SlideShare a Scribd company logo
CLOUD SERVICES AND
SECURITY.
Presented by: Jaspreet Kaur
Shipra Kataria
PEC UNIVERSITY OF TECHNOLOGY
Cloud Computing
 Cloud computing involves distributed computing over
a network, where a program or application may run on
many connected computers at the same time.
 It has been considered as one of the most promising
solutions to our increasing demand for accessing and
using resources provisioned over the Internet.
 The concept of this new trend originated in 1960 was
used by telecommunication companies
 A study by Gartner considered Cloud Computing as the
first among the top 10 most important technologies.
 Cloud computing exhibits the following key
characteristics.
a. Broad Network Access
b. Rapid Elasticity
c. Measured Service
d. On demand self service
e. Resource Pooling
Service Delivery Model
 Cloud Software as a Service(SaaS): SaaS also referred as "on-
demand software" is a software delivery model in which software
and associated data are centrally hosted in the cloud.
 Cloud Platform as a Service(PaaS): PaaS is a cloud computing
service providing computing platform and solution stack s a service. It
provides capability to consumer to deploy onto the cloud
infrastructure.
 Cloud Infrastructure as a Service(IaaS): IaaS service model
provides the consumer the efficiency to provision storage, network,
processing and other computing resources
Cloud Deployed models
 Public Cloud: In this type of cloud, the cloud infrastructure is
managed by an organization selling cloud services. Various service
providers like Amazon, Microsoft, Google own all infrastructure at
their data centre. Public cloud services may be free or offered on a pay
per-usage model.
 Private Cloud: In this type of cloud the infrastructure is available
only to specific customer and placed within the internal data center of
an organization. It is managed either by an organization itself or third
party service provider.
 Community Cloud: This type of cloud infrastructure is
controlled and shared by various organizations from the same
community with common community concerns.
 Hybrid Cloud: The cloud infrastructure is a mixture of two or
more clouds either public, private or community that are
managed centrally and circumscribed by a secure network. It
allows multiple entities to access the cloud through Internet in
a secure way than public clouds.
NIST Visual Model of cloud
computing
Cloud Computing Security
Scenario
The fame of cloud computing is due to the fact that many enterprise
applications and data are moving towards cloud platforms but lack of
security is the major obstacle for cloud adoption.
According to a recent survey by International Data Corporation (IDC)
87.5 % of the masses belonging to varied levels starting from IT
executives to CEOs have said that security is the top most challenge to
be dealt with in every cloud service. Security is the primary concern
and the greatest inhibitor in cloud computing.
VARIOUS THREATS
Threat is a potential cause of an incident, that may result in harm of
systems and organization. Following are the threats that illustrate
possibility of compromising an entire cloud network.
1.Abuse of cloud computing: This threat is related to shortcomings of
registration process associated with cloud. Examples includes
Info Stealer Trojan horses and downloads for Microsoft Office and
Adobe PDF exploits.
2. Insecure interfaces and API: Sometimes in cloud the information
that is not deleted could reside in insecure locations which may cause
inconsistency. Examples including flexible access controls ad improper
authorizations, limited monitoring and logging capabilities
Continued….
3. Data Loss or Leakage: Threats related to data loss or
leakage depends upon how data is organized or structured.
Following terms that should keep in mind while protecting
data from any loss or leakage.
 The data of organizations should reside in servers of other
nations.
 Unauthorized parties must be prevented from gaining access
to sensitive data.
 The data retained on Cloud provider should reside on
provider's server for the same duration even after it has been
deleted by client.
Examples are insufficient client authentication, authorization
and audit controls (AAA)
Continued..
4. Malevolence: This threat originates due to lack of transparency into
provider's process and procedures. If the factors affecting hiring of new
employee are not considered it may provide opportunity to adversary to
harvest confidential data or gain complete control over the cloud services
