A Comprehensive Study of Security in Cloud Computing

A Comprehensive Study of Security in Cloud Computing

Prasanta K. Manohari (Silicon Institute of Technology, India) and Niranjan K. Ray (Silicon Institute of Technology, India)
DOI: 10.4018/978-1-5225-0486-3.ch016
OnDemand PDF Download:
List Price: $37.50


Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.
Chapter Preview

1. Introduction

Cloud computing (Ali, Khan, & Vaisilakos, 2015; Raheman & Choo, 2011; Suhasini, & Kavita, 2011; Zhang, Zhang, Chen, & Huo, 2010) is a type of Internet-based computing. It consists of different services like servers, storage and applications. These services are delivered to an organization’s computers and devices through the Internet. It uses minimal resources of the computer and also supported with less cost at a high speed. It also provides users with a wide infrastructure and storage of large amount of data, which including the important information. The basic operation and definition is given by National Institute of Standards and Technology (NIST) (Mell, & Grance, 2011). According this NIST, cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources. For example, networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort. In simple, cloud computing is a computing which enables users to operate or access resources via Internet. Users do not bother about maintenance issues of the original resources. Resources can be accessible at any time and from any place of the globe using Internet. It gives promising business concept to one of the fast growing segments of the IT industry. Some example of cloud services are Google apps, Microsoft Share point, and Amazon cloud.

Cloud computing is cheaper than other types of computing models. Minimal cost is involved to maintain data and information can be easily retrieved by the user. Due to its benefits or effectiveness, cloud computing is also known as utility computing, or IT on-demand. The key factor in this computing technology is scalability. It can be achieved through server virtualization. Web-based generation of computing uses remote severs placed in extremely safe and secure data centers for storage of data and management. A typical structure of cloud computing is shown in Figure 1. Cloud computing can be broken to three major segments such as:

Figure 1.

Background structures of cloud computing

1. Applications,

2. Platforms,

3. Infrastructure (Desai, & Mock, 2012; Takabi, Joshi, & Ahn, 2010; Bhatnagar, Raizade, & Saxesena, 2015). This segments use for different purpose based on the requirement.

Now-a-days everyone relies on cloud computing to store different types of data. Due to the rapid growth in cloud computing, one major important point is security (Zunnurhain, & Vrbsky, 2011; Zissis, & Lekkas, 2012; Celesti, Tusa, Villari, & Puliafito, 2015). Security means the client data must be safe in providers “cloud” and examining the utilization of cloud by the cloud computing vendors. Cloud security is a complex requirement, involving with different levels of the cloud, external and internal threats, and challenges from third party. Without appropriate security and privacy solutions the data kept in a cloud can be a major open tasks. Therefore, privacy is considering an important issue. In this paper, we have discussed different issues and challenges in cloud computing. We also discuss some of the secured technologies.

Key Terms in this Chapter

Integrity: Keeping genuineness of transmitting data.

Virtualization: A machine, which can switch to previous instances, paused and restarted easily.

PaaS: Platform as a service where customers can build their own applications by delivering services in the form of program development tools, platforms and frameworks.

IaaS: Infrastructure as a service where customers can directly use the IT infrastructures (processing, storage, networks, and other fundamental computing resources).

Cloud Computing: A type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications.

SaaS: A service which enables the customers to use the applications, which running on the cloud environment.

Sanitization: A process of removing certain pieces of data from a resource after it becomes available for other parties.

Complete Chapter List

Search this Book: