SlideShare a Scribd company logo
Implications of Security issues in cloud computing
 Cloud computing is the use of computing resources (hardware and software)
that are delivered as a service over a network.
Cloud computing allows application software to be operated using
internet-enabled devices. Clouds can be classified as public, private, and
hybrid
 This Emerging computing paradigm offers attractive financial and
technological advantages.
 cloud computing infrastructures use new technologies and services, some
of which haven’t been fully evaluated with respect to security.
 Security is considered one of the most critical aspects in everyday
computing, and it is no different for cloud computing due to the sensitivity
and importance of data stored in the cloud. Cloud computing infrastructures
use new technologies and services, most which haven’t been fully evaluated
with respect to security.
• Cloud services are very exciting and useful, but have
many open security issues. One issue with cloud
computing is that the management of the data might not
be fully trustworthy
• The risk of malicious insiders in the cloud and the
failing of cloud services have received a strong attention
by companies. Security is a troubling concern for cloud
computing as shown in a Survey conducted by the IDC
enterprise panel which confirms that Security is the top
concern of cloud users.
• Cloud Security is one of the major issue that need to be
addressed in allow faster growth of cloud computing.
• Cloud Computing has several major issues and
concerns, such as data security, trust,
expectations, regulations, and performance
issues.
• The aim of this research is to examine the major
security issues affecting Cloud Systems and the
solutions available.
• Research is currently being done on the different
known issues faced by cloud systems and possible
solutions for these issues, however there is still a
need for better solutions if cloud systems are to
be widely adopted.
• One of the main problems that need to be addressed is
coming up with a clear and standardized format for the
Service Level Agreement (SLA), a format that fully
documents all of the services, what services and processes
would be provided by the service provider to back up its
assurances. When customers have the right level of
expectations and the insecurities are deemed manageable,
cloud computing as a whole will gain ground and take
hold as usable technology.
• Another major issue cloud systems face is Encryption.
Encryption is the main method of ensuring security of data
stored in the cloud; however, encryption is computationally
expensive. Encryption methods specific to DaaS (Cloud
Databases) has been developed and more research is
currently being done on Encryption mechanisms for cloud
systems, however, more efficient methods are still needed
to help accelerate the adoption of cloud systems.
Current Problems and Solutions
• Trust
• Legal Issues
• Confidentiality
• Authenticity (Integrity and Completeness)
• Encryption
– Querying Encrypted Data
– Key Management
– Data Splitting
– Multi-clouds Database Model (MCDB)
Multi-Tenancy
Virtual Machine Attacks
Shared Resources
• 1) Encryption techniques using hash function
with cryptographic nonce number
• 2) with out concern of third party(service
provider) end user has to store and retrieve
data with encrypted form.( traffic
confidentiality .. Ip based routing ).
• SLA
• Username password

More Related Content

What's hot

6.introducing private clouds
6.introducing private clouds6.introducing private clouds
6.introducing private clouds
DrRajapraveenkN
 
Cloud computing
Cloud computingCloud computing
Cloud computing
radhika jain
 
Cloud Computing and Distance Education
Cloud Computing and Distance EducationCloud Computing and Distance Education
Cloud Computing and Distance Education
RoryMcGreal
 
Group 2 - Cloud Storage
Group 2 - Cloud StorageGroup 2 - Cloud Storage
Group 2 - Cloud Storage
12201375
 
Cloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITCloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismIT
PrismITsolutions
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governance
Asim Kumar Pathak
 
What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?
Dell World
 
Gov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_final
GovCloud Network
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
Dell World
 
Cloud computing
Cloud computingCloud computing
Cloud computing
jhoejoe
 
IBM Smarter Campus-Cloud Computing in Education
IBM Smarter Campus-Cloud Computing in EducationIBM Smarter Campus-Cloud Computing in Education
IBM Smarter Campus-Cloud Computing in EducationJyothi Satyanathan
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityMamta Saxena
 
Halloween Infographic
Halloween InfographicHalloween Infographic
Halloween Infographic
NetAppUK
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introductionRameshKante
 
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
Kenneth Moore
 
Citrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackneyCitrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackneyGreythornAU
 
Challenges of Cloud Computing
Challenges of Cloud ComputingChallenges of Cloud Computing
Challenges of Cloud Computing
lavanyamohan45
 
Cloud computing
Cloud computingCloud computing
Cloud computing
David Martin
 
Data Science for Effective Network Operations
Data Science for Effective Network OperationsData Science for Effective Network Operations
Data Science for Effective Network Operations
Kiran Inampudi
 

What's hot (20)

6.introducing private clouds
6.introducing private clouds6.introducing private clouds
6.introducing private clouds
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing and Distance Education
Cloud Computing and Distance EducationCloud Computing and Distance Education
Cloud Computing and Distance Education
 
Group 2 - Cloud Storage
Group 2 - Cloud StorageGroup 2 - Cloud Storage
Group 2 - Cloud Storage
 
Cloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITCloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismIT
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governance
 
What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?
 
