Cloud Computing Security

Page 1

International Journal of Engineering, Management & Sciences (IJEMS) ISSN: 2348 –3733, Volume-2, Issue-4, April 2015

Cloud Computing Security Marwan Ali Albahr  Abstract—Actually in appropriated computing in view of extended system and exponentially increasing data has realized movement towards cloud development displaying. Cloud computing is advancement where the customers' can use first class advantages as a piece of kind of programming that live on assorted servers and access data from all over the place all through the world. Cloud stockpiling engages customers to get to and store their data wherever. It similarly ensures perfect utilization of the available resources. With an ensuring advancement like this, it absolutely leaves customers' security, putting new security dangers towards the certitude of data in cloud. The security dangers, for instance, upkeep of data genuineness, data hiding and data wellbeing govern our stresses when the issue of cloud security comes up. The voluminous data and time concentrated encryption checks related to applying any encryption framework have been exhibited as an impediment in this field. In this investigation paper, I have considered a framework for cloud structural arranging which ensures secured advancement of data at client and server end. I have used the non weakness of Elliptic twist cryptography for data encryption and Diffie Hellman Key Exchange framework for affiliation establishment. The proposed encryption framework uses the blend of immediate and bended cryptography schedules. It has three security checkpoints: approval, key time and encryption of data. [1]. Index Terms— Cryptography, Cloud Computing, Phishing, Cloud Model .

I. INTRODUCTION The possibility of an intergalactic PC framework was exhibited in the sixties by J.C.R. Licklider, who was responsible for engaging the headway of ARPANET (Advanced Research Projects Agency Network) in 1969. His vision was for everyone on the globe to be interconnected and getting to tasks and data at any site, from wherever, elucidated Margaret Lewis, thing showcasing boss at AMD. It is a dream that sounds a ton like what we are calling cloud computing.[1] Different specialists credit the cloud idea to PC researcher John McCarthy who proposed the thought of reckoning being conveyed as an open utility, like the administration agencies which go again to the sixties. Since the sixties, cloud computing has grown along various lines, with Web 2.0 being the latest advancement. Nonetheless, since the web just began to offer noteworthy transmission capacity in the nineties, cloud computing for the masses has been something of a late engineer. One of the first defining moments in appropriated computing history was the arriving of Salesforce.com in 1999, which initiated the thought of passing on endeavor applications by method for a fundamental site. Manuscript received April 24, 2015. Marwan Ali Albahar, Department of Computer Science, Frost Burg State University, Maryland, USA

16

The organizations firm arranged for both expert and standard programming firms to pass on applications over the web. The accompanying progression was Amazon Web Services in 2002, which gave a suite of cloud-based organizations including stockpiling, retribution and even human understanding through the Amazon Mechanical Turk. At that point in 2006, Amazon propelled its Elastic Compute cloud (EC2) as a business web benefit that permits little organizations and people to lease PCs on which to run their own PC applications. "Amazon EC2/S3 was the first generally available cloud computing base administration," said Jeremy Allaire, CEO of Brightcove, which gives its SaaS online feature stage to UK TV stations and daily papers. An alternate enormous development came in 2009, as Web 2.0 hit its stride, and Google and others began to offer program based undertaking applications, however administrations, for example, Google Apps. "The most critical commitment to cloud computing has been the development of "executioner applications" from driving innovation monsters, for example, Microsoft and Google.[2] At the point when these organizations convey benefits in a manner that is dependable and simple to devour, the thump on impact to the business all in all is a more extensive general acknowledgement of online administrations," said Dan Germain, boss innovation officer at IT benefit supplier Cobweb Solutions. Other key variables that have empowered cloud computing to develop incorporate the developing of virtualization innovation, the improvement of widespread rapid transfer speed, and all inclusive programming interoperability models, said UK cloud computing pioneer Jamie Turner.[1] Turner included, "As cloud computing broadens its compass past a modest bunch of right on time adopter Google Docs clients, we can just start to envision its extension and span. Basically anything can be conveyed from the cloud." Following the cloud "Numerous IT experts perceive the profits cloud computing offers regarding expanded stockpiling, adaptability and expense decrease," said Songnian Zhou, CEO of Platform Computing. At the same time he included that IT chiefs still have worries about the security of their corporate information in the cloud. [2]This implies that it will be 2010 at the most punctual before cloud selection sees expanded development. Julian Friedman, an authority in developing innovations, said that security and different concerns will soon be determined. "Contemplations, for example, security, information protection, system execution and financial aspects are prone to prompt a blend of cloud computing focuses both inside the organization firewall and outside of it." He included that today's applications will characteristically move towards a cloud demonstrate as they get to be all the more pervasively accessible through the web, require more information transforming, and compass the limits of numerous gadgets. Specialists appear to concur that cloud computing will at last change today's computing scene.

www.alliedjournals.com


Cloud Computing Security Andreas Asander, bad habit central of item administration at virtualization security expert Clavister, said that once the security issues are determined, cloud computing administrations "can empower an endeavor to grow its base, include limit request, or outsource the entire framework, bringing about more noteworthy adaptability, a more extensive decision of computing assets and critical expense funds." It is clear that cloud computing can bring colossal profits for IT clients. Nonetheless, what really matters for IT chiefs is that they will need to keep on dealing with their inside computing situations, whilst figuring out how to secure, oversee and screen the developing scope of outer assets dwelling in the cloud. [3] Characterizing cloud computing turns into a troublesome undertaking with numerous definitions, yet no accord on single or novel ones. Cloud computing alludes to a system of PCs, joined through web, offering the assets given by cloud suppliers pander to its client's necessities like adaptability, convenience, asset prerequisites. The inquiry center was to distinguish the most pertinent issues in Cloud Computing which consider vulnerabilities, dangers, dangers, necessities and arrangements of security for Cloud Computing. This inquiry must be connected with the point of this work; that is to distinguish and relate vulnerabilities and dangers with conceivable arrangements. Consequently, the examination inquiry tended to by our exploration was the accompanying: What security vulnerabilities and dangers are the most critical in Cloud Computing which must be considered inside and out with the motivation behind taking care of them? The essential words and related ideas that make up this inquiry and that were utilized amid the survey execution are: secure Cloud frameworks, Cloud security, conveyance models security, SPI security, SaaS security, Paas security, IaaSsecurity, Cloud dangers, Cloud vulnerabilities, Cloud suggestions, best practices in Cloud.[4] II. LITERATURE REVIEW: I have completed an efficient audit of the current writing with respect to security in Cloud Computing, not just so as to compress the current vulnerabilities and dangers concerning this theme additionally to distinguish and break down the current state and the most essential security issues for Cloud Computing. A. Definition of Cloud Computing: Step by step, organizations of all sizes are deciding to move their information, applications and administrations to the Cloud [6].Cloud computing is turning into one of the following IT slants where IT Administrators, chiefs and CEO are porting their information and applications to remote "Clouds" and getting to these information in a straightforward and universal way from anyplace far and wide.However not much considerations is given due to the vulnerability of the data which becomes a tantalizing target for hackers which will be discussed further in the overview of the security concerns of the Cloud computing. Cloud computing can be generally defined as numerous diverse ways to distribute information or services to customers who pay what they use. Obviously, the customer can either be an individual or a business purchasing for a service or information. Cloud computing is nothing less

