SlideShare a Scribd company logo
6
International Indexed & Refereed Research Journal, ISSN 0974-2832, (Print), E-ISSN- 2320-5474, July, 2013 VOL-V * ISSUE -54
Research Paper -Computer Science
July, 2013
Introduction
The cloud symbol introduces the functional
area between the provider and the users. Cloud com-
puting technologyis enablingIT industries to do more
with the infrastructure that already exists and also by
adding new ways to expand capacity economically. In
1990s,cloudcomputingcomefromtelecommunication
companies when the VPN services were developed to
provide security and lower cost. Cloud computing
means computing over the internet. Internet is visual-
ized as cloud and the term cloud computing means
computing through internet. Cloud computing is shar-
ingofresourcesviainternet.Usercanaccessdatacenter
and computing resources through the internet from
anywhere. Industries explore CC as a way to reduce
costs and free resource to focus on differentiating
mission critical activates. Security is a major issue in
any cloud computing infrastructure, because it is nec-
essary to ensure that only authorized access is permit-
ted and secure behavior is accepted.
Featuresofcloudcomputing
Cloud computing brings various benefits.
Everyone is thinking about cloud computing from dif-
ferent perspectives. Some emphasize the economic
benefit, while other emphasize about the security.
1. Pricing
Cloud computing is completely based on
usage. It does not have any upfront cost. Resources
can be paid for the incrementally without the need for
the large investment. Therefore, capital costs are re-
duced. This helps the user to track their usage and
ultimately help to reduce cost.
2.Resourcepoolingandelasticity
In CC, resources are pooled to serve a large
number of customers. CC uses multi-tenancy where
difference resources are dynamically allotted and de-
allotted accordingly to demand. The pooling together
CloudComputing:
Features and Security Issues
* Pardeep Seelwal
*Asst.Prof.,J.V.M.G.R.R.(P.G.)College,Dept.ofComputerScience,CharkhiDadri
Today, The number of organization using cloud computing is increasing day by day. Today, IT working most of the work
through computer and internet. Cloud computing provide availability and accessibility of data at very low cost. Cloud
computing is the sharing of resources in distributed organizations cloud, which is consisted of different, organizes and system.
Industries choose cloud as because it is very helpful in fast deployment of the application. This article try to cover the benefits
and security issues of cloud computing.
A B S T R A C T
Keywords: CC-Cloud Computing, VM-Virtual Machine, Security.
of the resource builds economies of scale. Elasticity
defines; it changes appropriately and quickly with the
demand.
3.Datastoragecenter
Cloudprovides largeamountofdata ina cen-
tralized place. The storing capacity may be increased
or decreased as the requirement of the organization
increases or decreases. Data protection, cost efficien-
cies in utilities, real-estate and trained personnel are
the benefits of centralization of data.
4.SelfserviceandOn-demandservice
On-demand Self-service listed by National
Institute of Standards and Technology allows users to
obtain,configureanddeploycloudservicesthemselves
using cloud catalogues, without requiring the assis-
tance of IT. Computer services such as email, applica-
tion, and network as server service can be provided
without requiring human interaction with each service
provider.
5.Multitenancy
Itreferstotheneed forpolicy-drivenenforce-
ment, segmentation, isolation, service levels, gover-
nance and chargeback/billing models for different
consumer's constituencies. Consumers might utilize a
publiccloudprovider'sserviceofferingsoractuallybe
from the same organization.
Security issues in Cloud computing
1. Business continuity
A major risk to business continuity in the cloud
computing environment is loss of internet connectiv-
ity as businesses are dependent on the internet access
to their corporate information.
2.Attackstargetingshared-tenancyenvironment
In the shared-tenancy cloud computing environment,
data from different clients can be hosted on separate
VMs but reside on a single physical machine. In the
resent study, it is possible to map the internal cloud
7SHODH, SAMIKSHA AUR MULYANKAN
International Indexed & Refereed Research Journal, ISSN 0974-2832, (Print), E-ISSN- 2320-5474, July, 2013 VOL-V * ISSUE -54
infrastructure, identifywhere aparticulartarget VM is
likely to reside. By identifying the target VMs, attack-
ers can potentially monitors the cache in order to steal
data hosted on the same physical machine.
3.Botnethosting
Bot malware typically takes advantage of system vul-
nerabilities and software bugs that allows malicious
code to be installed on machines without the owner's
knowledge.Thentheyload themselvesinto computers
often for nefarious purpose.
4.Launchpadfornewattacks
A security consultant recently suggested that it may
be possible to abuse cloud computing services to
launch a brute force attack on various types of pass-
words.
1. "Introducing to Cloud Computing Architecture" Sun Microsystems,1st Edition, June2009"
2. http://www.cloudtweaks.com/2012/09/key-features-of-cloud-computing/
3. http://www.isaca.org/groups/professional-english/cloud-computing/groupdocuments/
essential%20characteristics%20of%20cloud%20computing.pdf
4. en.wikipedia.org/wiki/Cloud_computing
5. International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011
6. Ronald L. Krutz, Russell Dean Vines - Cloud Security A Comprehensive Guide to Secure Cloud Computing 2010
5.VM-basedmalware
Vulnerabilities in VMs can be exploited by
malicious code VM-based root kits designed to infect
bothclientandservermachinesincloudservices.Root
kits are technologies usually employed by other
malware programs to abuse files, registry keys and
other operating system objects from diagnostic,
antivirus and security programs.
Conclusion
Cloud computinghelpsthemodernorganiza-
tion to run their application with minimum chance of
failure. With the help of cloud customer can deploy
their application in very short time frame but there are
risk associated with it also. Aservices-oriented archi-
tecture, reduced information technology overhead for
theend-usergreatflexibility,reducedcost,on-demand
services and many other things.
R E F E R E N C E

More Related Content

What's hot

FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
Anjana Shivangi
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
Ankit Singh
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
Jahangeer Qadiree
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
ijtsrd
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
G033030035
G033030035G033030035
G033030035
ijceronline
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
vivatechijri
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
onlineservice530
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
omkar parab
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
MonishaNehkal
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
Eswar Publications
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Er Piyush Gupta IN ⊞⌘
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Soumitra Halder
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Hossam Al-Ansary
 
A220113
A220113A220113
A220113
irjes
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
archana lisbon
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To Multicloud
Sandip Karale
 

What's hot (20)

FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
G033030035
G033030035G033030035
G033030035
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
A220113
A220113A220113
A220113
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To Multicloud
 

Similar to 6 7

Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
ijcnes
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
ijtsrd
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
Journal For Research
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
IJECEIAES
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
IOSR Journals
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
D045031724
D045031724D045031724
D045031724
IJERA Editor
 
G0314043
G0314043G0314043
G0314043
iosrjournals
 
489 493
489 493489 493
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
eSAT Publishing House
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Cloud security cam ready
Cloud security cam readyCloud security cam ready
Cloud security cam ready
Hai Nguyen
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
IJNSA Journal
 

Similar to 6 7 (20)

Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
D045031724
D045031724D045031724
D045031724
 
G0314043
G0314043G0314043
G0314043
 
489 493
489 493489 493
489 493
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Cloud security cam ready
Cloud security cam readyCloud security cam ready
Cloud security cam ready
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 

More from INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL

Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL
 
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL
 
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL
 
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPERGoel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER

More from INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL (20)

Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
 
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
 
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
 
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPERGoel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 

