Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Outlining Imminent Areas and Possible Schemes of Cloud Security


Affiliations
1 Dr. NGP Institute of Technology, Coimbatore, India
     

   Subscribe/Renew Journal


Cloud computing derives from a long history of research and development on various approaches to IT outsourcing, in which customers draw from a utility provider’s pool of capacity on a pay-as you-go basis as an alternative to operating their own infrastructure. While many of the predictions may be cloud hype, we believe the new IT procurement model offered by cloud computing is here to stay . Brushing aside the services offered, however, security is a huge concern for cloud users. Cloud fears largely stem from the perceived loss of control of sensitive data. Current control measures do not adequately address cloud computing third-party data storage and processing needs. In our vision, we propose to extend control measures from the enterprise into the cloud through the use of Trusted Computing and applied cryptographic techniques. These measures should alleviate much of today’s fear of cloud computing, and, we believe, have the potential to provide demonstrable business intelligence advantages to cloud participation. Our vision also relates to likely problems and abuses arising from a greater reliance on cloud computing, and how to maintain security in the face of such attacks. Namely, the new threats require new constructions to maintain and improve security. Among these are tools to control and understand privacy leaks, perform authentication, and guarantee availability in the face of cloud denial-of-service attacks.

Keywords

Cloud, Privacy, Security, Trusted Computing.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 230

PDF Views: 1




  • Outlining Imminent Areas and Possible Schemes of Cloud Security

Abstract Views: 230  |  PDF Views: 1

Authors

Roshna Ravindran
Dr. NGP Institute of Technology, Coimbatore, India

Abstract


Cloud computing derives from a long history of research and development on various approaches to IT outsourcing, in which customers draw from a utility provider’s pool of capacity on a pay-as you-go basis as an alternative to operating their own infrastructure. While many of the predictions may be cloud hype, we believe the new IT procurement model offered by cloud computing is here to stay . Brushing aside the services offered, however, security is a huge concern for cloud users. Cloud fears largely stem from the perceived loss of control of sensitive data. Current control measures do not adequately address cloud computing third-party data storage and processing needs. In our vision, we propose to extend control measures from the enterprise into the cloud through the use of Trusted Computing and applied cryptographic techniques. These measures should alleviate much of today’s fear of cloud computing, and, we believe, have the potential to provide demonstrable business intelligence advantages to cloud participation. Our vision also relates to likely problems and abuses arising from a greater reliance on cloud computing, and how to maintain security in the face of such attacks. Namely, the new threats require new constructions to maintain and improve security. Among these are tools to control and understand privacy leaks, perform authentication, and guarantee availability in the face of cloud denial-of-service attacks.

Keywords


Cloud, Privacy, Security, Trusted Computing.