17

than a new approach of conducting business that seizes the advantage of housing various competencies into a particular structure that can then extended to host out services for multiple businesses. [3]Due to the ongoing evolution of the Cloud Computing, it is quite premature to come up with an exact definition of what is Cloud computing? However, at this early stage we believe that the Cloud computing definition could be summaries as: A Range of framework enabled organizations, having the limit to be augmented, quality of standards, ordinarily versatile, with sensible transforming base and environment on demand to the openness of the customers that can be gotten to viably structure wherever. However agreeing to National Institute of models and Innovation (NIST) in 2009, their definition of Cloud transforming was described as cloud enlisting can't avoid being a model for enabling beneficial, on-investment framework access to a conferred pool of configurable preparing resources (e.g., frameworks, servers, limit, applications, and organizations) that can be rapidly provisioned and released with immaterial organization effort or organization supplier cooperation. This Cloud model propels openness and can't avoid being made out of 5 essential qualities, 3 organization models, and 4 sending models. B.Definition of Cloud Computing: The development of Cloud figuring can be followed back to the Lattice processing. The thought of "The Grid" picked up in ubiquity after Foster and Kesselman distributed their work "The Grid: Blueprint for a new Computing Base". It was established on the electric framework that gives electric power to your home and business. This time it would be arranged towards utilizing the same idea in equipment and programming which would be given from the matrix on-interest from a registering level.[5] One of the most intriguing defeats with Cloud registering is that the same issues that hit the matrix did the same for Cloud registering which at present still endures from the arrangement of benchmarks, whether seller have to be secured, and so forth. Cloud figuring will be about moving administrations, calculation as well as information for a reasonable expense which will advantage the business. It will be area straightforward with a brought together office. By making information accessible through the Cloud, it can be more effortlessly got to from all around at a much lower cost, expanding its esteem by permitting great circumstances for enhanced cooperation, reconciliation and examination on an imparted basic environment/stage which drives to have different decisions of Cloud processing foundation models. C. Cloud Computing Infrastructure Model: Preceding relocating the information, applications and administrations to the Cloud, there will be a few contemplations that need to be taken into account as moving from a standard venture application sending to a Cloud figuring structural engineering could result in the whole business to crumple. There will be open and private Clouds that propose integrative focal points which IT organizations can select to broaden the utilization of uses on

www.alliedjournals.com


International Journal of Engineering, Management & Sciences (IJEMS) ISSN: 2348 –3733, Volume-2, Issue-4, April 2015 private, open or mixture Mists every of which have their gives and takes: Public Clouds:Open Clouds can't avoid being regularly run by third parties; and applications from diverse clients can't avoid being apparently mixed together on the Cloud's server, limit structures and frameworks as portrayed in figure.[6]Open Clouds are ordinarily facilitated offsite from the customer's territories which consequently lessens the clients cost and hazard by pleasing an versatile expansion to the endeavor base. It is also to be recognized that if general society cloud present execution, security and data centralization, the vicinity of the other applications running on the Cloud will have to be clear to both the Cloud organizer and the end customers.In this sense the benefit of open Clouds can't avoid being that they can be much greater than an association's own specific private Cloud giving the limit to scale up or down on investment. Private Clouds:Private clouds will be fabricated for the restrictive use of one client, pleasing the outright control over information, security, and nature of administration as portrayed. The organization will be the manager of the base and has got aggregate control over how applications are situated up on it. Private clouds can either be fabricated in an endeavor information focus or they can likewise be conveyed at an imparted office. Private Clouds can be assembled and controlled by a business own IT division or by a Cloud supplier. In this model a organization can introduce, design, and work the base to help a private Cloud inside an organization's endeavor information focus. This base permits organizations with a most extreme level of control over the utilization of Cloud assets while obliging the fundamental ability to settle and deal with the earth. Hybrid Clouds:Hybrid Clouds as it name say it all it will be a mix of both open and private Cloud models. These Clouds help with on interest and remotely provisioned scale. The capacity to enhance a private Cloud with the profits of a open Cloud can be connected to protect the administration levels in the case of fast advancing workload varieties. This is obvious in making utilization of capacity Clouds to aid Web 2.0 applications for instance. Half breed Clouds presented the intricacies of choosing how to dispense the applications crosswise over both a open and private Cloud. Among the diverse concerns that expected to be taken into account will be the association between information and transforming assets. In the event that the information will be little and of not major significance, or the application will be in a stateless condition, a half and half Cloud would have more achievement instead of exchanging a vast sums of information into a open Cloud for a little measure of information handling.[7] D. Technologies Behind Cloud Computing: There are various enabling technologies that contribute to the successful achievement of Cloud computing. These precursors are identified as: Serious Oriented Architecture:It is basically an accumulation of administrations which correspond with one another by either basic information passing or it could include two or more administrations arranging a few exercises. Since computing Clouds are ordinarily opened to work with Web

18

Services, for example, WSDL, SOAP and UDDI, the administrations gave by the SOA could be utilized to organize and sort out these administrations. Besides, a set of Cloud administrations could be utilized as a part of a SOA application environment in this way exploiting having them accessible of different dispersed stages got to through the Internet. Virtualization Technology:Visualization is programming innovation which utilizes a physical asset, for example, a server and partitions it up into virtual assets called virtual machines (VM's) which offers visualized IT bases on-interest. Visualization grants clients to fortify physical assets, improve course of action and organization whilst lessening power and cooling necessities. While visualization innovation is most well known in the server world, visualization innovation is likewise being utilized as a part of information stockpiling, for example, Storage Area Networks, and within working frameworks. Virtual systems, for example, Virtual Private Networks (VPNs) aid clients with altered system situations to get to Cloud assets as they are the establishments of Cloud computing as they portray adaptable and versatile equipment assets. Inexpensive Worldwide Distributed Storage:A system stockpiling framework which is backed by dispersed stockpiling suppliers otherwise called server farms (infrequently called server ranch) which are at the attitude of the clients for advance. In this manner, the need of having a brought together store for the capacity, administration and dispersal of information and data. One key playing point of the server farm stockpiling idea is that physical hard commute stockpiling assets are consolidated into an accumulation of capacity pools. An alternate advantage that add to the utilization of Cloud computing is the merging of all offices typifying HVAC, electrical, system associations, wiring, equipment, programming and individual. Consequently a conveyed information framework which can help information sources to be gotten to in an omnipresent way. Web 2.0:Web 2.0 is another innovation which evidently helps in recognizing the utilization of the World Wide Web innovation and Web outline relating to the inattentiveness, data imparting, and cooperation to the Web. The primary thought behind Web 2.0 is to elevate the inter-connectivity and the intelligence of the Web applications empowering clients to get to the web all the more effectively and productively. Furthermore since Cloud computing assets are in view of web applications, it makes it regular that while advancing, Cloud computing will support the utilization of Web 2.0.[4] Service flow and work Flow:Cloud computing give a whole set of administration layouts on-interest, which could be involved administrations from within Cloud. Subsequently, the Cloud ought to have the capacity to characteristically if not consequently arrange administrations from different sources to structure a stream of administration which is straightforward and dynamical to the clients. E. Benefits of Cloud Computing: The essential point of Cloud computing is to lessening the expense for computing assets whilst leaving if not expanding the adaptability and versatility of the framework. This model

www.alliedjournals.com


Cloud Computing Security likewise minimizes capital consumption, since the idea of leasing the administrations from an alternate supplier on a scrutinize expense the business pays for the utilized assets. The offering of assets and obtaining force of huge scale, server farms gives financial preferences are recorded beneath: Reducing high fixed-capital cost to low variable expense:Making an inward cloud inside an organization upholds a proficient administration stage while checking interior capital utilization's for the IT framework. This could then be misused with an outside cloud administration supplier that could bounce on board to supply flood administration limit when interest increments over the inside limit. Flexibility:Likewise with expansive organizations, the simplicity of sending a full administration without needing to compose the base environment to help it can be much more appealing that cost investment funds.There is the ability to update the hardware and software quickly to comply and suit customers’ demands and updates in technology. Smoother Scalability Path:Cloud computing allows for many singles services to scale over a wide demand range. It multiplies resources load balance peak load capacity and utilization across multiple hardware platforms in numerous locations. Drastically Reduces Cost (Disaster Recovery):Especially with small to medium enterprises, make no investment in disaster recovery (DR) plans. But with enabling technologies such as the virtualization. VMware’s (virtual machines) to be transferred to the Cloud for access whenever it is needed, it has evolved in a cost effective disaster recovery model since the DR plans cost twice the infrastructure whereas with a Cloud computing approach the DR is available for much cheaper hence making a significant difference in cost for the businesses. Self Service IT Infrastructure: Cloud computing service models are often self-service, even in internal models. As before the business had to partner with the IT to develop your applications, port it onto a platform and run it but with Cloud computing all this is not of the past. You are purchasing infrastructure. Increased Automation and Portability: Moving into the Cloud computing requires a much higher level of automation because moving off-premises terminates on-call systems administrators. It also increases the portability of the system whereby users can work from home, work or at client location thus increasing mobility that employee can access information anywhere they are. Centralization: Centralization of critical data improves security by eliminating data from user’s computer. Cloud computing providers have the necessary knowledge and resources to provide all the latest security features to guard the data. Maintenance:With centralized applications, they are much easier to maintain than their distributed counterparts. All updates and changes are made in one centralized server rather than on each user’s computer.[8]

arranging, trade organization, trouble conforming, concurrency control and memory organization [8].

Security issues for various of these systems and headway can't avoid being significant to cloud figuring. For case, the framework that interconnects the systems in a cloud has to be secure. Moreover, visualization standard in cloud figuring results in a couple of security concerns. For outline, mapping the virtual machines to the physical machines has to be finished securely. Data security incorporates scrambling the data as well as ensuring that suitable approaches can't avoid being maintained for data conferring. In development, resource assignment and memory organization computations must be secure. Finally, data mining systems may be suitable to Waldemar distinguished in fogs. B. Security issues face by cloud computing: At whatever point a trade about cloud security is happened there will be all that much to achieve for it. The cloud organization supplier for cloud confirms that the customer does not face any issue, for instance, loss of data or data robbery. There is moreover a likelihood where a noxious customer can invade the cloud by impersonating a genuine customer, there by debasing the entire cloud. This prompts impacts various customers who are putting forth the polluted cloud [7]. There are four sorts of issues raise while discussing security of a cloud.Data Issues 1) Privacy Issues 2) Infected Application 3) Security Issues

III. CLOUD COMPUTING SECURITY A. Parameter affecting cloud security: There are different security issues for Cloud computing as it joins various progressions numbering frameworks, databases, working structures, visualization, resource

19

www.alliedjournals.com


International Journal of Engineering, Management & Sciences (IJEMS) ISSN: 2348 –3733, Volume-2, Issue-4, April 2015 Data Issues:Delicate information in a cloud computing environment develop as major issues as to security in a cloud based framework. Firstly, at whatever point a information will be on a cloud, anybody From anyplace at whatever time can get to information from the cloud since information may be basic, private and touchy information in a cloud. So in the meantime, numerous cloud computing administration buyer and supplier gets to and alter information. Consequently there is a need of some information uprightness technique in cloud computing. Also, information taking will be a one of genuine issue in a cloud computing environment. Numerous cloud administration supplier do not give their own server rather they obtain server from other administration suppliers due to it is expense emotional and adaptable for operation and cloud supplier. So there is a much likelihood of information can be stolen from the outer server. Thirdly, Data misfortune is a typical issue in cloud computing. In the event that the cloud computing administration supplier close down his administrations due some money related or lawful issue then there will be a misfortune of information for the client. Additionally, information can be lost or harm or tainted due to miss happening, regular debacle, and fire. Because of above condition, information might not be gets to capable to clients. Fourthly, information area will be one of the issues what obliges center in a cloud computing environment. Physical area of information stockpiling is vital and critical. It ought to be straightforward to client and client. Merchant does not uncover where all the information's are put away. Privacy Issues:The cloud computing administration supplier must verify that the client individual data is decently secured from different suppliers, client and client. As the greater part of the servers will be outer, the cloud administration supplier ought to verify who is getting to the information and who will be keeping up the server so that it empower the supplier to secure the client's close to home data. [5] Tainted Applications: cloud computing administration supplier ought to have the complete access to the server with all rights for the reason of observing and upkeep of server. So this will keep any malevolent client from transferring any contaminated application onto the cloud which will seriously influence the client and cloud computing administration. Security Issues:cloud computing security must be carried out on two levels. One is on supplier level and an alternate will be on client level. Cloud computing administration supplier ought to verify that the server is decently secured from all the outside dangers it may run over. Despite the fact that the cloud computing administration supplier has given a decent security layer for the client and client, the client ought to verify that there ought to not be any misfortune of information or taking or altering of information for different clients who are utilizing the same cloud because of its activity. A cloud is great just when there is a decent security gave by the administration supplier to the client. C. Security Concern of Cloud Computing: While cost and usability are among the colossal points of interest of Cloud computing, there are disturbing security worries that need to be looked into while being slanted to move basic applications and particularly touchy information

20

to open, private or cross breed Cloud situations. [4]To concentrate on these issues, the cloud supplier must actualize and create satisfactory measures to match the same if not broadened layers of security than if the business would have on the off chance that they were not to utilize the cloud. Recorded underneath are the primary worries that ought to be mulled over preceding porting all their touchy information and applications to the remote "Clouds" as these can rapidly get to be engaging focuses for individuals of criminal propositions. The following is a review of these issues that have been compressed into three separate classes that ought to be thought before change to the Cloud computing base. Conventional Security:These issues would be including PC and systems interruptions or assaults which could have a capability of happening since moving to the cloud. Authentication and Authorization:the association's approval and approbation structure does not connect into the cloud which in case it does can bring about issues with the cloud supplier's diagram given that the cloud supplier has got one set up. As per Jericho Forum (2010), it would be simpler to bolt and ensure data on the off chance that its overseen by an outsider than it was in-house.So the question here is how the organization remodels its existing structure to accommodate the cloud computing infrastructure model. Furthermore, how does an organization combine cloud security within its own security policies? Phishing: What are the countermeasures that are set up to reduce the risks of being hit with phishing scams which have new attack vectors? Virtual Machine Attack: Potential attacks lies within the virtualization area i.e. VM technology used by cloud vendors hence the introduction use of firewalls and intrusion detection systems should be part of the system to monitor system activities. Network Attacks:The cloud client ought to guarantee that the foundation used to join and communicate with the cloud is secured at all times which could be a massive assignment as the cloud is composed and situated up outside the firewall in the greater part of the cases. Forensics Implications: At present, the conventional methods of digitally forensically analyzing equipment is to seize the devices and image them and perform an in-depth analysis of the media and then recover the data from. But with cloud computing the likelihood of conducting forensics analysis would be very complicated to perform due to the nature providers maintaining their own multi-server infrastructure and hence data being overwritten multiple times. D. Data Control by external Parties: What are the legitimate consequences and ramifications of information and applications being under the control of outer gatherings? Since this zone is not well comprehended and extremely intricate, there are potential absence of control and straightforwardness when an outsider is included at present containing all the information. Audit Ability:Is an alternate issue of absence of control in the cloud which then raises the inquiry is there enough straightforwardness in the method for leading operations from

www.alliedjournals.com


Cloud Computing Security the cloud supplier's side? This is vital as it thus develop the trust between both the supplier and the client. Contractual Obligations: One of the various issues that emerge when using a third party infrastructure is the legal implications. Hence the implementation of service level agreement (SLA) or what can and what cannot be done bounded by a written contract. Data loss & Leakage: There a numerous ways of compromising the data. Modification, fabrication, deletion of data without a proper backup of the original or updated data is a very common example. Loss of encryption key could lead to data not being disposed properly. The threat of compromising data is multiplied on the cloud due to the numerous interactions of users with the environment is dangerous due to the architectural design of the cloud environment. Data Lock In:How does a cloud client swear off securing to a specific cloud merchant? Additionally there is the issue that the cloud clients have no influence over the general changes that the cloud supplier is effecting from his side.[9] E. Remedial Strategies for addressing Cloud Computing Risks: The dangers that an undertaking may perceive must be managed in a successful way. A strong danger administration program that is adaptable to such a degree as to manage persistently developing data dangers ought to be set up. In a situation where security has turned into the most extreme need to big business clients, unapproved access to information in the cloud is of real concern. At the point when consenting to an administration level assertion (SLA) with a cloud supplier, the association (client) ought to importantly record all his data resources. The association ought to additionally verify that information are accurately recorded. This methodology ought to be executed while drafting the SLA which will focus a legitimately contract between both the client and the supplier. Any particular needs of the client, for example, information need to be encoded before being exchanged or traveling or put away from one area to the next, and extra controls for data that is delicate or of high esteem to the association ought to be plainly characterized in the assertion. The SLA is an authoritative archive that portrays the relationship between the business and the cloud supplier, it likewise serves as an effective instrument to ensure against data depended to the cloud.Listed below are some of the remedial actions that should be implemented when considering cloud computing environment: Abuse use of Cloud Computing: 1) Effectively analysis of user network traffic whilst monitoring public blacklisted network blocks. 2) Tighter initial registration and validation process when it comes to using credit card. (Everyone can use a credit card to purchase and immediately start using the cloud services) Insecure Applications Program Interfaces: 1) Scrutinize the security model of the cloud providers 2) Making sure that strong authentication and authorization is implemented with encrypted transmission. Threads from Insiders: 1) Making sure that there is a reliable security breach notification in place. 2) Requesting transparency in information security practices as well as compliance reporting.

21

3) Including human resource requirements as part of legal contracts Shared Technology: 1) Monitor for unauthorized activities. 2) Conduct vulnerability scanning, configuration auditing while ensuring that SLA mentioned the patching and upgrading of the environment 3) Promoting strong use of authentication and access controls for any levels of operations.[12] Data Loss & Leakage: 1) Implementation of strong encryption to protect integrity of data in transmission 2) Ensure that strong key generation, storage and management and destruction policies are in place 3) Analyze and monitor data protection on both ends. 4) Prohibit the sharing of account credentials between users and resources 5) Use strong 2-way authentication wherever it is possible. 6) Understand cloud provider security policies and SLAs.[10] IV. METHODOLOGY A. My Solutions for problems: There will be need for progressed and developed advances, ideas and techniques that give secure server which drives to a secure cloud. For this a layered system will be accessible that guaranteed security in cloud computing environment. It comprises of four layers as demonstrated in Figure 3 [8].

