SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016
ISSN: 2347-8578 www.ijcstjournal.org Page 38
Solutions of Cloud Computing Security Issues
Jahangeer Qadiree [1], Mohd Ilyas Maqbool[2]
Research Scholar [1]
Aisect University
Institute of Science and Technology
India
ABSTRACT
Cloud computing is a model which uses the mixture concept of “software-as-a-service” and “utility computing”, and provides
various on-demand services in a convenient way requested end users. It is internet based where resources are shared and the
information is available for on demand service users. Security issue in Cloud computing is the important and critical issues
because the resources are distributed. Both the Cloud provider and the cloud consumer should be fully sure that the cloud is safe
enough from all the external threats so that the customer does not face any kind of problem like loss or theft of their valua ble
data. There is also a possibility where a malicious user can penetrate the cloud by imitate an authorized user, and affect with a
virus to the entire cloud and affects many customers who are sharing the infected cloud. In this paper we firstly lists the
parameters that affects the security of the cloud then it explores the security issues of cloud computing and the troubles faced by
providers and consumers about their data, privacy, and infected application and security issues. It also presents some security
solutions for tackling these issues and problems.
Keywords:-Cloud Computing, Data issues,Security issues.
I. INTRODUCTION
Cloud Computing is a computer based model that produce
various services in the form of on-demand services, it is
accessible worldwide to everyone, everywhere and every time,
including clouds referring to the internet and the web. [1] [2].
In simple, Cloud Computing is the mixture of a technology
that provides the hosting as well as storage service on the
Internet [3]. Its main intention is to provide scalable and
affordable on-demand computing structure with superior
quality of service levels [4] [5]. Various international and
national companies are developing and are offering cloud
computing services but they have not properly considered the
implications of accessing, processing and storing the data in a
distributed shared environment. Many cloud-based application
developers are struggling to include security. In various other
cases, the cloud developers simply cannot provide real
security with the currently affordable technological
capabilities [6]. Cloud computing concept is simple to
understand as it allows us to share the resources on a larger
scale distributed networks which requires less cost and is
location independent. Resources on the cloud can be used by
the consumers and deployed by the vendors such as snapdeal,
google, ibm, salesforce, zoho, rackspace, flipkart. Cloud
computing model allows to distribute the required on-demand
services for various IT Industries. Benefits of Cloud
computing are broad. The very most important one benefit is
that the users don’t need to buy the resource from a third party
vendor; rather they use the resources and pays for it as a
service thus cloud helps the users to save time and also money.
The Cloud Computing model is not only used by international
companies but today it’s also used by Small and medium
enterprises [7].
Cloud Computing architecture consists of multiple cloud
components interacting with each other for various data they
are holding, thus allowing the user to access to the required
data on a faster rate. When we look cloud it is more
concentrated to the front and the back end. Front end is the
user side who is accessed the data, whereas the backend is the
data storage device, server which makes the Cloud [7]. Cloud
computing is categorized into three different categories as per
their usage include, private cloud, public cloud and hybrid
cloud. The private clouds are maintained by single
organization and the public clouds are maintained and are
shared on a larger scale. The Private clouds provide better
security control and more flexibility than other cloud types.
RESEARCH ARTICLE OPEN ACCESS
International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016
ISSN: 2347-8578 www.ijcstjournal.org Page 39
Hybrid clouds are the combination of Private clouds and
Public Clouds that are used by various industries.
The benefits of cloud computing may be very appealing but
nothing is perfect. Because the Cloud computing got many
security issues especially on Data theft, Data loss and Privacy
[7]. This research paper lists the parameters that affect the
security of the cloud, explores the cloud security issues and
problems that the cloud computing service provider and also
the cloud service customer face by such as loss of data,
privacy, infected application and security issues.
II. PARAMETERS AFFECTING CLOUD
SECURITY
There are countless security issues for cloud computing as it
surround many technologies include networks, operating
systems, databases, resource allocation, transaction Processing,
virtualization load balancing, and memory management and
concurrency control [8].
Figure 1: Parameter that affects cloud security
The various Security issues of these systems and technologies
are appropriate to cloud computing systems. For example, the
network that interconnects the systems in a cloud computing
has to be secured. Moreover, the virtualization paradigm in
the cloud computing results the various security concerns. For
example, mapping the virtual systems to the physical systems
has to be carried out securely. Data security includes
encrypting the data as well as ensuring that the significant
strategies are enforced for data sharing. Furthermore, the
resource allocation and memory management algorithms have
to be secured. Finally, data mining method may be applicable
to malware detection in cloud computing.
III. VARIOUS SECURITY ISSUES FACED
BY CLOUD COMPUTING
Whenever a discussion about security of cloud computing is
taken place there will be a very much to do for it. The cloud
computing service providers should be sure that their
customers should not face any kind of problem namely loss of
their important data or data theft. At cloud computing there
may be a possibility where an unauthorized user can infiltrate
the cloud computing by impersonating a legitimate user, there
by infect the entire cloud with a virus. This leads to affect
many customers who are sharing the infected cloud [7].
While discussing the security of a cloud, four issues are raised.
a. Data Issues
b. Privacy issues
c. Infected Application
d. Security issues
International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016
ISSN: 2347-8578 www.ijcstjournal.org Page 40
Figure 2: Security Issues of Cloud Computing
A. Data Issues:
In a cloud computing environment sensitive data arise as a
serious issue regarding to security in cloud computing based
systems. Firstly, when the data is on cloud, anyone can access
data from anywhere and anytime from the cloud because the
data may be usual, private and sensitive data in a cloud. At the
same time, many cloud computing service customers and
providers are accessing and modifying the data. So there is an
important requirement for data integrity method in cloud
computing environment. Secondly, the data embezzlement is
another big serious issue in cloud computing environment. As
we can say that many cloud computing service providers do
not have their own servers, they buy the servers from other
service providers due to it is cost effective. So there is a
probability that data can be stolen from the external servers.
Thirdly, Data loss is a very common problem in cloud
computing environment. Whenever cloud computing service
providers close their services due to some financial or legal
issues then there will be a loss of data for the customers.
Moreover, data can be damaged or corrupted due to some
miss happening, natural disaster, and fire. Due to above
condition, data may not be accesses able to the cloud
computing service providers customers. Fourthly, data
location is also an important and common security issue that
requires focus in the cloud computing environment. Because
the physical location of data storage is very important and
crucial in the cloud computing. Data should be in transparent
manner to from the users view.
B. Secrecy Issues:
The service providers of cloud computing should kept in mind
that the customers important information is fully secured from
other service providers, customer and user. As the most of the
cloud servers are external, the cloud service provider should
make it clear about who is accessing the data and also keep it
well clear that who is maintaining the server so that it will
help to the provider to secure the customer’s personaldata.
C. Infected Application:
The cloud computing service providers should have the
complete control and access to their servers, so that they can
monitor and maintain their servers. This will cause the
hindrance to the malicious user from uploading any virus
affected application onto the server which will seriously affect
the userand cloud computing service.
D. Security issues:
The security of cloud computing must be done on two sides.
Cloud computing service provider’s side and the customer’s
side. The Cloud computing service developers should be fully
sure that their server is secured from all the outside
environmental threats that may arise in the cloud. They should
also provide a good security layer to their customers; before
using the services of cloud computing the user should also
make sure that there should not be any kind of data loss or
theft or tampering of data for other customers who are in the
same cloud. A cloud is good only when there is a good
security mechanism provided by the service provider to its
consumers.
IV. CLOUD COMPUTING SECURITY
ISSUES SOLUTIONS
There is a dire need for extended and advanced technologies,
concepts and methods which leads to secure cloud. There is a
layered framework available that assist security in cloud
computing environment. The framework consists of four
layers. [8].
International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016
ISSN: 2347-8578 www.ijcstjournal.org Page 41
Figure 3: Cloud Security Layered Framework
First layer is secure virtual machine layer. Cloud storage layer
is the second layer of cloud computing. It has a storage
structure that integrates various resources from various
external cloud service providers, so that it can build a heavy
virtual storage system. Virtual network monitor layer is the
fourth layer that combines both of the hardware and software
mixture in the virtual systems to handle the problems [8].
However, there are various groups who are working and
interested in developing standards and security strategies for
