Cloud Security
A Synopsis Submitted
in Partial fulfillment of the requirements
for the Degree of
Bachelor of Engineering
Submitted by
SUSHMITA BASAVRAJ BENNISUR
Name of Seminar Guide :
PROF D.KANTHALE
Computer Engineering Department
The Shetkari Shikshan Mandal’s
Bhivarabai Sawant College of Engineering and Research, Narhe, Pune
2022-2023
Synopsis
1. Abstract :-
Today, cloud computing is an emerging way of computing in
computer science. Cloud computing is a set of resources and services that are
offered by the network or internet. Cloud computing extends various computing
techniques like grid computing, distributed computing. Today cloud computing
is used in both industrial field and academic field. Cloud facilitates its users by
providing virtual resources via internet. As the field of cloud computing is
spreading the new techniques are developing. This increase in cloud computing
environment also increases security challenges for cloud developers. Users of
cloud save their data in the cloud hence the lack of security in cloud can lose the
user’s trust. Cloud computing is used as data storage so data security and
privacy issues such as confidentiality, availability and integrity are important
factor associated with it. Cloud storage provides user to access remotely store
their data so it becomes necessary to protect data from unauthorized access,
hackers or any type of modification and malicious behavior. Security is an
important concern. The meaning of data storage security is to secure data on
storage media. Cloud storage does not require any hardware and software
management. it provide high quality applications. As we proposed the concept
of cloud data storage security strategy capable to overcome the shortcomings of
traditional data protection algorithms and improving security using, encryption
decryption techniques, compression and splitting technique adoptable to better
security for the cloud.
2. Motivation :-
The number of enterprises migrating their applications and data to the
cloud has been increasing consistently. A number of studies suggest that the
cloud platforms provide enterprises with a more secure outlet for storing
applications and data. But no enterprise can leverage the benefits of cloud
computing without ensuring the security of its software applications and data.
They need robust security solutions that meet the frequency and speed of cloud
deployment. Also, they must leverage the latest security tools and implement
advanced security protocols to eliminate the disastrous impact of targeted
security attacks. There are also a number of reasons why enterprises must focus
extensively on cloud security
3. Introduction :-
Cloud computing provides an efficient, scalable, and cost-effective
way for today’s organizations to deliver business or consumer IT services
over the Internet. A variety of different cloud computing models are available,
providing both solid support for core business functions and the flexibility
to deliver new services. However, the flexibility and openness of cloud
computing models have created a number of security concerns. Massive
amounts of IT resources are shared among many users, and security
processes are often hidden behind layers of abstraction. More to the point,
cloud computing is often provided as a service, so control over data and
operations is shifted to third-party service providers, requiring their clients to
establish trust relationships with their providers and develop security
solutions that take this relationship into account.
We consider the cloud security issues and identify the current security
counter measures available to address these issues. In doing so, our aim is to
seek answer for the following questions:
• What security issues does cloud introduce or change?
• What security is sufficient for the cloud?
The answers to the above key questions are sought with the intention of exploring
the current cloud security landscape and to arrive at a roadmap for securing the
cloud
4. Advantages :-
• Efficient recovery –.
• Openness
• Improving Data safety.
• Pay as you Go Model.
• Regulatory Compliance.
• Automatic backup
5. Disadvantages :-
• Bandwidth issues –
For perfect execution, clients need to arrange in like manner
and not pack expansive sums of servers and capacity gadgets into a
little set of information centers
• All the interactions of users with the cloud use internet channels
which is not secured. Hence it leads to interception of web session
or stealing of passwords and so on. In order to avoid such risks,
secure connections must be available from your computer to
provider's data center
6. Applications :-
• Enhanced Authentication.
• Enhanced Authentication
• increased safety.
• Data integrity
• better data protection.
• increased production flexibility.
• Not dependent on the hardware of your machine.
7. References :-
• [1] Sheikh Mahbub Habib, Sebastian Ries and Max Mühlhäuser,
“Towards a Trust Management System for Cloud Computing”
2nd IEEE International Symposium on Trust and Security in Cloud
Computing
• [2] Jonathan Spring, "Monitoring Cloud Computing by Layer," IEEE
Security and Privacy, vol. 9, no. 3, pp. 52-55, May/June 2011,
doi:10.1109/MSP.2011.5.
• Cloud Security Alliance - Security guide
www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf
• BM cloud security guidance whitepaper - IBM
Recommendations for the Implementation of Cloud