To begin with layer is secure virtual machine layer. Second layer is cloud stockpiling layer. This layer has a stockpiling framework which incorporates assets from numerous cloud administration suppliers to fabricate an enormous virtual stockpiling framework. Fourth layer is virtual system screen layer. This layer consolidating both equipment and programming arrangements in virtual machines to handle issues, for example, key lumberjack analyzing XEN [8]. Notwithstanding, there are a few gatherings working and keen on creating benchmarks and security for clouds. The Cloud Standards site is gathering and organizing data about cloud-related models being worked on by different gatherings. The Cloud Security Alliance (CSA) is one of them. CSA accumulates arrangement suppliers, non-benefits and people to go into examination about the present and

www.alliedjournals.com


International Journal of Engineering, Management & Sciences (IJEMS) ISSN: 2348 –3733, Volume-2, Issue-4, April 2015 future best practices for data certification in the cloud. An alternate gathering is Open Web Application Security Project (OWASP). OWASP keeps up a rundown of vulnerabilities to cloud-based or Software as a Service organization models which is upgraded as the risk scene changes. The Open Grid Forum distributes archives to containing security and infrastructural particulars and data for network computing designers and analysts. [13] There are a few tips and traps that cloud security arrangement suppliers ought to remembered when they conveys their administration to cloud administration buyer in an open cloud arrangement. Verify the access controls:Set up information access control with rights and afterward check these entrance controls by the cloud administration supplier at whatever point information is being utilized by cloud administration buyer. To actualize access control routines for buyer side, the cloud administration supplier must depict and guarantee that the main approved clients can access the client or purchaser's information. Control the consumer access devices: Be of course the buyer's entrance gadgets or focuses, for example, Personal Computers, virtual terminals, newspapers, leaflets and cellular telephones are sufficiently secure. The loss of an endpoint access gadget or access to the gadget by an unapproved client can wipe out even the best security conventions in the cloud. Make certain the client computing gadgets are overseen legitimately and secured from malware working and supporting propelled confirmation characteristics. Screen the Data Access: cloud administration suppliers need to guarantee about whom, when and what information is being gotten to for what reason. For instance numerous site or server had a security protest in regards to snooping exercises by numerous individuals, for example, listening to voice calls, perusing messages and individual information and so on. Share demanded records and Verify the data deletion: If the user or consumer needs to report its compliance, then the cloud service provider will share diagrams or any other information or provide audit records to the consumer or user. Also verify the proper deletion of data from shared or reused devices. [11]Many providers do not provide for the proper degassing of data from drives each time the drive space is abandoned. Insist on a secure deletion process and have that process written into the contract [6]. Security check events:Guarantee that the cloud administration supplier gives enough insights about satisfaction of guarantees, break remediation and reporting possibility. These security occasions will depict obligation, guarantees and activities of the cloud computing administration supplier.[14]

considering database breaking down focuses, it erases the repetition. Besides, we can access to the wanted information by utilizing compound strategies. In the later passages, we note to the routines which incorporate examined issues about security. Data Fragmentation:Assume a social database which incorporates a few tables. We need to section it by utilizing systems and disperse them as a part of distinctive spaces by uncommon components. The reason is that: the fracture of social database brought about diminishing in the time of information preparing, simplicity of information control, decline of multifaceted nature, information process circulation and office of information trade and conveyance. In spite of the fact that, this activity will force extra overhead by considering specialized and security matters both for information base server and system for trading information actually. In any case, we destroy it request to protect classifieds and build client trust. Here, the divided tables are isolated in 2 gatherings: 1) Main Data Tables 2) Tables which focus correspondences (relations). The divided information must meet 3 primary needs before they are put away and dispersed in better places. 1) Data base must be 3nf preceding any methodology. In this way, every table can be showed up as an autonomous part. 2) The level of secrecy in tables will focus the significance of accessible information. 3) The client needs will focus the extra requests identified with part conveyance which can be chosen by the client. In the first thing, database standardization procedure is given to guarantee that non-correspondence and autonomy is fundamental. Thus, every table must have an autonomous subject, no excess in the put away information, unessential qualities which are reliant to the principle key furthermore respectability and similarity. We store the information in a safe space (neighborhood area) without disguising (implies that fixing extra activities on information is performed to safeguard them) or place them in an outer source while we apply hiding activities on them. In the second thing, we apply hiding in all sections. Indeed the names of substances are put away in as codes to stay away. For instance, a client can store various types of information as encoded and with high security. For this situation, the trespassers wouldn't have the capacity to comprehend whether the database incorporates charge card numbers or the other information which have low security level. As the shrouded peculiarity is utilized, its keys must be put away in (area) space and get to be accessible. The issue is that it builds the expenses of computing as it must be invested time for uncovering before inquiry process for every information.[15]

B. Methods for improving Security:

C. Cloud Testing & its Requirement:

Assume that we need to section and separation the accessible information of a database by utilizing specific strategies furthermore considering their security rate in it. After that the information are placed in distinctive areas, we start to trade information by utilizing safe specialized systems which brought about expanding security and information privacy. It is clear that if information fracture is carried out by

Organizations imagine true Web clients by utilizing cloud testing (A testing process that includes utilizing cloud assets) benefits that are given by cloud administration. The primary target behind cloud testing is: * To guarantee the nature of cloud-based applications composed in a cloud, with their practical pleasantries, business strategies and framework execution and

22

www.alliedjournals.com


Cloud Computing Security additionally versatility taking into account a set of utilizations based prerequisites. * To test cloud similarity in cloud foundation. To run a suite of experiments over a cloud application you may need to perform taking after steps, for example, * Create and design cloud PCs. * Start them. * Upload tried applications and test information to be tried over the cloud * Run your tests. * Get test outcome The whole process requires some serious energy and slip inclined, it might be anything but difficult to run a few tests on cloud machines with mechanization. D. Architecture support for cloud testing: Cloud Computing building design, much the same as some other application or programming, is considered into two primary areas: Front End and Back End. Front end is a customer or any application which is utilizing cloud administrations. Back end is the system of customer machines with servers having PC project and information stockpiling framework. Cloud has unified server organization to administrate the frameworks customer, requests and so on. When client situations are produced and the test is composed, and executed. When the test finished the cloud administration supplier convey results and examination once again to corporate IT experts through constant dashboards for a complete investigation of how their applications and the web will perform amid crest volumes. Different Testing's to be performed over Cloud Applications:

