More Related Content
Similar to Cloud Computing: Its Applications and Security Issues (A Major Challenge in Cloud Computing Applications) (20)
More from IRJET Journal (20)
Cloud Computing: Its Applications and Security Issues (A Major Challenge in Cloud Computing Applications)
- 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 687
Cloud Computing: Its Applications and Security Issues (A Major
Challenge in Cloud Computing Applications)
Prof. Mayuri B. Dandwate1, Prof. Rutuja V. Kotkar2
1, 2Assistant professor,PIRENS Institute of Computer Technology(PICT), LONI.
---------------------------------------------------------------------***---------------------------------------------------------------------
ABSTRACT: In this modern technologies world everything
becomes terribly immense and a lot of reliable .We makes our
documentation on one computer and that we will access and
obtain this on alternative system however this will be
happened with the assistance of net. The fast improvement of
the capability of on-line property gave birth to cloud
computing. information and processes can be done on-line
while not the necessity of any native package or consumer. As
long because the user is aware of the method and has the
proper security credentials, he might access the system and
create the required changes, however there are major
challenges and security problems in cloud computing that
creates accessing somewhat tough. During this paper we tend
to give a introduction to cloud computing and discussing and
overcome this security problems that being returning in cloud
computing applications.
KEYWORDS: Cloud computing, Hybrid Cloud, Security
issues, SaaS, IaaS, PaaS.
1.INTRODUCTION:
1.1 Cloud Computing:
It simply, means that "Internet Computing." the web is often
envisioned as clouds; therefore the term “cloud computing”
for computation done through the web. With Cloud
Computing users will access information resources via the
web from anyplace, for as long as they have, without fear
regarding any maintenance or management of actual
resources. Besides, databases in cloud ar terribly dynamic
and scalable. Cloud computing is in contrast to grid
computing, utility computing, or involuntary computing. In
fact, it's a really freelance platform in terms of computing.
the simplest example of cloud computing is Google Apps
wherever any application may be accessed employing a
browser and it may be deployed on thousands of computer
through the web.
1.2 Styles of cloud computing services:
IT individuals point out 3 totally different forms of cloud
computing, wherever totally different services are being
provided for you.
Infrastructure as a Service (IaaS) means that you are
shopping for access to raw computing hardware over
Infobahn, like servers or storage. Since you purchase what
you would like and pay-as-you-go, typically this can be often
remarked as utility computing. Standard net hosting could
be a straightforward example of IaaS, you pay a monthly
subscription or a per-megabyte/gigabyte fee to possess a
hosting company servesup filesfor your web site from their
servers.
Software as a Service (SaaS) means that you utilize a whole
application running on somebody else's system. Web-based
email and Google Documents maybe the known examples.
Zoho is another well-known SaaS supplier giving a range of
workplace applications on-line.
Platform as a Service (PaaS) means that you develop
applications victimization Web-based tools in order that
they run on computer program and hardware provided by
another company. Force.com (from salesforce.com) and the
Google App Engine are examples of PaaS.
1.3 Form of clouds:
Public cloud:
A public cloud is one supported the quality cloudcomputing
model, within which a service supplier makesresources,like
applications and storage, out there to the final public over
the web. Cloud services could also be free or offered on a
pay-per-usage model.
The main advantages of employing a public cloud service
are:
1) Easy and cheap set-up as a result of hardware,
application and information measure prices and coated
by the supplier.
2) Scalability to fulfill wants.
3) No wasted resources
Private cloud:
Private cloud (also known as internal cloud or company
cloud) could be a selling term for a proprietary computing
design that has hosted services to a restricted range of
individuals behind a firewall.
- 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 688
Hybrid cloud:
A hybrid cloud surroundings consisting of multiple internal
and/or external suppliers are going to be typical for many
enterprises. it's a cloud computing surroundings within
which a company providesand manages some resourcesin-
house and has others provided outwardly. for instance, a
company would possibly use a public cloud service, like
Amazon's Elastic calculate Cloud (EC2) for general
computing however store client information inside its own
information center.
2. RESOLUTION OF SECURITY PROBLEMSINCLOUD
COMPUTING:
As new technologies emerge, they usually tend to create on
the success of previousdevelopments. Cloud computingand
storage, enjoy years of development andtestingofenormous
scale infrastructure. the foremost vital deduct is cloud
storage is for everybody and each organization. From
massive to tiny, teams to individual, the employment of grid
infrastructure may be deployed for optimum come and
potency. In response, Stone soft has known 5 ways that IT
groups will shield themselves against cloud security threats
and attacks, whereas serving to make sure the success of
their cloud computing methods. They include:
2.1 UNITED ID:
Inherent in an exceedingly cloud computing surroundingsis
that the want for employeesto log into multiple applications
and services. This presents a formidable security pitfall, as
organizations could lose management over their ability to
confirm sturdy authentication at the user level. To mitigate
this risk, organizations want “single sign-on” capabilities –
like those provided by the Stone Gate SSL VPN – that change
usersto access multiple applications and services, aswell as
those set outside of the organization within the publiccloud,
through one login. With this ability, organizations will
contour security management and guarantee sturdy
authentication inside the cloud.
2.2 Always-on property:
When the bulk of associate organization’s important
business information is keep within the cloud, network
period will finish off business operations. Access to cloud
services should be continuously out there, even throughout
maintenance, so requiring high availableness technologies
and capabilities like active cluster, dynamic server load
leveling and ISP load leveling inside the network
infrastructure. Organizations ought to ask for technologies
that are engineered into their network solutions, instead of
purchase them as standalone merchandise to confirm
effectiveness, easy management and reduced network
prices.
