1. 6
International Indexed & Refereed Research Journal, ISSN 0974-2832, (Print), E-ISSN- 2320-5474, July, 2013 VOL-V * ISSUE -54
Research Paper -Computer Science
July, 2013
Introduction
The cloud symbol introduces the functional
area between the provider and the users. Cloud com-
puting technologyis enablingIT industries to do more
with the infrastructure that already exists and also by
adding new ways to expand capacity economically. In
1990s,cloudcomputingcomefromtelecommunication
companies when the VPN services were developed to
provide security and lower cost. Cloud computing
means computing over the internet. Internet is visual-
ized as cloud and the term cloud computing means
computing through internet. Cloud computing is shar-
ingofresourcesviainternet.Usercanaccessdatacenter
and computing resources through the internet from
anywhere. Industries explore CC as a way to reduce
costs and free resource to focus on differentiating
mission critical activates. Security is a major issue in
any cloud computing infrastructure, because it is nec-
essary to ensure that only authorized access is permit-
ted and secure behavior is accepted.
Featuresofcloudcomputing
Cloud computing brings various benefits.
Everyone is thinking about cloud computing from dif-
ferent perspectives. Some emphasize the economic
benefit, while other emphasize about the security.
1. Pricing
Cloud computing is completely based on
usage. It does not have any upfront cost. Resources
can be paid for the incrementally without the need for
the large investment. Therefore, capital costs are re-
duced. This helps the user to track their usage and
ultimately help to reduce cost.
2.Resourcepoolingandelasticity
In CC, resources are pooled to serve a large
number of customers. CC uses multi-tenancy where
difference resources are dynamically allotted and de-
allotted accordingly to demand. The pooling together
CloudComputing:
Features and Security Issues
* Pardeep Seelwal
*Asst.Prof.,J.V.M.G.R.R.(P.G.)College,Dept.ofComputerScience,CharkhiDadri
Today, The number of organization using cloud computing is increasing day by day. Today, IT working most of the work
through computer and internet. Cloud computing provide availability and accessibility of data at very low cost. Cloud
computing is the sharing of resources in distributed organizations cloud, which is consisted of different, organizes and system.
Industries choose cloud as because it is very helpful in fast deployment of the application. This article try to cover the benefits
and security issues of cloud computing.
A B S T R A C T
Keywords: CC-Cloud Computing, VM-Virtual Machine, Security.
of the resource builds economies of scale. Elasticity
defines; it changes appropriately and quickly with the
demand.
3.Datastoragecenter
Cloudprovides largeamountofdata ina cen-
tralized place. The storing capacity may be increased
or decreased as the requirement of the organization
increases or decreases. Data protection, cost efficien-
cies in utilities, real-estate and trained personnel are
the benefits of centralization of data.
4.SelfserviceandOn-demandservice
On-demand Self-service listed by National
Institute of Standards and Technology allows users to
obtain,configureanddeploycloudservicesthemselves
using cloud catalogues, without requiring the assis-
tance of IT. Computer services such as email, applica-
tion, and network as server service can be provided
without requiring human interaction with each service
provider.
5.Multitenancy
Itreferstotheneed forpolicy-drivenenforce-
ment, segmentation, isolation, service levels, gover-
nance and chargeback/billing models for different
consumer's constituencies. Consumers might utilize a
publiccloudprovider'sserviceofferingsoractuallybe
from the same organization.
Security issues in Cloud computing
1. Business continuity
A major risk to business continuity in the cloud
computing environment is loss of internet connectiv-
ity as businesses are dependent on the internet access
to their corporate information.
2.Attackstargetingshared-tenancyenvironment
In the shared-tenancy cloud computing environment,
data from different clients can be hosted on separate
VMs but reside on a single physical machine. In the
resent study, it is possible to map the internal cloud
2. 7SHODH, SAMIKSHA AUR MULYANKAN
International Indexed & Refereed Research Journal, ISSN 0974-2832, (Print), E-ISSN- 2320-5474, July, 2013 VOL-V * ISSUE -54
infrastructure, identifywhere aparticulartarget VM is
likely to reside. By identifying the target VMs, attack-
ers can potentially monitors the cache in order to steal
data hosted on the same physical machine.
3.Botnethosting
Bot malware typically takes advantage of system vul-
nerabilities and software bugs that allows malicious
code to be installed on machines without the owner's
knowledge.Thentheyload themselvesinto computers
often for nefarious purpose.
4.Launchpadfornewattacks
A security consultant recently suggested that it may
be possible to abuse cloud computing services to
launch a brute force attack on various types of pass-
words.
1. "Introducing to Cloud Computing Architecture" Sun Microsystems,1st Edition, June2009"
2. http://www.cloudtweaks.com/2012/09/key-features-of-cloud-computing/
3. http://www.isaca.org/groups/professional-english/cloud-computing/groupdocuments/
essential%20characteristics%20of%20cloud%20computing.pdf
4. en.wikipedia.org/wiki/Cloud_computing
5. International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011
6. Ronald L. Krutz, Russell Dean Vines - Cloud Security A Comprehensive Guide to Secure Cloud Computing 2010
5.VM-basedmalware
Vulnerabilities in VMs can be exploited by
malicious code VM-based root kits designed to infect
bothclientandservermachinesincloudservices.Root
kits are technologies usually employed by other
malware programs to abuse files, registry keys and
other operating system objects from diagnostic,
antivirus and security programs.
Conclusion
Cloud computinghelpsthemodernorganiza-
tion to run their application with minimum chance of
failure. With the help of cloud customer can deploy
their application in very short time frame but there are
risk associated with it also. Aservices-oriented archi-
tecture, reduced information technology overhead for
theend-usergreatflexibility,reducedcost,on-demand
services and many other things.
R E F E R E N C E