Security in Cloud Computing in Current Scenario
A Comprehensive Survey of Security Issues and Solutions in Cloud Computing
by Ekta .*, Dr. Yash Pal,
- Published in Journal of Advances and Scholarly Researches in Allied Education, E-ISSN: 2230-7540
Volume 13, Issue No. 1, Apr 2017, Pages 716 - 721 (6)
Published by: Ignited Minds Journals
ABSTRACT
The cloud computing exhibits, remarkable potential to provide cost effective, easy to manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing, upsurges the capabilities of the hardware resources by optimal and shared utilization. The above mentioned features encourage the organizations and individual users to shift their applications and services to the cloud. Even the critical infrastructure, for example, power generation and distribution plants are being migrated to the cloud computing paradigm. However, the services provided by third-party cloud service providers entail additional security threats. The migration of user’s assets (data, applications etc.) outside the administrative control in a shared environment where numerous users are collocated escalates the security concerns. This survey details the security issues that arise due to the very nature of cloud computing. Moreover, the survey presents the recent solutions presented in the literature to counter the security issues.
KEYWORD
security, cloud computing, cost effective, easy to manage, elastic, powerful resources, Internet, hardware resources, shared utilization, organizations, individual users, applications, services, critical infrastructure, third-party cloud service providers, security threats, user's assets, data, administrative control, shared environment, numerous users, collocated, security concerns, survey, solutions, literature
INTRODUCTION
Secure the information in Cloud condition is one of the testing issues. Cloud gives three kinds of the services to the client like Iaas, Paas, Saas. This three services likewise incorporates the storage choices. The Iaas incorporates raw storage, Volume storage Object storage and furthermore a substance conveyance organizes. Thus Pass likewise gives storage alternatives like Database as a service, huge data application like hadoop, Application storage Etc. other than above Pass may devours Databases ,Object/File storage Volume storage Etc.. Saas likewise gives the storage alternatives to Cloud clients like Information storage management which gives interface by means of which client store data. Saas additionally gives Content or File storage. The data scattering is the method of accomplishing storage rightness without utilization of encryption system. This procedure (algorithm) called Ida in short is utilized a principal of discontinuity and each part accessible on various destinations. Client reproduces the data by picking m discretionary sections. The existence cycle of secure data contains a few stages like make, store, utilize, share, Archive, Destroy. Also, data can be moved from any stage to another with no limitation.
Table 1: Data security Dimension
Data security is accomplished in three dimensions. Recognition or counteractive action the data from moving: Monitor the vast data movement too additionally screens the url channels and data misfortune aversion. Secure the data which experiencing significant change: can accomplish utilizing three different ways 1. Client level encryption (Using DES, AES Etc.) 2. System Encryption (utilizing SSL, SSH Etc.) 3. Intermediary based encryption (utilize intermediary server who scramble the data previously send). Secure the data once its accessible on Cloud: this a be accomplished utilizing some procedure like
information. Other than this encryption can likewise be connected to Iaas, Paas, and Saas Storage alternatives. Some time we have to send the essential data to other place without encryption than we additionally have some alternative like tokenization, Data anonymization, Cloud database control and so on however this strategy are experiencing a few issues like inadvertent public exposure and pernicious divulgence, government revelation, abuse of N/W or client profiles. Two integral ideas utilized in the encryption area 1) Content mindful encryption: Used in Data Leak Prevention, content mindful software comprehends a data type or arranges and encodes dependent on approach settings. For instance a MasterCard number is encoded in an email being sent to law implementation. 2) Format Preserving Encryption: Encryption that jelly arrange is an outcome that scrambles a message and delivers an outcome like the info message.