but to behave (e.g., failure) in an acceptable manner (e.g., not corrupting or losing data or loss). Stress tests typically involve simulating one or more key production scenarios under a variety of hectic conditions. For example, you might deploy your application on a server that is already running a processor-intensive application; in this manner, your application is immediately “starved” of processor resources and must compete with the other application for processor phases. You can also stress-test single item such as a stored procedure or class or a single Web page. (ii) Load Test Over Cloud Application: The process of analyzing software applications and supporting infrastructure to determine acceptable performance, capacity and transaction handling capabilities of real world data with usage conditions and executing them against the application and supporting infrastructure under test. The basic approaches to performing load testing on a Web application are: Identify the performance-serious states. Identify the workload status for distributing the entire load among the key scenarios. Identify the metrics to verify them against your performance objectives. Design tests to simulate the load. Use available tools to implement the load according to the designed tests, and capture the metrics for proper load analysis. Identify and analyze the metric data captured during the tests; make a record for proper load spreading. By such an iterative testing process, we achieve our performance objectives. There are several reasons for load-testing to be accomplished over Web applications. The basic need of load testing is used to govern the Web application’s behavior under both usual and foreseen peak load conditions. (iii)Functional Testing on Cloud Applications:

There are various testing methods to be performed; we are here using basic and general testing approaches.

All software are designed and developed to meet and satisfy certain functional basic requirements. A functional requirement may be nominal, business, or process based. Functional Testing is the process by which expected behavior of an application can be tested. Web Functional testing involves carrying set of tasks and comparing the result of same with the expected output and ability to repeat same set of tasks multiple times with different data input and same level of accuracy. Web Functional Testing can be performed both manually with a human tester or could be performed automatically with use of a software program.

(i) Stress Test over Cloud Application:

(iv)Compatibility testing for Cloud Applications:

Stress testing is used to performance testing which focused on determining an application’s robustness, convenience, and consistency under extreme conditions. The aim of stress testing is to recognize application issues that become apparent under risky conditions. These conditions can include dense loads, high concurrency, or limited computational resources. Right stress testing is useful in outcome synchronization and effective bugs interconnect problems, priority problems, and resource loss bugs. The plan behind stress a system is to the breaking point in order to find bugs. The system is not expected to process the overload without adequate resources,

23

Compatibility testing is used to resolve compatibility issues that are significant for the product or software and design accost-effective matrix of platforms against which product tested. [16]A typical compatibility test includes: Various hardware configurations Different Operating Systems/Platforms Network Environment Computer Peripherals (v) Browser Performance testing on Cloud Applications:

www.alliedjournals.com


International Journal of Engineering, Management & Sciences (IJEMS) ISSN: 2348 –3733, Volume-2, Issue-4, April 2015 To check application's backing for different program sorts and execution in every sort can be fulfilled without breaking a sweat. Numerous devices empower mechanized site testing from the cloud. *

(vi) Testing End-To-End for cloud applications: End-to-end accessibility is the first administration viewpoint require to test. This includes testing network. There are a few business frameworks accessible for testing inactivity in a WAN situation. The cloud administrations supplier does not claim the WAN information correspondence base. Notwithstanding, utilizing system watching and examination machines at the datacenter and inside your spot, your cloud supplier can quantify the WAN execution to keep up the fitting administration level. The capacity to manage execution information in backing of concurred SLAs ought to drive your decision of cloud supplier and correspondence supplier. (vii) Latency Testing: Cloud testing is utilized to quantify the idleness between the activity and the relating reaction for any application in the wake of sending it on cloud.[18] (viii) Forms of Cloud-Based Software Testing: There are four separate types of cloud-based application or programming testing. Every attention on diverse goals: * Testing a SaaS in a cloud: it consoles the nature of a SaaS in a cloud in view of it useful and non-practical administration necessities. * Testing of a cloud: it approves the nature of a cloud from an outer perspective taking into account the gave cloud determined capacities and administration characteristics. * Testing inside a cloud: It checks the nature of a cloud from an inner perspective taking into account the interior bases of a cloud and indicated cloud capability. Just cloud merchants can actualize this sort of testing since they have gets to inside foundations and associations between its internals as a programmed capability, security, administration and screen.

*

Potentially captivating the administration supplier as an on-going operations accomplice if delivering business off-the rack (COTS) programming. Being eager to be utilized as a contextual investigation by the cloud administration supplier. Venture Managers can screen the general advancement of the task and penetrate down into particular assignments for audit. This diminishes process durations and enhances application sending, which diminish issues and giving clients an upgraded testing background.[17] V. RESULTS In recent years, the huge amount of research has been done in the area of Cloud Computing. In the process of SLR, we have extracted 69 papers relevant to meet the goals of the research from the large number of papers published since the year 2001. This section covers the results and analysis of the papers that were extracted in the process of SLR. We have given a detailed description of the list of identified challenges and mitigation techniques in appendix section. In the past years, research is followed the distributed computing and mainly focused on service like grid computing. From the last decade, there is a rapid increase in research on new paradigm Cloud Computing which is the next generation computing. We mainly focused on security aspects of the Cloud Computing in last 10 years. Totally 69 papers are retrieved during the literature study. Mostly the selected papers are in between the year 2010 and 2011 which revealed 52 papers and 25 papers respectively. Others include 3 papers published in 2009. The figure below shows the empirical evidence of research on security in Cloud Computing in the last 10 years.

(ix) Keys to successful Cloud Testing: Cloud –based test environment give testing groups more prominent control to assemble and execute tests, examinations application execution and search for bottlenecks and anxiety zones while tests are running. The cloud consents to analyzers to scale from thousands to a great many clients to get to the limit and limit edges to battle exceedingly erratic interest levels. This gives analyzers a clearer picture of conceivable runtime mistakes, which lessen creation blunders. When an analyzer logs in and executes a test, the outcomes are accessible to engineers, who can judge execution and fix irregularities, ever the cloud itself. It diminishes correspondence crevice in the middle of analyzers and designers with respect to slips. Different qualities to raise accomplishment of cloud testing are as per the following: * Configuration model. * Service Provider's or merchants developing in checking administrations.

