Security In The Cloud Essay

2452 words - 10 pages

Problem Statement Discussion and Justification
Cloud users face security threats both from outside and inside the cloud. Many of the security issues involved in protecting clouds from outside threats are similar to those already facing large data centers. In the cloud, however, this responsibility is divided among potentially many parties, including the cloud user, the cloud vendor, and any third-party vendors that users rely on for security-sensitive software or configurations. The cloud user is responsible for application-level security. The cloud provider is responsible for physical security, and likely for enforcing external firewall policies. Security for intermediate layers of the ...view middle of the document...

The one important exception is the risk of inadvertent data loss. It's difficult to imagine someone spying on the contents of virtual machine memory; it's easy to imagine a hard disk being disposed of without being wiped, or a permissions bug making data visible improperly.
Traditional attacks on software
They are related to the vulnerability of network protocols, operating systems, modular components, and others. These are traditional threats, and to protect from them it will be sufficient to install an anti-virus, firewall, IPS, and other components discussed. It is important that these remedies should be adapted to a cloud infrastructure, and work effectively in virtualization (Winkler, 2011).
Functional attacks on elements of the cloud
This type of attacks is associated with multi-layer nature of clouds, the general principle of security that the general protection of the system is equal to the protection of the weakest link. Thus, a successful DoS-attack on the reverse proxy placed in front of the cloud will block the access to the entire cloud, despite the fact that all the connections inside the cloud will operate without interference (Winkler, 2011). Similarly, SQL-injection coming through an application server will provide access to system data regardless of the access rules in data storage layer. To protect against functional attacks each layer of the cloud should use a specific means of protection: for the proxy - protection against DoS-attacks, the Web server - control over the integrity of pages, for the application server - applications level screen, for DBMS layer - protection from SQL-injections, for storage system - backup and access control. Individually, each of these protective mechanisms is already created, but they are not combined together for the comprehensive protection of the cloud, that is why the task of integrating them into a single system should be solved during the creation of the cloud (Sun et al., 2011).
Attacks on the client
This type of attacks is worked out in the Web environment, but it is also relevant for the cloud, since the clients are usually connected to the cloud through the browser. It includes such attacks as Cross Site Scripting (XSS), interceptions of web sessions, stealing passwords, man in the middle, and others (Kifayat et al., 2010). Protection against these attacks is traditionally a strict authentication and use of an encrypted connection with mutual authentication, but not all of the creators of clouds cannot afford such a wasteful and usually not very convenient means of protection (Winkler, 2011). Therefore, there are still unsolved problems in this field of information security, and the space to create new remedies.

Threats to virtualization
As the virtual environments are traditionally a platform for cloud components, the attack on the virtualization system also threaten the whole cloud as a whole (Trivedi & Pasley, 2012). This type of threat is unique in cloud computing,...

Other Papers Like Security in the Cloud

Review the Process of Implementing Cloud Computing of Smes in Uk - an Exploratory Study

2805 words - 12 pages services. Garrison et al.(2012) carried a report about the successful deployment of SMEs, he argued cloud computing can be a source of differentiation and competitive advantage. It helps enterprises achieve T-related three categories of derived benefit: strategic, economic, and technological. Ali et al. in ‘Security in cloud computing: Opportunities and challenges' (2015), mentioned about remarkable features of cloud computing that encourage SMEs

Cloud Computing Security Essay

1330 words - 6 pages Managing the security of an Electronic Medical Record (EMR) system in a cloud computing environment can be challenging. Even without the addition of the cloud computing environment, the EMR system is vulnerable to the compromise of login information, unauthorized viewing or editing of medical records, and denial of service attacks. First of all, the data contained within the Electronic Medical Record (EMR) itself is sensitive. Inside the

Cloud Security Planning

2972 words - 12 pages Cloud Security Planning Abstract Cloud systems as new online storage and computing systems provide great potentials to all businesses and organizations of creating new approach of storage and computing; cloud system guarantee that all your files and valuable data can be accessed and recovered from anywhere in the world, providing a new meaning of technology. Unfortunately and as to what happen with all emerging technologies there are new

The Impact of Hiv/Aids on Food Security and Livelihood in the Southern Part of Africa

2769 words - 12 pages are likely to be affected by the epidemic. And approximately 95 percent of them live in develping countries. Food security HIV/AIDS takes its toll on food security in a number of ways. For example:   HIV increases fatigue and decreases work productivity, which means less food on the table. In households coping with sick family members, food consumption generally decreases. As adults fall ill, families face increasing medical and health care

To What Extent Are Domestic Energy Resources Important in Determining the Energy Security of Countries?

