Cloud Computing Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

International Research Journal of Innovations in Engineering and Technology (IRJIET)

ISSN (online): 2581-3048


Volume 7, Issue 10, pp 579-582, October-2023
https://doi.org/10.47001/IRJIET/2023.710076

Cloud Computing Security


1
Prof. S.K.Totade, 2Priyanka Bhumbar, 3Vaishnavi Samudre, 4Lalita Darsimbe
1
Assistant Professor, Department of MCA, Vidya Bharati Mahavidyalaya, Amaravati, India
2,3,4
Student, Department of MCA, Vidya Bharati Mahavidyalaya, Amaravati, India

Abstract - Cloud computing refers to the management of Cloud providers offer types of services:
data and servers and the provision of technology services
using cloud computing technology. It is commonly used to 1) Infrastructure as a Service (IaaS): Which provides
store large amounts of data on cloud platforms. As a hardware-related services through cloud computing.
result, it is essential to safeguard data in various formats
2) Platform as a Service (PaaS): Which provides a cloud
such as text, audio, video, and others. This paper presents
development platform. However, different vendors offer
a research study on cloud security, focusing on AWS, the
incompatible platforms.
most trusted cloud computing provider. AWS offers not
only cloud security but also cloud storage services. The 3) Software as a Service (SaaS): Which offers complete
document addresses several key security challenges, software services in the cloud.
including virtualization security, data storage in the cloud,
and risk tolerance assessment in cloud computing. As the Cloud computing security concerns include sensitive data
cloud grows, it is increasingly important to understand access, sharing, privacy, authentication, hacking, recovery,
and implement effective security measures to protect accountability, and account control.
sensitive information and maintain trust in cloud-based
services. 2. Security Analysis

Keywords: Cyber Security, Virtualization, Scalability, Cloud ECC encryption efficiently encrypts messages by
Service provider, Storage security, Data integrity and Data utilizing varying points on an elliptic curve. This method uses
confidentiality. a short key size of 256 bits which makes it difficult for
algorithms to attack the encryption system as the computing
1. Introduction complexity of attacking algorithms is O (2^128). Cloud
clients' IDs and private keys are stored in their smart cards to
Cloud computing refers to the practice of storing and prevent illegal users from generating a valid digital signature.
accessing data and programs on remote servers hosted on the
internet, rather than on a computer's hard drive or local server. 3. Security Architecture
The term "cloud" simply means the servers that are accessed
over the internet. Cloud providers usually offer a "pay-as-you- When designing cloud security architecture, it is crucial
go" model, which may result in unexpected operating to define the objectives. The architecture must address three
expenses if administrators are not familiar with cloud pricing key factors: the attack surface that represents external access
models. Essentially, cloud computing allows users to access interfaces, the protected asset set that contains the information
data and applications from anywhere, at any time, as long as being safeguarded, and vectors intended to perform indirect
they have an internet connection. This technology has become attacks, including those in the cloud and attacks on the system.
increasingly popular due to its flexibility, scalability, and cost-
To achieve the goal of cloud security architecture, a set of
effectiveness.
functional elements must be implemented. These elements are
Service providers: often treated as separate entities rather than being part of a
coordinated architectural plan. They include access control,
 Google Cloud network security, application security, contractual security,
 AWS(Amazon web server) and monitoring, also called service security. Additionally, data
 Microsoft Azur protection measures are implemented at the protected asset
 IBM Cloud level.
 Alibaba Cloud
A comprehensive cloud security architecture brings
together the functional elements to achieve the objectives.

© 2023-2017 IRJIET All Rights Reserved www.irjiet.com 579


International Research Journal of Innovations in Engineering and Technology (IRJIET)

ISSN (online): 2581-3048


Volume 7, Issue 10, pp 579-582, October-2023
https://doi.org/10.47001/IRJIET/2023.710076

implies that malicious code can infiltrate cloud services and


appear to be part of the program or service running on cloud
servers themselves.

