Page 17 - ICDEBI2018
P. 17
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 | IF: 4.101
GB store per hour, network bandwidth inspired, GB store per hour, network bandwidth inspired, cloud and data on clouds. Mutual indulgent between cloud and data on clouds. Mutual indulgent between
network communications used per hour, value network communications used per hour, value service providers and users is enservice providers and users is enormously essential
additional services used, e.g., monitor, autoadditional services used, e.g., monitor, auto-scaling for as long as better cloud security. In this paper we for as long as better cloud security. In this paper we
etc. Examples: Storage services provided by Storage services provided by have identified that security is main hurdle in wide have identified that security is main hurdle in wide
AmazonS3, Amazon EBS. Computation services: AmazonS3, Amazon EBS. Computation services: receipt of cloud compute. Users of cloud services are receipt of cloud compute. Users of cloud services are
AmazonEC2, Layered tech and so on. i in fear of data loss and privacy. Researchers and IT n fear of data loss and privacy. Researchers and IT
security professional must come onward and do more must come onward and do more
t
PAAS (PLATFORM AS A SERVICE) MODEL: PAAS (PLATFORM AS A SERVICE) MODEL: to ensure security and privacy to users. Our study o ensure security and privacy to users. Our study
It refers to the environment that provides the runtime It refers to the environment that provides the runtime identify top security concern of cloud computing, identify top security concern of cloud computing,
environment, software consumption framework and environment, software consumption framework and these concern are Data loss, escape of Data, Client‘s these concern are Data loss, escape of Data, Client‘s
constituent on pay to enable the direct deployment of tuent on pay to enable the direct deployment of trust, User‘s Authentication, Malicious users trust, User‘s Authentication, Malicious users
application level property or web application. PaaS is application level property or web application. PaaS is handling, Wrong usage of Chandling, Wrong usage of Cloud computing and its
a platform where software can be developed, tested a platform where software can be developed, tested services .Hijacking of sessions while accessing data. services .Hijacking of sessions while accessing data.
and deployed. It means the entire life cycle of and deployed. It means the entire life cycle of We propose to use The Cloud Security Alliance We propose to use The Cloud Security Alliance
software can be operating on a PaaS. This service software can be operating on a PaaS. This service (CSA) discharge of a new governance, risk (CSA) discharge of a new governance, risk
model is dedicated to application developers, testers, l is dedicated to application developers, testers, management, and compliance stack for cloud management, and compliance stack for cloud
deplorers and administrators. Examples: Google App deplorers and administrators. Examples: Google App computing. The suite of cloud security tools, avcomputing. The suite of cloud security tools, available
Engine (GAE), Microsoft Azure, IBM Smart Cloud, Engine (GAE), Microsoft Azure, IBM Smart Cloud, for free download, is meant to help organization for free download, is meant to help organization
create municipal and private clouds that comply with reate municipal and private clouds that comply with
Amazon EC2, salesforce.com and jelastic.com. Amazon EC2, salesforce.com and jelastic.com. c
m
manufacturing standards for conventional governance, anufacturing standards for conventional governance,
SAAS (SOFTWARE AS A SERVICE): SAAS (SOFTWARE AS A SERVICE): r risk, and compliance (GRC) best practices. The GRC isk, and compliance (GRC) best practices. The GRC
Through this service release model end users consume model end users consume stack has three components: a technical fostack has three components: a technical foundation, a
the software request services directly over system the software request services directly over system controls framework, and a questionnaire for assess controls framework, and a questionnaire for assess
according to on-demand basis. For example, Gmail is demand basis. For example, Gmail is what the CSA calls "industrywhat the CSA calls "industry-accepted ways to file
a SaaS where Google is the provider and we are a SaaS where Google is the provider and we are what safety.
consumers. Other well known examples of PaaS examples of PaaS
include billing services provided by Arial system, op Arial system, op REFERENCES:
basis. Financial services: Concur, workday, Backup basis. Financial services: Concur, workday, Backup 1. Bowman, S. Roschke, et aI., "Intrusion Detection Bowman, S. Roschke, et aI., "Intrusion Detection
i
and recovery services and so on in the Cloud," presented at the Eighth IEEE n the Cloud," presented at the Eighth IEEE
on n
International Conference ce o Dependable, ependable,
D
A
CONCLUSION AutonomIc and Secure Computing, Chengdu, utonomIc and Secure Computing, Chengdu,
In this study dissimilar security and privacy related In this study dissimilar security and privacy related China, 2009.
explore papers were calculated briefly. Cloud services explore papers were calculated briefly. Cloud services 2. Brodkin. (2008). Gartner Seven cloudBrodkin. (2008). Gartner Seven cloud computing
are used by both better and smaller scale organization. er scale organization.
security Available:
Compensation of Cloud computing are huge. But it‘s ompensation of Cloud computing are huge. But it‘s
h
http://www.networkworld.com/news/200S!07020ttp://www.networkworld.com/news/200S!07020
a global happening that all in this world has a global happening that all in this world has
Scloud.html.
advantages as well as disadvantages. Cloud advantages as well as disadvantages. Cloud
computing is pain from severe protection threats from computing is pain from severe protection threats from 3. Ponemon, "Security of Cloud Computing Users," Ponemon, "Security of Cloud Computing Users,"
user point of view, one can say that lack of security is ck of security is 2010.
the only worth mention disadvantage of cloud the only worth mention disadvantage of cloud 4. T. Mather. (2011). Data Leakage Prevention and Mather. (2011). Data Leakage Prevention and
computing. Both the Service providers and the clients computing. Both the Service providers and the clients Cloud Computing. Available:loud Computing. Available:
C
must work together to guarantee safety and security of must work together to guarantee safety and security of
@ IJTSRD | Available Online @ www.ijtsrd.comwww.ijtsrd.com | Conference Issue: ICDEBI-2018 | | Oct 2018 Page: 9