Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Submitted By: Reshmi p Rajan M.Tech (C.S.) Weekend V Semester Submitted To: M. Safdar Tanweer ( Assistant Professor) Department of Computer Science Faculty of Management and Information Technology Jamia Hamdard (Hamdard University) Hamdard Nagar, New delhi-11006
Introduction
Cloud computing is the latest step in evolution of distributed computing that takes advantage of technology innovations and the internet evolution. It provides convenient, ondemand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be quickly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing technologies can be implemented in a wide variety of architectures, under different service and deployment models, and can coexist with other technologies and software design approaches. The security challenges cloud computing presents, however, are formidable, especially for public clouds whose infrastructure and computational resources are owned by an outside party that sells those services to the public.The US National Institutes of Standards and Technology (NIST) recently published a definition of cloud computing that provides a useful model for the cloud that has been widely accepted in the IT industry. Cloud Service Models proposed by NISTSaaS/PaaS/IaaS The NIST model provides for three service models and four different deployment models (sometimes referred to as cloud formations).
Software as a Service
Software-as-a-Service (SaaS) is capability provided to the consumer to use the providers applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g. web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. The cloud service provider typically takes responsibility for data security in this model, but the enterprise is ultimately accountable and needs to review security practices. Prime examples of SaaS include Salesforce.com and Google Apps.
Platform as a Service
With Platform as a Service (PaaS), the capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. The cloud service provider usually takes responsibility for much of data security in this model, but this can be a shared responsibility for some PaaS vendors. Examples of PaaS include Microsoft Windows Azure, Salesforce.com Force.com, and Google App Engine.
Infrastructure as a Service
Using Infrastructure-as-a-Service (IaaS), the capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where
the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). Data security is typically a shared responsibility between the cloud service provider and cloud consumer in this model. Examples of IaaS include Amazon Elastic Cloud Computing (EC2), Terremark, and Rackspace. Deployment models
Private Cloud
Operated solely for a single organization. It may be managed by the organization or a third party and may exist onpremise or off-premise.
Community Cloud
Shared by several organizations in support of a specific community that has shared concerns (e.g. business need, policy, compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise.
Public Cloud
Made available to the general public or a large industry group. Owned by an organization selling cloud services.
Hybrid Cloud
A composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
Malicious Insiders. Shared Technology Vulnerabilities Data Loss/Leakage Account, Service & Traffic Hijacking. Unknown Risk Profile
Problem Definition
Our research is to focus on Account, service and traffic hijacking, Data Loss/Leakage their risks and solutions for this. Since Clouds have no borders and the data can be physically located anywhere in the world, data protection is a critical issue in cloud computing environments. So this phenomenon raises serious issues regarding user authentication and data confidentiality. Hence it is proposed to implement a simple Data Protection model which performs authentication, verification and encrypted data transfer, thus maintaining data confidentiality and integrity.
Conclusion
The quick development of cloud computing bring some security problems as well as many benefits to Internet users. The major risk among these being data security .This research tries to explore the possibilities of building a model for secure data communication and data storage using crypto graphical tools. Future work can be done in the model proposed by adding the concept of steganography for encrypted messages for ensuring data hiding also.
References
[1]Robert Gellman and World Privacy Forum , Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, February 23, 2009. [2] Amazon.com, Amazon Web Services (AWS), Online at http://aws. amazon.com, Version 2010. [3] Weiss, Aaron. Computing in the clouds. netWorker 11, 4 (Dec. 2007), <http://doi.acm.org/10.1145/1327512.1 327513>. [4] Eric A. Marks, Bob Lozano Executives Guide to Cloud computing, John Wiley & Sons, Inc. [5] Theart of Service, A Complete Guide to Cloud Computing, http://theartofservice.com. [6] Tim Mather, Subra Kumaraswamy, and Shahed Latif, Cloud Security and Privacy, Published by OReilly Media, Inc.,- 2009. [7] Brian J.S. Chee and Curtis Franklin, Jr., Cloud Computing, Technologies and Strategies of the Ubiquitous Data Center, CRC Press 2010 by Taylor and Francis Group, LLC. [8] N.Gohring, Amazons S3 down for several hours, Online at http://www.pcworld.com/businesscenter/article/142549/amazons s3 down for several hours.html, 2008. [9]cong Wang, Qian Wang and Kui Ren. Ensuring Data Storage Security in Cloud computing 978-14244-3876-1/2009 IEEE. [10] Lijun Mei, W.K.Chan and T.H.T se, A Tale of Clouds:Paradigm comparisons and some thoughts on researchissues, 2008 IEEE Asia-Pacific Services ComputingConference. [11] John Harauz, Lori M. Kaufman and Bruce Potter, Datasecurity in the world of cloud computing ,2009 IEEE COPublished by the IEEE Computer and Reliability Societies. [12] Siani Pearson, Taking account of Privacy when DesigningCloud computing Services CLOUD09, May 23, 2009,Vancouver, Canada, 2009 IEEE. [13] Meiko Jensen, Jorg Schwenk, Nils Gruschka and Luigi Lo Iacono, On technical security issues in cloud computing 978-0-7695- 3840-2/ 092009,IEEE Computer Society. [14] Balachandra Reddy Kandukuri, Ramakrishna Paturi V and Dr. Atanu Rakshit, Cloud securityIssues 978-0-7695-38112/09 2009, IEEE computer society.