Cloud Computing Security Issues and Its Challenges: a Comprehensive Research
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-1S4, June 2019 Cloud Computing Security Issues and Its Challenges: A Comprehensive Research Jaydip Kumar Abstract: Cloud computing is used by many of the organizations for storing the huge amount of data on the clouds. II. REVIEW OF LITERATURE Therefore, there is need to secure the data which may in the form of text, audio, video, etc. There are numerous algorithms Firstly considering the In the year 2011, authors presented designed by the researchers for securing the data on the cloud. a work related to cloud computing services like networks, The present paper by Jaydip Kumar is an attempt to elaborate storage, servers, services and applications without some of the important algorithms for the security of data for this physically receipt them. As per observation in the paper it is purpose, exhaustive literature has been conducted. found that overhead of the large system has been reduced of Index Terms: Cloud Security, Genetic Algorithm, Data risk, data leakage etc [1]. cloud computing provide on- Encryption, Intrusion Detection System, Security Techniques. demand web services. If a company providing internet services need to invest large capital money for infrastructure I. INTRODUCTION and problems like machine failure, disk failure and software The term “Cloud computing” has defined by National bugs etc. due to this cloud is best solution for those who Institute of Standards and Technology (NIST) is does not want to setup infrastructure in own system. [2] comprehensive and rising technology in the daily life for According to this paper cloud user no need to invest money every one provides on demand web services like networks, on infrastructure and pay as per services use. storage, servers and applications with flexibility and cost In the year 2012, authors discussed about cloud security efficiency for users. Cloud computing is a technology that that data growing exponentially but security of an open- increase or reduce the storage capacity as peruse without ended and rather easily accessible resources is still investment in new infrastructure. The process of cloud questionable and investigates risks of security from cloud storage contains four layers newly storage layer that store computing environment, characteristics, cloud delivery data on cloud data center, management layer which ensures model and the cloud stakeholder [4] . The authors brief privacy and security of cloud storage, application interface discussed about cloud security. In these days more and more layer that provide cloud application service platform, and people are using clouds that have sensitive data and send, finally cloud access layer which provide accessibility to the receive and store in network so that cloud network security cloud user. The cloud models are classified with different has become major issues [5] in above work author discuss services like Infrastructure as a Service (IaaS): is most some Violation of confidential data, man-in-middle attack, prevalent and developed market segments of cloud that data corruption are risk issues that impact cloud security. deliver customized infrastructure on demand, Platform as a Cloud is one of the most technological research area because Service(PaaS): that provides platform and environment to of its flexibility and cost efficiency and transformation of the developers that build cloud services and application on data between client and server. [6] this paper elaborates to the web and that services are stored in the cloud and ensure the strong data security is managed with the help of accessed by cloud users using web browser, Software as a reputation management system also maintain the transaction Service (SaaS): that provides its own application running on table that contains the information. In cloud, virtualization is a cloud infrastructure. The cloud user need not control or crucial for cloud computing but the security for manage the cloud infrastructure including storage, operating virtualization is not adequately studied [7]. This paper system, services, network and application. It also reduces analysis of cloud security focuses on how virtualization the need of computers, server, storage and manage and run attacks affects different cloud computing service model. The all application. In cloud computing data are growing cloud computing provides platform for sharing of resources exponentially but security of data is still questionable. Due that comprises software and infrastructure with the help of to the transfer of data to the cloud data center, the security virtualization [8]. Which discuss cloud environment makes problem occurs and data owner loss their control on data. try to be flexible and reliable to provide services. Cloud Security and privacy for cloud data is a major aspect of security provides some kind of security pattern which cloud cloud computing that is still not solved. These cloud security service provider cloud comply and uses RSA algorithm with challenges include unauthorized access, data leakage and Digital Signature is used to encrypt cloud data While data user‟s sensitive information leaks. are transferred in network [9] is described the security management models and security standards and RSA algorithm with Digital Signature to increase cloud data security in cloud. In the year 2013, it is found Revised Manuscript Received on June 10, 2019. that multi-clouds providers to Jaydip Kumar, Department of Computer Science , Babasaheb Bhimrao Ambedkar University, Lucknow, India. manage security has secured Published By: Blue Eyes Intelligence Engineering Retrieval Number: A10030681S419/19©BEIESP 10 & Sciences Publication CLOUD COMPUTING SECURITY ISSUES AND ITS CHALLENGES: A COMPREHENSIVE Research less attention from the research community than the use of of things (IoT) and then proposed the security framework to single cloud provider [10] the main attention of this paper is reduce the security threats. Cloud computing is dynamic use of multi-clouds, reduce security risks and data security. technology, that gives the transformation of data and avoid Cloud user‟s causes loss of control from the owner‟s side the burden of local storage of cloud users [20] proposed a due to moving data outward from organizational boundaries method to improve the security aspects by using and access them through internet. [11] provides brief stenography and cryptographic techniques. Security-as-a- description about data securing and maintain a level of trust Service(SaaS) model provides security in cloud environment among data owners is become an important issues for cloud and user can easily use these services using web browser providers. The nasty people have second option to cause and algorithm is canny in a way the Encryption into multiple damage to people‟s sensitive information by doing cyber encryption [21] In this paper author worked in encryption attacks rather than physical attacks and to prevent the cyber and decryption in cloud service in intellectual and attacks needs time and sake of securing business, personal transpicuous manner. information and nation [12]. In this paper discussed assuring In the year 2017, authors discussed about cloud cloud data security, data mining and algorithms contribute computing platform is implemented and designed to use tremendously. web applications and share by internet such type of In the year 2014, the most important techniques in our life technology built using OpenStack framework, open to is Internet of Things (IoT) and cloud computing. Their multimodal improvements and exploiting fingerprints is an leased and use is expected to increase further, due to this original biometric approach for user authentication, the reason will become most required component on internet platform provide secure access for multiple users guarantees [13] provide attention on integration of IoT and cloud and provide complete logical dissociation of data resources computing, which is introduced as CloudIoT. Cloud and computation related to different organization [25] provides virtual pool of resources to the cloud users as described topics related to cloud security, the security of service through a web interface and Cloud resources include data storage on public cloud servers and authentication of infrastructure, network, platform, software, storage and most logical user accessing the cloud. In cloud, multi-cloud of the organization are migrating their data over the cloud, it storage is one of the necessary service which is used to store is imperative to ensure security and integrity of cloud user‟s and access cloud data remotely, and storage are able to data [14] has discuss the security risks posed to data on the encrypt and store information in different cloud drives [26] cloud computing. The fast increment in the field of cloud proposed model, that provide solution for different insider‟s computing also increases server security problems and it is attack, privacy for different files uploaded by different difficult to track the security threats and one of the most users, and decentralized distribution of data storage using an genuine threats comes in the Diversity of a Denial-of- index based cryptographic data. Service(DOS) and its bigger aspect is Distributed Denial-of- In the year 2018, the cloud security become biggest Service(DDOS) attack these are the different types of concern for cloud researchers due to unauthorized activities network intrusion in cloud computing