2.3 Multi-layer review:
The rise of the cloud computing surroundings and accrued
sophistication of threats has created a desire for a correct
bedded defense comprised of perimeter protection and
intrusion detection and hindrance capabilities inside the
network. instead of implementing first-generation firewalls
to shield the cloud at the perimeter, Stone soft recommends
the readying of virtual next generation firewall appliances–
just like the Stone Gate Virtual Next info Firewall – that
integrate advanced firewall and IPS capabilities for deep
traffic review. this may enable organizations to examine all
levels of traffic, from basic net browsing to peer-to-peer
applications and encrypted net traffic within the SSL tunnel.
extra IPS appliancesought to be enforced to shieldnetworks
from internal attacks that threaten access to the cloud.
2.4 Centralized Management:
Human error continues to be the best network security
threat facing each physical and virtual computing
environments. As firms deploy extra network devices to
secure their virtual networks, they exponentially increase
this risk as device management, observation and
configuration become a lot of tedious and fewer organized.
For this reason, Stone soft recommends firms use one
management console to manage, monitor and piece all
devices – physical, virtual and third-party.
2.5 Virtual Desktop Protection:
More and a lot of organizations ar deployingvirtualdesktops
to comprehend the price and administration advantages.
However, these desktops ar even as – if less – vulnerable
than their physical counterparts. To adequately shield
virtual desktops, organizations ought to isolate them from
alternative network segments and implementdeepreviewat
the network level to stop each internal and external threats.
Those organizations ought to deploy a multi-pronged
approach to security by implementing IPS technology that
forestalls prohibited internal access, protects the shoppers
from malicious servers, moreover as providing secure
remote access capabilities through information science sec
- 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 689
or SSL VPN that protects against unauthorized external
access.
2.6 Information Storage Location:
Cloud compliance is tough as a result of {you do you are
doing} not understand wherever you information are set.
Not solely will a company not understand what's being
finished its information, it should not even understand
World Health Organization the suppliers ar. Cloud
computing models ignore theseissuesandcreatecompliance
and verification of compliance tough.
2.7 Security and privacy:
First among cloud computing information storage problems
is security and privacy indeed, package as a Services (SaaS)
supplier could also be counting on alternative external
suppliers for its backbone, infrastructure, and information
storage. Cloud merchandiser usessecretwritingforsecuring
information at rest and in transit. The cloud service supplier
ought to encipher information on storage devices the least
bit times so as to stop information breaches. firms ought to
confirm that their information is protected oncetransmitted
over the web by continuously being encrypted and
documented by the cloud supplier.
3.CLOUD COMPUTING APPLICATIONS:
The applications of cloud computingaremuchlimitless.With
the proper middleware, a cloud ADPS might execute all the
programs a traditional computermight run. There are some
advantages and applications in cloud computingthatcreates
it totally different from alternative concepts:
3.1 Shoppers would be able to access their applications and
information from anyplace at any time. theymightaccessthe
cloud ADPS victimization any computer joined to the web.
information would not be confined to a tough drive on one
user'scomputer or maybe a corporation'sinternal network.
3.2 It might bring hardware prices down. Cloud computing
systems would cut back the necessityforadvancedhardware
on the consumer aspect. you would not havetobecompelled
to obtain the quickest computer with the foremost memory,
as a result of the cloud system would beware of these wants
for you. Instead, you may obtain a reasonable computer
terminal. The terminal might include a monitor, input
devices sort of a keyboard and mouse and merely enough
process power to run the middleware necessary to attach to
the cloud system.
3.3 Firms that have confidence computers ought to confirm
they need the proper package in situ to realize goals. Cloud
computing systems provide these organizations company-
wide access to computer applications.thebusinesseshaven't
got to shop for a group of package or package licenses for
each worker.
Figure-2: Uses of Cloud Computing
3.4 Servers and digital storage devices take up area. Some
firms rent physical area to store servers and databases as a
result of they do not have it out there on website. Cloud
computing offers these firms the choice of storing
information on somebody else's hardware, removing the
necessity for physical area on the front.
3.5 Firmswould possibly save cash thereonsupport.efficient
hardware would, in theory, have fewer issues than a
network of heterogeneous machines and operational
systems.
3.6 If the cloud ADPS's face could be a grid computing
system, then the consumer might make the most of the
whole network's process power. Often, scientists and
researcherswork with calculations therefore advanced that
it'd take years for individual computers to complete them.
On a grid ADPS, the consumer might send the calculation to
the cloud for process. The cloud systemwouldfaucetintothe
process power of all out there computers on the rear finish,
considerably dashing up the calculation.
4.CONCLUSION:
Cloud computing could be a higher thought as a result of we
are able to access our files, pictures and something through
the web, however there are some security problems in
victimization these applications .We have to beat these
security problems and once this we are able to used any
cloud computing applications that’s makescloud computing
higher possibility.
5.REFRENCES:
[1]http://blog.animoto.com/2008/04/21/amazon-ceo-jeff-
bezos-onanimoto/
[2]searchcloudcomputing.techtarget.com/definition/cloud-
computing
- 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 690
[3]www.infoworld.com/.../cloud-computing/what-cloud-
computing
[4]“Let it rise – A special report on company IT”, The
Economist, Oct twenty fifth, 2008
[5]Jeff Cogswell, “RightScale eases developing on Amazon
EC2” eweek.com, Oct twenty first, 2008
[6]Peter Wayner, “Cloud versus cloud – A guided tour of
Amazon,
[7]James Staten, “Is Cloud Computing prepared for the
Enterprise?”