Capsulization of Security Concern in Enterprise Cloud Computing
Autor: ashish4187 • October 27, 2015 • Research Paper • 6,628 Words (27 Pages) • 943 Views
Capsulization of Security Concern in Enterprise Cloud Computing
Ashish Kumar, IT Analyst, TATA Consultancy Services
M-Tech (Electronics & Communication) & ePGDM (Pursuing) IIM Rohtak
E-Mail - ashish4187@gmail.com
Parijat Prasoon, B-Tech (3rd Year), RD Engineering College, Ghaziabad
E-Mail – parijat.prasoon@gmail.com
Abstract
Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies (SOA, virtualization, Web 2.0); it also inherits their security issues, which we discuss here, identifying the main vulnerabilities in this kind of systems and the most important threats found in the literature related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions. This paper provides an insightful analysis of the existing status on cloud computing security issues based on a detailed survey carried by the author. It also makes an attempt to describe the security challenges in Software as a Service (SaaS) model of cloud computing and also endeavors to provide future security research directions
Keywords:
Cloud computing; Security; SPI model; Vulnerabilities; Threats; Countermeasures
Guild of Paper
This paper on innovational technology has been categorized in 8 subtopics as
- Introduction
- Over view Of Cloud Computing
- Cloud Service Offering
- Deployment Model Of Cloud Computing
- Technical Component Of Cloud Computing
- Mobile Cloud Computing
- Mobile Cloud Computing Security
- Mobile Network User Security
- Security Information On Cloud
- Cloud Computing Security Impact- based on area
- Cloud Computing Key Security Consideration
- Current Status Of Cloud Computing
- Security Concerns
- Security Solutions
- Cloud Computing Implementation Guidelines
- Steps to Cloud Security
- Issue to Clarify before adopting Cloud Computing
- Need for a Governance Strategy and Good Governance Technology
- Conclusion
- Acknowledgement
- Introduction
A lot has been written and spoken about Cloud Computing technology, by IT experts, industry and business leaders and independent experts. While some believe it is a disruptive trend representing the next stage in the evolution of the Internet, others believe it is hype, as it uses earlier established computing technologies. So, what exactly is cloud computing? From a user perspective, cloud computing provides a means for acquiring computing services without any need for deep understanding of the underlying technology being used. From an organizational perspective, cloud computing delivers services for consumer and business needs in a simplified way, providing unbounded scale and differentiated quality of service to foster rapid innovation and decision making. The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities.
...