONS: The applications of cloud computingaremuchlimitless.With the proper middleware, a cloud ADPS might execute all the programs a traditional computermight run. There are some advantages and applications in cloud computingthatcreates it totally different from alternative concepts: 3.1 Shoppers would be able to access their applications and information from anyplace at any time. theymightaccessthe cloud ADPS victimization any computer joined to the web. information would not be confined to a tough drive on one user'scomputer or maybe a corporation'sinternal network. 3.2 It might bring hardware prices down. Cloud computing systems would cut back the necessityforadvancedhardware on the consumer aspect. you would not havetobecompelled to obtain the quickest computer with the foremost memory, as a result of the cloud system would beware of these wants for you. Instead, you may obtain a reasonable computer terminal. The terminal might include a monitor, input devices sort of a keyboard and mouse and merely enough process power to run the middleware necessary to attach to the cloud system. 3.3 Firms that have confidence computers ought to confirm they need the proper package in situ to realize goals. Cloud computing systems provide these organizations company- wide access to computer applications.thebusinesseshaven't got to shop for a group of package or package licenses for each worker. Figure-2: Uses of Cloud Computing 3.4 Servers and digital storage devices take up area. Some firms rent physical area to store servers and databases as a result of they do not have it out there on website. Cloud computing offers these firms the choice of storing information on somebody else's hardware, removing the necessity for physical area on the front. 3.5 Firmswould possibly save cash thereonsupport.efficient hardware would, in theory, have fewer issues than a network of heterogeneous machines and operational systems. 3.6 If the cloud ADPS's face could be a grid computing system, then the consumer might make the most of the whole network's process power. Often, scientists and researcherswork with calculations therefore advanced that it'd take years for individual computers to complete them. On a grid ADPS, the consumer might send the calculation to the cloud for process. The cloud systemwouldfaucetintothe process power of all out there computers on the rear finish, considerably dashing up the calculation. 4.CONCLUSION: Cloud computing could be a higher thought as a result of we are able to access our files, pictures and something through the web, however there are some security problems in victimization these applications .We have to beat these security problems and once this we are able to used any cloud computing applications that’s makescloud computing higher possibility. 5.REFRENCES: [1]http://blog.animoto.com/2008/04/21/amazon-ceo-jeff- bezos-onanimoto/ [2]searchcloudcomputing.techtarget.com/definition/cloud- computing
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 690 [3]www.infoworld.com/.../cloud-computing/what-cloud- computing [4]“Let it rise – A special report on company IT”, The Economist, Oct twenty fifth, 2008 [5]Jeff Cogswell, “RightScale eases developing on Amazon EC2” eweek.com, Oct twenty first, 2008 [6]Peter Wayner, “Cloud versus cloud – A guided tour of Amazon, [7]James Staten, “Is Cloud Computing prepared for the Enterprise?”