with little or no risk of detection.
5. Virtualization threats: It introduces some kind of risks to its applications:
 Dependency on Secure Hypervisor: The security can be
breached here as all the information is stored with a common storage
system. By gaining access to this information, adversary can launch
many attacks like VM Hijack attack.
RISKS INVOLVED
 Risk is an expose to danger, harm, or loss. Their are
certain risks in residing data at providers
infrastructure which are as follows:
 Shared Access
 Vulnerabilities
 Virtual Exploits
 Authentication, Authorization & Access Control
 Availability
 Ownership
Service & Security Offerings and
Compliance
 Google apps & Google Engine
 Amazon Web Services
Google Apps & Google
Engine
 Google Apps is a service from Google that
provides independently customizable versions
of several Google products using a domain
name provided by the customer.
 Features several Web applications with similar
functionality including Gmail, Google Calendar,
Docs, Drive, Groups, News, Play, Sites, Talk.
 Google Apps has passed FISMA certification
meaning that they are compliant with federal law
for holding data for government agencies.
Google Apps controls &
Protocols
 Logical security
 Privacy
 Data center physical security
 Incident management and availability
 Change management
 Organization and administration
Two factor authentication
 First Step: login using the username and
password. This is an application of the
knowledge factor.
 Implementation of second step:
 Phone's IMEI International Mobile Station
Equipement Identity
 Access to their services is HTTPS enabled so
data can be protected in transit.
Continued…
 Data stored on Google’s servers is replicated
to several data centers so even a major outage
to a data center does not destroy the data.
 Google also performs internal audits of their
application code, as well as having external
audits.
 Physical access to data centers is restricted to
an as-needed basis and the data centers
themselves have network and power
redundancies.
Geographical Location
Control Environment
 Amazon Web Services abbreviated as AWS is
a collection of remote computing services that
together make up a cloud computing platform.
 Amazon Elastic compute cloud is meant for
providing a complete rented computer that can
be used by users for its computer utility.
 Goal is to protect data against unauthorized
systems or users and to provide Amazon EC2
instances
Amazon Elastic Compute Cloud
Multiple levels of security
 Host Operating system
 Guest Operating system
 Firewall
Services
 Well known services are Amazon EC2, S3 and
Amazon SimpleDB
 Elastic Compute Cloud(EC2): It provides a virtual
rented computer with the help of Xen.
 Simple Storage Service: It provides storage to
various applications so that users can do
computations and developments onto that space
and store them for further use.
 Amazon Virtual Private Cloud: It creates a
logically isolated set of Amazon EC2 instances
which can be connected to an existing network
using a VPN connection.
Hypervisor
 It is conceptually one level higher than a
supervisory program.
 The hypervisor presents to the guest operating
systems a virtual operating platform and manages
the execution of the guest operating systems.
 Multiple instances of a variety of operating
systems may share the virtualized hardware
resources
 Amazon EC2 currently utilizes a highly
customized version of the Xen hypervisor, taking
advantage of paravirtualization
Instance Isolation
 Different instances running on the same
physical machine are isolated from each other
via the Xen hypervisor.
 AWS firewall resides within the hypervisor
layer, between the physical network interface
and the instance's virtual interface
 All packets must pass through this layer, thus
an instances neighbors have no more access
to that instance
Instance Isolation
Countermeasures
 Authentications and ID
Management
 Workload analysis and allocation
 Use of Data Encryption
 Better Enterprise Infrastructure
Conclusion & Future Scope
 The classification of various threats discussed
in this paper helps the cloud users to make out
proper choice and also help cloud providers to
handle such threats efficiently.
 Various Cloud Providers like Amazon, Google
& Windows Azure are liable to users in their
services.
 The future work done by authors would
comprise developing a model to detect and
prevent the most common Virtualization
related threats various risks.
Please Ask…
Cloud security and services

