0% found this document useful (0 votes)
18 views7 pages

A Survey On Cloud Computing PDF

This paper surveys cloud computing and its security applications, highlighting its significance in providing scalable, cost-effective services. It discusses the major security challenges and solutions in cloud computing infrastructure, emphasizing the importance of user authentication and access control. The authors review recent advancements in cloud security applications and the need for organizations to adopt effective security measures to protect against cyber threats.

Uploaded by

simran negi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views7 pages

A Survey On Cloud Computing PDF

This paper surveys cloud computing and its security applications, highlighting its significance in providing scalable, cost-effective services. It discusses the major security challenges and solutions in cloud computing infrastructure, emphasizing the importance of user authentication and access control. The authors review recent advancements in cloud security applications and the need for organizations to adopt effective security measures to protect against cyber threats.

Uploaded by

simran negi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Parishodh Journal ISSN NO:2347-6648

A Survey on Cloud Computing and


Security Applications
Devarakonda Krishna1, S. Malli Babu2, D. Prasad3
1,2,3
Assistant Professor, Department of CSE,
St. Martins Engineering College, Hyderabad, India.
Abstract: Cloud computing is a newly evolved technology for complex systems that allow on‐ demand,
flexible, scalable, and low cost services with massive-scale services sharing among plentiful users. The
wide receiver of the cloud computing idea has brought about significant effects in both fixed and mobile
communication systems prompting frontline research to give fitting System protocols and network
architecture, alongside resource administration/management components. In cloud computing, access
control and security are two major problems. Therefore, Security of both services and users is a
substantial issue for the uses and trust of the cloud computing. This paper audits recent works
concentrating on security issues, solutions, and difficulties in cloud computing infrastructure.

Keywords: Cloud Computing, Cloud Security, Cloud Computing Infrastructure, User Authentication.

I.INTRODUCTION
Cloud computing is not just a buzz-word, The term “cloud” is used as a metaphor for
but it represents strong direction of the Internet since it doesn’t matter where the
Information Technology industry hardware and software resources that are
development. In the last couple of years, used are located. For IT professionals cloud
"Cloud Computing” has increasingly been computing is a new business model and a
discussed. This is a relatively new trend of new technology platform for developing and
Information Technology industry deploying applications, and for end-users a
development, focused on users, and driven new and cheaper way to use applications.
by the increasing use of various mobile Speaking of cloud computing we should be
devices such as laptops, tablet PCs and able to distinguish three different models:
smart phones. Infrastructure as a Service (IaaS), Platform
as a Service (PaaS) and Software as a
Research has shown that it is one of the
Service (SaaS). The scope of this work is a
fastest growing sectors of the digital
model of Software as a Service.
economy. European governments and
industry plan to invest 45 billion Euros in This represents the lease of computing
the development of cloud computing by the resources on a network of remote servers
year 2020. In cloud computing networks of where applications are executed and data is
remote servers, storage systems (data centers stored. The application of cloud computing
and server farms) and their resources are is very broads and growing daily because of
being used upon user request. many advantages to the users, and is driven

Volume IX, Issue III, March/2020 Page No:7383


Parishodh Journal ISSN NO:2347-6648

by the increasing use of various mobile Thus, cloud computing has not only many
devices (laptops, tablets and smart phones) advantages but also some limitations, both
and mobile Internet access being more arising from the fact that all the data and
available. In general it can be portrayed as a applications are located somewhere on the
synonym for distributed computing over a Internet. It can be used in various activities
network, with the ability to run a program or of everyday life, including in education. In
application on many connected computers at addition to providing students and teachers
the same time. (usually fee of charge) access to may
applications and services in the cloud, which
It specifically refers to a computing
can be used in formal and informal
hardware machine or group of computing
education, cloud computing allows for
hardware machines commonly referred as a
greater flexibility and mobility in the use of
server connected through a communication
resources for teaching and learning, greater
network such as the Internet, an intranet, a
degree of collaboration, communication and
local area Network (LAN) or wide area
sharing of resources, and creates a
Network (WAN) and individual users or
personalized learning environment of virtual
user who have permission to access the
communities of learning and teaching.
server can use the server’s processing power
for their individual computing needs like to Cloud computing has the potential to offer
run application, store data or any other staff and students better services at a lower
computing need. cost than the technology deployment models
they’re using now. Saving money and
Cloud computing is applicable in education,
improving efficiencies are two areas where
but it implies the acceptance of these
schools can use all the help they can get.
services by all involved in the educational
The term, “cloud computing” originated
process. Cloud computing provides shared
from the clouds metaphor and graphic that
resources, software and information through
are often represent the Internet on network
internet as a PAYGO (Pay-as-you-go) basis.
diagrams, because cloud computing relies on
Cloud computing is a kind of virtualization;
applications and file storage that reside on a
thus also known as Virtualization
network, a local area network, a district
Technology.
intranet, or the Internet itself.
Cloud computing and it benefits attracts
several other field. Education Systems also II. Literature Review
interacts with educational applications for Nowadays, Cloud computing is a well-
cloud computing. Cloud computing provides known paradigm. However, for the sake of
several benefits in educational systems such readability and self-containment of the
as creation of virtual teaching learning paper, we consider relevant to recap basic
environment, making interactive and speedy notions of Cloud computing. This also
smart classroom. It also minimizes the time allows us to define a common terminology
of knowledge collection, model preparation that is going to be used throughout the rest
and delivery. of this paper.

