A Comprehensive Review On Trust Issues, Security and Privacy Issues in Cloud Storage
:- Now a days everywhere talking about cloud
computing paradigm and if you look at business
enterprises there are lot of initiatives to put everything
on a cloud computing . Most of the IT industries are
insisting to adopt cloud computing in their business
operations.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
163 views9 pages
A Comprehensive Review On Trust Issues, Security and Privacy Issues in Cloud Storage
:- Now a days everywhere talking about cloud
computing paradigm and if you look at business
enterprises there are lot of initiatives to put everything
on a cloud computing . Most of the IT industries are
insisting to adopt cloud computing in their business
operations.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9
Volume 5, Issue 9, September – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
A Comprehensive Review on Trust Issues,
Security and Privacy Issues in Cloud Storage K.Suresha P.Vijayakarthick Department of Computer Science and Engineering Department of Information Science and Engineering D R R Government Polytechnic Sir M Visveswaraya Institute of Technology Davanagere, Karnataka, India-577004 Bangalore, Karnataka, India
Abstract:- Now a days everywhere talking about cloud I. INTRODUCTION
computing paradigm and if you look at business enterprises there are lot of initiatives to put everything Cloud computing has been characterized as “A Model on a cloud computing . Most of the IT industries are for enabling Convenient, On-demand Network access to a insisting to adopt cloud computing in their business Shared pool of Configurable Computing resources (e.g., operations. A Cloud Computing is a one infrastructure Networks, Servers, Storage, Applications, and Services) that which can cater to the need of many people and it can do can be Rapidly Provisioned and Released with Minimal different varieties of services and functionalities such as management effort or Service Provider Interaction” [61]. ,it can store for you, it can compute for you, importantly Cloud computing should be seen as a digital computing it can scale for your need, so cloud computing means a paradigm with implications for greater flexibility and lower provision of infrastructure which is scalable and it can cost availability. And of this, cloud computing has attracted a do different varieties of services. A major challenge lot of coverage lately. Cloud computing services benefit from today in providing cloud computing is data security, economies of scale gained by efficient utilization of access control and privacy of users data, so first we need infrastructure, specialization and other productivity. to identify what are the security issues, security threats However, the evolution of distributed computation is only in and security vulnerabilities present in cloud computing its infancy. Today , the term itself is still used for a variety of ,after identifying and analyzing all these issues we have meanings and interpretations[33]. Three widely cited service to propose a solution model which will provide data models have been built [58, 78, 85] Software-as-a-Service security ,access control and data privacy in cloud (SaaS) facilitates a software implementation platform in computing. Information security is one of the significant which one or more programmes and computer resources are imperatives for re-appropriated information in a provided for use on demand as a turnkey service. This will distributed storage condition. reduce the total costs of hardware and software development, repair and service. Platform-as-a-Service (PaaS) facilitates a This paper addresses key concerns that are presumed to software implementation paradigm in which the have long haul pertinence to distributed computing programming platform is distributed as an on-demand service security and protection on the basis of established where applications can be developed and implemented. It concerns and vulnerabilities. The main aim of this paper will reduce the cost and complexity of buying, housing, and is to highlight key security , privacy and trust concerns managing the hardware and software components of the in current cloud computing environments and to help network. users understand the tangible and intangible risks associated with their use, including those associated with Infrastructure-as-a-Service (IaaS) promotes a software cloud computing. (a)Survey the most important delivery paradigm in which the core computing infrastructure protection, security and trust gives that present dangers of servers, applications and network equipment is provided as to current distributed computing conditions and (b) an on-demand service on which application development and Analyze how these possible risks to privacy , security and execution mechanisms can be based. It may be used to avoid confidence can be handled and provide a high level of common hardware and software infrastructure components security, confidence and reliability in the cloud from being purchased, stored and controlled. computing world. In the near future, we will further examine and evaluate privacy, protection and trust Cloud computing should be entirely used as a private problems in the cloud computing environment through a platform in a corporate computing environment. However, it quantifiable methodology, further build and deploy should be apparent from the service models that the key comprehensive security, privacy trust assessment, thrust of cloud computing is to provide the external party management system for truly cloud computing with the means to outsource aspects of the setting. And for environments. the outsourcing of information technology resources, there is anxiety about the implications for data security and privacy; Keywords:- Access Control, Trust Issues, Security Threats, In fact, the transfer of sensitive programmes or data from the Vulnerabilities, Multitenancy, Virtualization. company's computer center to another organization’s computer center. While cost savings are the primary
IJISRT20SEP705 www.ijisrt.com 1244
Volume 5, Issue 9, September – 2020 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 justification for converting to a cloud provider, there should availability issues Finally , in Section VI, conclusions and be no savings in terms of protection or privacy. In the end , guidance for future work are given. the organization is responsible for the overall state of the outsourced operation. Monitoring and resolution of security II. DATA SECURITY ISSUES and privacy problems remain the responsibility of the company; as do other important issues, such as performance, Data security is used as a composite term, including 'a availability, and recovery. mixture of privacy, the prevention of unauthorized exposure of information, integrity of information, the prevention of Cloud computing, a long-standing "computing as a unauthorized alteration or deletion of information, and the service" idea, has opened a new era in future computing, prevention of unauthorized withholding of information'[13]. transformed a large part of the IT market, reshaped the Data protection is the lack of unwanted access to, or buying and use of IT software and hardware, and drawn handling of, the state of the system. The main dimensions of substantial interest from global and local IT participants, security are