More Related Content

What's hot

Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
Jyoti Srivastava
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
Aleem Mohammed
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
vidhya dharmarajan
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Ashish Patel
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Cloud computing & IAAS  The Dual Edged Sword of New Technology Cloud computing & IAAS  The Dual Edged Sword of New Technology
Cloud computing & IAAS The Dual Edged Sword of New Technology
Mekhi Da ‘Quay Daniels
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
Rugby7277
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
PhD Services
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and management
Shamsundar Machale (CISSP, CEH)
 
Cloud security
Cloud security Cloud security
Cloud security
Mohamed Shalash
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
Ankit Singh
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
SlideTeam
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
ClubHack
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
shafzonly
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
bhanu krishna
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Venkateswar Reddy Melachervu
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
Maganathin Veeraragaloo
 

What's hot (20)

Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Cloud computing & IAAS  The Dual Edged Sword of New Technology Cloud computing & IAAS  The Dual Edged Sword of New Technology
Cloud computing & IAAS The Dual Edged Sword of New Technology
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and management
 
Cloud security
Cloud security Cloud security
Cloud security
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
 

Viewers also liked

World Aquaculture Adelaide 2014
World Aquaculture Adelaide 2014World Aquaculture Adelaide 2014
World Aquaculture Adelaide 2014progressive01
 
Séptima semana
Séptima semanaSéptima semana
Séptima semana
Gabriel García Torres
 
Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)
Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)
Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)Luca Parasiliti
 
Petar michev-2014.eng-1
Petar michev-2014.eng-1Petar michev-2014.eng-1
Petar michev-2014.eng-1
Sim Aleksiev
 
PyATL Meetup, Oct 8, 2015
PyATL Meetup, Oct 8, 2015PyATL Meetup, Oct 8, 2015
PyATL Meetup, Oct 8, 2015
Roy Russo
 
CLASS NO.1 DARVIN D. ARANDA
CLASS NO.1 DARVIN D. ARANDACLASS NO.1 DARVIN D. ARANDA
CLASS NO.1 DARVIN D. ARANDA
asesor2013
 
INFORME SOBRE ESTRUCURAS
INFORME SOBRE ESTRUCURASINFORME SOBRE ESTRUCURAS
INFORME SOBRE ESTRUCURAS
Universidad De Pamplona
 
Purelea
PureleaPurelea
Purelea
Lyle Kim
 
Weather forecast
Weather forecastWeather forecast
Weather forecast
sanjoel
 
Databaseadminppt3663
Databaseadminppt3663Databaseadminppt3663
Databaseadminppt3663
Sonam Sharma
 
Bg 14-q-&-a
Bg 14-q-&-aBg 14-q-&-a
dissertationforum.org
dissertationforum.orgdissertationforum.org
dissertationforum.org
dissertationfor
 
001
001001
Ролевой коучинг в ситуации кризиса и санкций.
Ролевой коучинг в ситуации кризиса и санкций.Ролевой коучинг в ситуации кризиса и санкций.
Ролевой коучинг в ситуации кризиса и санкций.
Елена Виль-Вильямс
 
Как я провел каникулы
Как я провел каникулыКак я провел каникулы
Как я провел каникулы
Ivan Borisov
 
Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2
Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2
Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2
progressive01
 
Renault can clip v131 installation manual
Renault can clip v131 installation manualRenault can clip v131 installation manual
Renault can clip v131 installation manual
David Wu
 
แนวข้อสอบภาษาต่างประเทศ นสต ม6
แนวข้อสอบภาษาต่างประเทศ นสต ม6แนวข้อสอบภาษาต่างประเทศ นสต ม6
แนวข้อสอบภาษาต่างประเทศ นสต ม6Marr Ps
 

Viewers also liked (20)

Ktchen 1
Ktchen 1Ktchen 1
Ktchen 1
 
World Aquaculture Adelaide 2014
World Aquaculture Adelaide 2014World Aquaculture Adelaide 2014
World Aquaculture Adelaide 2014
 
Séptima semana
Séptima semanaSéptima semana
Séptima semana
 
Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)
Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)
Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)
 
Petar michev-2014.eng-1
Petar michev-2014.eng-1Petar michev-2014.eng-1
Petar michev-2014.eng-1
 
PyATL Meetup, Oct 8, 2015
PyATL Meetup, Oct 8, 2015PyATL Meetup, Oct 8, 2015
PyATL Meetup, Oct 8, 2015
 
CLASS NO.1 DARVIN D. ARANDA
CLASS NO.1 DARVIN D. ARANDACLASS NO.1 DARVIN D. ARANDA
CLASS NO.1 DARVIN D. ARANDA
 
INFORME SOBRE ESTRUCURAS
INFORME SOBRE ESTRUCURASINFORME SOBRE ESTRUCURAS
INFORME SOBRE ESTRUCURAS
 
Purelea
PureleaPurelea
Purelea
 
Weather forecast
Weather forecastWeather forecast
Weather forecast
 
Databaseadminppt3663
Databaseadminppt3663Databaseadminppt3663
Databaseadminppt3663
 
Productes area assegurances
Productes area assegurancesProductes area assegurances
Productes area assegurances
 
Bg 14-q-&-a
Bg 14-q-&-aBg 14-q-&-a
Bg 14-q-&-a
 
dissertationforum.org
dissertationforum.orgdissertationforum.org
dissertationforum.org
 
001
001001
001
 
Ролевой коучинг в ситуации кризиса и санкций.
Ролевой коучинг в ситуации кризиса и санкций.Ролевой коучинг в ситуации кризиса и санкций.
Ролевой коучинг в ситуации кризиса и санкций.
 