24

A. Identified Challenges from the analysis We have identified 43 security challenges during the SLR. The detailed description of these challenges is presented in Appendix A. The list of identified challenges are WSsecurity, Phishing attack, Wrapping attack, Injection attack, IP spoofing, Tampering, Repudiation, Information Disclosure, Denial of 30 service, Elevation of privilege, Physical security, WLAN‟s security, Direct attacking method, Replay attack, Man-in-the middle attack, Reflection attack, Interleaving, Timeliness attack, Self adaptive storage resource management, Client monitoring, Lack of trust, Weak SLAs, Perceived lack of reliability, Auditing, Back door, TCP hijacking, Social engineering, Dumpster diving, Password

www.alliedjournals.com


Cloud Computing Security guessing, Trojan horses, Completeness, Roll back attack, Fairness, Data leakage, Computer network attack, Denial of service, Data security, Network security, data locality, Data segregation, Backup, Data integrity, Data manipulation. In the part of the analysis, we find some of the Cloud Computing attributes which are threats to Cloud Computing. As a part of the result the compromised attributes in Cloud Computing is described in appendix A, they are Confidentiality, Integrity, Availability, Security, Accountability, Usability, Reliability and Audit ability. The records of the most threaten attributes are in fig. the fig. shows that Confidentiality 31% and Integrity 24% recorded most threaten, while comparing with usability, reliability, accountability and audit ability which recorded less than the 10%.

VI. RESEARCH QUESTIONS

Identified Mitigation Techniques from the analysis, we have identified 34 security techniques during the SLR. The detailed description of these techniques is presented in Appendix B. The summary include Identity based authentication, RSA algorithm, Dynamic Intrusion detection system, Multi tenancy based access control model, TLS Handshake, Public key homomorphism, Third party auditor, probabilistic sampling technique, Diffle – Hellman key exchange, Private face recognition, MACs, Data coloring and water marking, A novel Cloud dependability model, KP-ABE, RBAC, ARVTM, Security assertion markup language, TPM, Proof of irretrievability, Fair MPNR protocol, Sobol sequence, Redundant array of independent Net storages, Handout distributed file system, self cleansing intrusion tolerance, searchable symmetric encryption, Provable data possession, Privacy manager, Time bound ticket based mutual authentication 31 scheme, Security Access Control Service, The Service Level Agreement, Intrusion detection system. The above mentioned mitigation techniques have strong impact on the Performance, Security, Efficiency, QoS, Privacy and Access control of Cloud Computing. [18]The defined mitigation techniques somehow improve the overall services in Cloud Computing environment. The result is shown in figure

25

Research Question 1:What are the different security methods being utilized by the main Cloud Computing suppliers, when the information is being exchanged between the Cloud and a nearby system? Research Question 2:What are the different security methods being utilized to anticipate unapproved access to information inside the Cloud? Research Question 3:In what capacity would we be able to handle security issues that are normal in future Cloud Computing? VII. DISCUSSION & ASSUMPTIONS: Assumption 1: The servers are physically not in this country Securing your information on the cloud machines all your important information on any server ought to be safely scrambled, so regardless of the possibility that somebody runs off with a duplicate of the volume, they will need to comprehend what the secret key is to unscramble the volume. You can utilize Windows on Encrypted File System (EFS) for instance in the event that you have a Windows OS. An option that you can utilize incorporate the famous freeware True Crypt. I for one utilization True Crypt at home as its quick, simple to utilize, and free. It makes a virtual encoded circle inside a record. It then mounts it as a plate under windows, showing up as a volume. Obviously, thinking safely, one ought to have handicapped the 'auto-mount-and-decode' alternative for True Crypt as it rather crushes the purpose of securing the framework! Best thing is, the document can be replicated and put away on a versatile commute. Additionally, I have yet to become aware of any gossip that it is conceivable to hack and duplicate an EBS volume that you don't possess. (Figure: 01)

www.alliedjournals.com


International Journal of Engineering, Management & Sciences (IJEMS) ISSN: 2348 –3733, Volume-2, Issue-4, April 2015

Presumption 2: people in general cloud is on the web Verify you are joining with the Amazon Web Services Dashboard An undeniable one, yet there are a lot of fake sites out there to excursion you up. Abstain from utilizing alternate ways; verify you know the entrance purpose of the AWS dashboard. It ought to dependably be utilizing the HTTPS convention. (Figure: 02) Assumption 4: Username and secret word Identified with the ACL, each of our client records is liable to our secret word arrangement techniques that incorporate length of watchword, restriction of re-utilization (go ahead, you're not utilizing the SAME watchword for AWS concerning your work area are you?) and the utilization of a multi-element confirmation device*. The recent is critical. On the off chance that somebody DOES figure out how to phish your username and secret key; they still can't get to the dashboard since they'd additionally need access to the MFA gadget. (Figure: 04 & 04-A)[10]

Presumption 3: The AWS passwords are not piece of our Active Directory area and in this way are not represented by the same thorough secret key approach AWS Identity and Access Management (IAM) to control who has admittance to the AWS Dashboard. For some time, my group was utilizing the primary AWS record (how about we call it the root record) to get to the dashboard and the EC2 stage. At that point, after a security review we acknowledged how uncovered this was. At about the same time, AWS turned out with IAM which permits you to make clients and gatherings under the fundamental root AWS account. These new clients will have their own particular passwords and have a fluctuating level of access to items and administrations. These clients won't have the capacity to get to the Account profile data and (critically) the charging and metering data. For this level of access, regardless you have to utilize the root AWS account.(Figure: 03)

Figure.4

Figure 4.A VIII. CONCLUSION AND RECOMMENDATIONS FOR FUTURE WORK A. Recommendations: Consumer-Side Vulnerabilities:Customers ought to minimize the potential for web programs or other customer gadgets to be assaulted by utilizing best practices for the

26

www.alliedjournals.com


Cloud Computing Security security and solidifying of purchaser stages, and ought to look to minimize program presentation to perhaps vindictive sites. Encryption:Shoppers ought to oblige that solid (FIP 140-2 agreeable) encryption be utilized for web sessions and other system correspondence at whatever point a leased application requires the secrecy of utilization connections with different applications or information exchanges. Likewise purchasers ought to oblige that the same persistence is connected to put away information. Physical:Customers ought to consider physical plant security practices and arrangements at supplier destinations as a major aspect of the general danger contemplation when selecting a supplier. Physical assaults oblige reinforcement arranges generally as digital assaults do. Customers ought to compose plans for recuperation from such assaults. Shoppers ought to additionally explore whether a competitor supplier offers repetition for the destinations they work, and settle on suppliers that are not attached to a particular geographic area if there should arise an occurrence of common calamities or different interruptions. Authentication:: Consumers ought to consider the utilization of confirmation tokens or other proper manifestation of cutting edge verification, which a few suppliers offer, to moderate the danger of record commandeering and different sorts of endeavors. Personality and Access Management. Buyers ought to have perceivability into the accompanying capacities of a supplier: (1) the validation and access control components that the supplier foundation backs, (2) the devices that are accessible for shoppers to procurement verification data, and (3) the instruments to include and keep up approvals for shopper clients and applications without the mediation of the supplier. Performance Requirements:Buyers ought to benchmark current execution scores for an application, and afterward create key execution score necessities before conveying that application to a supplier's site. Key execution scores incorporate responsiveness for intelligent client applications, and mass information exchange execution for applications that must include or yield vast amounts of information on a progressing premise. Visibility:Purchasers ought to demand that a supplier permit imperceptibility into the working administrations that influence a particular buyer's information or operations on that information, including observing of the framework's welfare.[20]