Volume IX, Issue III, March/2020 Page No:7384


Parishodh Journal ISSN NO:2347-6648

For these reasons, background notions about In terms of interactions, there are several
Cloud computing are provided in this possible scenarios. Generally, a Cloud
section. NIST defines Cloud computing as consumer may request a Cloud service from
“a model for enabling ubiquitous, a Cloud provider, either directly or via a
convenient, on-demand network access to a Cloud broker. A Cloud auditor conducts
shared pool of configurable computing independent audits and may contact other
resources (e.g., networks, servers, storage, actors to collect the necessary information.
applications, and services) that can be The NIST defines the Cloud by means of
rapidly provisioned and released with five essential characteristics, three service
minimal management effort or service models, and four deployment models.Cloud
provider interaction”. computing is a newly evolved technology
for complex systems that allow on‐ demand,
Figure 1 depicts the NIST Cloud computing
flexible, scalable, and low cost services with
reference architecture. It provides a high-
massive-scale services sharing among
level overview of the Cloud and identifies
plentiful users. The wide receiver of the
the main actors and their role in Cloud
cloud computing idea has brought about
computing. Each actor is an entity, i.e., a
significant effects in both fixed and mobile
person or an organization, that either takes
communication systems prompting frontline
part in a transaction/process or performs
research to give fitting system protocols and
some tasks in Cloud computing. There are
network architecture, alongside resource
five main actors: • Cloud Provider: an entity
administration/management components. In
that provides a service to interested parties; •
cloud computing, access control and security
Cloud Consumer: an entity that uses a
are two major problems. Therefore, Security
service from, and has a business relationship
of both services and users is a substantial
with, one or more Cloud providers; • Cloud
issue for the uses and trust of the cloud
Broker: an entity that mediates affairs
computing. This paper audits recent works
between Cloud providers and Cloud
concentrating on security issues, solutions,
consumers, and that manages the use,
and difficulties in cloud computing
performance, and delivery of Cloud
infrastructure.
services;
Cloud Carrier: an intermediary that supplies
connectivity and delivery of Cloud services
from Cloud providers to Cloud consumers;

Cloud Auditor: a party that conducts


independent assessments of the Cloud
infrastructure, including services,
information systems operations,
performances, and security of the Cloud
implementation. Figure 1. NIST Cloud computing reference
architecture.