Gov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_final
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
IBM Smarter Campus-Cloud Computing in Education
IBM Smarter Campus-Cloud Computing in EducationIBM Smarter Campus-Cloud Computing in Education
IBM Smarter Campus-Cloud Computing in Education
 
Impact2
Impact2Impact2
Impact2
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Halloween Infographic
Halloween InfographicHalloween Infographic
Halloween Infographic
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
 
Citrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackneyCitrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackney
 
Challenges of Cloud Computing
Challenges of Cloud ComputingChallenges of Cloud Computing
Challenges of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Data Science for Effective Network Operations
Data Science for Effective Network OperationsData Science for Effective Network Operations
Data Science for Effective Network Operations
 

Similar to cloud abstract

Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
 
Cloud security
Cloud securityCloud security
Cloud security
Niharika Varshney
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
IJERA Editor
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
MuhammadArslan799356
 
Exploring the Applications of Cloud Computing in the IT Industry.pdf
Exploring the Applications of Cloud Computing in the IT Industry.pdfExploring the Applications of Cloud Computing in the IT Industry.pdf
Exploring the Applications of Cloud Computing in the IT Industry.pdf
TechnoMark Solutions
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
CeleraNetworks
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
dailytimeupdate.com
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
cscpconf
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
csandit
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overview
Peter HJ van Eijk
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Azhar Hassan
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
shafzonly
 
Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges
RohitKumar3153
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
B018211016
B018211016B018211016
B018211016
IOSR Journals
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
Pradeep Muralidhar
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
AJASTJournal
 

Similar to cloud abstract (20)

Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Cloud security
Cloud securityCloud security
Cloud security
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
Exploring the Applications of Cloud Computing in the IT Industry.pdf
Exploring the Applications of Cloud Computing in the IT Industry.pdfExploring the Applications of Cloud Computing in the IT Industry.pdf
Exploring the Applications of Cloud Computing in the IT Industry.pdf
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overview
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
70 74
70 7470 74
70 74
 
Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
B018211016
B018211016B018211016
B018211016
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

cloud abstract

  • 1. Implications of Security issues in cloud computing  Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network. Cloud computing allows application software to be operated using internet-enabled devices. Clouds can be classified as public, private, and hybrid  This Emerging computing paradigm offers attractive financial and technological advantages.  cloud computing infrastructures use new technologies and services, some of which haven’t been fully evaluated with respect to security.  Security is considered one of the most critical aspects in everyday computing, and it is no different for cloud computing due to the sensitivity and importance of data stored in the cloud. Cloud computing infrastructures use new technologies and services, most which haven’t been fully evaluated with respect to security.
  • 2.
  • 3. • Cloud services are very exciting and useful, but have many open security issues. One issue with cloud computing is that the management of the data might not be fully trustworthy • The risk of malicious insiders in the cloud and the failing of cloud services have received a strong attention by companies. Security is a troubling concern for cloud computing as shown in a Survey conducted by the IDC enterprise panel which confirms that Security is the top concern of cloud users. • Cloud Security is one of the major issue that need to be addressed in allow faster growth of cloud computing.
  • 4. • Cloud Computing has several major issues and concerns, such as data security, trust, expectations, regulations, and performance issues. • The aim of this research is to examine the major security issues affecting Cloud Systems and the solutions available. • Research is currently being done on the different known issues faced by cloud systems and possible solutions for these issues, however there is still a need for better solutions if cloud systems are to be widely adopted.
  • 5. • One of the main problems that need to be addressed is coming up with a clear and standardized format for the Service Level Agreement (SLA), a format that fully documents all of the services, what services and processes would be provided by the service provider to back up its assurances. When customers have the right level of expectations and the insecurities are deemed manageable, cloud computing as a whole will gain ground and take hold as usable technology.
  • 6. • Another major issue cloud systems face is Encryption. Encryption is the main method of ensuring security of data stored in the cloud; however, encryption is computationally expensive. Encryption methods specific to DaaS (Cloud Databases) has been developed and more research is currently being done on Encryption mechanisms for cloud systems, however, more efficient methods are still needed to help accelerate the adoption of cloud systems.
  • 7. Current Problems and Solutions • Trust • Legal Issues • Confidentiality • Authenticity (Integrity and Completeness) • Encryption – Querying Encrypted Data – Key Management – Data Splitting – Multi-clouds Database Model (MCDB) Multi-Tenancy Virtual Machine Attacks Shared Resources
  • 8. • 1) Encryption techniques using hash function with cryptographic nonce number • 2) with out concern of third party(service provider) end user has to store and retrieve data with encrypted form.( traffic confidentiality .. Ip based routing ). • SLA • Username password

Editor's Notes

  1. nu
  2. Nonce number: a number or bit string used only once, in security engineering.