than a large portion of the names on that rundown will be experiencing harsh times and the movement to the cloud and an administration based economy will be the principle reasons why. Be that as it may IT merchants won't be the main ones affected by these progressions. The cloud has effectively helped organizations build their aggressiveness today and will assume an imperative part in guaranteeing it tomorrow. The individuals who keep on dismissing cloud arrangements as not being adaptable, secure or adequate will fizzle under the heaviness they could call their own IT expenses and absence of spryness. Starting today, any organization making new IT resources that does not consider the cloud in some structure is expanding the legacy trouble that will make their prerogative to the cloud more difficult and their business less aggressive.[18] For Research Questions 1: * Identity based Authentication * Third gathering Auditor * Proof of hopelessness For Research Questions 2: * Intrusion Detection framework * Virtual private system * A Novel Cloud constancy model * Hadoop Distribution documents framework For Research Questions 3: * Increased endeavors in danger administration * Ensure solid Authentication and Access controls * Increased endeavors to alleviate unsafe codes and legitimate obligation * Data security at both outline and run time IX. REFERENCES [1]

[2]

[3]

[4]

B. Conclusion: The cloud speaks to a standout amongst the most huge movements that computing has experienced. As we move towards the cloud, we will find another administration based world, where numerous words that were once normal in the normal IT shop – like servers, server farms, OS, middleware and grouping will get eradicated. Much like Google and Face book were not well known organizations a minor decade prior, the IT scene is because of profoundly change in the following five years. New participants with a cloud immaculate play will be considerably more spry in making quality and won't confront the inside rivalry that emerges amid an ideal model transformation, securing their current incomes while giving a dependable, cost-proficient option. Consider it thusly: List the organizations you consider today the greatest IT players. Hold up five years, perform the same practice and analyze your notes. There's a decent risk more

27

[5]

[6]

[7]

Ahmed S, Raja M. (2010) 'Tackling Cloud security issues and forensics model', High Capacity Optical Networks and Enabling technologies (HONET) , 19-21 Dec, pp. 190-195 Ahuja R. (June 2011) 'SLA Based Scheduler for Cloud storage and Computational Services', International Conference on Computational Science and Applications (ICCSA), 258-262. Albeshri A, Caelli W. (Sept 2010) 'Mutual Protection in a Cloud Computing Environment', 12th IEEE International Conference on High performance Computing and Communications (HPCC), 641-646. Almulla S, Chon YeobYeun. (March 2010) 'Cloud Computing Security management ', 2nd International Conference On Engineering Systems Management and Its Applications, 1-7. B. lagesse. (Mar.2011) 'Challenges in Securing the Interface between the cloud and Pervasive Systems', 2011 IEEE International Conference on Pervasive Computing and Communications Workshops, 106-110. Tackle your client’s security issues with cloud computing in 10 steps, http://searchsecuritychannel.techtarget.com/tip/Tackle -your-clients-security-issues-with-cloud-computing-in -10-steps. Problems Faced by Cloud Computing, Lord CrusAd3r, dl.packetstormsecurity.net/.../ProblemsFacedbyCloud Computing.pdf.

www.alliedjournals.com


International Journal of Engineering, Management & Sciences (IJEMS) ISSN: 2348 –3733, Volume-2, Issue-4, April 2015 [8]

Kevin Hamlen, MuratKantarcioglu, Latifur Khan, BhavaniThuraisingham, Security Issues for Cloud Computing, International Journal of Information Security and Privacy, 4(2), 39-51, University of Texas, USA, April-June 2010. [9] Cong Wang, Kuiren. (2010) 'Toward publicly auditable secure cloud data storage services', Network ,IEEE, vol. 24, no. 4, July, pp. 19-24. [10] Cong Wang, Qian Wang. (March 2010) 'Privacy Preserving Public Auditing for Data storage security in Cloud Computing', INFOCOM 2010, IEEE, 1-9. [11] Cong Wang, Qian Wang. (2009) 'Ensuring data storage security in Cloud Computing', International Workshop on Quality of Service, 1-9. [12] C. Wohlin. (2000) Experimentation in Software engineering: an introduction, 6 th edition, International series in software engineering, Springer. 44 [13] Dawei Sun, Guiran Chang. (Sept.2010) 'A Dependability Model to Enhance Security of Cloud Environment Using System-Level Virtualization Techniques', Pervasive Computing Signal Processing and Applications, 305-310. [14] Dawod W, Takouna I. (March 2010) 'Infrastucture as a service security: challenges and solutions', 7th International Conference on Informatics and Systems (INFOS), 1-8. [15] Doelitzscher F, Reich C. (July 2010) 'Designing Cloud services adhering to Government privacy Laws ', IEEE 10th International Conf. on Computer and Information Technology, 930-935. [16] D.K. Mishra. (Sept.2010) 'Tutorial: Secure Multiparty Computation for Cloud Computing Paradigm by Durgesh Kumar Mishra', Second International Conference on Computational Intelligence, Modelling and Simulation, xxiv-xxv. [17] Ford R.B. (2011) 'Information Security in the Cloud', Network Security, vol. 2011, no. 4, April, pp. 15-17. [18] Gul I, Rehman A. (June 2011) 'Cloud Computing Security Auditing', 2nd International Conference on next Generation Information Technology (ICNIT), 143-148. [19] Hao Z, Zhong S. (June,2011) 'A Time-Bound Ticket-Base Mutual Authentication Scheme for Cloud Computing', International Journal of Computers, Communications and Control, vol. 6, no. 2, June, pp. 227-235. [20] Huimei Wang, Ming Xian. (May 2011) 'Cloud Evaluation method of Network Attack resitance Ability', Network Computing and Information Security (NCIS), 239-243.

28

www.alliedjournals.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.