SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
International Journal of Allied Practice, Research and Review
Website: www.ijaprr.com (ISSN 2350-1294)
Cloud Computing: Unexampled firmness of purpose
of Java Technologies as for Security vulnerabilities
and Cloud user’s Interaction on the Web.
1
Dr. Tejinder Singh
Assistant Professor of Computer Science and Deputy Dean IRP, Baba Farid College,
Bathinda, Email: - tejinder31.singh@gmail.com
Abstract - Here in this paper, we explore comparative study to analyze the cloud computing with the use of Java Technologies.
Cloud computing is a natural firmness of purpose for data and computation centers with automated systems management,
workload balancing, and virtualization technologies. A mounting number of vendors are contribution Java Platform as a Service
(PaaS) solutions that support the Java Standard Edition (JSE) and JEE standard. Java EE 7 Provides more or less additional
functionality even you can handle the security purpose and applications on the web community. We have seen that Java EE is the
major enterprise platform with millions of lines of code available in the data centers, a path to move them to Cloud will be very
attractive to enterprises. As a security issues on cloud environment data transfer, data sharing and user permission’s which form
could be accessed on via cloud computing. Java EE 7 be responsible for regarding data transfer and user permissions. In this
paper, the author discuss security issues, privacy and control issues, accessibility issues, confidentiality, integrity of data and
many more for cloud computing And discuss, three cloud service models were compared; cloud security risks and threats were
investigated based on the nature of the cloud service models.
Keywords: J2EE, Enterprise; Security; Users; Applications
I. Introduction
As presently, java introduces the concept of cloud computing with the Enterprise technology. Java
provides the environment for cloud, Service engines provide logic in the environment, such as XSL
(Extensible Stylesheet Language) transformation or BPEL (Business Process Execution Language)
orchestration. Binding components are sort of "connectors" to external services or applications. They
allow communication with various protocols, such as SOAP, REST, Java Message Service, or ebXML.
Especially if you mean the enterprise as we know it today. While there are important security, privacy and
regulatory issues that enterprises need to sort through before full migration to the cloud, and cloud
vendors need to strengthen cloud capabilities in these areas before enterprise applications can be
effectively hosted in the cloud, there are benefits that cloud technologies do offer today that can be
leveraged in the deployment of many enterprise applications [1]. In simple words, Cloud computing is the
combination of a technology, platform that provides hosting and storage service on the Internet. Cloud
computing aims to provide scalable and inexpensive on -demand computing infrastructures with good
quality of service levels. “A model for enabling convenient, on-demand network access to a shared pool
of configurable service delivery models coexist in one cloud platform the security management process
[2].
IJAPRR Page 1
Figure 1: Cloud Service models
II. Cloud Computing Threats
Cloud computing faces just as much security threats that are currently found in the existing computing
platforms, networks, intranets, internets in enterprises. These threats, risk vulnerabilities come in
various forms. It identified the following seven major threats: [3].
 Abuse and Nefarious Use of Cloud Computing
 Insecure Application Programming Interfaces
 Malicious Insiders
 Shared Technology Vulnerabilities
 Data Loss/Leakage
 Account, Service & Traffic Hijacking
 Unknown Risk Profile
III. Cloud Security
with the security risk and vulnerability in the enterprise cloud computing that are being discovered
enterprises that want to proceed with cloud computing should, use the following steps to verify and
understand cloud security provided by a cloud provider: [3]
 Understand the cloud
 Demand Transparency
 Reinforce Internal Security
 Consider the Legal Implications
 Pay attention
a. Issues to Clarify Before Adopting Cloud Computing
An enterprise cloud computing user should address with cloud computing providers before adopting: [3]
 User Access
IJAPRR Page 2
 Regulatory Compliance
 Data location
 Data Segregation
 Disaster Recovery Verification
 Disaster Recovery
 Long-term Viability
IV. Data Security on the Cloud Side
From the laaS on the bottom foundation layer to the PaaS on the middle layer and the SaaS on the top
layer, cloud storage is always an important key factor for implement the application of cloud computing.
lasS layer is supporting the networking service. In the following, some consideration regarding the
security issue for device and equipment must be focused.
 Storage and system protection
 Data protection
Encrypt those confidential file or sensitive data before uploading. After then, those encrypted data could
be uploading to the storage designated and provided by service provider of the cloud computing through
secure channel. The demonstrated operating process is shown [4]
Figure 2: Data Encryption before Uploading
V. Java Vulnerabilities for Cloud
Over the years that the X-Force team has been tracking Security incidents, the overall attack tactics
and techniques have not changed significantly. The number of overall incidents has increased, the amount
of traffic used in distributed-denial-of-service (DDoS) attacks has multiplied and the number of leaked
records has been steadily rising. They successfully exploited vulnerable web applications with attacks
such as SQL injection (SQLi) and cross-site scripting (XSS), as well as utilized a mix of sophisticated and
generally accessible toolkits to gain critical points of entry. [5]
IJAPRR Page 3
Figure 3. Most-Commonly Attacked Industries
Figure 4. Most-Common Attack Types
An analysis of X-Force threat intelligence data during the month of December, 2013 reveals that out of a
survey of more than one million Trusteer banking and enterprise customers, the most targeted applications
were Oracle Java, Adobe Reader and popular browsers.[5]
Figure 5. Exploitation of application vulnerabilities
IJAPRR Page 4
Disclosure comes in the form of two detailed reports
 Weaknesses with the PaaS’s implementation and configuration.
 Opportunities for users to access other users’ applications, and, most importantly,
• Issues that could expose the service platform to attacks from remotely executed code.
VI Conclusion
In this paper I have provided some information regarding java Vulnerabilities for cloud web
applications and others. I have showing the survey report e-force that it is shown in figures most-common
attack types
Cloud security and most common attacked Industries. The advent of cloud computing emphasizes the
importance of service availability; in fact, for an increasing number of mission-critical applications,
availability becomes subject to contractual obligations. We present evidence that the infrastructure that
underlies, and the applications that rely upon, cloud computing undergo a fast-paced evolution.
VII References
[1] "Cloud computing A collection of working papers", Thomas B Winans , John Seely Brown, 2009 Deloitte Development
LLC., www.deloitte.com
[2] "Security Issues with Possible Solutions in Cloud Computing-A Survey", Abhinay B.Angadi, Akshata B.Angadi, Karuna
C.Gull, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 2, Issue 2,
February 2013, ISSN: 2278 – 1323, pp-652-661.
[3] "AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING", Anthony Bisong1
and Syed (Shawon) M. Rahman, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January
2011, PP-30-45.
[4] "Information Security Issue of Enterprises Adopting the Application of Cloud Computing", Chang-Lung Tsai Uei-Chin
Lin Allen Y. Chang Chun-Jung Chen, National Science Council and Chinese Culture University of Taiwan, R.O.C., PP-648-
649.
[5] “IBM X-Force Threat Intelligence Quarterly 1Q 2014”, IBM Security Systems, February 2014.
[6] “Cloud Software Upgrades: Challenges and Opportunities”, Iulian Neamtiu, Department of Computer Science and
Engineering University of California, Riverside Email: neamtiu@cs.ucr.edu
[7]” Security Vulnerability Notice” ,SE-2013-01-ORACLE,Security vulnerabilities in Oracle Java Cloud Service, Issues 1-
28.
IJAPRR Page 5

