• No results found

SECURITY AND CHALLENGES IN THE ADOPTION OF CLOUD COMPUTING IN ORGANIZATIONS: A REVIEW

N/A
N/A
Protected

Academic year: 2020

Share "SECURITY AND CHALLENGES IN THE ADOPTION OF CLOUD COMPUTING IN ORGANIZATIONS: A REVIEW"

Copied!
9
0
0

Loading.... (view fulltext now)

Full text

(1)

Impact Factor- 3.570

SECURITY AND CHALLENGES IN THE ADOPTION OF CLOUD COMPUTING IN ORGANIZATIONS: A REVIEW

Jaipal Marripally1, Dr Arvind Kumar Sharma2

Department of Computer Science and Engineering

1,2

OPJS University, Churu (Rajasthan)

Abstract

The examination begins by recognizing cloud computing security challenges and their relief systems from the literature. To distinguish cloud computing security challenges and their answers, dark literature, methodical literature review, snowball sampling and so on., could be utilized, yet this report utilizes snowball sampling and literature review. Literature Review (LR) recognizes condition of workmanship in an examination and snowball sampling returns to into references utilized as a part of the article and discover data identified with the present investigation. The method of reasoning for choosing snowball sampling and literature review is as per the following; The point of decision (cloud computing) is new and utilizing different systems may bring about a couple of papers, The snowball sampling procedure considers most applicable papers as starting set and after that crosses through every one of the references in them and The LR recognizes articles that are important to the examination yet are missed to be distinguished by snowball sampling.

1. SECURITY CHALLENGES IN CLOUD COMPUTING

Cloud computing security is the major concern and has various challenges that need attention [1]. From the recent surveys on IT executives and CIO’s conducted by IDC, it was clear that security was the highly cited (74%) challengein the cloud computing field [2]. A comparison with grid computing systems also proves that for cloud computing security the measures are simpler and less secure. Security in cloud computing is totally based on the cloud service provider, who is responsible for storing data and providing security [3]. In view of the information examination process clarified in the past segment, terms in literature with comparative comprehension (terms, for example, information security, information area and so forth., are arranged in information related difficulties) are gathered under 8 areas and each segment is clarifiedin detail. These segments are assembled in view of how they are clarified and in light of classifications proposed by a few creators in their dialogs.

Data locality

(2)

Impact Factor- 3.570

over number of locales. It is likewise realized that when the geological area of information changes the laws overseeing on that information additionally changes. This clears up that the client's information (data, applications, and so on.,) that is put away in cloud computing (circulated over number of areas) is influenced by the consistence and information security laws of that nation (which ever nation client's information is found). So it is important that the client ought to be educated about the area his information put away in cloud. SP can give the area of information at whatever point there is a change or if the SP give an instrument to track the area of information it can be exceptionally useful for client [5]. In the event that the client demonstrates any worries towards the area of information they ought to be managed promptly. This is on the grounds that if the client is discovered disregarding laws of certain region his/her information can be seized by the government.

Data integrity

If a system maintains integrity, its assets can be only be modified by authorized parties or in authorized ways. This modification could be on software or hardware entities of system [6]. Data honesty in any segregated framework (with a solitary database) can be kept up by means of database imperatives and exchange. Be that as it may, in a circulated situation, where databases are spread out in numerous areas data trustworthiness must be looked after effectively, to maintain a strategic distance from loss of data. For instance when the premises application is endeavoring to get to or change data on a cloud the exchange ought to be finished and data honesty ought to be kept up and neglecting to do as such can cause data loss. In general every transaction has to follow ACID properties (Atomicity, Consistency, Isolation and Durability) to preserve data integrity[7]. This data honesty confirmation is one of the key issues in cloud data stockpiling particularly in the event of an untrusted server. Web administrations confront issues with exchange administration as often as possible as despite everything it utilizes HTTP administrations. This HTTP benefit, does not bolster exchange or certification conveyance.

Data segregation

Another issue in cloud computing is multi-tenure. Since multi-tenure enables numerous clients to store data on cloud servers utilizing distinctive implicit applications at once, different client's data lives in a typical place. This sort of capacity demonstrates a probability for data interruption. Data can be interfered (vindictive client recovering or hacking into others data) by utilizing some application or infusing a customer code [8]. The user should ensure that data stored in the cloud should be separated from other customer’s data. Article [9] recommends that an encryption plot utilized ought to be evaluated and ensured that they are protected and cloud supplier should utilize just standardized encryption calculations and conventions. Vulnerabilities with data isolation can be recognized or discovered utilizing the accompanying test:

(3)

Impact Factor- 3.570

Data access

Data from articles that examine about data get to, get to rights, special client get to, get to control, regulatory get to is considered. This issue for the most part identifies with security arrangements. Arrangements are portrayed as "Conditions important to acquire trust, and can likewise endorse activities and results if certain conditions are met” [10]. Each association has their own particular security arrangements. In view of these strategies worker will be offered access to a segment of data and at times representatives won't not be given a total get to. While giving access it is important to know which bit of data is gotten to by which client [11]. What's more, for this different interfaces or encryption systems are utilized and keys are imparted to just approved gatherings. Wrong administration of keys can likewise cause trouble in giving security. To avert wrong administration of keys get to control rundown may be utilized, yet with increment in the quantity of keys, the intricacy of overseeing keys additionally increments. Indeed, even on account of interfaces used to oversee security, if the quantity of interfaces increment administration of get to can likewise wind up plainly entangled [12].

Data Breaches

Since data from different clients and associations is put away in a cloud situation, if client with pernicious purpose enters the cloud condition, the whole cloud condition is inclined to a high esteem target [13]. A breach can happen because of inadvertent transmission issues (such ruptures happened in Amazon, Google CC's) or because of an insider assault. Regardless of break data is traded off and is dependably a security hazard which is likewise a best risk specified by CSA [14]. There is a high necessity for break notice process accessible in the cloud. It is on account of if ruptures are not informed the cloud won't not have the capacity to advise genuine assaults.

Table 1: Business breach report blog

Threat Impact Resulting in

Pseudo Risk External Criminals Pose Greatest (73%) Least (30,000 compromised records) 67,500 Insiders Pose Least (18%) Greatest (375,000 compromised

records)

67,500

Partners are middle 73.39% 73.39% 73,125

2. NETWORKING

Network security

(4)

Impact Factor- 3.570

exists in the organization. It empowers secretly use over the cloud for repetition, versatility and failover amid basic advances, which may prompt scale up develop or downsize to the organization or business [15].

Notwithstanding every one of these sorts of assaults, the creators in notices that even the cloud firewalls are still under confused state.

From all the assault sorts and point put before us there is a solid prerequisite for security measures, anybody's accreditations can be stolen effectively with all these diverse sorts of security dangers called attention to. On the off chance that an assailant can access somebody's accreditations, he or she can listen stealthily on a client's movement, exchanges and furthermore turn into a tremendous risk to client's data [51]. A server side insurance which incorporates application security and virtual server ought to likewise be given to reinforce network security [16].

Sharing computing resources

Sharing technology is a best risk to cloud computing since it acquires every one of the issues that are conceivable with sharing assets in independent frameworks. In the realm of cloud computing data is put away in data servers which are all inclusive circulated. This cloud computing engineering is upheld by virtual machines that keep running on hypervisors [90]. Because of this the client will lose control of physically securing data and this may bring about security dangers since this data is put away in an area where assets (stockpiling, computational assets, and so on.,) are imparted to some different organizations [17]. Sharing assets between various activities and items and remote stockpiling and preparing of data can be helpful however there are likewise a few dangers, (for example, how data is dealt with and abuse in order) and can complicate calculation (i.e., observing, examination and detailing for organization needs).

