International Journal of Engineering Research Vo lu me No.3, Issue No.4, pp : 221-225
ISSN:2319-6890)(online),2347-5013(print) 01 April 2014
Literature review: Cloud Computing –Security Issues, Solution and Technologies Rajani Sharma, Rajender Kumar Trivedi Graphic Era University rajanisharma65@gmail.com,engineertrivedi@gmail.com Abstract— Cloud computing has grabbed the spotlight in the year 2013 at a conference in San Francisco, with vendors providing plenty of products and services that equip IT with controls to bring order to cloud chaos. Cloud computing trend is increasing rapidly so to make cloud computing more popular the very first step for the organization is to identify exact area where the cloud related threats lie. At an unusual pace, cloud computing has transformed business and government. And this created new security challenges. The development of the cloud service model provide business – supporting technology in a more efficient way than ever before .the shift from server to service based technology brought a drastic change in computing technology. However these developments have created new security vulnerabilities, including security issues w hose full impressions are still rising. This paper presents an overview and study of cloud computing, with several security threats, security issues, currently used cloud technologies and security solutions. Keywords—Cloud Computing, Deployment Models, Threats, Technologies, Security Issues, Service Models. I. In tr o du c ti o n Cloud computing is set of resources that are being allocated on demand. Cloud computing proposes new ways to provide services. These new innovative, technical and pricing opportunities bring changes in the way business operated. Cloud computing is the matchless computing technology. Cloud computing is a new label to an old idea. Cloud computing is a collection of resources and serviced provided by cloud service provider through internet. Cloud services are distributed from data canters sited all over the wo rld. Cloud computing makes possible for its users to use the virtual resources via internet as per requirements. Cloud computing grabbed the spotlight in few years. General examp le of cloud services are Google Engine, Oracle Cloud, Office 365. As the cloud computing is growing rapidly this also leads to severe security concerns. Lack of security is the only barrier in wide adoption of cloud computing. The rapid growth o f cloud computing has brought many security challenges for users and providers. II. Cloud S erv ice M o d els Cloud Software-as-a-Service: Software –as-a-Service is a software distribution scheme which gives right to access the software and its functions remotely as a web-based service. Software -as-a-Serv ice permits organizations to get into business functionality a very low cost normally less than paying for licensed applications in view of the fact that SaaS charges are built on a monthly fee. As so the software is hosted remotely users do not require to pay for additional hardware. So ftware -as-a-Serv ice eliminates the all possibilit ies for organizat ions to handle the installation, set-up,
IJER@2014
daily preservation and maintenance. Cloud Platform-as-aService: the capability provided to the users to deploy onto the cloud infrastructure. PaaS model, cloud suppliers brings a computing platform, naturally co mprising Operat ing System, Programming Language execution environment, database and wed servers. Application developers can develop and run their software results on cloud platform with no cost and difficulty of acquiring and handling of the main hardware and software films, for examp les Oracle cloud platform-as-a-service, Oracle provides the Database as platform. And other examp le is windows azure. In other means Platform-as-a-Serv ice is the facility to offer to the users to deploy user-designed or obtained applications on the cloud infrastructure. PaaS can largely be characterized as application development environments proposed as a „Service‟ via the cloud supplier. Users uses these platforms wh ich is being normally have Integrated Develop ment Environ ment (IDE), so as it comprises the editor, compiler, build/execute and deploy features to develop their applications. And users deploy their applications on the infrastructure provided by the cloud supplier. Cloud Infrastructure-as-a-Service: The cloud infrastructure such as hardware, servers, routers, storage, and other networking modules all are granted by the IaaS supplier. The end user takes on these offered services based on their requirements and pay for what they have used. The end user is capable of deploy and run any software, which co mprise Operation Systems, applications. The end user does not supervise or monitor the core cloud infrastructure, but has hold over the operation systems and deployed application. At this juncture the end user needs to experience the resource requirements for the precise application to make use of IaaS properly. Flexib ility and scaling are the liabilit ies of the end user, not the supplier. Moreover IaaS is small task performing it-yourself informat ion hub so as you would require to form the means (server, storage) and make the task completed. Waiting right away, small end users did not have the investment to make a purchase of immense computing resources and to make sure that they had the space they wanted to manage unpredicted spikes during load. Amazon Elastic Co mpute Cloud (A mazon EC2) is an infrastructure –as-a-Service model that facilitates scalable compute volume, on demand, in the cloud. It actually allo ws end users to leverage Amazon‟s huge infrastructure with no up-front investments. Amazon EC2 decreases the clock needed to get hold of and boot latest server instances and permit users to immed iately scale space – equally up and down as their computing needs vary. III. Cloud Deplo y m en t M o d els Public Cloud-A cloud is to be entitled as public cloud when the services (like applicat ions, storage) are being provided over network that are available publically, anyone can access it.
Page 221