REVIEW OF LITERATURE:
Atiqur Rehman, M. Hussain SZABIST in (2009) creator introduced a model for overseeing DaaS classification of data put away in cloud database. Demonstrate comprising two primary highlights. The primary spotlight is on the how the client data will be put away on the server. Second component gave in regards to how client can send inquiry so that even data will be gotten utilizing DaaS service the database administrator have no clue about this procedure and furthermore about what sort of data asked for by the client. The models perform inquiry execution on the encoded and jumbled data. Arvind Narayanan and Vitaly Shamatikov in (2010) In this the system for accomplishing protection are talked about. The proprietor who needs to share their information to various client it not concealing every datum passages independently but rather to muddle the database sections which gives execution of just specific kinds of inquiries. Indeed, even the database subtle elements furnished still database is just available with reference to privace show planned. Here the novel idea of database protection is proposed, other than instead of overseeing mystery of individual records just a portion of the inquiries are allowed, and acknowledged it utilizing provably secure muddling procedure. absolute minimum costs and endeavors. Plan was created to diminish the computational and storage overhead of the client and additionally to limit the computational overhead of the Cloud storage server. Plan additionally limited the measure of the verification of data uprightness in order to decrease the system transfer speed utilization. Consequently this plan demonstrates worthwhile to thin clients like PDAs and cell phones. Plan performing encryption on extremely restricted data saving money on the computational time of the client. Proposed conspire take a shot at private key encryption procedure. S. Sanka at (2010) exhibited an arrangement of security conventions to anchor the information of a data proprietor in the cloud infrastructure. In their proposed plan, the joined methodology of access control and cryptography is utilized to monitor the re-appropriated data. They utilize the capacity based model for access control system alongside public key encryption. A D-H key trade show is proposed for the Cloud clients to get to the Cloud data proficiently and safely from cloud service suppliers. In their proposed plan public key, hash, and private key figures that are proposed among cloud service supplier, data proprietor, and client guarantee a separated and secure execution condition at the Cloud. The proposed model likewise introduced a proof of usage of the cryptographic calculations in a Cloud computing condition utilizing Java Remote Method Invocation Technique. Creators of (2010) proposed a model Venus, a service for anchoring client collaboration with untrusted cloud storage. The model ensures uprightness and consistency for applications getting to a key-based protest store service, without requiring confided in parts or changes to the storage supplier. The Model finishes all tasks hopefully, ensuring data honesty. It at that point checks task consistency and notification the application. At whatever point either respectability or consistency is damaged, Venus alarms the application. Priyank R., Varun S., Priyanka C. (2009) Creators of the study propose an uprightness layered design of atypical cloud dependent on MAS engineering comprises of two fundamental layers cloud assets layer (cloud server-side) and MAS engineering layer (cloud client-side). At the cloud assets layer there exist gigantic physical cloud assets (storage servers and Cloud application servers) that control the CDS. MAS's engineering layers comprise of two specialists: Cloud Service Provider Agent (CSPA) and Cloud Data Integrity Backup Agent (CDIBA).
There are various security issues and difficulties in cloud computing technology. The security issues on cloud computing is indicated in. It is essential for the system on the cloud which is in charge of interconnection among the systems to be protected and secure. Cloud computing has virtualization designs which offers ascend to numerous security issues. Accordingly to outline machines into physical machines, a high security is required. The data securities incorporate encryption of the data and guarantees applicable arrangements expected to do data sharing. The portion of assets and the memory overseeing algorithms ought to be exceedingly ensured and safe. One of the significant issues in cloud computing is that it certainly comprises of the business basic data and complex procedures and furthermore re-appropriates delicate data safely. The data put away on a cloud service is the duty of the cloud supplier who controls and ensures those data. At the point when the data is composed on the cloud through IaaS or PaaS, at that point the entire control is controlled by the cloud supplier. Thus, a trust commendable relationship among the cloud clients and the cloud service suppliers is required for which a few examines are done. The security dangers looked by a large portion of the computing systems are on the whole likewise looked by the cloud computing technology. The fundamental issue in redistributing the data present in the mobiles is abusing of the data or damaging the respectability of the data. Securing the secrecy and touchy files that is re-appropriated is one of the significant issues. The prepared files present in cloud storage are avoided the unlawful clients by using the property based encryption for controlling the confirmation of the files being encoded by the Data Owners. Characteristic Based Encryption is a technique dependent on cryptography which gives better security, mystery of data, and keeps a few assaults. The main belief system of Attribute Based Encryption was produced by Sahai and Waters amid 2005. Later numerous enhancements for Attribute Based Encryption techniques were advanced. The strategies for access arrangements are isolated into two sorts, key approach ABE model and figure content strategy ABE demonstrate. The ABE conspire comprises of data proprietors, declaration backers, and collectors. Crafted by the guarantors is creating the keys for the Data Owners and crafted by recipients is the figuring and translating of data.
DEFENSIVE DATA DISTRIBUTION IN CLOUD PLATFORM:
Cloud computing technology offers flexible assets and boundless assets like storage space and different services. In Cloud Computing technology both the clients of cloud services and the suppliers of cloud services are for the most part unique in relation to one another trust spaces. Secure access control essential for putting away. In this manner the data proprietors take finish control in the data get to. In Cloud Computing technology, cloud clients can likewise be asset controlled gadgets like cell phones. In this way, to limit the totaling load for cloud clients, certain designation techniques and defensively offload computationally genuine errands to cloud servers. The calculation stack is diminished utilizing the techniques of languid re-encryption for the data buyers to the unpredictability and furthermore made it reasonable for the client gadgets like cell phones. Additionally, both the security evidences and examination of execution are given.
POLICIES FOR DATA ACCESSIBILITY IN SHARED CLOUD STORAGE:
By putting away the data on the nearby servers or at the assigned networks, for example, cloud servers, a few advantages like cost, proficiency, simple recovery of appropriated data and sparing the system correspondence load can be accomplished. The cloud servers which are not gotten to are effectively presented to serious assaults like physical bargains. They are likewise not trusted by the cloud proprietors for data security. Consequently in cloud servers, ensured data storage and recovery instrument is required for dispersed data storage. Subsequently, this proposal gives cryptography based access control techniques like encryption of data on the cloud storages utilizing public keys and dissemination of unscrambling keys to endorsed clients. The activities are dispersed to every one of these stages for making ABE encryption task techniques reasonable to the cloud substances. The current ABE plot is amended and the client disavowal unpredictability is made steady to limit the calculation and correspondence stack present on the framework substances.
PROTECTION OF DATA CONFIDENTIALITY:
It is important to uncover less user‘s private information notwithstanding the data classification since data storage servers can't be totally trusted. Qualities or access strategies are should have been joined in the plaintext to the data figure message with the end goal to help the client unscrambling in the present execution ABE. Access arrangements and ascribes can be covered up to safeguard protection by giving a fresher usage of ABE. Productivity is an application challenge since it is distinctive for all applications according to their prerequisites. The ongoing ABE usage presents a component which matches the encryption and decoding. They are extremely costly and along these lines exorbitant. With the end goal to designate computationally escalated activities in ground-breaking systems, it is
The prime objective of the work is to plan and create design for portable computing where Attribute Based Encryption strategy can be utilized consistently and can give fine grained access control to the clients even at the season of client disavowal and rekeying. • Analyse major symmetric cryptographic techniques on versatile condition to discover best proficiency algorithm. • Research on various system including portable data re-appropriating on servers which give get to control techniques. • Design and create design which might keep protection of portable client data on server utilizing progressed ABE instrument and furthermore give fine-grained get to control. • Use Java dialect for web programming and android for cell phone applications as both the most famous in their sections. • Compose a total theory on study and join trial results. In this examination circumstances were viewed as where client need to re-appropriate their data utilizing their cell phone to online web servers like cloud storage and the data sharing ought to occur inside certain client gatherings. As the security of data involves worry on untrusted servers, clients need to ensure their data is in safe hands. There ought to be an instrument through which the control on servers can be constrained and different elements can be engaged with making the framework more secure and flexible. There are few works done preceding actualize ABE (which is most developed component in this field) in web applications, yet there is extremely constrained work done to coordinate this instrument where clients get to the services utilizing their cell phones. ABE is another system for portable computing which gives cryptographic strategies dependent on data get to control. Before the application of ABE to for all intents and purposes utilized systems, numerous issues ought to be tended to. This postulation tends to such issues and offers ascend to numerous security improvements.
SECURITY CONCERNS:
The Cloud diverse service models are IAAS, PAAS, SAAS and its sending service models are Private, Public, Hybrid, and Community these all are confront various security issues/concerns with cloud computing yet these issues fall due to: security issues looked by cloud suppliers (associations giving or store data on the on the cloud). The fundamental obligation goes both course, it might be the cloud supplier must guarantee that their cloud condition is secure or not and that their client ' all the information and data are secure and ported when the client utilize it data and cloud application now here cloud client are make an extremely solid passwords and satisfy the all the verification measures. 1. Security Issues in Public Cloud: Cloud infrastructures are simply one more PC arrange. This implies Clouds will have a similar security any system infrastructure will have (interruption location/counteractive action and so on.). It is up to the Cloud merchant (regardless of whether it be you or an outsider) to decide the dimension of security required. The International Organization for Standardization (ISO) gives a few codes of training to information security the executives, in particular the ISO 27001 and 27002. The ISO 27001 covers a wide range of associations. The ISO 27002 is additionally redone to the necessities of the association, however it is expected to help meet prerequisites recognized by a security hazard evaluation (ISO (2), 2008). There is a continuous discussion between IT experts of regardless of whether private Clouds are extremely more secure. As indicated by a few experts and merchants, there's been no deficiency of discussion and shock about the security dangers public Cloud computing presents. The worry can be justifiable; particularly if touchy data and crucial applications are in the hands of a gathering not straightforwardly under your see. Other than from the regular view that private Clouds ought to be more secure, there are Public Cloud Computing versus Private Cloud Computing: How Security Matters 8 some fascinating qualities/properties of public Clouds to consider. 2. Security Issues in Private Cloud: Private Clouds have a similar security concerns as public Clouds do, however commonly on a littler scale since private Clouds are worked exclusively for an association. Be that as it may, there are some explicit concerns towards this Cloud display: Security Architecture: Public Cloud Computing versus Private Cloud Computing: ► Perimeter Security and insider assaults - Very regularly, conventional edge security isn't designed to shield assets from assaults that originate from inside the association.
