Cloud security is a rapidly growing area of research due to the increasing dependence on cloud computing in modern organizations. The use of cloud computing offers numerous benefits, including increased flexibility, scalability, and cost savings. However, it also introduces new security challenges that must be addressed to ensure the confidentiality, integrity, and availability of data and systems.
One major challenge in cloud security is the shared responsibility model, in which the cloud provider is responsible for the security of the infrastructure, while the customer is responsible for the security of their data and applications. This can lead to confusion about who is responsible for certain security controls, leading to potential gaps in protection.
Another challenge is the potential for insider threats, either from malicious employees or individuals with legitimate access to the system who abuse their privileges. This can be particularly concerning in public cloud environments, where resources are shared among multiple customers and the risk of accidental or intentional data leaks is higher.
To address these challenges, researchers have proposed various solutions, including the use of encryption to protect data in transit and at rest, access control mechanisms to ensure that only authorized individuals can access sensitive data and systems, and network segmentation to prevent the spread of malware or unauthorized access.
In addition, researchers have also focused on the development of new cloud security architectures and frameworks, such as the Cloud Security Alliance's Cloud Controls Matrix, which provides a comprehensive set of security controls and best practices for cloud environments.
Overall, the research in cloud security is constantly evolving as new threats and vulnerabilities are discovered. It is essential for organizations to stay up-to-date on the latest research and best practices in order to effectively secure their cloud environments and protect their critical data and systems.
A Review Paper on Security in Cloud Computing
Today many enterprises and individuals across the globe and in all sectors of the economy have a desire to adopt a cloud computing system but have security fears. Other determinants of the privacy relationships between the vendor and the client are procedural or substantive barriers, which may impact the limit of disclosure. This paper proposes a novel scheme that does not require the user to present his password, and yet is able to prove his ownership of access to the cloud service using a variant of zero- knowledge proof. A challenge-response protocol is devised to authenticate the user, requiring the user to compute a one-time pad OTP to authenticate himself to the server without revealing password to the server. To stop vulnerable virtual machines from being compromised within the cloud, we tend to propose a multi-phase distributed vulnerability detection, measurement, and countermeasure selection. Security challenges and issues in cloud computing— the way ahead. In the era of cloud computing, data breaches is one of the major security concerns found in the literature.
CLOUD COMPUTING SECURITY IEEE PAPER 2022
T, Nagpur Nagpur, India nehamahakalkar gmail. Using data traceability technologies to audit who accessed financial information in an organization, for instance, helps maintain confidentiality of such data. Cloud computing is undoubtedly the best technological advancement of the 21st century. The technology flexible can control data including data content and metadata transmitted between the organizations inside, to the cloud and between multiple clouds. Cloud computing transforms the way information technology IT is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand Leighton, 2009. The term private cloud is relatively new and is usually used by some providers to describe services that are similar in functionality to private networks.
(PDF) Cloud Computing: Security Issues and Research Challenges
The main scenario behind the Cloud Malware Injection attack is that an attacker transfers a malicious service instance into cloud so that it can achieve access to the service requests of the victims service. Depending on the value of , the client generates a different response to authenticate itself. Here we highlight some recent cloud computing security incidents. Organizations are now following the pragmatic path towards cloud computing and Web2. Many industries, such as banking, healthcare and education are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern based on the resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied etc.
(PDF) Cloud computing research paper
Shefali Ojha proposed an authentication based AES and MD5 technique to secure data and login of user over cloud. IEEE Cloud Computing, 1 1 , 54-57. In this chapter, we describe various service and deployment models of cloud computing and identify major challenges. This way, the cloud provider, can violate laws under which the data was collected for own benefits, and thus, should be held responsible. Encryption is used to assure confidentiality and integrity in case of a breach between the parties exchanging data. This paper has highlighted key security concerns associated with cloud computing.