Identification of Various Privacy and Trust Issues in Cloud Computing Environment

Identification of Various Privacy and Trust Issues in Cloud Computing Environment

Shivani Jaswal (Chandigarh University, India) and Manisha Malhotra (Chandigarh University, India)
DOI: 10.4018/978-1-5225-3029-9.ch005
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Cloud computing is a rising paradigm in today's world. In this, users can send his or her request to any CSP, i.e., cloud service provider, of their choice. In return, the CSP reverts him back with that particular service. Now, while communicating from various two locations, the data transferred is not passed through that much amount of security and privacy as expected. So, there are lots of parameters in the environment that are taken care of while sending, receiving or just passing data over the network. This chapter presents various security issues that are underlying in cloud computing. This chapter has illustrated various issues such as Trust, Encryption, Authenticity, Confidentiality and Multi Tenancy. Also, some of the proposed solutions have also been discussed later in the chapter.
Chapter Preview
Top

Cloud Computing Architecture

The working of Cloud computing is generally divided into two parts: backend and frontend (Armbrust, et al., 2009). Here, Frontend is basically a “user section” and backend is a “cloud section”.Also, there is a server which works in centralized manner which is further helpful in administering the system and checks whether the system is running smoothly or not, by fulfilling the client’s demands. The proper functioning of the environment is taken under some set of rules and protocols that uses special software known as middleware (Singh et al, 2014).

Figure 1.

Architecture of high-level cloud middleware

Cloud middleware is also known as Cloud OS, which helps in controlling the services. Networked computers can communicate with each other with the help of middleware. For example: Google App Engine and Amazon EC2/S3.

In an improved vision of the cloud computing, Client sends benefit solicitations to the server. Then system management finds appropriate resources. After the computing resources are found, then the request which was made by client is executed. Finally, the found results are forwarded to clients as a service (Zhang et al, 2010).

Complete Chapter List

Search this Book:
Reset