705 words - 3 pages (b) To what extent are domestic energy resources important in determining the energy security of countries? (15) To have energy security means to have access to reliable and affordable energy sources. E.g. Russia and their natural gas reserves. Countries/regions/localities that do not haver this are said to be energy insecure. E.g. Rural communities in Zimbabwe or the UK winter fuel allowance for the elderly is a recognition of fuel poverty

The Scope of Sustainable Agriculture in the District of Allahabad: an Approach to Food Security, Innovation & Greening the Economy

2043 words - 9 pages part of Himalayan ecology Uttarakhand is vulnerable to minor ecological changes. Hence any activity disapproved by mountain ecosystem triggers a disaster in the state. Uttarakhand is a multi-hazard prone state vulnerable to earthquakes, landslides, flash-floods, forest-fire, cloud-bursts and soil-erosion. Therefore, Uttarakhand has to be prepared to cope with disasters by having proper disaster management systems in place. Also we need to

“the Soviet Union Developed Its Influence in Eastern Europe in the Years 1945-1949 Because It Wanted to Guarantee Its Security in the Future”. How Valid Is This Assessment?

1241 words - 5 pages The standard view in the West during the development of the Cold War was that the Soviet Union conducted an expansionist policy which was seen to threaten peace and collective security. The provocative and expansionist nature of Stalin’s foreign policy after 1945 was singled out as the prime cause of the Cold War and, as the Soviet Union sought to expand world communism, the West was forced into taking action to safeguard the free world. However

Toulmin Model

1782 words - 8 pages UNIVERSITY OF TECHNOLOGY, JAMAICA | Critical Thinking and Argumentation | Toulmin Model | Roosevelt Wilmot | | 9/18/2014 | Topic In recent news, Celebrities Photo Leak Puts Spotlight On The Cloud, And Security. However over the years, there has been a debate about whether data in the cloud is more secure than data that’s housed on an organization’s premises. Despite recurring cloud security breaches, the number of government

Databases

872 words - 4 pages Databases 1. Architecture a. Cloud Database as a Service b. Database Management System in the Cloud c. Relational vs. Non-Relational III. What is Cloud Computing? 1. Background of Cloud Computing 2. Information Security in Cloud Computing a. Security Features in Cloud Computing b. Security Risks 3. Future of Cloud Computing IV. File Storage in the Cloud 1. System Architecture 2. Types of Cloud

Cloud Database

2610 words - 11 pages specialize company. Hence, cost saving on maintenance, equipment, manpower and electricity are solved. In this report, we will be discussing on the concept of cloud database, its advantages and disadvantages and security challenges that companies may face when using this new technology. In addition, looking into areas of different approaches from cloud providers who adapt cloud database and how to counter the security weakness. 2. Cloud Database

Cloud Computing

572 words - 3 pages English 4010 Cloud Computing Cover Letter Abstract Introduction: 1- Definition of cloud Computing and examples of cloud computing 2- Brief of the history of cloud computing 3- Explaining the benefits and the harms of cloud computing 4- Focus on the security issues Collected Data: 1- Benefits of Cloud Computing. a. Cost-Effective (provider). b. Reliability (user). c. How to make the mentioned benefits

Related Essays

The Effects Of Cloud Computing On Enterprises N Terms Of Cost And Security

1257 words - 6 pages for using cloud computing. Based on these factors my research is going to analyze cost and security with an example of Fox analyze Group (Salesforce, 2015). 2. Goals and Organizations of research: The main goal of this research is to find out cloud computing’s effect on cost and security. In this research the organization structure has the following steps. First, the work starts off by analyzing the problem. Second, cloud computing

Cloud Computing Security Architecture The Computing Model For Future James Alwyn Durai Xavier

3121 words - 13 pages Cloud Computing Security Architecture The computing model for future James Alwyn Durai Xavier1  Abstract—In the recent years there is an increasing interest among the researchers on security aspects of the cloud computing model. This is primarily because of the evolution of this new computational model, but mainly due to the advances in the technology which brings more threat and challenges to the society at large. In this paper we are

Security In The Public Services Essay

608 words - 3 pages of security to officers and the police force as a whole. The consequences of assault and robbery to a police officer can include a major loss of confidence and authority in the local area, it can even result in a disciplinary in some circumstances or death. Consequences to the property of the police force (police cars and equipment) include an impact to proper function of the police force, for example if someone or a group of people where to

Analyzing The Dangers And Risk Associated With Cloud Computing In The Health Care Industry

1953 words - 8 pages patient records in accordance with HIPAA Privacy Rule. Patient Information in the Cloud Data on the cloud is almost always encrypted; this is to ensure the security of the data (Prahash, 2011, p. 40). Any health care installation should make sure that only authorized individuals can access patient information. The IT department is responsible for ensuring that they add data encryption, digital signatures, and monitor the system for log