Mais conteúdo relacionado

Mais procurados

A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework forIJCNCJournal
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 

Mais procurados (20)

A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
B1802041217
B1802041217B1802041217
B1802041217
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework for
 
J3602068071
J3602068071J3602068071
J3602068071
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 

Semelhante a Ijaprr vol1-1-1-5dr tejinder

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...Claire Webber
 
Literature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesLiterature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesIJCSIS Research Publications
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingYolanda Ivey
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGijitcs
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture IJECEIAES
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunalKashyap Kunal
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docxRAHUL126667
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 

Semelhante a Ijaprr vol1-1-1-5dr tejinder (20)

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
 
Literature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesLiterature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and Techniques
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
G0314043
G0314043G0314043
G0314043
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
489 493
489 493489 493
489 493
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
H046053944
H046053944H046053944
H046053944
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 

Mais de ijaprr_editor

32 ijaprr vol1-4-36-42ramesh
32 ijaprr vol1-4-36-42ramesh32 ijaprr vol1-4-36-42ramesh
32 ijaprr vol1-4-36-42rameshijaprr_editor
 
31 ijaprr vol1-4-29-35harmeet
31 ijaprr vol1-4-29-35harmeet31 ijaprr vol1-4-29-35harmeet
31 ijaprr vol1-4-29-35harmeetijaprr_editor
 
30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syedijaprr_editor
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishorijaprr_editor
 
28 ijaprr vol1-4-01-13ritaaabi
28 ijaprr vol1-4-01-13ritaaabi28 ijaprr vol1-4-01-13ritaaabi
28 ijaprr vol1-4-01-13ritaaabiijaprr_editor
 
27 ijaprr vol1-3-47-53dharam
27 ijaprr vol1-3-47-53dharam27 ijaprr vol1-3-47-53dharam
27 ijaprr vol1-3-47-53dharamijaprr_editor
 
26 ijaprr vol1-3-42-46praveen
26 ijaprr vol1-3-42-46praveen26 ijaprr vol1-3-42-46praveen
26 ijaprr vol1-3-42-46praveenijaprr_editor
 
25 ijaprr vol1-3-38-41nagaveni
25 ijaprr vol1-3-38-41nagaveni25 ijaprr vol1-3-38-41nagaveni
25 ijaprr vol1-3-38-41nagaveniijaprr_editor
 
24 ijaprr vol1-3-32-37nasir
24 ijaprr vol1-3-32-37nasir24 ijaprr vol1-3-32-37nasir
24 ijaprr vol1-3-32-37nasirijaprr_editor
 
23 ijaprr vol1-3-25-31iqra
23 ijaprr vol1-3-25-31iqra23 ijaprr vol1-3-25-31iqra
23 ijaprr vol1-3-25-31iqraijaprr_editor
 
22 ijaprr vol1-3-18-24babita
22 ijaprr vol1-3-18-24babita22 ijaprr vol1-3-18-24babita
22 ijaprr vol1-3-18-24babitaijaprr_editor
 
21 ijaprr vol1-3-12-17juni
21 ijaprr vol1-3-12-17juni21 ijaprr vol1-3-12-17juni
21 ijaprr vol1-3-12-17juniijaprr_editor
 
20 ijaprr vol1-3-7-11tushar
20 ijaprr vol1-3-7-11tushar20 ijaprr vol1-3-7-11tushar
20 ijaprr vol1-3-7-11tusharijaprr_editor
 
19 ijaprr vol1-3-1-6dkpandey
19 ijaprr vol1-3-1-6dkpandey19 ijaprr vol1-3-1-6dkpandey
19 ijaprr vol1-3-1-6dkpandeyijaprr_editor
 
Ijaprr vol1-2-18-92-96laxmiv1
Ijaprr vol1-2-18-92-96laxmiv1Ijaprr vol1-2-18-92-96laxmiv1
Ijaprr vol1-2-18-92-96laxmiv1ijaprr_editor
 
Ijaprr vol1-2-17-85-91shailesh
Ijaprr vol1-2-17-85-91shaileshIjaprr vol1-2-17-85-91shailesh
Ijaprr vol1-2-17-85-91shaileshijaprr_editor
 
Ijaprr vol1-2-16-80-84laxmi
Ijaprr vol1-2-16-80-84laxmiIjaprr vol1-2-16-80-84laxmi
Ijaprr vol1-2-16-80-84laxmiijaprr_editor
 
Ijaprr vol1-2-15-74-79rajeshshiv
Ijaprr vol1-2-15-74-79rajeshshivIjaprr vol1-2-15-74-79rajeshshiv
Ijaprr vol1-2-15-74-79rajeshshivijaprr_editor
 
Ijaprr vol1-2-14-65-73rmpawar
Ijaprr vol1-2-14-65-73rmpawarIjaprr vol1-2-14-65-73rmpawar
Ijaprr vol1-2-14-65-73rmpawarijaprr_editor
 
Ijaprr vol1-2-13-60-64tejinder
Ijaprr vol1-2-13-60-64tejinderIjaprr vol1-2-13-60-64tejinder
Ijaprr vol1-2-13-60-64tejinderijaprr_editor
 

Mais de ijaprr_editor (20)

32 ijaprr vol1-4-36-42ramesh
32 ijaprr vol1-4-36-42ramesh32 ijaprr vol1-4-36-42ramesh
32 ijaprr vol1-4-36-42ramesh
 
31 ijaprr vol1-4-29-35harmeet
31 ijaprr vol1-4-29-35harmeet31 ijaprr vol1-4-29-35harmeet
31 ijaprr vol1-4-29-35harmeet
 
30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor
 
28 ijaprr vol1-4-01-13ritaaabi
28 ijaprr vol1-4-01-13ritaaabi28 ijaprr vol1-4-01-13ritaaabi
28 ijaprr vol1-4-01-13ritaaabi
 
27 ijaprr vol1-3-47-53dharam
27 ijaprr vol1-3-47-53dharam27 ijaprr vol1-3-47-53dharam
27 ijaprr vol1-3-47-53dharam
 
26 ijaprr vol1-3-42-46praveen
26 ijaprr vol1-3-42-46praveen26 ijaprr vol1-3-42-46praveen
26 ijaprr vol1-3-42-46praveen
 
25 ijaprr vol1-3-38-41nagaveni
25 ijaprr vol1-3-38-41nagaveni25 ijaprr vol1-3-38-41nagaveni
25 ijaprr vol1-3-38-41nagaveni
 
24 ijaprr vol1-3-32-37nasir
24 ijaprr vol1-3-32-37nasir24 ijaprr vol1-3-32-37nasir
24 ijaprr vol1-3-32-37nasir
 
23 ijaprr vol1-3-25-31iqra
23 ijaprr vol1-3-25-31iqra23 ijaprr vol1-3-25-31iqra
23 ijaprr vol1-3-25-31iqra
 
22 ijaprr vol1-3-18-24babita
22 ijaprr vol1-3-18-24babita22 ijaprr vol1-3-18-24babita
22 ijaprr vol1-3-18-24babita
 
21 ijaprr vol1-3-12-17juni
21 ijaprr vol1-3-12-17juni21 ijaprr vol1-3-12-17juni
21 ijaprr vol1-3-12-17juni
 
20 ijaprr vol1-3-7-11tushar
20 ijaprr vol1-3-7-11tushar20 ijaprr vol1-3-7-11tushar
20 ijaprr vol1-3-7-11tushar
 
19 ijaprr vol1-3-1-6dkpandey
19 ijaprr vol1-3-1-6dkpandey19 ijaprr vol1-3-1-6dkpandey
19 ijaprr vol1-3-1-6dkpandey
 
Ijaprr vol1-2-18-92-96laxmiv1
Ijaprr vol1-2-18-92-96laxmiv1Ijaprr vol1-2-18-92-96laxmiv1
Ijaprr vol1-2-18-92-96laxmiv1
 
Ijaprr vol1-2-17-85-91shailesh
Ijaprr vol1-2-17-85-91shaileshIjaprr vol1-2-17-85-91shailesh
Ijaprr vol1-2-17-85-91shailesh
 