Как я провел каникулы
Как я провел каникулыКак я провел каникулы
Как я провел каникулы
 
Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2
Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2
Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2
 
Renault can clip v131 installation manual
Renault can clip v131 installation manualRenault can clip v131 installation manual
Renault can clip v131 installation manual
 
แนวข้อสอบภาษาต่างประเทศ นสต ม6
แนวข้อสอบภาษาต่างประเทศ นสต ม6แนวข้อสอบภาษาต่างประเทศ นสต ม6
แนวข้อสอบภาษาต่างประเทศ นสต ม6
 

Similar to Cloud security and services

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Fog doc
Fog doc Fog doc
Fog doc
priyanka reddy
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Er Piyush Gupta IN ⊞⌘
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Dulith Kasun
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
Suranga Nisiwasala
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
ronak patel
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
Tony Godfrey
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
Techsparks
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
shafzonly
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
IIJSRJournal
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
Gopal Jogdand
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
vijay_m_chaudhary
 
cloud1_aggy.pdf
cloud1_aggy.pdfcloud1_aggy.pdf
cloud1_aggy.pdf
AkhileshKumar241470
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
Puneet Arora
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER
 

Similar to Cloud security and services (20)

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
cloud1_aggy.pdf
cloud1_aggy.pdfcloud1_aggy.pdf
cloud1_aggy.pdf
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 

Recently uploaded

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 

Recently uploaded (20)

