SlideShare uma empresa Scribd logo
1 de 17
SEMINAR REPORT ON
JIIU’S
Jamia Institute of Engineering and Management Studies
Presented By:
Saba Karim
 Introduction
 Cloud Services delivery Model
 Deployment Model
 Cloud advantage
 Security in Cloud
 data security
 Encryption Scheme
 Cloud integrity
 Cloud availability
 Conclusion
 References
Introduction
Cloud computing is an internet-based computing
technology, where shared resources such as software,
platform, storage and information are provided to
customers on demand.
Cloud computing is a computing platform for sharing
resources that include infrastructures, software,
applications, and business processes. .
.
Cloud Services Delivery Model
A cloud services delivery model is
commonly referred to as an SPI and falls
into three generally accepted services:
 The Software-As-a-Service Model
 The Platform-As-a-Service Model
 The Infrastructure-As-a-Service Model
hh
FIG.: Cloud delivery model
Software as a service (SaaS):
Software as a service features a complete
application offered as a service on
demand. A single instance of the
software runs on the cloud and services
multiple end users or client organizations.
.
Infrastructure as a service (IaaS):
Infrastructure as a service delivers basic storage and
computer capabilities as standardized services over
the network. Servers, storage systems, switches,
routers.
Platform as a service (PaaS):
In a platform-as-a-service
(PaaS) model, the vendor offers a
development environment to application
developers, who develop applications and
offer those services through the provider’s
platform.
Deployment Model
Cloud deployment models include:
 Public clouds
 Private clouds
 Community clouds
 Hybrid clouds.
Cloud deployment model
Public Clouds:
Public clouds are external or publicly available
cloud environments that are accessible to
multiple tenants.
Private clouds:
private clouds are typically tailored
environments with dedicated virtualized
resources for particular organizations.
Hybrid clouds:
Hybrid clouds combine both public and private
cloud models. They can help to provide on-
demand, externally provisioned scale.
Community Cloud:
In Community Cloud the cloud
infrastructure is shared by several
organizations and supports a specific
community that has shared concerns (e.g.,
mission, security requirements, policy, or
compliance considerations).
Cloud Advantage
 Agility improves with users' ability to rapidly and inexpensively re-provision
technological infrastructure resources.
 Cost is claimed to be greatly reduced and capital expenditure is converted to
operational expenditure.
 Multi-tenancy enables sharing of resources and costs across a large pool of users .
 Maintenance cloud computing applications are easier to maintain, since they don't
have to be installed on each user's computer.
Security could improve due to centralization of data, increased security-focused
resources, etc
SECURITY IN CLOUD
Data Security:
It focuses on protecting the software
and hardware associated with the cloud.
It deals with choosing an apt locatio
n for data centers so as to protect it from inter
nal threats, different types of weather conditio
ns, fire and even physical attacks that might de
stroy the center physically and external threats
avoiding unauthorized access and break in.
Network Security:
Network security Protecting the
network over which cloud is running from
various attacks DOS, DDOS, IP Spoofing, ARP
Spoofing and any novel attacks that
intruders may device.
Backups of Data
• Data store in database of provider should be redundantly store
in multiple physical location.
• Data that is generated during running of program on instances
is all customer data and therefore provider should not perform
backups.
• Control of Administrator on Databases.
Encryption Scheme
• Is it possible for all of my data to be fully encrypted?
• What algorithms are used?
• Who holds, maintains and issues the keys?
Problem:
• Encryption accidents can make data totally unusable.
• Encryption can complicate availability
Solution :
• The cloud provider should provide evidence that encryption schemes were
designed and tested by experienced specialists
Cloud Integrity
Integrity is a degree confidence that the data in the cloud is what is
supposed to be there, and is protected against accidental or intentional
alteration without authorization.
It also extends to the hurdles of synchronizing multiple databases.
Integrity is supported by well audited code, well-designed distributed
systems, and robust access control mechanisms.
Cloud Availability
Availability means being able to use the system as anticipated.
Cloud technologies can increase availability through widespread internet
enabled access, but the client is dependent on the timely and robust provision
of resources.
Availability is supported by capacity building and good architecture by the
provider, as well as well-defined contracts and terms of agreement.
Conclusion
Every new technology has its pros and cons, similar is the case with cloud computing.
Although cloud computing provides easy data storage and access. But there are several
issues related to storing and managing data, that is not controlled by owner of the data.
This attack attempts to prevent the data available to its intended users. The last
issue is cloud privacy and it is similar to cloud confidentiality. if cloud confidentiality is at
risk, cloud privacy will also be at risk.
Wang, Q, Wan, K. Ren nd Wenjing Lou, "Privacy-Preserving Public Auditing for Data StorageSecurity in
Cloud Computing", Infocom, Proceedings IEEE, 2010, pp.1-9.
Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Com-puting", in International
Conference on Computer Science and Electronics Engineer-ing(ICCSEE), 2012, vol.1, pp.647-651.
Xiao and Y. Xiao, "Security and Privacy in Cloud Computing ",IEEE Commun. Surveys and Tutorials, vol.
15, no.2, pp.843 - 859, Second quarter 2013.
Ren, C. Wang and Q. Wang, "Security Challenges for the Public Cloud", Internet Computing, IEEE ,
vol.16, no.1, pp.69-73, Jan/Feb 2012.
REFERENCES
Security in cloud computing

Mais conteúdo relacionado

Mais procurados

What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
Israel Marcus
 
Parallel programming using python
Parallel programming using python Parallel programming using python
Parallel programming using python
Samah Gad
 

Mais procurados (20)

Machine Learning using Support Vector Machine
Machine Learning using Support Vector MachineMachine Learning using Support Vector Machine
Machine Learning using Support Vector Machine
 
Scripting languages
Scripting languagesScripting languages
Scripting languages
 
Extensible hashing
Extensible hashingExtensible hashing
Extensible hashing
 
Decision Tree Learning
Decision Tree LearningDecision Tree Learning
Decision Tree Learning
 
Modules and packages in python
Modules and packages in pythonModules and packages in python
Modules and packages in python
 
Php Presentation
Php PresentationPhp Presentation
Php Presentation
 
Php array
Php arrayPhp array
Php array
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
Virtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference ModelVirtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference Model
 
Javascript arrays
Javascript arraysJavascript arrays
Javascript arrays
 
Web Terminology
Web TerminologyWeb Terminology
Web Terminology
 
NumPy.pptx
NumPy.pptxNumPy.pptx
NumPy.pptx
 
Parallel programming using python
Parallel programming using python Parallel programming using python
Parallel programming using python
 
3.2 partitioning methods
3.2 partitioning methods3.2 partitioning methods
3.2 partitioning methods
 
Learn 90% of Python in 90 Minutes
Learn 90% of Python in 90 MinutesLearn 90% of Python in 90 Minutes
Learn 90% of Python in 90 Minutes
 
Unit-I: Introduction to Cloud Computing
Unit-I: Introduction to Cloud ComputingUnit-I: Introduction to Cloud Computing
Unit-I: Introduction to Cloud Computing
 
Private Cloud Architecture
Private Cloud ArchitecturePrivate Cloud Architecture
Private Cloud Architecture
 
Python Basics
Python BasicsPython Basics
Python Basics
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 
Data mining Measuring similarity and desimilarity
Data mining Measuring similarity and desimilarityData mining Measuring similarity and desimilarity
Data mining Measuring similarity and desimilarity
 

Semelhante a Security in cloud computing

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
A220113
A220113A220113
A220113
irjes
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 

Semelhante a Security in cloud computing (20)

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Cloud security
Cloud securityCloud security
Cloud security
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
A220113
A220113A220113
A220113
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Clouding computing
Clouding computingClouding computing
Clouding computing
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Mais de Er. Saba karim

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Er. Saba karim
 

Mais de Er. Saba karim (8)

eye gaze
eye gazeeye gaze
eye gaze
 
Wireless USB
Wireless USBWireless USB
Wireless USB
 
Wireless USB
Wireless USBWireless USB
Wireless USB
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Eye Gaze
Eye GazeEye Gaze
Eye Gaze
 
Underwater Wireless Communication”,
Underwater Wireless Communication”,Underwater Wireless Communication”,
Underwater Wireless Communication”,
 
security in cloud computing
security in cloud computingsecurity in cloud computing
security in cloud computing
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communication
 