Volume IX, Issue III, March/2020 Page No:7385


Parishodh Journal ISSN NO:2347-6648

III. Cloud Data Security Organizations, and additionally home users’/


clients’ have progressed toward becoming
We have investigated the structure and casualties, and depending on reinforcements
substance of the system. We attempt to is frequently the last procession of defense
feature the essential improvements and look when cybersecurity should be the foremost.
to future patterns. This investigated goes Directed assaults take valuable intellectual
past simply taking a gander at PC property from the organizations, and an
frameworks, cell phones, and different information disruption can scrap an
items, and reaches out into expansive ideas organization’s reputation―even devastating
like the economy, national security, its survival. Cyber assurance/insurance
information assurance, data protection and claims are rising in number and cost. In the
privacy. Systems to secure again those widest sense, cyber security issues debilitate
vulnerabilities are discharged routinely, national security and financial development,
including for SSL/TLS convention libraries, by which every one of us is influenced.
for example, OpenSSL, however, site
proprietors still need to introduce them. We Any framework is not invulnerable to
have found that this is still not happening cybersecurity threats, and in this study, the
rapidly enough. The quantity of vulnerable outcomes of overlooking the dangers from
websites keeps on persevering a seemingly lack of concern, carelessness, and
endless amount of time, with almost no inadequacy is clear. Around three years back
change to appear. While the transfer from a remarkable number of vulnerabilities were
SHA-1 certificates to the significantly more recognized, and web assault misuse units are
grounded SHA-2 is picking up motion, adjusting and advancing them more rapidly
organizations must convey the new than any time in recent memory. As various
testimonies appropriately all together for the gadgets are associated, susceptibilities will
progressions to be successful and effective. be misused. Protective Internet-connected
Immune system for Cloud Computing. gadgets will turn out to be critical to
assuring the security of modern control
This study takes an abnormal state frameworks and medical gadgets in the
perspective of Internet threats and cyber network. Close by the growing number of
security, highlighting the striking changes software liabilities / vulnerability, and the
and progresses. Although, we should not motorcade of attacks on various
oversee that cyber-crime isn't harmless. For frameworks, the future will carry with it a
instance, ransom ware keeps individuals out more prominent scope of assorted variety as
of their PCs, holding treasured family threats against Windows frameworks will
photographs to payment, seizing incomplete stretch out to other working frameworks,
original copies for books, and blocking mobile, operating systems and additional
access to government forms, saving money IoT devices. The following table consist of
records, and other important reports. In various issues, threats and possible solutions
addition, there are no ensures that paying the for the security threat.
payoff will discharge those latches.

Volume IX, Issue III, March/2020 Page No:7386


Parishodh Journal ISSN NO:2347-6648

IV.SECURITYAPPLICATIONS Comprehensive cloud security applications


for testing.
Cloud security applications and SaaS
application monitoring solutions are Static Analysis, a service that quickly
transforming the way enterprises protect identifies and remediates flaws in any
against application-layer attacks. application written, purchased or
downloaded.
Flaws and vulnerabilities in web
applications are one of the primary sources Software Composition Analysis, a tool for
of data breaches, yet only one in 10 analyzing commercial and open source code
enterprises today tests all critical software and cataloging open source components for
for resilience against data breaches. greater visibility into risk when open source
Traditional application testing solutions vulnerabilities are discovered.
slow the pace of innovation. Dynamic Analysis, a service that finds,
Typical on-premises solutions are not only scans and monitors all the web applications
expensive to deploy but complex and time- belonging to an organization – even the ones
consuming to operate, creating tension with that IT teams are unaware of.
development teams intent on bringing Veracode Greenlight, a tool that runs in the
software to market faster. Consequently, background of an IDE to provide developers
testing is often ignored or postponed until a with real-time feedback and security
later date when fixing flaws is more recommendations as they write code.
expensive.
V. CONCULSION
Veracode offers a better solution: cloud
security applications and cloud-based Cloud computing model can scale up
security testing solutions that are purpose services and virtual assets / resources on
built for the speed and scale required to to request. To process clients traditional cluster
simplify secure DevOps and enable system, cloud service gives a considerable
development teams to innovate rapidly, measure of points of interest. Cloud
Veracode cloud security applications require computing builds on periods of research in
no special testing expertise and no dedicated virtualization, scattered figuring, benefit
staff to operate and maintain. Developers registering, service computing and, all the
can upload applications to Veracode’s more as of late, systems administration, and
online platform and receive test results web and software administrations. The cloud
within a matter of hours. Veracode’s cloud is a noteworthy test in how processing of
security applications combine automated resources will be used since the point of the
services, centralized policies and world- cloud computing is to alter the financial
class expertise to help organizations manage aspects of the data center, however, before
best practices for cloud application delicate and directed information move into
security more effectively. the public cloud. Issues of security
benchmarks and similarity must be tended to

