Cloud Computing Security: From Single to Multi-Clouds
#1

Abstract

The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in other words, “interclouds” or “cloud-of-clouds” has emerged recently. This paper surveys recent research related to single and multi-cloud security and addresses possible solutions. It is found that the research into the use of multi-cloud providers to maintain security has received less attention from the research community than has the use of single clouds. This work aims to promote the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing  user.
Reply
#2
Security in cloud computing refers to a broad set of policies, technologies, and controls deployed to protect the data, applications, and associated infrastructure of cloud computing. Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance standards and protect information, data applications, and infrastructure associated with the use of cloud computing.

Cloud computing and storage provide users with the ability to store and process their data in third-party data centres. Organisations use the cloud in a variety of different service models (with acronyms such as SaaS, PaaS and IaaS) and implementation models (private, public, hybrid, and community). Security issues associated with cloud computing fall into two broad categories: security issues faced by cloud providers (organisations providing software, platform or infrastructure as a service through the cloud) that host Applications or store data in the cloud). However, responsibility is shared. The provider must ensure that its infrastructure is secure and that its clients' data and applications are protected, while the user must take steps to strengthen their application and use secure passwords and authentication measures.
When an organisation chooses to store data or host applications in the public cloud, it loses its ability to have physical access to the servers hosting its information. As a result, potentially sensitive data is at risk of internal attacks. According to a recent report from the Cloud Security Alliance, insider attacks are the sixth biggest threat in cloud computing. Therefore, cloud service providers must ensure that thorough background checks are performed for employees who have physical access to data centre servers. In addition, data centres should be monitored frequently for suspicious activity.
In order to conserve resources, reduce costs, and maintain efficiency, cloud service providers often store more than one data client on the same server. As a result, there is the possibility that a user's private data can be viewed by other users (possibly even by competitors). To handle such sensitive situations, service providers in the cloud must ensure adequate data isolation and logical storage segregation.
Extensive use of virtualisation in deploying cloud infrastructure brings with it unique security concerns for customers or tenants of a public cloud service. Virtualisation alters the relationship between the OS and the underlying hardware. This introduces an additional layer - virtualisation - that must be configured, managed and secured correctly. Specific concerns include the possibility of compromising virtualisation software, or "hyper-visor." While these concerns are largely theoretical, they exist. For example, a violation on the administrator's workstation with the virtualisation software management software may cause the entire data centre to slow down or be reconfigured to the liking of an attacker.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,548 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Ar 1 1,033 15-02-2017, 04:39 PM
Last Post: jaseela123d
  Cloud Computing with Service Oriented Architecture in Business Applications 1 898 15-02-2017, 11:55 AM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 895 14-02-2017, 03:49 PM
Last Post: jaseela123d
  Energy-Aware Autonomic Resource Allocation in Multi tier Virtualized Environments 1 740 14-02-2017, 02:13 PM
Last Post: jaseela123d
  Multi Banking System mechanical engineering crazy 16 15,369 07-10-2016, 09:38 PM
Last Post: rano
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Security system using IP camera mechanical engineering crazy 5 4,340 16-03-2015, 02:52 PM
Last Post: seminar report asees
  projects on cloud computing? shakir_ali 0 1,201 30-10-2014, 01:12 AM
Last Post: shakir_ali
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,248 19-09-2014, 12:52 AM
Last Post: [email protected]

Forum Jump: