Data Security in Cloud Computing
Data Security in Cloud Computing
Cloud computing is Internetbased computing, whereby shared resources, software, and information are provided to computers and other devices on demand
The name cloud computing was inspired by the cloud symbol that's often used to represent the Internet in flowcharts and diagrams.
Soon, there may be an alternative for executives like you. Instead of installing a suite of software for each computer, you'd only have to load one application. That application would allow workers to log into a Web-based service which hosts all the programs the user would need for his or her job. Remote machines owned by another company would run everything from e-mail to word processing to complex data analysis programs. It's called cloud computing,.. and it could change the entire computer industry
Real life example is:-if we go into restaurant ,,,we eat food and give money to them,,,, Here restaurant acts as cloud computing company And food acts as software of company which are we using..
These are the companies which are hardly trying to get into business of Cloud computing AMAZON is very successful among them ..
IAAS Services
y Supplies the whole cloud infrastructure viz. servers
etc y You pay only for the resources your actually use.
PASS Service
y Is a delivery of a computing platform over the web. y Provides all the facilities required to support the
SAAS Service
y The vendor supplies the hardware infrastructure y The software product y Interacts with the user.
Rapid elasticity
Architectures
Customer Data Customer Customer Code Provider Premises
To ensure data confidentiality, integrity, and availability (CIA), the storage provider must offer capabilities that, at a minimum, include: Scheduled data backup and safe storage of the backup media Stringent access controls
Data
Backups of Data
Data store in database of provider should be redundantly store in multiple physical location.
Data that is generated during running of program on instances is all customer data and therefore provider should not perform backups.
Some virus and worm create Job Starvation Issue : where one job takes up a huge amount of resource
Solution:
A trusted set of users is defined through the distribution of digital certification, passwords, keys etc. and then access control policies are defined to allow the trusted users to access the resources of the hosts Advanced reservations of resources and priority reduction
Information Security
Security related to the information exchanged between different hosts or between hosts and users. This issues pertaining to secure communication, authentication, and issues concerning single sign on and delegation. Secure communication issues include those security concerns that arise during the communication between two entities. These include confidentiality and integrity issues. Confidentiality indicates that all data sent by users should be accessible to only legitimate receivers, and integrity indicates that all data received should only be sent/modified by legitimate senders.
Solution:
Public key encryption, X.509 certificates, and the Secure Sockets Layer (SSL) enables secure authentication and communication over computer networks
Problems: y Is it possible for all of my data to be fully Problems: encrypted? y Encryption accidents can make y What algorithms are data totally unusable. used? y Encryption can complicate availability y To ensure Users that both Data and Code are safe
issues the keys? y Investigating inappropriate or illegal activity may be difficult in cloud computing because
Solution:
The cloud provider should provide evidence that encryption schemes were designed and tested by experienced specialists. Commitment to support specific forms of investigation, along with evidence that the vendor has already successfully supported such activities.
Provider should get some standard certificate from some governing or standardized institution that ensure users that provider has established adequate internal control
profound implications not only for Internet services but also for the IT sector as a whole.
y Promises to stream-line the on-demand