0% found this document useful (0 votes)
87 views5 pages

Sushmita Updated

This document provides a synopsis for a project on cloud security submitted for a Bachelor of Engineering degree. It discusses how cloud computing introduces new security challenges due to shared resources and third-party providers. The synopsis outlines the motivation to focus on cloud security, introduces key security issues and questions, and lists advantages like efficient recovery and disadvantages like bandwidth issues. It also discusses potential applications of cloud security techniques and references papers on trust management and monitoring in cloud computing.

Uploaded by

Abhijit Mali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views5 pages

Sushmita Updated

This document provides a synopsis for a project on cloud security submitted for a Bachelor of Engineering degree. It discusses how cloud computing introduces new security challenges due to shared resources and third-party providers. The synopsis outlines the motivation to focus on cloud security, introduces key security issues and questions, and lists advantages like efficient recovery and disadvantages like bandwidth issues. It also discusses potential applications of cloud security techniques and references papers on trust management and monitoring in cloud computing.

Uploaded by

Abhijit Mali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Cloud Security

A Synopsis Submitted
in Partial fulfillment of the requirements
for the Degree of
Bachelor of Engineering

Submitted by
SUSHMITA BASAVRAJ BENNISUR

Name of Seminar Guide :


PROF D.KANTHALE

Computer Engineering Department


The Shetkari Shikshan Mandal’s
Bhivarabai Sawant College of Engineering and Research, Narhe, Pune
2022-2023
Synopsis

1. Abstract :-

Today, cloud computing is an emerging way of computing in


computer science. Cloud computing is a set of resources and services that are
offered by the network or internet. Cloud computing extends various computing
techniques like grid computing, distributed computing. Today cloud computing
is used in both industrial field and academic field. Cloud facilitates its users by
providing virtual resources via internet. As the field of cloud computing is
spreading the new techniques are developing. This increase in cloud computing
environment also increases security challenges for cloud developers. Users of
cloud save their data in the cloud hence the lack of security in cloud can lose the
user’s trust. Cloud computing is used as data storage so data security and
privacy issues such as confidentiality, availability and integrity are important
factor associated with it. Cloud storage provides user to access remotely store
their data so it becomes necessary to protect data from unauthorized access,
hackers or any type of modification and malicious behavior. Security is an
important concern. The meaning of data storage security is to secure data on
storage media. Cloud storage does not require any hardware and software
management. it provide high quality applications. As we proposed the concept
of cloud data storage security strategy capable to overcome the shortcomings of
traditional data protection algorithms and improving security using, encryption
decryption techniques, compression and splitting technique adoptable to better
security for the cloud.

2. Motivation :-

The number of enterprises migrating their applications and data to the


cloud has been increasing consistently. A number of studies suggest that the
cloud platforms provide enterprises with a more secure outlet for storing
applications and data. But no enterprise can leverage the benefits of cloud
computing without ensuring the security of its software applications and data.
They need robust security solutions that meet the frequency and speed of cloud
deployment. Also, they must leverage the latest security tools and implement
advanced security protocols to eliminate the disastrous impact of targeted
security attacks. There are also a number of reasons why enterprises must focus
extensively on cloud security
3. Introduction :-

Cloud computing provides an efficient, scalable, and cost-effective


way for today’s organizations to deliver business or consumer IT services
over the Internet. A variety of different cloud computing models are available,
providing both solid support for core business functions and the flexibility
to deliver new services. However, the flexibility and openness of cloud
computing models have created a number of security concerns. Massive
amounts of IT resources are shared among many users, and security
processes are often hidden behind layers of abstraction. More to the point,
cloud computing is often provided as a service, so control over data and
operations is shifted to third-party service providers, requiring their clients to
establish trust relationships with their providers and develop security
solutions that take this relationship into account.

We consider the cloud security issues and identify the current security
counter measures available to address these issues. In doing so, our aim is to
seek answer for the following questions:

• What security issues does cloud introduce or change?

• What security is sufficient for the cloud?

The answers to the above key questions are sought with the intention of exploring
the current cloud security landscape and to arrive at a roadmap for securing the
cloud

4. Advantages :-

• Efficient recovery –.
• Openness
• Improving Data safety.
• Pay as you Go Model.
• Regulatory Compliance.
• Automatic backup
5. Disadvantages :-
• Bandwidth issues –
For perfect execution, clients need to arrange in like manner
and not pack expansive sums of servers and capacity gadgets into a
little set of information centers

• All the interactions of users with the cloud use internet channels
which is not secured. Hence it leads to interception of web session
or stealing of passwords and so on. In order to avoid such risks,
secure connections must be available from your computer to
provider's data center

6. Applications :-

• Enhanced Authentication.
• Enhanced Authentication
• increased safety.
• Data integrity
• better data protection.
• increased production flexibility.
• Not dependent on the hardware of your machine.
7. References :-

• [1] Sheikh Mahbub Habib, Sebastian Ries and Max Mühlhäuser,


“Towards a Trust Management System for Cloud Computing”
2nd IEEE International Symposium on Trust and Security in Cloud
Computing

• [2] Jonathan Spring, "Monitoring Cloud Computing by Layer," IEEE


Security and Privacy, vol. 9, no. 3, pp. 52-55, May/June 2011,
doi:10.1109/MSP.2011.5.

•  Cloud Security Alliance - Security guide


www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf

•  BM cloud security guidance whitepaper - IBM


Recommendations for the Implementation of Cloud

You might also like