Ijaprr vol1-2-16-80-84laxmi
Ijaprr vol1-2-16-80-84laxmiIjaprr vol1-2-16-80-84laxmi
Ijaprr vol1-2-16-80-84laxmi
 
Ijaprr vol1-2-15-74-79rajeshshiv
Ijaprr vol1-2-15-74-79rajeshshivIjaprr vol1-2-15-74-79rajeshshiv
Ijaprr vol1-2-15-74-79rajeshshiv
 
Ijaprr vol1-2-14-65-73rmpawar
Ijaprr vol1-2-14-65-73rmpawarIjaprr vol1-2-14-65-73rmpawar
Ijaprr vol1-2-14-65-73rmpawar
 
Ijaprr vol1-2-13-60-64tejinder
Ijaprr vol1-2-13-60-64tejinderIjaprr vol1-2-13-60-64tejinder
Ijaprr vol1-2-13-60-64tejinder
 

Último

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 

Último (20)

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 

Ijaprr vol1-1-1-5dr tejinder

  • 1. International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) Cloud Computing: Unexampled firmness of purpose of Java Technologies as for Security vulnerabilities and Cloud user’s Interaction on the Web. 1 Dr. Tejinder Singh Assistant Professor of Computer Science and Deputy Dean IRP, Baba Farid College, Bathinda, Email: - tejinder31.singh@gmail.com Abstract - Here in this paper, we explore comparative study to analyze the cloud computing with the use of Java Technologies. Cloud computing is a natural firmness of purpose for data and computation centers with automated systems management, workload balancing, and virtualization technologies. A mounting number of vendors are contribution Java Platform as a Service (PaaS) solutions that support the Java Standard Edition (JSE) and JEE standard. Java EE 7 Provides more or less additional functionality even you can handle the security purpose and applications on the web community. We have seen that Java EE is the major enterprise platform with millions of lines of code available in the data centers, a path to move them to Cloud will be very attractive to enterprises. As a security issues on cloud environment data transfer, data sharing and user permission’s which form could be accessed on via cloud computing. Java EE 7 be responsible for regarding data transfer and user permissions. In this paper, the author discuss security issues, privacy and control issues, accessibility issues, confidentiality, integrity of data and many more for cloud computing And discuss, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Keywords: J2EE, Enterprise; Security; Users; Applications I. Introduction As presently, java introduces the concept of cloud computing with the Enterprise technology. Java provides the environment for cloud, Service engines provide logic in the environment, such as XSL (Extensible Stylesheet Language) transformation or BPEL (Business Process Execution Language) orchestration. Binding components are sort of "connectors" to external services or applications. They allow communication with various protocols, such as SOAP, REST, Java Message Service, or ebXML. Especially if you mean the enterprise as we know it today. While there are important security, privacy and regulatory issues that enterprises need to sort through before full migration to the cloud, and cloud vendors need to strengthen cloud capabilities in these areas before enterprise applications can be effectively hosted in the cloud, there are benefits that cloud technologies do offer today that can be leveraged in the deployment of many enterprise applications [1]. In simple words, Cloud computing is the combination of a technology, platform that provides hosting and storage service on the Internet. Cloud computing aims to provide scalable and inexpensive on -demand computing infrastructures with good quality of service levels. “A model for enabling convenient, on-demand network access to a shared pool of configurable service delivery models coexist in one cloud platform the security management process [2]. IJAPRR Page 1
  • 2. Figure 1: Cloud Service models II. Cloud Computing Threats Cloud computing faces just as much security threats that are currently found in the existing computing platforms, networks, intranets, internets in enterprises. These threats, risk vulnerabilities come in various forms. It identified the following seven major threats: [3].  Abuse and Nefarious Use of Cloud Computing  Insecure Application Programming Interfaces  Malicious Insiders  Shared Technology Vulnerabilities  Data Loss/Leakage  Account, Service & Traffic Hijacking  Unknown Risk Profile III. Cloud Security with the security risk and vulnerability in the enterprise cloud computing that are being discovered enterprises that want to proceed with cloud computing should, use the following steps to verify and understand cloud security provided by a cloud provider: [3]  Understand the cloud  Demand Transparency  Reinforce Internal Security  Consider the Legal Implications  Pay attention a. Issues to Clarify Before Adopting Cloud Computing An enterprise cloud computing user should address with cloud computing providers before adopting: [3]  User Access IJAPRR Page 2