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 

Cloud security and services

  • 1. CLOUD SERVICES AND SECURITY. Presented by: Jaspreet Kaur Shipra Kataria PEC UNIVERSITY OF TECHNOLOGY
  • 2. Cloud Computing  Cloud computing involves distributed computing over a network, where a program or application may run on many connected computers at the same time.  It has been considered as one of the most promising solutions to our increasing demand for accessing and using resources provisioned over the Internet.  The concept of this new trend originated in 1960 was used by telecommunication companies
  • 3.  A study by Gartner considered Cloud Computing as the first among the top 10 most important technologies.  Cloud computing exhibits the following key characteristics. a. Broad Network Access b. Rapid Elasticity c. Measured Service d. On demand self service e. Resource Pooling
  • 4. Service Delivery Model  Cloud Software as a Service(SaaS): SaaS also referred as "on- demand software" is a software delivery model in which software and associated data are centrally hosted in the cloud.  Cloud Platform as a Service(PaaS): PaaS is a cloud computing service providing computing platform and solution stack s a service. It provides capability to consumer to deploy onto the cloud infrastructure.  Cloud Infrastructure as a Service(IaaS): IaaS service model provides the consumer the efficiency to provision storage, network, processing and other computing resources
  • 5. Cloud Deployed models  Public Cloud: In this type of cloud, the cloud infrastructure is managed by an organization selling cloud services. Various service providers like Amazon, Microsoft, Google own all infrastructure at their data centre. Public cloud services may be free or offered on a pay per-usage model.  Private Cloud: In this type of cloud the infrastructure is available only to specific customer and placed within the internal data center of an organization. It is managed either by an organization itself or third party service provider.
  • 6.  Community Cloud: This type of cloud infrastructure is controlled and shared by various organizations from the same community with common community concerns.  Hybrid Cloud: The cloud infrastructure is a mixture of two or more clouds either public, private or community that are managed centrally and circumscribed by a secure network. It allows multiple entities to access the cloud through Internet in a secure way than public clouds.
  • 7. NIST Visual Model of cloud computing
  • 8. Cloud Computing Security Scenario The fame of cloud computing is due to the fact that many enterprise applications and data are moving towards cloud platforms but lack of security is the major obstacle for cloud adoption. According to a recent survey by International Data Corporation (IDC) 87.5 % of the masses belonging to varied levels starting from IT executives to CEOs have said that security is the top most challenge to be dealt with in every cloud service. Security is the primary concern and the greatest inhibitor in cloud computing.
  • 9. VARIOUS THREATS Threat is a potential cause of an incident, that may result in harm of systems and organization. Following are the threats that illustrate possibility of compromising an entire cloud network. 1.Abuse of cloud computing: This threat is related to shortcomings of registration process associated with cloud. Examples includes Info Stealer Trojan horses and downloads for Microsoft Office and Adobe PDF exploits. 2. Insecure interfaces and API: Sometimes in cloud the information that is not deleted could reside in insecure locations which may cause inconsistency. Examples including flexible access controls ad improper authorizations, limited monitoring and logging capabilities
  • 10. Continued…. 3. Data Loss or Leakage: Threats related to data loss or leakage depends upon how data is organized or structured. Following terms that should keep in mind while protecting data from any loss or leakage.  The data of organizations should reside in servers of other nations.  Unauthorized parties must be prevented from gaining access to sensitive data.  The data retained on Cloud provider should reside on provider's server for the same duration even after it has been deleted by client. Examples are insufficient client authentication, authorization and audit controls (AAA)
  • 11. Continued.. 4. Malevolence: This threat originates due to lack of transparency into provider's process and procedures. If the factors affecting hiring of new employee are not considered it may provide opportunity to adversary to harvest confidential data or gain complete control over the cloud services with little or no risk of detection. 5. Virtualization threats: It introduces some kind of risks to its applications:  Dependency on Secure Hypervisor: The security can be breached here as all the information is stored with a common storage system. By gaining access to this information, adversary can launch many attacks like VM Hijack attack.
  • 12. RISKS INVOLVED  Risk is an expose to danger, harm, or loss. Their are certain risks in residing data at providers infrastructure which are as follows:  Shared Access  Vulnerabilities  Virtual Exploits  Authentication, Authorization & Access Control  Availability  Ownership
  • 13. Service & Security Offerings and Compliance  Google apps & Google Engine  Amazon Web Services
  • 14.
  • 15. Google Apps & Google Engine  Google Apps is a service from Google that provides independently customizable versions of several Google products using a domain name provided by the customer.  Features several Web applications with similar functionality including Gmail, Google Calendar, Docs, Drive, Groups, News, Play, Sites, Talk.  Google Apps has passed FISMA certification meaning that they are compliant with federal law for holding data for government agencies.
  • 16. Google Apps controls & Protocols  Logical security  Privacy  Data center physical security  Incident management and availability  Change management  Organization and administration
  • 17. Two factor authentication  First Step: login using the username and password. This is an application of the knowledge factor.  Implementation of second step:  Phone's IMEI International Mobile Station Equipement Identity  Access to their services is HTTPS enabled so data can be protected in transit.
  • 18. Continued…  Data stored on Google’s servers is replicated to several data centers so even a major outage to a data center does not destroy the data.  Google also performs internal audits of their application code, as well as having external audits.  Physical access to data centers is restricted to an as-needed basis and the data centers themselves have network and power redundancies.
  • 19.
  • 21. Control Environment  Amazon Web Services abbreviated as AWS is a collection of remote computing services that together make up a cloud computing platform.  Amazon Elastic compute cloud is meant for providing a complete rented computer that can be used by users for its computer utility.  Goal is to protect data against unauthorized systems or users and to provide Amazon EC2 instances
  • 23. Multiple levels of security  Host Operating system  Guest Operating system  Firewall
  • 24. Services  Well known services are Amazon EC2, S3 and Amazon SimpleDB  Elastic Compute Cloud(EC2): It provides a virtual rented computer with the help of Xen.  Simple Storage Service: It provides storage to various applications so that users can do computations and developments onto that space and store them for further use.  Amazon Virtual Private Cloud: It creates a logically isolated set of Amazon EC2 instances which can be connected to an existing network using a VPN connection.
  • 25. Hypervisor  It is conceptually one level higher than a supervisory program.  The hypervisor presents to the guest operating systems a virtual operating platform and manages the execution of the guest operating systems.  Multiple instances of a variety of operating systems may share the virtualized hardware resources  Amazon EC2 currently utilizes a highly customized version of the Xen hypervisor, taking advantage of paravirtualization
  • 26. Instance Isolation  Different instances running on the same physical machine are isolated from each other via the Xen hypervisor.  AWS firewall resides within the hypervisor layer, between the physical network interface and the instance's virtual interface  All packets must pass through this layer, thus an instances neighbors have no more access to that instance
  • 28. Countermeasures  Authentications and ID Management  Workload analysis and allocation  Use of Data Encryption  Better Enterprise Infrastructure
  • 29. Conclusion & Future Scope  The classification of various threats discussed in this paper helps the cloud users to make out proper choice and also help cloud providers to handle such threats efficiently.  Various Cloud Providers like Amazon, Google & Windows Azure are liable to users in their services.  The future work done by authors would comprise developing a model to detect and prevent the most common Virtualization related threats various risks.