machines are vigorously utilized in Private Clouds. It is conceivable that those virtual machines will have the capacity to have virtual correspondence with other virtual machines. Virtual machines should just speak with the ones they have to. Encryption and verification instruments ought to be executed utilizing IPSec and additionally IPS/IDS. ► Security Zones - Resources of various kinds and affectability levels ought to be situated in discrete security zones. In light of past examinations and the meaning of a private Cloud, private Clouds will promptly appear to be more secure than public Clouds on account of how the infrastructure is planned. It gives the association more power over their arrangements and security. As indicated by NIST, the interior private Cloud is more reasonable arrangement models that offer an association more prominent oversight and specialist over security and protection, and better limit the kinds of inhabitants that share platform assets, decreasing introduction in case of a disappointment or setup blunder in a control. Private Clouds commonly would experience the ill effects of edge lack of concern; imagining that since it is on the interior system, it must be secure; the Internet and infections are as yet present.
Table 2 - Security Issues Comparison
Public Cloud Private Cloud Low investment hurdle High investment hurdle Negative loss and control over data IT organization retains control over data Higher risk of multi-tenancy data transfer Fewer security concerns
Along these lines, alert and security norms ought not to be brought down in light of the fact that it is private. In addition, the private Cloud expects that to have added up to authority over all layers of the stack, which incorporates any conventional system edge security you should need to have set up. In a private Cloud display, the Cloud services are not commonly presented to the general Internet clients and remote access to private Cloud facilitated assets is empowered through systems utilized in conventional data focuses. Private Cloud computing normally utilizes virtualization innovations to expand equipment usage and to extract process, memory, examination of public Clouds and private Clouds.
CONCLUSION:
Cloud computing refers to high scalable computing applications, storages and platforms as a service to companies, individuals and governments. Therefore, SMB (Small and Medium Business) organizations are adapting cloud computing services gradually to save cost and to increase efficiency in their business environment. Cloud computing model has the ability to scale up services and virtual resources on demand. To process users conventional cluster system, cloud services provides a lot of advantages. There is no big investment required to update infrastructure, labor and continuing cost. In fact cost is almost zero when resources are not in used (pay per use). Throughout this paper clearly discussed about security risks and issues in various aspects, such as CIAA (Confidentiality, Integrity, Availability and Authenticity) and issues related to various service delivery models such as: DoS, network security, data security and locality in SaaS models, network and host intrusion in PaaS and IaaS not only considered where data is being stored and process but also concerned the media of data transfer is being used over the Internet. Mitigation of risks and issues are the important part of this paper where described the possible way to reduce risks such as: to implement proper access control, monitoring, auditing and some standard data security mechanism. Finally, provide some recommendations based on literature review on a number of papers in recent years. Thus cloud computing is not mature enough, therefore many academic researches and industries are moving toward to cloud computing environment. Cloud technology is still now in cloud for users.
REFERENCES:
1. Arvind N., Vitaly S. (2010). ―Obfuscated databases and group privacy‖ Proceedings of the 12th ACM conference on Computer and communications security, Pages 102–111. 2. Sanka, S., Hota, C., Rajarajan, M. (2010). ―Secure Data Access in Cloud Computing‖ IEEE. 3. Priyank R., Varun S., Priyanka C. (2009). ―Data Protection in Cloud Computing‖ in IJITEE, ISSN: 2278-3075, Volume-3, Issue-3. 4. Madhoun N., Pujolle G, Amine F. (2016). ―An Online Security Protocol for NFC Payment: Formally analyzed by the scyther tool‖ in
5. Joshi, K., Yelena Yesha, and Tim Finin (2012). "Automating cloud services lifecycle through semantic technologies." 6. Huijun X., Xinwen Z., Danfeng Y., Xiaoxin W., Yonggang W. (2012). ―Towards End-to-End Secure Content Storage and Delivery with Public Cloud‖ Proceedings of the second ACM conference on Data and Application Security and Privacy, pp. 257-266. 7. Kamara, S., Lauter, K. (2010). ―Cryptographic cloud storage‖ In Proceedings of the 14th international conference on Financial cryptography and data security, FC'10, pp. 136-149. Springer-Verlag, Berlin, Heidelberg. 8. Wang, C., Wang, Q., Ren, K., Lou, W. (2010). ―Privacy-preserving public auditing for data storage security in cloud computing‖ 2010 Proceedings IEEE INFOCOM 54(2), pp. 1-9. 9. Alexander S. (2014). ―Efficient Cloud Storage Confidentiality to Ensure Data Security‖ CCSW. 10. International Conference on Computer Communication and Informatics (ICCCI -2014), Jan. 03–05, 2014, IEEE. 11. Muhammad H., Ahmed E. (2012). ―Cloud Protection by Obfuscation: Techniques and Metrics‖.
Corresponding Author Ekta*
Research Scholar of OPJS University, Churu, Rajasthan