Security and Privacy Issues in Cloud Computing
Security and Privacy Issues in Cloud Computing
Computing
BY : Vishal kumar
Hritik prabhakar
1
INTRODUCTION
As per the definition provided by the National Institute for Standards and
Technology (NIST) (Badger et al., 2011), “Cloud Computing is a model for
enabling convenient, on-demand network access to a shared pool of
configurable computing resources (e.g., networks, servers, storage,
application, and services) that can be rapidly provisioned and released with
minimal management effort or service provider interaction”.
Cloud computing has become popular because of its great features. This
technology includes services like hardware, software and different platforms.
Cloud service providers provide services on the basis of client’s requests and
some cloud services providers are Amazon Web Services (AWS), Microsoft
Azure, Google Cloud Platform (GCP), Oracle Cloud. Instead of using remote
servers or local computers, cloud computing services can be used from a wide
range of resources. It is made up of a number of widely dispersed servers, or
"masters," which deliver requested services and resources to various clients,
or "clients" in a network, with the scalability and dependability of a data center.
The distributed computers provide on-demand services. Services are as
follows :
But unfortunately, there are many issues with the security and privacy in the
usage of the cloud services. Security is an important topic in the cloud and its
uses. All systems immediately and organizations move to the cloud. Data
storage and convenience using the cloud will prompt the next generation to
2
switch to the cloud. but only the reason people refrain from using the cloud is
because of security concerns of the cloud faces various security issues.
Problem Statement
There are many security issues and obstacles encountered in cloud storage
systems. The problems that the cloud faces in the security arena are many. A
serious study because the same is necessary so that the problems
encountered can be fixed. In Cloud Computing, various algorithms have been
implemented to secure its storage systems. However, Cloud struggles with a
lack of security due to its wide reach availability. Since the Cloud will be the
most available trend in the future, there is a system security obligation to
ensure confidentiality and protect the satisfaction of their customers.
In current cloud architectures, for better security, data is divided into blocks or
frames using a process called Fragmentation. First, the client generates a key
pair using some parameters. And this key pair will be used to sign and decrypt
the file. Through encryption/decryption and other measurements, the server
can tell which users are real users. Next, the client generates a second key
pair. This key pair is used to generate the file block identifier. Based on
identity, the verifier can determine if the file has been modified. In the
advanced era, the use of multimedia data including audio, video, and image
data. So the data type can be added for any condition fragmentation criteria
otherwise data will be lost. there is no mentioned criterion for dividing data into
blocks, resulting in
data loss and cost increase. In this through the cloud host, the sender can
send the message in encrypted form to receiver. To send it to the
sender/recipient, just knowing the sender's identity is enough.but other
information such as certificates or public keys is optional. To decrypt an
encrypted message, the recipient must have his/her private key in a computer,
a single personal security device connects to computer. When either is
missing, the receiver cannot decrypt the message. But if a "personal security
device" is used, it will increase the cost as well as the burden for client.
Therefore, it is necessary to provide a better alternative to this device.
3
Features of Cloud Computing
Cloud computing brings a drastic and far-reaching change in the IT sector with
its features and services provided. Various advantages of cloud computing are
discussed below:
4
Highly automated : If working in a cloud environment, there is no need to
purchase software updates. Everything is configured and ready to use.
5
Security and privacy - perhaps two of the most thorny issues in distributed
computing related to privacy and information security, as well as the vetting of
cloud usage by providers. cloud. These problems are ultimately attributed to
cloud service delivery management. These problems can be solved by
securing the information inside the association, while allowing it to be used as
part of the cloud. For this to happen, the security systems between the
association and the cloud must be efficient, and a hybrid cloud can fund such
a shipment.
6
Reliability - When it comes to reliability, it all depends on choosing a supplier
it's honest and legal. Understanding the Service Level Agreement (SLA) is
important as some vendors guarantee 100% frame uptime evaluate and
reimburse the customer for any downtime. The main thing is the customer
strive to gain benefits before they give. This course, if anyone is interested
fragments in the operation of cloud or server administration are lost, you can
rest assured that the right support is in place to manage and compensate for
any problems.
7
2.Different Cloud Models:
Cloud Deployment Models
Customer needs are constantly evolving, and so are their requirements.
Capacity, Systems Management, and Interfaces. This is a "cloud", mainly
It's open, it's not static, it's constantly evolving. Figure shows them all.
Deployment model described below:
Private cloud
8
pictured as an open her cloud where various customers end up in a virtualized
organization, with all customers benefiting from the same server her pool
across the open structure. Private cloud organizations utilize specific pools of
physical PCs, which can be empowered internally or remotely and traversed
through engineering across private leased lines or mixed relationships to
ensure an open structure . The extra security provided by our dedicated cloud
model is great for everyone. Affiliation, including requirements for storing and
processing or performing personal information Tricky errands. For example,
private cloud organizations may be used by financial firms that are legally
obligated to store sensitive information, where premium resource tasks still
benefit greatly from distributed processing within their business infrastructure.
must enjoy.
Community cloud
Cloud frameworks are offered for premium use by specific groups of people
common interests (strategy, fundamentals, technique and consistency).
Anyone can bill, monitor and use or more entities within the group, other
outsiders, or a mixture thereof It can be local or external.
A group cloud is a multi-tenant system shared by several clubs at a particular
social event and has standard registration concerns. Such concerns may
relate to related consistency, such as research requirements, or may relate to
execution needs, such as sponsoring proposals that require quick response
times on the spot. The goal of the Community Cloud is for associations to see
the benefits.
B. Open cloud, multi-tenancy, pay-as-you-go pricing
- but with the included level of protection, security and strategy coherence.
Most are connected to private clouds. The group cloud can be any local. or off-
premises and may be regulated by the establishment of an interest group
Outcast Managed Service Provider (MSP).
Hybrid cloud :
9
and statistics sending options. For example, an enterprise can ship an on-
premises personal cloud to have touchy or essential workloads, but use a 3rd
party open cloud supplier, for instance, Google Compute Engine, to have
less-discriminating resources, for instance, take a look at and modified
workloads. To keep clients confronting genuine and help statistics, a hybrid
cloud may want to in like way use Amazon Simple Storage Service (Amazon
S3). An object layer, for instance, Eucalyptus,can empower personal cloud
institutions with open clouds, Amazon Web Services (AWS).
Governance
10