Volume IX, Issue III, March/2020 Page No:7387


Parishodh Journal ISSN NO:2347-6648

including solid verification, secure Cloud Computing: Services and


authentication, assigned authorization, key Architecture (IJCCSA), 4(5), pp.21-7, 2014.
management for encoded information, data
[4] Wu. Fuhui, Wu. Qingbo and T. Yusong,
misfortune assurances and regulatory
Workflow scheduling in cloud: a survey,
reporting. The clients ought to know about
The Journal of Supercomputing, Springer,
the risks and shortcomings exhibit in the
71, 9, 3373–3418, 2015.
present cloud computing environment before
being a part of it. All are components of a [5] S. Sing and I. Chana, A survey on
protected identity, data and infrastructure resource scheduling in cloud computing:
model can be connected to the public and Issues and challenges, Journal of Grid
private cloud and also to IAAS, SAAS and Computing, Springer, 14, 2, 217–264, 2016.
IAAS services. There is no enormous
[6] P. Mell and T. Grance, The NIST
venture required to update infrastructure,
definition of cloud computing, Computer
work and proceeding with cost. This paper
Security Division, Information Technology,
presented the latest work which is
Laboratory, National Institute of Standards
concentrating on security issues, solutions,
and Technology, Gaithersburg, 2011.
and difficulties in cloud computing
infrastructure. In the advancement of private [7] P. Patel, A. Ranabahu and A. Sheth,
and public clouds, the specialist service Service level agreement in cloud computing,
providers should utilize the managing Citeseer, 2009.
standards to embrace and expand security
[8] F. Panzieri,O. Babaoglu, S. Ferretti, V.
methods/tools and secure products to create
Ghini, and M. Marzolla, Distributed
and offer end-to-end dependable cloud
computing in the 21st century: Some aspects
computing and services.
of cloud computing, Springer, 2011.
REFERENCES [9] V. Nallur and R. Bahsoon,A
[1] K. Yang G, W. Yu, P. ByoungSeob and decentralized self-adaptation mechanism for
C. Hyo Hyun, A heuristic resource service-based applications in the cloud,
scheduling scheme in time-constrained Transactions on Software Engineering,
networks, Computers & Electrical IEEE, 39, 5, 591–612, 2013.
Engineering, Elsevier, 54, 1–15, 2016. [10] A. Abdelmaboud, D. Jawawi, I. Ghani,
[2] M. Armbrust, A. Fox, , R. Griffith, A. A. Elsafi and B. Kitchenham, ,Quality of
Joseph, R. Katz, A. Konwinsky, L. Andrew, service approaches in cloud computing: A
P. Gunho, A. David, A. Rabkin and I. systematic mapping study, Journal of
Stoica, Above the clouds: a Berkeley view Systems and Software, Elsevier, 101, 159–
of cloud computing, University of California 179, 2015.
at Berkeley, 2009. [11] R. Shelke and R. Rajani, Dynamic
[3] L. Tripathy and R.R. Patra, Scheduling resource allocation in cloud computing,
in cloud computing, International Journal on International Journal of Engineering

Volume IX, Issue III, March/2020 Page No:7388


Parishodh Journal ISSN NO:2347-6648

Research and Technology, ESRSA, 2, 10, [19] I. Foster, Y. Zhao, I. Raicu and S. Lu,
2013. Cloud computing and grid computing 360-
degree compared, Grid Computing
[12] S. Subashini and V. Kavitha, A survey
Environments Workshop, IEEE, 1–10, 2008.
on security issues in service delivery models
of cloud computing, Journal of network and [20] A. Bessani, M. Correia, B. Quaresma,
computer applications, Elsevier, 34, 1, 1–11, F. Andre and P. Sousa, ´ DepSky:
2011. dependable and secure storage in a cloud-of-
clouds, ACM Transactions on Storage
[13] T. Dillon, C. Wu, and E. Chang, Cloud
(TOS), ACM , 9, 4, 12, 2013.
computing: issues and challenges,
International Conference on Advanced [21] M. Alzain, B. Soh and E. Pardede, A
Information Networking and Applications, new model to ensure security in cloud
IEEE, 27–33, 2010. computing services, Journal of Service
Science Research, Springer, 4, 1, 49–70,
[14] D. Goutam, A. Verma, N. Agrawal,
2012.
The performance evaluation of proactive
fault tolerant scheme over cloud using
CloudSim simulator, International
Conference on the Applications of Digital
Information and Web Technologies
(ICADIWT), IEEE, 171–176, 2014.

[15] S. Ramgovind, M. Eloff, and E.


Smith,The management of security in cloud
computing, Information Security for South
Africa, IEEE, 1–7, 2010.
[16] R. Patil and RK. Singh, Scaling in
Cloud Computing, International Journal of
Advance Research, IJOAR, 1, 21–27,
ISSN:2320-9194, 2013.
[17] V. Chang,D. Bacigalupo, G. Wills and
D. De Roure, A categorisation of cloud
computing business models, Proceedings of
the IEEE/ACM International Conference on
Cluster, Cloud and Grid Computing, IEEE
Computer Society, 509–512, 2010.
[18] M. Petticrew and H. Roberts,
Systematic reviews in the social sciences: A
practical guide, John Wiley & Sons, 2008.

Volume IX, Issue III, March/2020 Page No:7389

You might also like