efficiency, secrecy and integrity. One of the national governments and international agencies[1,3,4].Cloud biggest challenges to opening the new era of the long- computing is a large- Cloud computing is a wide scale dreamed view of computers as a service is security. distributed computing paradigm powered by economies of scale in which a pool of abstracted, virtualized, seamlessly Cloud computing security issues can be categorized elastic, highly available, configurable and reconfigurable into six sub-categories [5,6,7,11,14], including: (a) how to computing services can be quickly generated and published provide cloud service access or tracking protection with limited management effort in data centers. Services are measures, (b) how to keep all entities and confidential delivered on demand via high-speed Internet to external information secret, (b) how to keep data private, (c) how to customers with a "X as a Service (XasS)" machine deter malicious insiders from illegal actions due to the architecture divided into three segments: "applications”, general lack of transparency in the provider system (d) how “platforms" and "infrastructure." The objective[3][4] is to to prevent hijacking of networks, where phishing, malware provide consumers with more flexible installations, more and harassment are well-known IT issues, (e) how to extensible software for computing , storage and networks in a manage multi-instances in multi-tenancy network straightforward manner. Similarly, it is no longer sufficient environments that assume that all instances are completely for IT businesses with creative concepts for new application separated from each other. However, this principle will also technologies to make substantial capital outlays in hardware break down, allowing attackers to cross virtual machines' and technological infrastructure. side channels, circumvent the sandboxed environment restrictions, and have full access to the host, and (f) how to Cloud servers with access to physical files, develop appropriate regulations and implement regulatory identification and certificate processing , data authentication, jurisdiction, such that consumers, if required, have a chain tempering, integrity , security, negligence and information against their vendors. leakage are involved in these problems. To secure private and sensitive data stored in data centres, the cloud customer In a global network related to data from other needs to verify (a) the true truth of the cloud computing consumers, data stored in the cloud typically exists. system in the world. (b) cloud storage of information; and (c) Organizations that transfer confidential and monitored data stability of software in the field of cloud computing. to the cloud must therefore take care of the means by which However, in cloud data centres, data and resources control is data access is handled and the information is kept secure. not safe and accurate. This paper addresses important cloud infrastructure- Data-Isolate: related security and privacy challenges as they extend to Data can take a variety of forms. Cloud-based outsourcing parts of the organizational computing application development, for instance, requires application environment. It identifies areas of interest that need extra programmes, templates, and setup settings, as well as consideration and makes educated security decisions with the software for development. This includes documentation and appropriate context. In this paper, trust issues in current cloud other material created or used by apps for deployed apps, as computing environments are primarily involved and help well as account records for application users. One way of users understand the tangible and intangible risks associated keeping data secure from unauthorized users is access with their uses. Our contributions can be summarized as: (a) controls; encryption is another. Data Access Controls are surveying the most significant privacy, security and trust normally Identity-based, making verification of the User's issues that pose threats in current cloud computing Identity an important problem in cloud computing. environments; and (b) examining how these potential security, privacy and trust risks can be handled and provide a Database ecosystems that are used in cloud computing highly Secure, Trustworthy and efficient cloud storage. can vary greatly. For instance, some settings adopt a multi- instance model, while others adopt a model of multi-intent. The rest of this paper is arranged as follows. Section II For each service customer, the former provides a particular poses data security issues and fixes them. In cloud database management system operating on a VM perhaps, computing, Section III raises data privacy problems and granting the customer direct control over job definition, user discusses them. In cloud computing , Section IV raises trust permission, and other administrative tasks relevant to or confidence problems and addresses. Section V raises data security. For a cloud service customer, the latter creates a
IJISRT20SEP705 www.ijisrt.com 1245
Volume 5, Issue 9, September – 2020 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 predefined environment that is shared with other users, many cloud storage services, on the other hand, is that usually by marking data with a user ID. precise knowledge about the status of an entity 's data is either unavailable or not disclosed to the service subscriber. For databases, there are various types of multi-tenant This situation makes it impossible to assess whether arrangements available. A type pools resources differently, effective safeguards are in place and whether there is delivering varying amounts of separation and utilization of consistency with legal and regulatory enforcement services[26, 65]. Also, other considerations apply. Some requirements. To a degree, external audits and security features, such as data encryption, for example, are only certifications may address this problem, but they are not a feasible with agreements that use separate databases rather panacea. than shared ones. This forms of tradeoffs imply that the suitability of the data management system with the data It is incredibly difficult to guarantee protection under concerned be carefully considered. The choice of storage international laws and regulations if sensitive data crosses and data organization used in the application is likely to be the borders of countries. For instance, the expansive powers influenced by criteria in certain fields, such as health care. of the USA Patriot Act have concerned some foreign Data that is responsive to privacy is usually a big governments that the regulations would allow the U.S. problem[52]. government access to private information outsourced to American businesses, such as medical records[5]. The When at rest, in transit and in usage, data must be limitations on the trans-border flow of non-classified secured and access to data must be controlled. confidential data and data confidentiality requirements have Communication protocol standards and public key become the subject of national and international privacy and certificates allow cryptography to secure data transfers. security laws and regulations[12]. Key concerns related to However, specifications for data storage at rest are not as cross-border data transfers include whether the regulations well standardized, making interoperability