3. ORGANIZATION

Organizational security management

(5)

Impact Factor- 3.570

Table 2: Examples of cloud computing previous failure

Service and outage Duration Date

Microsoft Azure; Malfunction in windows Azure 22 hours March 13-14, 2008

Gmail and google apps engine 2.5 hours Feb 24,2008

Google search outage:program error 40 minutes Jan 31,2008 Google site unavailable due to outage in contacts system 1.5 hours Aug 11,2008 Google AppEngine partial outage:programming error 5 hours Jun 17,2008 S3 outage: authentication service leading to unavailability 2 hours Feb 15,2008 S3 outage: Single bit error leading to gossip protocol

backup

6-8 hours Jun 20,2008

Flexi Scale core network failure 18 hours Oct 31,2008

Failure in providing security

Information from various articles that talk about adaptation to non-critical failure and disappointment in giving security are considered. Disappointment in giving security to the foundation under control of cloud supplier can bring about trading off endorser's security. Indeed, even a solitary frail connection in cloud computing can make a security risk various elements associated in it. For client to secure his data, he/she ought to put stock in specialist organization's security [20]. It is obvious that client should likewise have confide in suppliers security. For a cloud to be trusted and considered solid straightforward yet imperative components, for example, logging, security arrangements, occurrence reaction, and so forth., ought to likewise be solid. An outsider poor administration can prompt harming the supplier and furthermore the client by implication [21].

Identity and access management

(6)

Impact Factor- 3.570

get to rights as needs be. For the most part organizations offer access to its representatives in view of rule of slightest get to, where get to is given to just those administrations to which he/she needs fundamental get to [24].

4. CONFIDENTIALITY AND PRIVACY

Confidentially

Confidentiality plays a noteworthy part in securing organizational substance put away crosswise over various databases [25]. It's a key issue and since most data is basically gotten to, securing and keeping up confidentiality of client profiles is of most extreme thought. Infections, trojans, malwares, and so on., are some unapproved approaches to misuse client's informatio. Now and again it is likewise imperative for an organization to deal with data remains, this is to ensure the confidentiality of a worker's information even after his data is expelled or eradicated. Remanence is an issue that can prompt the exposure of private data. In article [26] writer says that despite the fact that there are techniques to give confidentiality they are not generally utilized by SPs. As an uncommon case in creator specifies that as a result of confidentiality understandings made with client, anticipating/recognizing malevolent assaults is getting to be noticeably troublesome (top risk said by CSA). This is on the grounds that a SP can't screen or look what's going on in the client's space because of confidentiality understandings, which can be misused by malevolent clients for unapproved action.

Privacy

Privacy is one of the cloud computing security necessities [27]. Keeping data private in a dispersed framework is testing when contrasted with individual ownership and in CC it is hazardous. Privacy or commitment is identified with the gathering, utilize, capacity, divulgence and obliteration of data that is close to home to somebody. The standards and the idea of privacy shift with nations, societies and purviews. The creator in [28] notices privacy as a craving to control exposure to his own information and presents that there are various legitimate difficulties to cloud. Privacy is being responsible to an organization's data subjects and furthermore be straightforward towards organizations hone around individual information, there is additionally a little learning on how privacy laws that govern inside an organization. There is no all inclusiveassention towards characterizing what constitutes individual data.

5. BACKUP AND RECOVERY ISSUES

Backup

(7)

Impact Factor- 3.570

fact that the cloud supplier becomes penniless? Will the data remain in place, open, with no calculated issue notwithstanding when there is combined and acquisitions made by the specialist organization. The primary angle in this discourse is to check whether the customer data has high likelihood in server side. Pernicious sellers endeavor to make it fake and gather the data from the server. For instance: the server asserts that it is putting away five duplicates of data in any case it is putting away three duplicates of data and shows just 5 duplicates of data occupation [30].

Data retention and recovery

Disaster recovery is another important issue [31]. To recover data service provider needs to have business continuity and disaster recovery planning strategies. Regardless of the possibility that the client don't know where his/her data is, cloud supplier ought to have the capacity to advise what will transpire in case of a disaster and to what extent will it take to recover? Industry intellectuals caution that if any offering is made which does not duplicate the data and utilization of foundation over numerous destinations is 'helpless against add up to disappointment'. Data replication approaches ought to be set up alongside the verification that the merchant can order an entire reclamation and demonstrate them to what extent will it take. The creator from [32] notices that disaster and recovery are given careful consideration in PaaS.

