SlideShare a Scribd company logo
1 of 8
Implications of Security issues in cloud computing
 Cloud computing is the use of computing resources (hardware and software)
that are delivered as a service over a network.
Cloud computing allows application software to be operated using
internet-enabled devices. Clouds can be classified as public, private, and
hybrid
 This Emerging computing paradigm offers attractive financial and
technological advantages.
 cloud computing infrastructures use new technologies and services, some
of which haven’t been fully evaluated with respect to security.
 Security is considered one of the most critical aspects in everyday
computing, and it is no different for cloud computing due to the sensitivity
and importance of data stored in the cloud. Cloud computing infrastructures
use new technologies and services, most which haven’t been fully evaluated
with respect to security.
• Cloud services are very exciting and useful, but have
many open security issues. One issue with cloud
computing is that the management of the data might not
be fully trustworthy
• The risk of malicious insiders in the cloud and the
failing of cloud services have received a strong attention
by companies. Security is a troubling concern for cloud
computing as shown in a Survey conducted by the IDC
enterprise panel which confirms that Security is the top
concern of cloud users.
• Cloud Security is one of the major issue that need to be
addressed in allow faster growth of cloud computing.
• Cloud Computing has several major issues and
concerns, such as data security, trust,
expectations, regulations, and performance
issues.
• The aim of this research is to examine the major
security issues affecting Cloud Systems and the
solutions available.
• Research is currently being done on the different
known issues faced by cloud systems and possible
solutions for these issues, however there is still a
need for better solutions if cloud systems are to
be widely adopted.
• One of the main problems that need to be addressed is
coming up with a clear and standardized format for the
Service Level Agreement (SLA), a format that fully
documents all of the services, what services and processes
would be provided by the service provider to back up its
assurances. When customers have the right level of
expectations and the insecurities are deemed manageable,
cloud computing as a whole will gain ground and take
hold as usable technology.
• Another major issue cloud systems face is Encryption.
Encryption is the main method of ensuring security of data
stored in the cloud; however, encryption is computationally
expensive. Encryption methods specific to DaaS (Cloud
Databases) has been developed and more research is
currently being done on Encryption mechanisms for cloud
systems, however, more efficient methods are still needed
to help accelerate the adoption of cloud systems.
Current Problems and Solutions
• Trust
• Legal Issues
• Confidentiality
• Authenticity (Integrity and Completeness)
• Encryption
– Querying Encrypted Data
– Key Management
– Data Splitting
– Multi-clouds Database Model (MCDB)
Multi-Tenancy
Virtual Machine Attacks
Shared Resources
• 1) Encryption techniques using hash function
with cryptographic nonce number
• 2) with out concern of third party(service
provider) end user has to store and retrieve
data with encrypted form.( traffic
confidentiality .. Ip based routing ).
• SLA
• Username password

More Related Content

What's hot

6.introducing private clouds
6.introducing private clouds6.introducing private clouds
6.introducing private cloudsDrRajapraveenkN
 
Cloud Computing and Distance Education
Cloud Computing and Distance EducationCloud Computing and Distance Education
Cloud Computing and Distance EducationRoryMcGreal
 
Group 2 - Cloud Storage
Group 2 - Cloud StorageGroup 2 - Cloud Storage
Group 2 - Cloud Storage12201375
 
Cloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITCloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITPrismITsolutions
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceAsim Kumar Pathak
 
What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?Dell World
 
Gov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGovCloud Network
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
Cloud computing
Cloud computingCloud computing
Cloud computingjhoejoe
 
IBM Smarter Campus-Cloud Computing in Education
IBM Smarter Campus-Cloud Computing in EducationIBM Smarter Campus-Cloud Computing in Education
IBM Smarter Campus-Cloud Computing in EducationJyothi Satyanathan
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityMamta Saxena
 
Halloween Infographic
Halloween InfographicHalloween Infographic
Halloween InfographicNetAppUK
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introductionRameshKante
 
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...Kenneth Moore
 
Citrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackneyCitrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackneyGreythornAU
 
Challenges of Cloud Computing
Challenges of Cloud ComputingChallenges of Cloud Computing
Challenges of Cloud Computinglavanyamohan45
 
Data Science for Effective Network Operations
Data Science for Effective Network OperationsData Science for Effective Network Operations
Data Science for Effective Network OperationsKiran Inampudi
 

What's hot (20)

6.introducing private clouds
6.introducing private clouds6.introducing private clouds
6.introducing private clouds
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing and Distance Education
Cloud Computing and Distance EducationCloud Computing and Distance Education
Cloud Computing and Distance Education
 
Group 2 - Cloud Storage
Group 2 - Cloud StorageGroup 2 - Cloud Storage
Group 2 - Cloud Storage
 
Cloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITCloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismIT
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governance
 
What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?
 
Gov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_final
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
IBM Smarter Campus-Cloud Computing in Education
IBM Smarter Campus-Cloud Computing in EducationIBM Smarter Campus-Cloud Computing in Education
IBM Smarter Campus-Cloud Computing in Education
 
Impact2
Impact2Impact2
Impact2
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Halloween Infographic
Halloween InfographicHalloween Infographic
Halloween Infographic
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
 
Citrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackneyCitrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackney
 
Challenges of Cloud Computing
Challenges of Cloud ComputingChallenges of Cloud Computing
Challenges of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Data Science for Effective Network Operations
Data Science for Effective Network OperationsData Science for Effective Network Operations
Data Science for Effective Network Operations
 

Similar to Ph d abstract

Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxMuhammadArslan799356
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing CeleraNetworks
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futuredailytimeupdate.com
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewPeter HJ van Eijk
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges RohitKumar3153
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 

Similar to Ph d abstract (20)

Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Cloud security
Cloud securityCloud security
Cloud security
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overview
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
70 74
70 7470 74
70 74
 
Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
B018211016
B018211016B018211016
B018211016
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Ph d abstract

  • 1. Implications of Security issues in cloud computing  Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network. Cloud computing allows application software to be operated using internet-enabled devices. Clouds can be classified as public, private, and hybrid  This Emerging computing paradigm offers attractive financial and technological advantages.  cloud computing infrastructures use new technologies and services, some of which haven’t been fully evaluated with respect to security.  Security is considered one of the most critical aspects in everyday computing, and it is no different for cloud computing due to the sensitivity and importance of data stored in the cloud. Cloud computing infrastructures use new technologies and services, most which haven’t been fully evaluated with respect to security.
  • 2.
  • 3. • Cloud services are very exciting and useful, but have many open security issues. One issue with cloud computing is that the management of the data might not be fully trustworthy • The risk of malicious insiders in the cloud and the failing of cloud services have received a strong attention by companies. Security is a troubling concern for cloud computing as shown in a Survey conducted by the IDC enterprise panel which confirms that Security is the top concern of cloud users. • Cloud Security is one of the major issue that need to be addressed in allow faster growth of cloud computing.
  • 4. • Cloud Computing has several major issues and concerns, such as data security, trust, expectations, regulations, and performance issues. • The aim of this research is to examine the major security issues affecting Cloud Systems and the solutions available. • Research is currently being done on the different known issues faced by cloud systems and possible solutions for these issues, however there is still a need for better solutions if cloud systems are to be widely adopted.
  • 5. • One of the main problems that need to be addressed is coming up with a clear and standardized format for the Service Level Agreement (SLA), a format that fully documents all of the services, what services and processes would be provided by the service provider to back up its assurances. When customers have the right level of expectations and the insecurities are deemed manageable, cloud computing as a whole will gain ground and take hold as usable technology.
  • 6. • Another major issue cloud systems face is Encryption. Encryption is the main method of ensuring security of data stored in the cloud; however, encryption is computationally expensive. Encryption methods specific to DaaS (Cloud Databases) has been developed and more research is currently being done on Encryption mechanisms for cloud systems, however, more efficient methods are still needed to help accelerate the adoption of cloud systems.
  • 7. Current Problems and Solutions • Trust • Legal Issues • Confidentiality • Authenticity (Integrity and Completeness) • Encryption – Querying Encrypted Data – Key Management – Data Splitting – Multi-clouds Database Model (MCDB) Multi-Tenancy Virtual Machine Attacks Shared Resources
  • 8. • 1) Encryption techniques using hash function with cryptographic nonce number • 2) with out concern of third party(service provider) end user has to store and retrieve data with encrypted form.( traffic confidentiality .. Ip based routing ). • SLA • Username password

Editor's Notes

  1. nu
  2. Nonce number: a number or bit string used only once, in security engineering.