an issue due to in the jurisdiction where data is gathered allow data to flow, the predominance of proprietary programmes. Lack of whether such regulations continue to relate to post-transfer interoperability impacts the availability of data and data, and whether there are external challenges to the complicates the portability of applications and data between regulation at the destination[12]. Technical, physical and cloud service providers. Cryptographic key management is institutional protections are also implemented, such as currently primarily the responsibility of users in cloud access restrictions. For example , European data protection providers. Using hardware authentication modules that do laws may impose additional responsibilities relating to the not scale well to the cloud model, key generation and handling and processing of European data transmitted to the storage is usually done outside the cloud. Research work United States[9]. underway to define extensible and functional Cryptographic secret key manage and interchange techniques to III. DATA PRIVACY ISSUES government use that would potentially helping to resolve the obstacles. The security of information usage considered as Privacy is the privilege of a individual or a group to evolving field of Cryptography with little experimental distinguish themselves or knowledge regarding themselves results to give, confidence technique is the key protection and, therefore, to reveal themselves selectively, [22]. including[15]: (a) where: a participant might be more anxious with the exposure of their present or future information than Data-Sanitize: information from the past; (b) how: a user might be There is strong safety ramifications for the data comfortable when friends may inquire for their information sanitization protocols implemented by the service supplier. manually, but may not want to notify. (c) scope: the user may Sanitize is the withdrawal from a storage facility of sensitive have their information documented as a generic area rather data in a variety of ways, such as when a storage unit is than a particular point; in the business, consumer and privacy removed from use or relocated for storage to another venue. sense, the protection and proper usage of customer It also applies to backup copies made for the service's information and the satisfaction of the customer's recovery and restoration and to the residual data left after the requirements about its use are required. Privacy in service 's termination. Data from one subscriber is physically organizations requires the application of guidelines, combined with data from other users in a cloud computing protocols, standards and processes for the management of arrangement, which can complicate matters. With sufficient publicly identifiable information[8]. expertise and tools, for example , data may be recovered from damaged drives that are not adequately disposed of by Depending on the different cloud contexts, privacy service providers. issues vary and can be categorized into four subcategories[5][6][8], including: (a) how to keep consumers Data Location: in charge of their data when collected and processed in the This issue is one of the popular complying problems cloud, and how to avoid infringement, misuse and challenging a company as the position of valuable data [30, unauthorized resale (b) how to ensure the reproduction of 51]. The usage of an in-house database center enables the data in a jurisdiction and in a reliable state that it is normally organization to coordinate its processing system and to possible to replicate consumer data at a variety of acceptable consider in detail where the information is stored and the locations and to avoid data destruction, misuse and unwanted safeguards used to safeguard the information. A feature of
IJISRT20SEP705 www.ijisrt.com 1246
Volume 5, Issue 9, September – 2020 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 modification or manufacture; (c) which party is responsible Insider Access: for enforcing security requirements for personal information; Data collected or maintained outside the limits of an entity, the firewall and other security mechanisms are IV. TRUST ISSUES combined with an intrinsic level of risk. For most companies, the insider protection problem is a well-known issue which, Trust is seen as a measurable faith that uses knowledge beyond its name, often extends to outsourced cloud to make trustworthy decisions. Originally used in social services[21,54]. Insider risks range to those faced by current science to create a connexion between human beings, it is or former workers and include company partners, suppliers, now an important alternative for the development of security and other persons who have had access to the networks, mechanisms in distributed computing environments. Since systems , and data of the enterprise to carry out or facilitate confidence has many soft security features, such as activities. It is also possible to cause accidents inadvertently. confidentiality, reliability , integrity, fairness, confidence, Moving data and information to an external cloud storage integrity, protection, competence, and so on.. Indeed, the facility improves not only the staff of the service provider, bond of trust between persons is the most complex since it is but also likely other business customers, with the possibility extremely contextual, context-dependent, non-symmetrical, of insider protection. For eg, it has been seen that an internal uncertain and partly transitive[9,10]. denial of service attack against the Amazon Elastic Compute Cloud ( EC2) entails a service user creating an initial 20 Trust evaluation is a multi-faceted and multi-phase accounts and launching instances of virtual machines for process based on multi-dimensional variables and the length each, then these accounts are used to build an additional 20 of the trust assessment, and is used to find the answer to the accounts and system instances to extend and rapidly absorb question "What node(s) should I associate with and what resources[76]. should I not associate with?" The observable perception of trust is adapted by [16], "Trust of Party A to Party B to Composite Services: Service X is A's observable expectation that B behaves Nesting and layering of other cloud providers may be consistently". Another perception of mathematical made up of cloud services themselves. A SaaS provider confidence is provided in[17],' Confidence (or, might build its services on PaaS or IaaS cloud resources , for symmetrically, distrust) is a simple degree of subjective example. Issues can emerge from cloud service providers probability in which an agent determines whether a particular subcontracting their services to third-party service providers, action will be carried out by another agent or a group of including the scope of third-party management, the duties agents, both before it is able to monitor such an action (or involved, and the solutions and remedies available. independently or in its ability to monitor it) and in a way in Furthermore, confidence is not transitory, ensuring that third- which it affects its own action.' Standard hard security party arrangements be updated before entering into an techniques such as encryption and permission have a stable arrangement with the service provider and that the terms of cloud defence mechanism, but they fail when cooperating certain arrangements be maintained in the course of the entities operate maliciously due to the scale and transient relationship or unless fully informed of any planned changes. existence of collaborations. For composite cloud providers, responsibility and performance expectations may become a serious concern. Through mitigating the role of hostile actors in This situation is illustrated by Linkup, an online storage communications and thereby providing a highly trustworthy facility that closed after its 20,000 users lost access to a vast cloud computing system, Trust will combat such security volume of data. The exact responsibility for the cause of the challenges as a soft social security philosophy. Trust issues failure was uncertain because another organisation, Nirvanix, can be categorised into four subcategories of cloud hosted the data for The Linkup, and another, Savvis, hosted computing environments[5][6,8,12], including: (a) how to its application and database[18]. define and measure trust based on the unique feature of cloud computing environments; b) how to deal with highly Visibility: sensitive malicious recommended data in cloud computing Migration to cloud computing provides the service environments, as cloud trust is variable and unpredictable, (c) provider with control over the networks on which the how to recognize and provide the extent of difference in enterprise's data and software operate. They must be service security compared to the degree of trust, (d) how to introduced in accordance with those used by internal deal with the change in the degree of trust with touch time organisational systems in order to avoid causing gaps in and meaning, and how to track, adjust, and completely reflect security, administration, operational and technological the complicated change in trust relationship with time and controls. The problem is overwhelming, because the metrics space. used to assess the security of the two computer systems are an evolving research area[27]. Furthermore, the user's A business relinquishes complete power of some areas network and system level access is typically outside the reach of protection under the cloud infrastructure paradigm and, in of most service arrangements, explicitly affecting exposure doing so, confers an unprecedented degree of confidence on and the means of auditing operations. Service arrangements the service provider. should have a means of making the compliance protocols and mechanisms implemented by the service provider more visible, as well as their reliability over time , to ensure that
IJISRT20SEP705 www.ijisrt.com 1247
Volume 5, Issue 9, September – 2020 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 policies and procedures are enforced over the device provider may be backed up by a second cloud storage lifecycle. provider to ensure that data is available for rapid resumption of critical operations after a sustained disruption or Risk Management: significant disaster at the primary level. Some subsystems or subsystem components for cloud- based applications are outside the direct control of an Prolonged and Permanent Outages: organisation who controls the knowledge and authorises the A service provider may encounter severe issues, such as usage of the software. When they have greater control of the bankruptcy or lack of services, disrupting the service for systems and equipment involved, often individuals are more extended periods of time or triggering a full shutdown. The at ease with risk. In the very least, when faced with an event, FBI raided data centres in Texas in April 2009, for example, a high degree of management provides an incentive to weigh and seized hundreds of computers to pursue fraud claims choices, set priorities and behave decisively in the company's against a range of businesses working out of the centers[86]. best interest. The related uncertainties need to be analysed in Hundreds of other firms who were not involved in the probe detail before choosing between an in-house approach versus yet had the misfortune of getting their network activities a cloud-based implementation. It may be a struggle to located in the targeted centres were interrupted by the raid. evaluate and mitigate risk in cloud-based systems. Ideally, The major data loss suffered by magnolia, the Bookmark the level of trust depends on the degree to which the archive service and the sudden failure of Omni drive, an organisation is able to exert full control over the external online storage company that collapsed in 2008 without service supplier in relation to the use of the security measures warning to its users[37, 58], are other examples. necessary for the protection of the operation and the evidence on the effectiveness of those controls[29]. However, the Denial of Service: proper operation of the module and the efficiency of security Application denial attacks include saturating the target measures can not be tested as closely as in the operational with fake requests to discourage it from responding to framework, and the degree of confidence must be contingent genuine requests in a timely manner. Typically, to launch an on other considerations. intrusion, an attacker requires multiple computers or a botnet. In order to defend from and raise costs, even a failed V. AVAILABILITY ISSUES distributed denial of service attack will potentially absorb a large amount of money. In certain cases, complex cloud In basic words, availability means an individual has a provision makes it possible for an attacker to do damage. wide set of accessible and functional computer services at all While cloud services are valuable, They could be flooded times. Disponibility can be temporarily or indefinitely with enough computers to attack[28]. For example, during an compromised and impairment may be partial or absolute. obvious denial of service attack on the underlying Amazon Service denial attempts, system outages and natural disasters cloud infrastructure, a denial of service attack on Bit Bucket, are always a challenge to availability. a code hosting site, culminated in an interruption of more than 19 hours of downtime [19, 62]. There could be denial of Temporary Outages: service attacks against proprietary networks, such as those Cloud computing services can and do experience used in cloud computing, in addition to publicly available failures and performance slowdowns, despite the use of networks. A denial of service attack against the computer architectures designed for high service reliability and programming interface of Amazon Cloud Services, for availability[58]. Amazon's Easy Storage Infrastructure (S3) instance, occurred, involving system instances replicating and EC2 systems experienced a three-hour shutdown in themselves exponentially[76]. As an attack vector, the February 2008, which in turn impacted the usage of systems centrally assigned non-routable addresses used to manage by Twitter and other start-up companies[55,63]. The services within the network of the service provider can also lightning storm in June 2009 caused a partial EC2 blackout, be used. For elements of one cloud, the worse probability is impacting some users for 4 hours[64]. Similarly, the failure to target that of another or to target all of its own of the Salesforce.com storage cluster prompted a shutdown in elements[45]. February 2008 for several hours and a more brief shutdown in January 2009 due to the failure of the network VI. CONCLUSION AND FUTURE WORK device[31,37]. Owing to networking problems related to updates, Microsoft's Azure cloud service encountered major Any of the biggest security issues have receded into loss for approximately 22 hours in March 2009[24]. the past and remain unanswered while demonstrating the savings and performance gains of the cloud. Several At a standard 8.76 hours of downtime is expected in important pieces of technology, such as a federated one year at a level of 99.999 percent reliability. In the confidence system, have not been fully implemented yet, organisation's contingency plans to manage the repair and impacting successful implementations. A long-standing rehabilitation of disrupted cloud systems and processes using security challenge that overshadows large-scale computation alternate networks, facilities and sites, the extent of stability in general is now deciding the security of sophisticated of a cloud infrastructure as well as its backup and recovery computer systems. For information protection experts and capability should be taken into account. For software stored professionals, the accomplishment of high quality standards there, cloud computing systems may be a single point of in software has been an inescapable goal and is still a work failure. In such situations, data maintained by the primary in progress for cloud computing. The reliability of the cloud
IJISRT20SEP705 www.ijisrt.com 1248
Volume 5, Issue 9, September – 2020 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 infrastructure depends on powerful computation and REFERENCES cryptography. Organizational data must be protected in a way compliant with the practises of the service centre of the [1]. Foster I, Zhao Y, Raicu I, Lu, S. Cloud Computing and enterprise or the cloud. There is no clear support Grid Computing 360-degree compared. Proceedings of arrangement encompassing the breadth of available cloud the Grid Computing Environments Workshop, GCE services and the demands of different entities. A useful 2008; IEEE Press, Nov. 2008, 1-10. starting point[51] is to provide a list of common outsourcing [2]. Buyya R, Chee Shin Y, Venugopal S, Broberg J, requirements, such as privacy and security guidelines, Brandic I. Cloud computing and emerging IT compliance and compliance issues, service quality criteria platforms: vision, hype, and reality for delivering and fines, change management procedures, quality of service computing as the 5th utility. Future Generation operation, and the right to cancel. In some ways, conversion Computer Systems; 2009;25(6):599–616. to a cloud storage infrastructure is a risk assessment practise. [3]. Armbrust M, Fox A, Griffith R, Joseph A D, Katz R, The research makes use of both qualitative and quantitative Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, elements. Risks must be carefully balanced against the Zaharia M. A View of Cloud Computing. safeguards available and future advantages, with the Communications of the ACM; 2010;53(4):50–58. assumption that the organisation is responsible for security. [4]. Mell P, Grance T. The NIST Definition of Cloud So many restrictions, if the advantages outweigh the costs Computing. Communications of the ACM; and associated risks, may be disruptive and risky. 2010;53(6):50. Maintaining an appropriate compromise between the [5]. Paquette S, Jaeger P T, Wilson S C. Identifying the strength of the controls and the relative risk associated with security risks associated with governmental use of each programme and procedure is crucial. cloud computing.Government Information Quarterly; 2010;27(3):245–253. High security remains one of the key obstacles to [6]. Subashini S, Kavitha V. A survey on security issues in opening up the modern era of the long-dreamed view of service delivery models of cloud computing. Journal of computers as a good. As essential systems and data are Network and Computer Applications; 2011;34(1):1– migrated to cloud storage centres, they run on virtual 11. computing services in the form of a virtual computer. These [7]. Vaquero L M, Rodero-Merino L, Morán D. Locking unusual aspects, however, introduce many new security the sky: A survey on IaaS cloud security. Computing; concerns, such as accessibility vulnerabilities, virtualization 2011;91(1):93–118. vulnerabilities, and mobile apps vulnerabilities. With the [8]. Pearson S, Benameur A. Privacy, security and trust growth of cloud computing and the rising number of cloud issues arising from cloud computing. Proceedings of users, stability, privacy and trust aspects can continuously the 2nd IEEE International Conference on Cloud grow. Paragraphs L shall be indented. Both the paragraphs, Computing Technology and Science, CloudCom 2010; that is, both left-justified and right-justified, must be IEEE Press, Nov. 2010, 693-702. justified. The cloud user wants to verify (a) the true [9]. Ahamed S I, Haque M M, Endadul Hoque M, Rahman existence of the world's cloud computing environment; (c) F, Talukder N. Design, analysis, and deployment of the security of cloud data; and (b) the security of cloud omnipresent formal trust model (FTM) with trust storage services to secure the sensitive and sensitive data bootstrapping for pervasive environments. Journal of contained in data centres. Systems and Software ; 2010;83(2):253–270. [10]. Karaoglanoglou K, Karatza H. Resource discovery in a In this article, we intend primarily to illustrate the main Grid system: Directing requests to trustworthy virtual security , privacy and confidence challenges in modern organizations based on global trust values. Journal of cloud computing environments and help users understand Systems and Software; 2011;84(3):465–478. the tangible and intangible threats associated with their use. [11]. Takabi H, Joshi J B D, Ahn G. Security and privacy Two key facets of confidentiality, safety and confidence challenges in cloud computing environments. IEEE issues are discussed, including: (a) surveying the most Security & Privacy;2010;8(6):24–31. significant data, protection and confidence problems raised [12]. Sangroya A, Kumar S, Dhok J, Varma V. Towards by challenges in modern cloud computing environments; (b) analyzing data security risks in cloud computing identifying how these future technology, privacy and trust environments.Communications in Computer and risks can be resolved, and creating a highly stable , secure Information Science; 2010;54:255–265. and effective ecosystem for cloud computing. [13]. Algirdas A, Jean-Claude L, Brian R, Carl L. Basic concepts and taxonomy of dependable and secure Future studies will concentrate on the following: (a) computing. IEEE Transactions on Dependable and reviewing and assessing privacy, security and trust concerns Secure Computing; 2004;1(1):11–33. in the cloud computing world from a quantifiable [14]. Tchifilionova V. Security and privacy implications of methodology; the survey and review methodology presented cloud computing - Lost in the cloud. Proceedings of in this paper is a first step towards analysing privacy, the IFIP WG 11.4 International Workshop on Open security and trust concerns (b) introducing maximum Research Problems in Network Security, iNetSec defence, faith evaluation of privacy, management's privacy 2010; Springer Verlag Press, Mar.2010,149-158. issues and (c) the application of a framework in the actual world of cloud computing.