6. CONCLUSION

This investigation all things considered portrays cloud computing security challenges all in all and depicts the alleviation rehearses that have been proposed to deal with the distinguished difficulties. However, there are still a few difficulties with no relief systems, which may remain as a hazard and a worry for some energetic CC lovers. Through this examination the creator attempted to concentrate on one such test "contrariness" and discover moderation rehearses from CC practitioners.

REFERENCES

1. Cloud cube model: Selecting cloud formations for secure collaboration, April 2009. 25

2. Security in the cloud. Clavister White Paper, 2010. cited By (since 1996) 1. 8, 25, 30, 36, 43, 54, 60, 63, 66, 70

3. Imad M. Abbadi and Cornelius Namiluko. Dynamics of trust in Clouds— Challenges and research agenda. In Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, pages 110–115, 2011. 46

4. Hussain Al-Aqrabi, Lu Liu, JieXu, Richard Hill, Nick Antonopoulos, and Yongzhao Zhan. Investigation of IT security and compliance challenges in security-as-a-service for cloud computing. In Object/Component/ServiceOriented Real-Time Distributed Computing Workshops (ISORCW), 2012 15th IEEE International Symposium on, pages 124–129, 2012. 33, 37, 40, 44, 49, 75

(8)

Impact Factor- 3.570

6. Aiiad Ahmad Albeshri and William Caelli. Mutual protection in a cloud computing environment. In IEEE 12th International Conference on High Performance Computing and Communications (HPCC 2010), pages 641– 646, 2010. 11, 27, 33, 37, 46, 52, 62, 75

7. AbdulrahmanAlmutairi, Muhammad Sarfraz, SalehBasalamah, WalidAref, and ArifGhafoor. A distributed access control architecture for cloud computing. Software, IEEE, 29(2):36–44, 2012. 51, 72

8. William; Athley Ambrose. Cloud Computing : Security Risks, SLA, and Trust. 2010. With Cloud Computing becoming a popular term on the Information Technology (IT) market, security and accountability has become important issues to highlight. In our research we review these concept ... 10, 15, 18

9. T. Andrei and R. Jain. Cloud computing challenges and related security issues. A Survey Paper. DOI= http://www. cse. wustl. edu/ jain/cse571- 09/ftp/cloud. pdf. 25, 26, 32

10. Gabriel Antoniu. Autonomic cloud storage: challenges at stake. In Complex, Intelligent and Software Intensive Systems (CISIS), 2010 International Conference on, pages 481–481, 2010. 29, 35

11. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, et al. Above the clouds: A berkeley view of cloud computing. EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, 2009. 33, 34, 52, 53, 55, 62, 66, 67, 69, 70, 71

12. Michael Armbrust, Armando Fox, Rean Griffith, Anthony D Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and MateiZaharia. A view of cloud computing. Communications of the ACM, 53:50–58, April 2010. ACM ID: 1721672. 33, 34, 52, 53, 55, 62, 66, 67, 69, 70, 71

13. JunaidArshad, Paul Townend, and JieXu. A novel intrusion severity analysis approach for clouds. Future Generation Computer Systems, 2011. 36, 72

14. AkhilBehl. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. In Information and Communication Technologies (WICT), 2011 World Congress on, pages 217–222, 2011. 32, 37, 41, 74, 78

15. D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow. Blueprint for the intercloud-Protocols and formats for cloud computing interoperability. In 2009 Fourth International Conference on Internet and Web Applications and Services, pages 328–336, 2009. 54

16. AashishBhardwaj and Vikas Kumar. Cloud security assessment and identity management. In Computer and Information Technology (ICCIT), 2011 14th International Conference on, pages 387–392, 2011. 24, 33, 37, 40, 49, 58, 72

17. W. Bin, H.H. Yuan, L.X. Xi, and X.J. Min. Open identity management framework for SaaS ecosystem. In 2009 IEEE International Conference on e-Business Engineering, pages 512–517, 2009. 48

