Page 17 - ICDEBI2018
P. 17

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 | IF: 4.101

        GB  store  per  hour,  network  bandwidth  inspired, GB  store  per  hour,  network  bandwidth  inspired,  cloud and data on clouds. Mutual indulgent between cloud and data on clouds. Mutual indulgent between
        network  communications  used  per  hour,  value network  communications  used  per  hour,  value  service  providers  and  users  is  enservice  providers  and  users  is  enormously  essential
        additional  services  used,  e.g.,  monitor,  autoadditional  services  used,  e.g.,  monitor,  auto-scaling  for as long as better cloud security. In this paper we for as long as better cloud security. In this paper we
        etc.  Examples:  Storage  services  provided  by Storage  services  provided  by  have  identified  that  security  is  main  hurdle  in  wide have  identified  that  security  is  main  hurdle  in  wide
        AmazonS3,  Amazon  EBS.  Computation  services: AmazonS3,  Amazon  EBS.  Computation  services:  receipt of cloud compute. Users of cloud services are receipt of cloud compute. Users of cloud services are
        AmazonEC2, Layered tech and so on.                      i in fear of data loss  and  privacy. Researchers and  IT n fear of data loss  and  privacy. Researchers and  IT
                                                                security professional must come onward and do more must come onward and do more
                                                                t
        PAAS (PLATFORM AS A SERVICE) MODEL: PAAS (PLATFORM AS A SERVICE) MODEL:    to  ensure  security  and  privacy  to  users.  Our  study o  ensure  security  and  privacy  to  users.  Our  study
        It refers to the environment that provides the runtime It refers to the environment that provides the runtime  identify  top  security  concern  of  cloud  computing, identify  top  security  concern  of  cloud  computing,
        environment,  software  consumption  framework  and environment,  software  consumption  framework  and  these concern are Data loss, escape of Data, Client‘s these concern are Data loss, escape of Data, Client‘s
        constituent on pay to enable the direct deployment of tuent on pay to enable the direct deployment of  trust,  User‘s  Authentication,  Malicious  users trust,  User‘s  Authentication,  Malicious  users
        application level property or web application. PaaS is application level property or web application. PaaS is  handling,  Wrong  usage  of  Chandling,  Wrong  usage  of  Cloud  computing  and  its
        a  platform  where  software  can  be  developed,  tested a  platform  where  software  can  be  developed,  tested  services .Hijacking of sessions while accessing  data. services .Hijacking of sessions while accessing  data.
        and  deployed.  It  means  the  entire  life  cycle  of and  deployed.  It  means  the  entire  life  cycle  of  We  propose  to  use  The  Cloud  Security  Alliance We  propose  to  use  The  Cloud  Security  Alliance
        software  can  be  operating  on  a  PaaS.  This  service software  can  be  operating  on  a  PaaS.  This  service  (CSA)  discharge  of  a  new  governance,  risk (CSA)  discharge  of  a  new  governance,  risk
        model is dedicated to application developers, testers, l is dedicated to application developers, testers,  management,  and  compliance  stack  for  cloud management,  and  compliance  stack  for  cloud
        deplorers and administrators. Examples: Google App deplorers and administrators. Examples: Google App  computing. The suite of cloud security tools, avcomputing. The suite of cloud security tools, available
        Engine  (GAE),  Microsoft  Azure,  IBM  Smart  Cloud, Engine  (GAE),  Microsoft  Azure,  IBM  Smart  Cloud,  for  free  download,  is  meant  to  help  organization for  free  download,  is  meant  to  help  organization
                                                                create municipal and private clouds that comply with reate municipal and private clouds that comply with
        Amazon EC2, salesforce.com and jelastic.com. Amazon EC2, salesforce.com and jelastic.com.    c
                                                                m
                                                                manufacturing standards for conventional governance, anufacturing standards for conventional governance,
        SAAS (SOFTWARE AS A SERVICE): SAAS (SOFTWARE AS A SERVICE):    r risk, and compliance (GRC) best practices. The GRC isk, and compliance (GRC) best practices. The GRC
        Through this service release model end users consume model end users consume  stack has three components: a technical fostack has three components: a technical foundation, a
        the  software  request  services  directly  over  system the  software  request  services  directly  over  system  controls  framework,  and  a  questionnaire  for  assess controls  framework,  and  a  questionnaire  for  assess
        according to on-demand basis. For example, Gmail is demand basis. For example, Gmail is  what  the  CSA  calls  "industrywhat  the  CSA  calls  "industry-accepted  ways  to  file
        a  SaaS  where  Google  is  the  provider  and  we  are a  SaaS  where  Google  is  the  provider  and  we  are  what safety.
        consumers.  Other  well  known  examples  of  PaaS examples  of  PaaS
        include billing services provided by Arial system, op Arial system, op  REFERENCES:
        basis.  Financial  services:  Concur,  workday,  Backup basis.  Financial  services:  Concur,  workday,  Backup  1.  Bowman, S. Roschke, et aI., "Intrusion Detection Bowman, S. Roschke, et aI., "Intrusion Detection
                                                                   i
        and recovery services and so on                            in  the  Cloud,"  presented  at  the  Eighth  IEEE n  the  Cloud,"  presented  at  the  Eighth  IEEE
                                                                                                  on n
                                                                   International   Conference ce   o    Dependable, ependable,
                                                                                                        D
                                                                   A
        CONCLUSION                                                 AutonomIc  and  Secure  Computing,  Chengdu, utonomIc  and  Secure  Computing,  Chengdu,
        In  this  study  dissimilar  security  and  privacy  related In  this  study  dissimilar  security  and  privacy  related   China, 2009.
        explore papers were calculated briefly. Cloud services explore papers were calculated briefly. Cloud services   2.  Brodkin. (2008). Gartner Seven cloudBrodkin. (2008). Gartner Seven cloud computing
        are used by both better and smaller scale organization. er scale organization.
                                                                   security                               Available:
        Compensation of Cloud computing are huge. But it‘s ompensation of Cloud computing are huge. But it‘s
                                                                   h
                                                                   http://www.networkworld.com/news/200S!07020ttp://www.networkworld.com/news/200S!07020
        a  global  happening  that  all  in  this  world  has a  global  happening  that  all  in  this  world  has
                                                                   Scloud.html.
        advantages  as  well  as  disadvantages.  Cloud advantages  as  well  as  disadvantages.  Cloud
        computing is pain from severe protection threats from computing is pain from severe protection threats from  3.  Ponemon, "Security of Cloud Computing Users," Ponemon, "Security of Cloud Computing Users,"
        user point of view, one can say that lack of security is ck of security is   2010.
        the  only  worth  mention  disadvantage  of  cloud the  only  worth  mention  disadvantage  of  cloud   4.  T.  Mather.  (2011).  Data  Leakage  Prevention  and Mather.  (2011).  Data  Leakage  Prevention  and
        computing. Both the Service providers and the clients computing. Both the Service providers and the clients   Cloud Computing. Available:loud Computing. Available:
                                                                   C
        must work together to guarantee safety and security of must work together to guarantee safety and security of


















        @ IJTSRD  |  Available Online @ www.ijtsrd.comwww.ijtsrd.com |  Conference Issue: ICDEBI-2018 | | Oct 2018   Page: 9
   12   13   14   15   16   17   18   19   20   21   22