  • 3.  Regulatory Compliance  Data location  Data Segregation  Disaster Recovery Verification  Disaster Recovery  Long-term Viability IV. Data Security on the Cloud Side From the laaS on the bottom foundation layer to the PaaS on the middle layer and the SaaS on the top layer, cloud storage is always an important key factor for implement the application of cloud computing. lasS layer is supporting the networking service. In the following, some consideration regarding the security issue for device and equipment must be focused.  Storage and system protection  Data protection Encrypt those confidential file or sensitive data before uploading. After then, those encrypted data could be uploading to the storage designated and provided by service provider of the cloud computing through secure channel. The demonstrated operating process is shown [4] Figure 2: Data Encryption before Uploading V. Java Vulnerabilities for Cloud Over the years that the X-Force team has been tracking Security incidents, the overall attack tactics and techniques have not changed significantly. The number of overall incidents has increased, the amount of traffic used in distributed-denial-of-service (DDoS) attacks has multiplied and the number of leaked records has been steadily rising. They successfully exploited vulnerable web applications with attacks such as SQL injection (SQLi) and cross-site scripting (XSS), as well as utilized a mix of sophisticated and generally accessible toolkits to gain critical points of entry. [5] IJAPRR Page 3
  • 4. Figure 3. Most-Commonly Attacked Industries Figure 4. Most-Common Attack Types An analysis of X-Force threat intelligence data during the month of December, 2013 reveals that out of a survey of more than one million Trusteer banking and enterprise customers, the most targeted applications were Oracle Java, Adobe Reader and popular browsers.[5] Figure 5. Exploitation of application vulnerabilities IJAPRR Page 4
  • 5. Disclosure comes in the form of two detailed reports  Weaknesses with the PaaS’s implementation and configuration.  Opportunities for users to access other users’ applications, and, most importantly, • Issues that could expose the service platform to attacks from remotely executed code. VI Conclusion In this paper I have provided some information regarding java Vulnerabilities for cloud web applications and others. I have showing the survey report e-force that it is shown in figures most-common attack types Cloud security and most common attacked Industries. The advent of cloud computing emphasizes the importance of service availability; in fact, for an increasing number of mission-critical applications, availability becomes subject to contractual obligations. We present evidence that the infrastructure that underlies, and the applications that rely upon, cloud computing undergo a fast-paced evolution. VII References [1] "Cloud computing A collection of working papers", Thomas B Winans , John Seely Brown, 2009 Deloitte Development LLC., www.deloitte.com [2] "Security Issues with Possible Solutions in Cloud Computing-A Survey", Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 2, Issue 2, February 2013, ISSN: 2278 – 1323, pp-652-661. [3] "AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING", Anthony Bisong1 and Syed (Shawon) M. Rahman, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011, PP-30-45. [4] "Information Security Issue of Enterprises Adopting the Application of Cloud Computing", Chang-Lung Tsai Uei-Chin Lin Allen Y. Chang Chun-Jung Chen, National Science Council and Chinese Culture University of Taiwan, R.O.C., PP-648- 649. [5] “IBM X-Force Threat Intelligence Quarterly 1Q 2014”, IBM Security Systems, February 2014. [6] “Cloud Software Upgrades: Challenges and Opportunities”, Iulian Neamtiu, Department of Computer Science and Engineering University of California, Riverside Email: neamtiu@cs.ucr.edu [7]” Security Vulnerability Notice” ,SE-2013-01-ORACLE,Security vulnerabilities in Oracle Java Cloud Service, Issues 1- 28. IJAPRR Page 5