18. K. Birman, G. Chockler, and R. van Renesse. Toward a cloud computing research agenda. SIGACT News, 40(2):68–80, 2009. 28

19. M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The role of trust management in distributed systems security. Secure Internet Programming, pages 185–210, 1999. 50

20. M. Blaze, S. Kannan, I. Lee, O. Sokolsky, J.M. Smith, A.D. Keromytis, and W. Lee. Dynamic trust management. Computer, 42(2):44–52, 2009. 70

(9)

Impact Factor- 3.570

22. YuriyBrun and NenadMedvidovic. Keeping data private while computing in the cloud. In Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, pages 285–294, 2012. 57, 59, 75

23. R. Buyya, C.S. Yeo, and S. Venugopal. Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In The 10th IEEE international conference on high performance computing and communications, pages 5–13, 2008. 38, 54

24. RajkumarBuyya, Chee Shin Yeo, SrikumarVenugopal, James Broberg, and IvonaBrandic. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6):599–616, June 2009. 42

25. C. Cachin, I. Keidar, and A. Shraer. Trusting the cloud. ACM SIGACT News, 40(2):81–86, 2009. 25, 26, 34, 35, 71

26. Jose M. AlcarazCalero, Nigel Edwards, Johannes Kirschnick, Lawrence Wilcock, and Mike Wray. Toward a multi-tenancy authorization system for cloud services. Security & Privacy, IEEE, 8(6):48–55, 2010. 78

27. D. Catteddu. Cloud computing: benefits, risks and recommendations for information security. Web Application Security, pages 17–17, 2010. 25, 26, 63

28. A. Cavoukian. Privacy in the clouds. Identity in the Information Society, 1(1):89–108, 2008. 72 29. Stuart Charters and Barbara Kitchenham. Guidelines for performing systematic literature

reviews in software engineering. (EBSE 2007-001), 2007. 19

30. AinulCheFauzi, A. Noraziah, TututHerawan, and NoriyaniMohd. Zin. On cloud computing security issues. Intelligent Information and Database Systems, pages 560–569, 2012. 28, 35, 38, 39, 52, 66

31. Jianyong Chen, Yang Wang, and Xiaomin Wang. On-demand security architecture for cloud computing. Computer, 45(7):73–78, 2012. 38, 39, 46, 50, 52, 74, 75

Figure

Table 2: Examples of cloud computing previous failure

References

Related documents

Practically, we provide insight to practitioners, industry associations and policy/support bodies with regards to consumers ’ interpretations of the term ‘ craft ’ , and

By first analysing the image data in terms of the local image structures, such as lines or edges, and then controlling the filtering based on local information from the analysis

Your child/student is invited to be in a research study of middle school student understanding and perception of differentiated instruction. This study is being conducted in an

ﻲﻳآرﺎـﻛ ﻦﻴﻴﻌﺗ فﺪﻫ ﺎﺑ ﻪﻌﻟﺎﻄﻣ ﻦﻳا مﺎﺠﻧا نﺎﻛدﻮﻛ يرﺎﺘﺳﺮﭘ ﻲﻨﻴﻟﺎﺑ شزﻮﻣآ رد يرﺎﺘﺳﺮﭘ ﺪﻨﻳآﺮﻓ يﺮﻴﮔدﺎﻳ رد ﻲﻣﻮﻬﻔﻣ ﻪﺸﻘﻧ زا هدﺎﻔﺘﺳا هﺪﺷ ﺖﺳا. ﻞـﻳﻮﺤﺗ زا ﺲـﭘ يزﻮﻣآرﺎـﻛ لوا زور رد

The purpose of the Community Support and Assistance (CSA) Budget Control Level (formerly Transitional Living and Support) is to provide resources and services to Seattle's

With Dynamic Fabric Automation (DFA), Cisco is the only vendor in the market with a strategy to orchestrate physical tunnelling functions in network hardware with software

Estimates in column (1) and (2) indicate that a more generous maternity leave policy at first childbirth is unrelated to depression scores among mothers not in employment,