clouds. The Cloud Security Alliance provider should describe
the strategies and should also be ensured that the cloud can be
used or accessed only by the authorized users.
CONTROL THE ACCESS DEVICES OF CUSTOMERS:
The cloud service providers should be sure about that the
customer’s access devices include Desktop Computers, virtual
terminals, gazettes, and even a simple mobile phone are fully
secured. Any kind of loss or theft to the customer’s access
devices or any unauthorized access to their devices by any
unauthorized user can affect the whole security protocols in
the cloud computing environment. The cloud service
providers should adopt the desired policies, methods so that
the user computing devices are maintained properly and are
fully secured from any kind of malware detection and lead to
assist the advanced identity features.
MONITOR THE DATA ACCESS:
The cloud service providers should be fully assure about that
who is accessing, when and what kind of data is being
accessed for what purpose. Because many servers had a
common security complaint for their customers regarding
snooping activities by many users’s about their personaldata.
SHARE DEMANDED RECORDS AND VERIFY THE
DATA DELETION:
If any time the user or consumer needs to report its action,
then the cloud service providers will share the diagrams or any
other necessary information or we can say that the service
provider should provide the audit records to the consumer or
user. The cloud computing providers should also verify the
proper deletion of data from shared or reused devices. As
Many Cloud providers do not provide the proper remover of
data from the drives each time thus in result the drive space is
forsaken. [6].
SECURITY CHECK EVENTS:
It should also be ensured that the cloud service provider gives
sufficient details about fulfillment of assurance, break
remediation and reporting contingency. These security check
events will describe the responsibilities, declarations and the
required tasks of the service providers.
V. CONCLUSION
The cloud computing service provider and the consumer
should be fully sure about that their cloud is fully protected
from all the external threats or attacks, so there will be a
strong and mutual interpretation by both of the customer
provider. The largest gaps between cloud security applications
and research theory lies in the fact that the assumption in the
research leaves some important differences among the actual
cloud security and the virtual machine security. Research
should be center on these gaps and differences and its removal.
One of the pieces of the framework might be for developing a
strategy to monitor the cloud computing software, and
theanother might be the development of the isolated
processing for the applications of specific clients’. The
consumer’s behaviour can be traced and monitored for
instance whether the consumer allows the automated patching
software to run, or updating the anti –virus definitions, or
whether the people understand that how to solidify their
virtual machines in the cloud.
REFERENCES
[1] Michael glas and paul Andres, “An Oracle white paper in
enterprise architecture achieving the cloud computing
vision”, CA-U.S.A, Oct 2010.
[2] Harjit Singh Lamba and Gurdev Singh, “Cloud
Computing-Future Framework for emanagement of
NGO's”, IJoAT, ISSN 0976-4860, Vol 2, No 3,
International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016
ISSN: 2347-8578 www.ijcstjournal.org Page 42
Department Of Computer Science, Eternal University,
Baru Sahib, HP, India, July 2011.
[3] Dr. Gurdev Singh, Shanu Sood, Amit Sharma, “CM-
Measurement Facets for Cloud Performance”, IJCA, ,
Lecturer, Computer science & Engineering, Eternal
University, Baru Sahib (India), Volume 23 No.3, June
2011
[4] Joachim Schaper, 2010, “Cloud Services”, 4th IEEE
International Conference on DEST, Germany.
[5] Tackle your client’s security issues with cloud computing
in 10 steps,
http://searchsecuritychannel.techtarget.com/tip/ Tackle-
your-clients-security-issueswithcloud-computing-in-10-
steps.
[6] Problems Faced by Cloud Computing, Lord CrusAd3r,
dl.packetstormsecurity.net/.../ProblemsFacedbyCloudCo
mputing.pdf
[7] Kevin Hamlen, Murat Kantarcioglu, Latifur Khan,
Bhavani Thuraisingham, Security Issues for Cloud
Computing, International Journal of Information Security
and Privacy, 4(S. Kuppuswamy, P. B. Shankar Narayan,
“The Impact of Social Networking Websites on the
Education of Youth”, In International Journal of Virtual
Communities and Social Networking, Vol. 2, Issue 1,
page 67-79, January-March 2010.
[8] http://searchvirtualdatacentre.techtarget.co.uk/news/1510
117/Community-cloud-Benefitsand-drawbacks
AUTHOR PROFILE
JAHANGEER QADIREE is
presently pursuing his Doctor’s
Degree (PHD) in Information
Technology at Aisect University,
Institute of Science and Technology.
He has received his Bachelors Degree
in 2011 from Computer Application
with 75% and Masters Degree in the
discipline of Information Technology with 84.5% in the year
2014 from Aisect University. His research area is
Networking, Software Engineering. Cloud Computing, Data
Mining.
MOHD ILYAS MAQBOOL has received
his Masters Degree in 2011 in the discipline
of Information Technology from HNB
Gharwal University Uttrakhand and M.Phill
Degree in Information technology from
Bhagwat University Ajmer. His research
area is Cloud Computing, Software Engineering, and DataMining.

Mais conteúdo relacionado

Mais procurados

A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
A220113
A220113A220113
A220113irjes
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computingijtsrd
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computingijtsrd
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4sophiabelthome
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudSandip Karale
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security IssuesIJERA Editor
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 

Mais procurados (20)

A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
A220113
A220113A220113
A220113
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computing
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To Multicloud
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Fog doc
Fog doc Fog doc
Fog doc
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 

Destaque

Advanced Interfaces and Repositories in Laravel
Advanced Interfaces and Repositories in LaravelAdvanced Interfaces and Repositories in Laravel
Advanced Interfaces and Repositories in LaravelJonathan Behr
 
Manusia digital (naskah film pendek)
Manusia digital (naskah film pendek)Manusia digital (naskah film pendek)
Manusia digital (naskah film pendek)Ayudya Arumsari
 
Sebuah permusuhan berakhir dengan sebuah persahabatan
Sebuah permusuhan berakhir dengan sebuah persahabatanSebuah permusuhan berakhir dengan sebuah persahabatan
Sebuah permusuhan berakhir dengan sebuah persahabatanOperator Warnet Vast Raha
 
Teks/Naskah film Bahasa Inggris
Teks/Naskah film Bahasa Inggris Teks/Naskah film Bahasa Inggris
Teks/Naskah film Bahasa Inggris Athiyatul Faiqoh
 
Naskah Film Terbangun Sendiri
Naskah Film Terbangun SendiriNaskah Film Terbangun Sendiri
Naskah Film Terbangun SendiriSiti Nafira
 
Naskah film pendek 'MASIH DIUSAHAKAN'
Naskah film pendek 'MASIH DIUSAHAKAN'Naskah film pendek 'MASIH DIUSAHAKAN'
Naskah film pendek 'MASIH DIUSAHAKAN'Dwitantri Rezkiandini
 
Entrepreneurship ideas, entrepreneurship development, social entrepreneurship...
Entrepreneurship ideas, entrepreneurship development, social entrepreneurship...Entrepreneurship ideas, entrepreneurship development, social entrepreneurship...
Entrepreneurship ideas, entrepreneurship development, social entrepreneurship...Vikasa International Center
 
Contoh storyline moeljadi pranata
Contoh storyline moeljadi pranataContoh storyline moeljadi pranata
Contoh storyline moeljadi pranataYohanes Pranata
 
Storyboard Dan StoryLine
Storyboard Dan StoryLineStoryboard Dan StoryLine
Storyboard Dan StoryLineAFif RvGs
 
Tugas story board
Tugas story boardTugas story board
Tugas story boardecco_15
 
Story board "Tanya Kenapa?"
Story board "Tanya Kenapa?"Story board "Tanya Kenapa?"
Story board "Tanya Kenapa?"nandaabiz
 
Skenario pembuatan video
Skenario pembuatan videoSkenario pembuatan video
Skenario pembuatan videositilestaridewi
 
University_Diploma_eng
University_Diploma_engUniversity_Diploma_eng
University_Diploma_engValkov Michael
 
seguridad en la internet
seguridad en la internetseguridad en la internet
seguridad en la internetluisita2314
 
いよいよ SAP Business Suite 正式サポート! SAP on AWS
いよいよ SAP Business Suite 正式サポート!  SAP on AWSいよいよ SAP Business Suite 正式サポート!  SAP on AWS
いよいよ SAP Business Suite 正式サポート! SAP on AWSMasaru Hiroki
 
contoh storyboard
contoh storyboardcontoh storyboard
contoh storyboardnur12005177
 

Destaque (20)

Tutorial dasar laravel
Tutorial dasar laravelTutorial dasar laravel
Tutorial dasar laravel
 
Advanced Interfaces and Repositories in Laravel
Advanced Interfaces and Repositories in LaravelAdvanced Interfaces and Repositories in Laravel
Advanced Interfaces and Repositories in Laravel
 
Manusia digital (naskah film pendek)
Manusia digital (naskah film pendek)Manusia digital (naskah film pendek)
Manusia digital (naskah film pendek)
 
Sebuah permusuhan berakhir dengan sebuah persahabatan
Sebuah permusuhan berakhir dengan sebuah persahabatanSebuah permusuhan berakhir dengan sebuah persahabatan
Sebuah permusuhan berakhir dengan sebuah persahabatan
 
Teks/Naskah film Bahasa Inggris
Teks/Naskah film Bahasa Inggris Teks/Naskah film Bahasa Inggris
Teks/Naskah film Bahasa Inggris
 
Naskah Film Terbangun Sendiri
Naskah Film Terbangun SendiriNaskah Film Terbangun Sendiri
Naskah Film Terbangun Sendiri
 
Naskah film pendek 'MASIH DIUSAHAKAN'
Naskah film pendek 'MASIH DIUSAHAKAN'Naskah film pendek 'MASIH DIUSAHAKAN'
Naskah film pendek 'MASIH DIUSAHAKAN'
 
Entrepreneurship ideas, entrepreneurship development, social entrepreneurship...
Entrepreneurship ideas, entrepreneurship development, social entrepreneurship...Entrepreneurship ideas, entrepreneurship development, social entrepreneurship...
Entrepreneurship ideas, entrepreneurship development, social entrepreneurship...
 
Contoh storyline moeljadi pranata
Contoh storyline moeljadi pranataContoh storyline moeljadi pranata
Contoh storyline moeljadi pranata
 
Storyboard Dan StoryLine
Storyboard Dan StoryLineStoryboard Dan StoryLine
Storyboard Dan StoryLine
 
Tugas story board
Tugas story boardTugas story board
Tugas story board
 
Laravel 5 and SOLID
Laravel 5 and SOLIDLaravel 5 and SOLID
Laravel 5 and SOLID
 
Resume
ResumeResume
Resume
 
Story board "Tanya Kenapa?"
Story board "Tanya Kenapa?"Story board "Tanya Kenapa?"
Story board "Tanya Kenapa?"
 
Skenario pembuatan video
Skenario pembuatan videoSkenario pembuatan video
Skenario pembuatan video
 
University_Diploma_eng
University_Diploma_engUniversity_Diploma_eng
University_Diploma_eng
 
seguridad en la internet
seguridad en la internetseguridad en la internet
seguridad en la internet
 
いよいよ SAP Business Suite 正式サポート! SAP on AWS
いよいよ SAP Business Suite 正式サポート!  SAP on AWSいよいよ SAP Business Suite 正式サポート!  SAP on AWS
いよいよ SAP Business Suite 正式サポート! SAP on AWS
 
contoh storyboard
contoh storyboardcontoh storyboard
contoh storyboard
 
ALAA ABBAS
ALAA ABBASALAA ABBAS
ALAA ABBAS
 

Semelhante a Solutions of cloud computing security issues

SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingIOSR Journals
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Various Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingVarious Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingINFOGAIN PUBLICATION
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms IJECEIAES
 

Semelhante a Solutions of cloud computing security issues (20)

Cloud security
Cloud securityCloud security
Cloud security
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
G0314043
G0314043G0314043
G0314043
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud Computing
 
G017214849
G017214849G017214849
G017214849
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Various Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingVarious Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud Computing
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 

Último

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Solutions of cloud computing security issues

