Data Security in Cloud Computing
Data Security in Cloud Computing
devices on demand. Cloud computing service is provided by companies call them as cloud providers. Based on the services which it provides the cloud companies are divided into 3 types IAAS(Infrastructure as a service) PAAS(Platform as a service) SAAS(Software as a service)
.
Capital expenditure Location and Device independence Utilization and efficiency improvement Very high Scalability High Computing power
TRUSTED COMPUTING
To improve the mutual trust between consumer and cloud provider, a well-understood trust foundation needs to be in place. The Trusted Computing Group , an industry consortium, has developed standards for using Trusted Computing techniques in laptop and desktop computers, networking, and storage. TCGs member companies, 100-plus major suppliers that cover the enterprise with connectivity and computing technology, also provide technology for cloud computing. As a result, TCG standards have been rapidly adapted to address cloud security.
When attestation is used, the TPM monitors software as it is loaded and provides secure reports on exactly what is running on the machine. This monitoring and reporting are especially important in the virtualized environment of cloud computing where viruses and worms can hide in many places. the TPM provides a strong security foundation for other TCG specifications including Trusted Network Connect (TNC) and Trusted Storage.
TRUSTED STORAGE
Trusted Storage specification provides a manageable, enterprise-wide means for implementing full-disk encryption using hardware included right in the drive. These drives, known as self-encrypting drives, simplify the enterprise encryption process for handling sensitive data, since all data, applications, and drivers are encrypted internal to the drive and key management is an integral part of the design. The hardware-based encryption can take advantage of the TPM if desired and does not require user intervention or impact system performance.
NOTE:unlike traditional software-only encryption schemes that require cycle time from the main processor. With a selfencrypting drive, when a drive is removed for any reason (maintenance, end of life or even theft), the data is completely useless to criminals since they dont know the encryption key.
AUTHENTICATION
In the cloud environment, authentication and access control are more important than ever since the cloud and all of its data are accessible to anyone over the Internet. The TPM can easily provide stronger authentication than username and passwords. TCGs IF-MAP standard allows for real-time communication between the cloud provider and the customer about authorized users and other security issues. When a user is fired or reassigned, the customers identity management system can notify the cloud provider in real-time so that the users cloud access can be modified or revoked within seconds. If the fired user is logged into the cloud, they can be immediately disconnected
INCIDENT RESPONSE
As part of expecting the unexpected, customers need to plan for the possibility of cloud provider security breaches or user misbehaviour. An automated response or at least automated notification is the best solution. TCGs IF-MAP (Metadata Access Protocol) specification enables the integration of different security systems and provides real-time notification of incidents and of user misbehaviour.
CONCLUSION
If we overcome all the difficulties and increase security and trust between cloud provider and customer then we can utilize the resources effectively.
REFERENCES
[1.] Trusted Computing Group (TCG): http://www.trustedcomputinggroup.org/ [2.] Cloud Security Alliance (CSA): http://cloudsecurityalliance.org/ [3.] A Security Analysis of Cloud Computing: (http://cloudcomputing.sys-con.com/node/1203943 [4.] Cloud Security Questions? Here are some answers (http://cloudcomputing.sys-con.com/node/1330353) [5.] Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control: http://www.parc.com/content/attachments/ControllingDataI nTheCloud-CCSW-09.pdf