Insider Threat

Insider threats in companies are a real possibility, even


though they may seem unlikely. Authorized employees who
have access to a company's cloud-based services can exploit or
obtain sensitive data such as client accounts, financial forms,
4. Security and other vital information. Furthermore, insiders do not
Cloud security is crucial to protecting data that is either necessarily have to be malicious to pose a threat.
stored or moving in and out of the cloud. It is designed to
protect your data from various security threats like
unauthorized access, theft, and corruption. The concept of
cloud security relies on physical security, technology tools,
access management and controls, and organizational policies.
These pillars form the basis of any organization's security
program.

The three key concepts of cloud security are as follows:

 Data confidentiality: It ensures that data can only be


accessed or modified by authorized people or processes.
The organization must take measures to keep its data 6. Cloud Security Solution
private.
Cloud Workload Protection Platforms are tools used to
 Data integrity: This concept ensures that data is
reduce security risks by identifying vulnerabilities in static
trustworthy, accurate, authentic, and reliable. To
code, performing system hardening, and detecting workload
maintain data integrity, organizations must implement
misconfigurations. These agent-based tools use a variety of
policies or measures that prevent the data from being
tactics such as network segmentation and system integrity
tampered with or deleted.
protection to provide security at a workload level.
 Data availability: While unauthorized access must be
stopped, data must still be available and accessible to It is important to note that CWPPs do not provide
authorized people and processes when required. coverage at the data or application layer. Furthermore, they
Therefore, the organization must ensure continuous exclude runtime security when it comes to defending
uptime and keep systems, networks, and devices running containers, which is a critical component of advanced threat
smoothly to ensure data availability. detection and response.
5. Security Issues In Cloud Computing 7. Network Detection And Response
Data Loss Network Detection and Response tools are a security
approach that uses network data to defend against cloud
Cloud computing faces a significant challenge - data loss,
threats and to secure containers. These tools are very effective
commonly referred to as a data leak. Insiders, such as
in detecting post-compromise behaviors within the perimeter
employees and business partners, who have access to sensitive
and are an essential component of defense-in-depth strategies.
data, can enable hackers to compromise the security of a cloud
Since all workloads communicate through the network,
service and gain access to private and confidential
network data is important for security analysts, incident
information.
responders, and forensic investigators.
Malware injection
While on-premises security has been using network-
Malware injections are scripts or code fragments inserted based tools for years, collecting network data in cloud
into cloud services, operating as Software as a Service from environments has been challenging in the past. However, with
cloud servers, and mimicking "genuine instances". This network taps from major cloud service providers and third-

© 2023-2017 IRJIET All Rights Reserved www.irjiet.com 580


International Research Journal of Innovations in Engineering and Technology (IRJIET)

ISSN (online): 2581-3048


Volume 7, Issue 10, pp 579-582, October-2023
https://doi.org/10.47001/IRJIET/2023.710076

party packet brokers, much of the complexity and friction that and testing an effective incident response plan specific to
came with NDR in the cloud has been eliminated. cloud environments is crucial to minimize the impact of
security incidents.
8. Cloud Access Security Brokers
10. Cloud Vendor’s Growth
Breaches can happen due to misconfigured cloud
settings, weak access controls, or insider threats. When Global spending on cloud infrastructure services
confidential data is stored in the cloud, it becomes vulnerable increased by 16% to reach $72 billion in the second quarter of
to cybercriminals. Therefore, it is of utmost importance to 2023. Although this growth rate represents a slowdown from
ensure that only authorized individuals have access by the previous quarter's 19%, it can be attributed to market
managing user identities, permissions, and access controls pressures. Additionally, slower growth is also due to the
across a dynamic cloud environment. Proper management of market's larger size.
these controls is essential to mitigate the risk of unauthorized
access and data breaches.

When it comes to securing applications, Static


Application Security Testing (SAST) is an essential measure.
While encrypting data in transit and at rest is crucial,
managing encryption keys can become challenging, especially
in multi-cloud or hybrid environments. Misconfigurations in
cloud services can create vulnerabilities, making it critical to
configure security measures properly. In the same quarter, AWS, Microsoft Azure, and Google
Cloud, the top three vendors, collectively grew by 20%,
Cloud resources often lack visibility into their security accounting for 65% of total spending. While AWS and
posture, but CSPM tools can help in complex environments. Microsoft both experienced a deceleration in growth, Google
Cloud's growth rate remained steady from the previous quarter
Cloud Infrastructure Entitlement Management at 31%.

It is crucial to implement DDoS protection measures. 11. Conclusion


Developing and testing an effective incident response plan
specific to cloud environments is also important. Cloud security is a sophisticated technology that provides
computing and access to high-performance computing,
9. Cloud Security Challenges storage, and infrastructure through the Internet. Cloud
computing has significantly impacted the computer industry,
Data breaches can occur due to misconfigured cloud
including software companies and internet service providers.
settings, weak access controls, or insider threats. When
It is an ever-growing part of the IT industry and is provided by
sensitive information is stored in the cloud, it becomes a target
cloud service providers (CSPs). The key technology used to
for cybercriminals. Therefore, it is crucial to ensure that
develop cloud security is virtualization.
authorized individuals have access by managing user
identities, permissions, and access controls across a dynamic In the future, work on data science, artificial intelligence,
cloud environment. It is important to understand the shared and machine learning services should be prioritized inside
responsibility model, where the cloud provider secures the cloud providers to protect customer-sensitive data such as
infrastructure, but users are responsible for securing their data login credentials through encryption techniques and other
and applications. Encrypting data both in transit and at rest is password protection techniques inside the security group. This
essential, but key management can be challenging, especially will increase efficiency and accuracy and make the data more
in multi-cloud or hybrid environments. Misconfigurations in secure. Multi-factor authentication should be practiced to
cloud services can cause vulnerabilities, making it critical to protect the data. Frequent clearing of cache and cookies is
configure security groups, firewalls, and access controls recommended, and passwords should never be auto-saved in
correctly. Maintaining visibility into the security of cloud the browser.
resources can be challenging without the right tools, especially
in large and complex cloud environments. Cloud services are REFERENCES
also prone to Distributed Denial of Service (DDoS) attacks,
which can disrupt operations. Therefore, it is crucial to [1] https://www.javatpoint.com/what-is-cloud-security
implement DDoS protection measures. Finally, developing [2] https://www.geeksforgeeks.org/cloud-computing-
security/

© 2023-2017 IRJIET All Rights Reserved www.irjiet.com 581


International Research Journal of Innovations in Engineering and Technology (IRJIET)

ISSN (online): 2581-3048


Volume 7, Issue 10, pp 579-582, October-2023
https://doi.org/10.47001/IRJIET/2023.710076

[3] https://www.geeksforgeeks.org/security-issues-in-cloud- [4] https://www.tutorialrsweb.com/cloud-computing/cloud-


computing/amp/#amp_tf=From%20%251%24s&aoh=16 computing-11.htm
972181138706&referrer=https%3A%2F%2Fwww.googl [5] https://www.educba.com/
e.com

Citation of this Article:

Prof. S.K.Totade, Priyanka Bhumbar, Vaishnavi Samudre, Lalita Darsimbe, “Cloud Computing Security” Published in
International Research Journal of Innovations in Engineering and Technology - IRJIET, Volume 7, Issue 10, pp 579-582,
October 2023. Article DOI https://doi.org/10.47001/IRJIET/2023.710076

*******

© 2023-2017 IRJIET All Rights Reserved www.irjiet.com 582


© 2023. Notwithstanding the ProQuest Terms and Conditions, you may use
this content in accordance with the associated terms available at
https://irjiet.com/about_open_access

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy