Cloud Protection and Security
Cloud Protection and Security
ISSN: 2278-0181
ICPCN - 2017 Conference Proceedings
Keywords— Data Security, Cloud Computing, Data Protection, For clouds to be used for the data storage purpose, the
Privacy, Risks and threats doubt which arises is that if we could make use of the third
party service providers of cloud or if we could create a
I. INTRODUCTION organizational internal cloud. When the sensitiveness of the
Cloud computing is a type ofInternetbased computing that data is too high to store on a public cloud, we use internal
provides shared computer processing resources and data to organizational cloud. National security data and other highly
computers and other devices on demand. Cloud computing is confidential data are the examples of data which are not to be
when data is stored in a central server, rather than being stored in public cloud. In public cloud, Data exposure could
distributed locally. For instance, you may log into your iCloud lead to problem which might turn serious. Thus, storing data
account on all of your devices, and your data appears to be in cloud which is internally organized is highly recommended.
stored on each device. In actuality, your data is kept on
Apple's server, and pulled to each device when it is needed. There are various techniques that are used in the world to
Computation in Cloud is service oriented concept and not protect and secure the data. This paper discussesthe threats
application based concept. Thus, being service oriented caused to the data in the cloud and also tells about the various
infrastructure overhead and the cost ownership is reduced. It solutions given by the service providers.
ensures maximum flexibility and the end user gets improved
performance [2, 3]. II. LITERATURE REVIEW
In "Cloud Computing Basics," there are
Privacy and security are the major concerns in usage of information about the different applications which can be
cloud for data [4]. Features of Data such asprivacy, integrity made and developed by using the cloud computing concept. It
and protection must be upheld. Different mechanisms and might be very helpful for the developing world.
policies are used by different service providersdepending on
the type of data, size of data and nature of data. In Cloud Large Enterprises still would not prefer cloud
Computing, the main advantage is that various organizations
can share the data.But, the advantage causes data to be at risk. because of the security concerns and the issues faced in the
Therefore, risk to the data needs to be overcome and thus data cloud environment. To find an optimal solution to all of these
protection is very much required. issues faced, there are many surveys going on and many
service models have been suggested to overcome the issues.
B. Virtualization
Virtualization software allows you to run other Operating
Systems completely inside your installed OS. Allocation and
de-allocation of resources is the main risk in virtualization.
Problems may arise if the OS doesn’t clear the memory before
performing every new task. Memory needs to cleared just after
that particular task is finished. If not, Data will be exposed
which is very big problem.
• Data interception