IJISRT20SEP705 www.ijisrt.com 1249
Volume 5, Issue 9, September – 2020 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 [15]. Krumm J. A survey of computational location privacy. [29]. M. P. Eisenhauer, Privacy and Security Law Issues in Personal and Ubiquitous Computing; 2009;13(6):291– Off-shore Outsourcing Transactions, Hunton & 399. Williams LLP, The Outsourcing Institute, February 15, [16]. Shekarpour S, Katebi S D. Modeling and evaluation of 2005, trust with an extension in semantic web. Journal of http://www.outsourcing.com/legal_corner/pdf/Outsour Web Semantics;2010;8(1):26–36. cing_Privacy.pdf [17]. Iltaf N, Hussain M, Kamran F. A mathematical [30]. P. Ferrie, Attacks on Virtual Machine Emulators, approach towards trust based security in pervasive White Paper, Symantec Corporation, January 2007, computing environment. Proceedings of the http://www.symantec.com/avcenter/reference/Virtual_ Third International Conference and Workshops, ISA Machine_Threats.pdf 2009IEEE Press, Jun. 2009, 702-711. [31]. T. Ferguson, Salesforce.com Outage Hits Thousands of [18]. J. Brodkin, Loss of Customer Data Spurs Closure of Businesses, CNET News, January 8, 2009, Online Storage Service ‘The Linkup,’ Network World, http://news.cnet.com/8301-1001_3-10136540-92.html August 11,2008, [32]. S. Frei, T. Duebendorfer, G. Ollmann, M. May, http://www.networkworld.com/news/2008/081108- Understanding the Web Browser Threat, ETH Zurich, linkup-failure.html?page=1 Tech Report Nr. 288, 2008, http://e- [19]. C. Brooks, Amazon EC2 Attack Prompts Customer collection.ethbib.ethz.ch/eserv/eth:30892/eth-30892- Support Changes, Tech Target, October 12, 2009, 01.pdf http://searchcloudcomputing.techtarget.com/news/artic [33]. G. Fowler, B. Worthen, The Internet Industry is on a le/0,289142,sid201_gci1371090,00.html Cloud – Whatever That May Mean, The Wall Street [20]. M. Calore, Ma.gnolia Suffers Major Data Loss, Site Journal, March 26, 2009 Taken Offline, Wired Magazine, January 30, 2009, [34]. S. Gajek, M. Jensen, L. Liao, and J. Schwenk, http://www.wired.com/epicenter/2009/01/magnolia- Analysis of Signature Wrapping Attacks and suffer/ Countermeasures, IEEE International Conference on [21]. D. Cappelli, A. Moore, R. Trzeciak, T. J. Shimeall, Web Services, Los Angeles, CA, July 2009 Common Sense Guide to Prevention and Detection of [35]. T. Garfinkel, M. Rosenblum, When Virtual is Harder Insider Threats,3rd Edition, Version 3.1, CERT, than Real, HotOS’05, Santa Fe, NM, June 2005 January 2009, http://www.cert.org/archive/pdf/CSG- [36]. S. Garfinkel, An Evaluation of Amazon’s Grid V3.pdf Computing Services: EC2, S3 and SQS, Technical [22]. USA Patriot Act Comes under Fire in B.C. Report, Report TR-08-07, Center for Research on Computation CBC News, October 30, 2004, and Society, Harvard University, July 2007 http://www.cbc.ca/canada/story/ [37]. D. Goodin, Salesforce.com Outage Exposes Cloud's 2004/10/29/patriotact_bc041029.html Dark Linings, The Register, January 6, 2009, [23]. R. Chow et al., Controlling Data in the Cloud: http://www.theregister.co.uk/2009/01/06/salesforce_ou Outsourcing Computation without Outsourcing tage/ Control, ACM Workshop on Cloud Computing [38]. D. Goodin, Webhost Hack Wipes Out Data for Security, Chicago, IL, November 2009 100,000 Sites, The Register, June 8, 2009, [24]. [24]G. Clarke, Microsoft's Azure Cloud Suffers First http://www.theregister.co.uk/2009/06/08/webhost_atta Crash, The Register, March 16, 2009, ck/ http://www.theregister.co.uk/ [39]. A. Greenberg, IBM's Blindfolded Calculator, Forbes 2009/03/16/azure_cloud_crash/ Magazine, July 13, 2009 [25]. S. Cocheo, The Bank Robber, the Quote, and the Final [40]. N. Gruschka, L. L. Iacono, Vulnerable Cloud: SOAP Irony, nFront, ABA Banking Journal, 1997 Message Security Validation Revisited, IEEE http://www.banking.com/aba/profile_0397.htm International Conference on Web Services, Los [26]. Safe Harbor Privacy Principles, U.S. Department of Angeles, CA, July 2009 Commerce, July 21, 2000, [41]. M. Gunderloy, Who Protects Your Cloud Data?, Web http://www.export.gov/safeharbor/eg_main_018247.as Worker Daily, January 13, 2008, p http://webworkerdaily.com/2008/01/13/who-protects- [27]. J. E. Dunn, Ultra-secure Firefox Offered to UK Bank your-cloud-data/ Users, Techworld, February 26, 2010, [42]. Twitter Email Account Hack Highlights Cloud http://news.techworld.com/security/3213740/ultra- Dangers, Infosecurity Magazine, July 23, 2009, secure-firefox-offered-to-uk-bank-users/ http://www.infosecurity- [28]. J. E. Dunn, Virtualised USB Key Beats Keyloggers, magazine.com/view/2668/twitter-email-account-hack- Techworld, February 22, 2010, highlights-cloud-dangers-/ http://news.techworld.com/security/3213277/virtualise [43]. D. Jacobs, S. Aulbach, Ruminations on Multi-Tenant d-usb-key-beats-keyloggers/[29] M. P. Eisenhauer, Databases, Fachtagung für Datenbanksysteme in Privacy and Security Law Issues in Off-shore Business, Technologie und Web, March 2007, Outsourcing Transactions, Hunton & Williams LLP, http://www.btw2007.de/paper/p514.pdf The Outsourcing Institute, February 15,2005,
IJISRT20SEP705 www.ijisrt.com 1250
Volume 5, Issue 9, September – 2020 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 [44]. W. Jansen, Directions in Security Metrics Research, [60]. R. McMillan, Hackers Find a Home in Amazon's EC2 Interagency Report 7564, National Institute of Cloud, Infoworld, IDG News Network, December 10, Standards and Technology (NIST), April 2009 2009, http://www.infoworld.com/d/cloud- [45]. M. Jensen, J. Schwenk, N. Gruschka, L. L. Iacono, On computing/hackers-find-home-in-amazons-ec2-cloud- Technical Security Issues in Cloud Computing, IEEE 742 Hospital, PC Magazine, International Conference on Cloud Computing, NewsServiceSept.17,2009,http://www.pcworld.com/bu Bangalore, India, September 21-25, 2009 sinesscenter/article/172185/misdirected_spyware_infec [46]. Guide for Applying the Risk Management Framework ts_ohio_hospital. to Federal Information Systems, Joint Task Force [61]. P. Mell, T. Grance, The NIST Definition of Cloud Transformation Initiative, Special Publication 800-37, Computing, Version 15, October 7, 2009, Revision 1, NIST http://csrc.nist.gov/groups/SNS/cloud-computing [47]. B. R. Kandukuri, R. Paturi V, A. Rakshit, Cloud [62]. C. Metz, DDoS Attack Rains Down on Amazon Security Issues, IEEE International Conference on Cloud, The Register, October 5, 2009, Services Computing, Bangalore, India, September 21- http://www.theregister.co.uk/ 2009/ 10/05/ 25, 2009 amazon_bitbucket_outage/ [48]. [48]P. A. Karger, I/O for Virtual Machine Monitors: [63]. R. Miller, Major Outage for Amazon S3 and EC2, Security and Performance Issues, IEEE Security and Data Center Knowledge, February 15, 2008, Privacy, September/October 2008 http://www.datacenterknowledge.com/archives/ [49]. N. Katz, Austin Plane Crash: Pilot Joseph Andrew 2008/02/15/ major-outage-for-amazon-s3-and-ec2/ Stack May Have Targeted IRS Offices, Says FBI, CBS [64]. R. Miller, Lightning Strike Triggers Amazon EC2 News, February 18, 2010, Outage, Data Center Knowledge, June 11, 2009, http://www.cbsnews.com/8301-504083_162-6220271- http://www.datacenterknowledge.com/archives/2009/0 504083.html?tag=contentMain%3bcontentBody 6/11/lightning-strike-triggers-amazon-ec2-outage/ [50]. Y. Keleta, J. H. P. Eloff, H. S. Venter, Proposing a [65]. J. Oberheide, E. Cooke, F. Jahanian, Empirical Secure XACML Architecture Ensuring Privacy and Exploitation of Live Virtual Machine Migration, Black Trust, Research in Progress Paper, University of Hat Security Conference, Washington, DC, February Pretoria, 2005, 2008 http://icsa.cs.up.ac.za/issa/2005/Proceedings/Research/ [66]. T. Ormandy, An Empirical Study into the Security 093_Article.pdf Exposure to Hosts of Hostile Virtualized [51]. S. M. Kerner, Mozilla Confirms Security Threat from Environments, 2007, Malicious Firefox Add-Ons, eSecurity Planet, http://taviso.decsystem.org/virtsec.pdf February 5, 2010, [67]. S. Overby, How to Negotiate a Better Cloud http://www.esecurityplanet.com/news/article.php/3863 Computing Contract, CIO, April 21, 2010, 331/Mozilla-Confirms-Security-Threat-From- http://www.cio.com/article/591629/How_to_Negotiate Malicious-Firefox-Add-Ons.htm _a_Better_Cloud_Computing_Contract [52]. S. King et al., SubVirt: Implementing Malware with [68]. S. Pearson, Taking Account of Privacy when Virtual Machines, IEEE Symposium on Security and Designing Cloud Computing Services, ICSE Privacy, Berkeley, California, May 2006 Workshop on Software Engineering Challenges [53]. B. Krebs, Salesforce.com Acknowledges Data Loss, of Cloud Computing, May 23, 2009, Vancouver, Security Fix, The