Último

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

Security in cloud computing

  • 1. SEMINAR REPORT ON JIIU’S Jamia Institute of Engineering and Management Studies Presented By: Saba Karim
  • 2.  Introduction  Cloud Services delivery Model  Deployment Model  Cloud advantage  Security in Cloud  data security  Encryption Scheme  Cloud integrity  Cloud availability  Conclusion  References
  • 3. Introduction Cloud computing is an internet-based computing technology, where shared resources such as software, platform, storage and information are provided to customers on demand. Cloud computing is a computing platform for sharing resources that include infrastructures, software, applications, and business processes. . .
  • 4. Cloud Services Delivery Model A cloud services delivery model is commonly referred to as an SPI and falls into three generally accepted services:  The Software-As-a-Service Model  The Platform-As-a-Service Model  The Infrastructure-As-a-Service Model hh FIG.: Cloud delivery model
  • 5. Software as a service (SaaS): Software as a service features a complete application offered as a service on demand. A single instance of the software runs on the cloud and services multiple end users or client organizations. . Infrastructure as a service (IaaS): Infrastructure as a service delivers basic storage and computer capabilities as standardized services over the network. Servers, storage systems, switches, routers. Platform as a service (PaaS): In a platform-as-a-service (PaaS) model, the vendor offers a development environment to application developers, who develop applications and offer those services through the provider’s platform.
  • 6. Deployment Model Cloud deployment models include:  Public clouds  Private clouds  Community clouds  Hybrid clouds. Cloud deployment model
  • 7. Public Clouds: Public clouds are external or publicly available cloud environments that are accessible to multiple tenants. Private clouds: private clouds are typically tailored environments with dedicated virtualized resources for particular organizations.
  • 8. Hybrid clouds: Hybrid clouds combine both public and private cloud models. They can help to provide on- demand, externally provisioned scale. Community Cloud: In Community Cloud the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, or compliance considerations).
  • 9. Cloud Advantage  Agility improves with users' ability to rapidly and inexpensively re-provision technological infrastructure resources.  Cost is claimed to be greatly reduced and capital expenditure is converted to operational expenditure.  Multi-tenancy enables sharing of resources and costs across a large pool of users .  Maintenance cloud computing applications are easier to maintain, since they don't have to be installed on each user's computer. Security could improve due to centralization of data, increased security-focused resources, etc
  • 10. SECURITY IN CLOUD Data Security: It focuses on protecting the software and hardware associated with the cloud. It deals with choosing an apt locatio n for data centers so as to protect it from inter nal threats, different types of weather conditio ns, fire and even physical attacks that might de stroy the center physically and external threats avoiding unauthorized access and break in. Network Security: Network security Protecting the network over which cloud is running from various attacks DOS, DDOS, IP Spoofing, ARP Spoofing and any novel attacks that intruders may device.
  • 11. Backups of Data • Data store in database of provider should be redundantly store in multiple physical location. • Data that is generated during running of program on instances is all customer data and therefore provider should not perform backups. • Control of Administrator on Databases.
  • 12. Encryption Scheme • Is it possible for all of my data to be fully encrypted? • What algorithms are used? • Who holds, maintains and issues the keys? Problem: • Encryption accidents can make data totally unusable. • Encryption can complicate availability Solution : • The cloud provider should provide evidence that encryption schemes were designed and tested by experienced specialists
  • 13. Cloud Integrity Integrity is a degree confidence that the data in the cloud is what is supposed to be there, and is protected against accidental or intentional alteration without authorization. It also extends to the hurdles of synchronizing multiple databases. Integrity is supported by well audited code, well-designed distributed systems, and robust access control mechanisms.
  • 14. Cloud Availability Availability means being able to use the system as anticipated. Cloud technologies can increase availability through widespread internet enabled access, but the client is dependent on the timely and robust provision of resources. Availability is supported by capacity building and good architecture by the provider, as well as well-defined contracts and terms of agreement.
  • 15. Conclusion Every new technology has its pros and cons, similar is the case with cloud computing. Although cloud computing provides easy data storage and access. But there are several issues related to storing and managing data, that is not controlled by owner of the data. This attack attempts to prevent the data available to its intended users. The last issue is cloud privacy and it is similar to cloud confidentiality. if cloud confidentiality is at risk, cloud privacy will also be at risk.
  • 16. Wang, Q, Wan, K. Ren nd Wenjing Lou, "Privacy-Preserving Public Auditing for Data StorageSecurity in Cloud Computing", Infocom, Proceedings IEEE, 2010, pp.1-9. Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Com-puting", in International Conference on Computer Science and Electronics Engineer-ing(ICCSEE), 2012, vol.1, pp.647-651. Xiao and Y. Xiao, "Security and Privacy in Cloud Computing ",IEEE Commun. Surveys and Tutorials, vol. 15, no.2, pp.843 - 859, Second quarter 2013. Ren, C. Wang and Q. Wang, "Security Challenges for the Public Cloud", Internet Computing, IEEE , vol.16, no.1, pp.69-73, Jan/Feb 2012. REFERENCES