  • 1. International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016 ISSN: 2347-8578 www.ijcstjournal.org Page 38 Solutions of Cloud Computing Security Issues Jahangeer Qadiree [1], Mohd Ilyas Maqbool[2] Research Scholar [1] Aisect University Institute of Science and Technology India ABSTRACT Cloud computing is a model which uses the mixture concept of “software-as-a-service” and “utility computing”, and provides various on-demand services in a convenient way requested end users. It is internet based where resources are shared and the information is available for on demand service users. Security issue in Cloud computing is the important and critical issues because the resources are distributed. Both the Cloud provider and the cloud consumer should be fully sure that the cloud is safe enough from all the external threats so that the customer does not face any kind of problem like loss or theft of their valua ble data. There is also a possibility where a malicious user can penetrate the cloud by imitate an authorized user, and affect with a virus to the entire cloud and affects many customers who are sharing the infected cloud. In this paper we firstly lists the parameters that affects the security of the cloud then it explores the security issues of cloud computing and the troubles faced by providers and consumers about their data, privacy, and infected application and security issues. It also presents some security solutions for tackling these issues and problems. Keywords:-Cloud Computing, Data issues,Security issues. I. INTRODUCTION Cloud Computing is a computer based model that produce various services in the form of on-demand services, it is accessible worldwide to everyone, everywhere and every time, including clouds referring to the internet and the web. [1] [2]. In simple, Cloud Computing is the mixture of a technology that provides the hosting as well as storage service on the Internet [3]. Its main intention is to provide scalable and affordable on-demand computing structure with superior quality of service levels [4] [5]. Various international and national companies are developing and are offering cloud computing services but they have not properly considered the implications of accessing, processing and storing the data in a distributed shared environment. Many cloud-based application developers are struggling to include security. In various other cases, the cloud developers simply cannot provide real security with the currently affordable technological capabilities [6]. Cloud computing concept is simple to understand as it allows us to share the resources on a larger scale distributed networks which requires less cost and is location independent. Resources on the cloud can be used by the consumers and deployed by the vendors such as snapdeal, google, ibm, salesforce, zoho, rackspace, flipkart. Cloud computing model allows to distribute the required on-demand services for various IT Industries. Benefits of Cloud computing are broad. The very most important one benefit is that the users don’t need to buy the resource from a third party vendor; rather they use the resources and pays for it as a service thus cloud helps the users to save time and also money. The Cloud Computing model is not only used by international companies but today it’s also used by Small and medium enterprises [7]. Cloud Computing architecture consists of multiple cloud components interacting with each other for various data they are holding, thus allowing the user to access to the required data on a faster rate. When we look cloud it is more concentrated to the front and the back end. Front end is the user side who is accessed the data, whereas the backend is the data storage device, server which makes the Cloud [7]. Cloud computing is categorized into three different categories as per their usage include, private cloud, public cloud and hybrid cloud. The private clouds are maintained by single organization and the public clouds are maintained and are shared on a larger scale. The Private clouds provide better security control and more flexibility than other cloud types. RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016 ISSN: 2347-8578 www.ijcstjournal.org Page 39 Hybrid clouds are the combination of Private clouds and Public Clouds that are used by various industries. The benefits of cloud computing may be very appealing but nothing is perfect. Because the Cloud computing got many security issues especially on Data theft, Data loss and Privacy [7]. This research paper lists the parameters that affect the security of the cloud, explores the cloud security issues and problems that the cloud computing service provider and also the cloud service customer face by such as loss of data, privacy, infected application and security issues. II. PARAMETERS AFFECTING CLOUD SECURITY There are countless security issues for cloud computing as it surround many technologies include networks, operating systems, databases, resource allocation, transaction Processing, virtualization load balancing, and memory management and concurrency control [8]. Figure 1: Parameter that affects cloud security The various Security issues of these systems and technologies are appropriate to cloud computing systems. For example, the network that interconnects the systems in a cloud computing has to be secured. Moreover, the virtualization paradigm in the cloud computing results the various security concerns. For example, mapping the virtual systems to the physical systems has to be carried out securely. Data security includes encrypting the data as well as ensuring that the significant strategies are enforced for data sharing. Furthermore, the resource allocation and memory management algorithms have to be secured. Finally, data mining method may be applicable to malware detection in cloud computing. III. VARIOUS SECURITY ISSUES FACED BY CLOUD COMPUTING Whenever a discussion about security of cloud computing is taken place there will be a very much to do for it. The cloud computing service providers should be sure that their customers should not face any kind of problem namely loss of their important data or data theft. At cloud computing there may be a possibility where an unauthorized user can infiltrate the cloud computing by impersonating a legitimate user, there by infect the entire cloud with a virus. This leads to affect many customers who are sharing the infected cloud [7]. While discussing the security of a cloud, four issues are raised. a. Data Issues b. Privacy issues c. Infected Application d. Security issues
  • 3. International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016 ISSN: 2347-8578 www.ijcstjournal.org Page 40 Figure 2: Security Issues of Cloud Computing A. Data Issues: In a cloud computing environment sensitive data arise as a serious issue regarding to security in cloud computing based systems. Firstly, when the data is on cloud, anyone can access data from anywhere and anytime from the cloud because the data may be usual, private and sensitive data in a cloud. At the same time, many cloud computing service customers and providers are accessing and modifying the data. So there is an important requirement for data integrity method in cloud computing environment. Secondly, the data embezzlement is another big serious issue in cloud computing environment. As we can say that many cloud computing service providers do not have their own servers, they buy the servers from other service providers due to it is cost effective. So there is a probability that data can be stolen from the external servers. Thirdly, Data loss is a very common problem in cloud computing environment. Whenever cloud computing service providers close their services due to some financial or legal issues then there will be a loss of data for the customers. Moreover, data can be damaged or corrupted due to some miss happening, natural disaster, and fire. Due to above condition, data may not be accesses able to the cloud computing service providers customers. Fourthly, data location is also an important and common security issue that requires focus in the cloud computing environment. Because the physical location of data storage is very important and crucial in the cloud computing. Data should be in transparent manner to from the users view. B. Secrecy Issues: The service providers of cloud computing should kept in mind that the customers important information is fully secured from other service providers, customer and user. As the most of the cloud servers are external, the cloud service provider should make it clear about who is accessing the data and also keep it well clear that who is maintaining the server so that it will help to the provider to secure the customer’s personaldata. C. Infected Application: The cloud computing service providers should have the complete control and access to their servers, so that they can monitor and maintain their servers. This will cause the hindrance to the malicious user from uploading any virus affected application onto the server which will seriously affect the userand cloud computing service. D. Security issues: The security of cloud computing must be done on two sides. Cloud computing service provider’s side and the customer’s side. The Cloud computing service developers should be fully sure that their server is secured from all the outside environmental threats that may arise in the cloud. They should also provide a good security layer to their customers; before using the services of cloud computing the user should also make sure that there should not be any kind of data loss or theft or tampering of data for other customers who are in the same cloud. A cloud is good only when there is a good security mechanism provided by the service provider to its consumers. IV. CLOUD COMPUTING SECURITY ISSUES SOLUTIONS There is a dire need for extended and advanced technologies, concepts and methods which leads to secure cloud. There is a layered framework available that assist security in cloud computing environment. The framework consists of four layers. [8].
  • 4. International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016 ISSN: 2347-8578 www.ijcstjournal.org Page 41 Figure 3: Cloud Security Layered Framework First layer is secure virtual machine layer. Cloud storage layer is the second layer of cloud computing. It has a storage structure that integrates various resources from various external cloud service providers, so that it can build a heavy virtual storage system. Virtual network monitor layer is the fourth layer that combines both of the hardware and software mixture in the virtual systems to handle the problems [8]. However, there are various groups who are working and interested in developing standards and security strategies for clouds. The Cloud Security Alliance provider should describe the strategies and should also be ensured that the cloud can be used or accessed only by the authorized users. CONTROL THE ACCESS DEVICES OF CUSTOMERS: The cloud service providers should be sure about that the customer’s access devices include Desktop Computers, virtual terminals, gazettes, and even a simple mobile phone are fully secured. Any kind of loss or theft to the customer’s access devices or any unauthorized access to their devices by any unauthorized user can affect the whole security protocols in the cloud computing environment. The cloud service providers should adopt the desired policies, methods so that the user computing devices are maintained properly and are fully secured from any kind of malware detection and lead to assist the advanced identity features. MONITOR THE DATA ACCESS: The cloud service providers should be fully assure about that who is accessing, when and what kind of data is being accessed for what purpose. Because many servers had a common security complaint for their customers regarding snooping activities by many users’s about their personaldata. SHARE DEMANDED RECORDS AND VERIFY THE DATA DELETION: If any time the user or consumer needs to report its action, then the cloud service providers will share the diagrams or any other necessary information or we can say that the service provider should provide the audit records to the consumer or user. The cloud computing providers should also verify the proper deletion of data from shared or reused devices. As Many Cloud providers do not provide the proper remover of data from the drives each time thus in result the drive space is forsaken. [6]. SECURITY CHECK EVENTS: It should also be ensured that the cloud service provider gives sufficient details about fulfillment of assurance, break remediation and reporting contingency. These security check events will describe the responsibilities, declarations and the required tasks of the service providers. V. CONCLUSION The cloud computing service provider and the consumer should be fully sure about that their cloud is fully protected from all the external threats or attacks, so there will be a strong and mutual interpretation by both of the customer provider. The largest gaps between cloud security applications and research theory lies in the fact that the assumption in the research leaves some important differences among the actual cloud security and the virtual machine security. Research should be center on these gaps and differences and its removal. One of the pieces of the framework might be for developing a strategy to monitor the cloud computing software, and theanother might be the development of the isolated processing for the applications of specific clients’. The consumer’s behaviour can be traced and monitored for instance whether the consumer allows the automated patching software to run, or updating the anti –virus definitions, or whether the people understand that how to solidify their virtual machines in the cloud. REFERENCES [1] Michael glas and paul Andres, “An Oracle white paper in enterprise architecture achieving the cloud computing vision”, CA-U.S.A, Oct 2010. [2] Harjit Singh Lamba and Gurdev Singh, “Cloud Computing-Future Framework for emanagement of NGO's”, IJoAT, ISSN 0976-4860, Vol 2, No 3,
  • 5. International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, Mar - Apr 2016 ISSN: 2347-8578 www.ijcstjournal.org Page 42 Department Of Computer Science, Eternal University, Baru Sahib, HP, India, July 2011. [3] Dr. Gurdev Singh, Shanu Sood, Amit Sharma, “CM- Measurement Facets for Cloud Performance”, IJCA, , Lecturer, Computer science & Engineering, Eternal University, Baru Sahib (India), Volume 23 No.3, June 2011 [4] Joachim Schaper, 2010, “Cloud Services”, 4th IEEE International Conference on DEST, Germany. [5] Tackle your client’s security issues with cloud computing in 10 steps, http://searchsecuritychannel.techtarget.com/tip/ Tackle- your-clients-security-issueswithcloud-computing-in-10- steps. [6] Problems Faced by Cloud Computing, Lord CrusAd3r, dl.packetstormsecurity.net/.../ProblemsFacedbyCloudCo mputing.pdf [7] Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham, Security Issues for Cloud Computing, International Journal of Information Security and Privacy, 4(S. Kuppuswamy, P. B. Shankar Narayan, “The Impact of Social Networking Websites on the Education of Youth”, In International Journal of Virtual Communities and Social Networking, Vol. 2, Issue 1, page 67-79, January-March 2010. [8] http://searchvirtualdatacentre.techtarget.co.uk/news/1510 117/Community-cloud-Benefitsand-drawbacks AUTHOR PROFILE JAHANGEER QADIREE is presently pursuing his Doctor’s Degree (PHD) in Information Technology at Aisect University, Institute of Science and Technology. He has received his Bachelors Degree in 2011 from Computer Application with 75% and Masters Degree in the discipline of Information Technology with 84.5% in the year 2014 from Aisect University. His research area is Networking, Software Engineering. Cloud Computing, Data Mining. MOHD ILYAS MAQBOOL has received his Masters Degree in 2011 in the discipline of Information Technology from HNB Gharwal University Uttrakhand and M.Phill Degree in Information technology from Bhagwat University Ajmer. His research area is Cloud Computing, Software Engineering, and DataMining.