Washington Post, November 6, 2007 Canada [54]. E. Kowalski et al., Insider Threat Study: Illicit Cyber [69]. N. Provos et al., The Ghost In The Browser: Analysis Activity in the Government Sector, Software of Web-based Malware, Hot Topics in Understanding Engineering Institute, January 2008, Botnets (HotBots), April 10, 2007, Cambridge, http://www.cert.org/archive/pdf/insiderthreat_gov2008 MA .pdf [70]. N. Provos, M. A. Rajab, P. Mavrommatis, Cybercrime [55]. M. Krigsma, Amazon S3 Web Services Down. Bad, 2.0: When the Cloud Turns Dark, Communications of Bad News for Customers, ZDNET, February 15, 2008, the ACM, April 2009 http://blogs.zdnet.com/projectfailures/?p=602 [71]. Security Within a Virtualized Environment: A New [56]. S. Labaton, 2 Men Held in Attempt to Bomb I.R.S. Layer in Layered Security, White Paper, Reflex Office, New York Times, December 29, 1995 Security, retrieved April 23, 2010, [57]. 20-Year Term in Plot to Bomb IRS Offices, Nation In http://www.vmware.com/files/pdf/partners/security/sec Brief, Los Angeles Times, August 10, 1996 urity-virtualized-whitepaper.pdf [58]. N. Leavitt. Is Cloud Computing Really Ready for [72]. T. Ristenpart, E. Tromer, H. Shacham, S. Savage, Hey, Prime Time?, IEEE Computer, January 2009 You, Get Off of My Cloud: Exploring Information [59]. R. McMillan, Salesforce.com Warns Customers of Leakage in Third-Party Compute Clouds, ACM Phishing Scam, PC Magazine, IDG News Network, Conference on Computer and Communications November 6, 2007, Security, November 2009 http://www.pcworld.com/businesscenter/article/ [73]. VMware Vulnerability in NAT Networking, BugTraq, 139353/salesforcecom_warns_customers_of_phishing Security Focus, December 21, 2005, _scam.html http://www.securityfocus.com/archive/1/420017
IJISRT20SEP705 www.ijisrt.com 1251
Volume 5, Issue 9, September – 2020 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 [74]. A. Shah, Kernel-based Virtualization with KVM, Linux Magazine, issue 86, January 2008, http://www.linuxmagazine.com/w3/issue/86/Kernel_B ased_Virtualization_With_KVM.pdf [75]. T. Shelton, Remote Heap Overflow, ID: ACSSEC- 2005-11-25 - 0x1, http://packetstormsecurity.org/0512- advisories/ACSSEC-2005-11-25-0x1.txt [76]. M. Slaviero, BlackHat presentation demo vids: Amazon, part 4 of 5, AMIBomb, August 8, 2009,http://www.sensepost.com/blog/3797.html [77]. J.D.Sutter,TwitterHackRaisesQuestions about 'Cloud Computing', CNN, July 16, 2009, http://edition.cnn.com/2009/TECH/07/16/twitter.hack/ [78]. L. M. Vaquero1, L. Rodero-Merino1, J. Caceres, M. Lindner, A Break in the Clouds: Towards a Cloud Definition, Computer Communication Review, January 2009, http://ccr.sigcomm.org/online/files/p50- v39n1l-vaqueroA.pdf [79]. K. Vieira, A. Schulter, C. Westphall, C. Westphall, Intrusion Detection Techniques in Grid and Cloud Computing Environment, IT Professional, IEEE Computer Society, August 26, 2009. [80]. VMware Hosted Products and Patches for ESX and ESXi Resolve a Critical Security Vulnerability, VMware Security Advisory,VMSA-2009-0006, http://www.vmware.com/security/advisories/VMSA- 2009-0006.html [81]. P. Wainewright. Many Degrees of Multi-tenancy, ZDNET News and Blogs, June 16, 2008, http://blogs.zdnet.com/SAAS/?p=533 [82]. J. Wei et al., Managing Security of Virtual Machine Images in a Cloud Environment, ACM Cloud Computing Security Workshop, Nov. 13, 2009, Chicago, IL [83]. L. Whitney, Amazon EC2 Cloud Service Hit by Botnet, Outage, December 11, 2009, CNET News, http://news.cnet.com/8301-1009_3-10413951-83.html [84]. Xen Architecture Overview, Version 1.2, Xen Wiki Whitepaper, February 13, 2008, http://wiki.xensource.com/xenwiki/XenArchitecture?a ction=AttachFile&do=get&target=Xen+Architecture_ Q1+2008.pdf [85]. L. Youseff, M. Butrico, D. D. Silva, Toward a Unified Ontology of Cloud Computing, Grid Computing Environments Workshop, held with SC08, November 2008. http://www.cs.ucsb.edu/~lyouseff/CCOntology/Cloud Ontology.pdf [86]. K. Zetter, FBI Defends Disruptive Raids on Texas Data Centers, Wired Magazine, April 7, 2009, http://www.wired.com/threatlevel/2009/04/data- centers-ra/
Nxivm Corporation and First Principles, Inc. v. The Ross Institute, Rick Ross Also Known as Ricky Ross, John Hochman, and Stephanie Franco, Paul Martin and Wellspring Retreat, Inc., Consolidated-Defendants-Appellees, 364 F.3d 471, 1st Cir. (2004)