6 7

  • 1. 6 International Indexed & Refereed Research Journal, ISSN 0974-2832, (Print), E-ISSN- 2320-5474, July, 2013 VOL-V * ISSUE -54 Research Paper -Computer Science July, 2013 Introduction The cloud symbol introduces the functional area between the provider and the users. Cloud com- puting technologyis enablingIT industries to do more with the infrastructure that already exists and also by adding new ways to expand capacity economically. In 1990s,cloudcomputingcomefromtelecommunication companies when the VPN services were developed to provide security and lower cost. Cloud computing means computing over the internet. Internet is visual- ized as cloud and the term cloud computing means computing through internet. Cloud computing is shar- ingofresourcesviainternet.Usercanaccessdatacenter and computing resources through the internet from anywhere. Industries explore CC as a way to reduce costs and free resource to focus on differentiating mission critical activates. Security is a major issue in any cloud computing infrastructure, because it is nec- essary to ensure that only authorized access is permit- ted and secure behavior is accepted. Featuresofcloudcomputing Cloud computing brings various benefits. Everyone is thinking about cloud computing from dif- ferent perspectives. Some emphasize the economic benefit, while other emphasize about the security. 1. Pricing Cloud computing is completely based on usage. It does not have any upfront cost. Resources can be paid for the incrementally without the need for the large investment. Therefore, capital costs are re- duced. This helps the user to track their usage and ultimately help to reduce cost. 2.Resourcepoolingandelasticity In CC, resources are pooled to serve a large number of customers. CC uses multi-tenancy where difference resources are dynamically allotted and de- allotted accordingly to demand. The pooling together CloudComputing: Features and Security Issues * Pardeep Seelwal *Asst.Prof.,J.V.M.G.R.R.(P.G.)College,Dept.ofComputerScience,CharkhiDadri Today, The number of organization using cloud computing is increasing day by day. Today, IT working most of the work through computer and internet. Cloud computing provide availability and accessibility of data at very low cost. Cloud computing is the sharing of resources in distributed organizations cloud, which is consisted of different, organizes and system. Industries choose cloud as because it is very helpful in fast deployment of the application. This article try to cover the benefits and security issues of cloud computing. A B S T R A C T Keywords: CC-Cloud Computing, VM-Virtual Machine, Security. of the resource builds economies of scale. Elasticity defines; it changes appropriately and quickly with the demand. 3.Datastoragecenter Cloudprovides largeamountofdata ina cen- tralized place. The storing capacity may be increased or decreased as the requirement of the organization increases or decreases. Data protection, cost efficien- cies in utilities, real-estate and trained personnel are the benefits of centralization of data. 4.SelfserviceandOn-demandservice On-demand Self-service listed by National Institute of Standards and Technology allows users to obtain,configureanddeploycloudservicesthemselves using cloud catalogues, without requiring the assis- tance of IT. Computer services such as email, applica- tion, and network as server service can be provided without requiring human interaction with each service provider. 5.Multitenancy Itreferstotheneed forpolicy-drivenenforce- ment, segmentation, isolation, service levels, gover- nance and chargeback/billing models for different consumer's constituencies. Consumers might utilize a publiccloudprovider'sserviceofferingsoractuallybe from the same organization. Security issues in Cloud computing 1. Business continuity A major risk to business continuity in the cloud computing environment is loss of internet connectiv- ity as businesses are dependent on the internet access to their corporate information. 2.Attackstargetingshared-tenancyenvironment In the shared-tenancy cloud computing environment, data from different clients can be hosted on separate VMs but reside on a single physical machine. In the resent study, it is possible to map the internal cloud
  • 2. 7SHODH, SAMIKSHA AUR MULYANKAN International Indexed & Refereed Research Journal, ISSN 0974-2832, (Print), E-ISSN- 2320-5474, July, 2013 VOL-V * ISSUE -54 infrastructure, identifywhere aparticulartarget VM is likely to reside. By identifying the target VMs, attack- ers can potentially monitors the cache in order to steal data hosted on the same physical machine. 3.Botnethosting Bot malware typically takes advantage of system vul- nerabilities and software bugs that allows malicious code to be installed on machines without the owner's knowledge.Thentheyload themselvesinto computers often for nefarious purpose. 4.Launchpadfornewattacks A security consultant recently suggested that it may be possible to abuse cloud computing services to launch a brute force attack on various types of pass- words. 1. "Introducing to Cloud Computing Architecture" Sun Microsystems,1st Edition, June2009" 2. http://www.cloudtweaks.com/2012/09/key-features-of-cloud-computing/ 3. http://www.isaca.org/groups/professional-english/cloud-computing/groupdocuments/ essential%20characteristics%20of%20cloud%20computing.pdf 4. en.wikipedia.org/wiki/Cloud_computing 5. International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011 6. Ronald L. Krutz, Russell Dean Vines - Cloud Security A Comprehensive Guide to Secure Cloud Computing 2010 5.VM-basedmalware Vulnerabilities in VMs can be exploited by malicious code VM-based root kits designed to infect bothclientandservermachinesincloudservices.Root kits are technologies usually employed by other malware programs to abuse files, registry keys and other operating system objects from diagnostic, antivirus and security programs. Conclusion Cloud computinghelpsthemodernorganiza- tion to run their application with minimum chance of failure. With the help of cloud customer can deploy their application in very short time frame but there are risk associated with it also. Aservices-oriented archi- tecture, reduced information technology overhead for theend-usergreatflexibility,reducedcost,on-demand services and many other things. R E F E R E N C E