07-09-2016, 10:12 AM
1453390012-research.docx (Size: 53.37 KB / Downloads: 4)
ABSTRACT
In the present day scenario when the security treats are ever increasing, there is a need to develop high end top notch security to ensure that the data being transmitted and stored into the cloud remains intact. This is the motivation behind the current research. Most security architecture currently being used by the cloud service providers aren’t efficient to handle new gen security threats. This is because most security are not defined properly. An architecture that differentiates security according to a third party in between client and server of the cloud. This third party software will carry out vulnerability scanning in client side and server side and create a secure tunnel for data movement. Even if one side is not using this architecture we can provide a high level security measures to a certain extent.This paper mainly paper focuses on network and storage domains .while using this architecture the cloud provider and user should not needed to much bothered about the security issues
INTRODUCTION
Cloud computing deals with gaining access to hosted service over the internet .These services are generally divided into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). The very elasticity and quick provisioning that cloud computing offers cause various problems to any security architecture [1].
In the current architecture, third party auditor would verify the integrity of the data being stored onto cloud. These third party security measures are not very reliable, as some of the security measures are access control, data encryption etc. This only ensures data integrity of data being stored onto cloud. Each of these research efforts aims to develop a security solution for a specific threat, yet such methods areincompatible with cloud services.
From literature survey that was conducted we understood that there is no standard security architecture for cloud computing. With the present security system many attack take place on cloud servers. In order to reduce these attacks a standard cloud computing architecture is essential. This was the driver for us to develop a security standards cloud computing architecture
There is no standard architecture defined cloud computing security until now. The organizations are using their own security mechanisms for securing there cloud. Now a days we can see that all the cyberattacks are towards the cloud servers, even many tech giants cloud servers were hacked recently.
THE CLOUD SECURITY CHALLENGES
The Cloud Computing provider must make available anextremelyprotected infrastructure and applications to keep users’data protected from unauthorized access by taking some ofthe security actions. Some of the cloud computingchallenges are discussed below.
Cloud computing security challenges are classified into three broad categories:
Data protection
Data should be protected from disaster so we need to use Raid technologies for protecting it. Also we should protect the data using various encryption technologies
User Authentication
User should be authorized before he accesses cloud technologies. For verification we can use various technologies like password verification and biometric verification technologies
Data break
Data breakis an event in which protected data is stolen by attackers. The compromised information includes many personal information
SECURITY DOMAINS
We can divide the cloud service into different domains like network and storage.in client side we are concerned only about security in network transmission. But in server side we should consider the security issues of network and storage
Network Domain
The network domain containthe domain of transmission of data. The various outbreaks in the network domain includes man in the middle attacks and denial of service attacks. To overcome these problems various protocols like TLS, SSL,IPsec and network based intrusion technique could be used.
Storage Domain
The main threats while data is in storage are unapprovedaccess, data change and theft. Protection mechanismsinclude encryption, marking data with different access levels to enable access control. Backuptechniques, such as a redundant array of independent disks and data recovery, cover against data loss.
Conclusion
The proposed architecture gives advantages such as it provides a third party architecture for security cloud computing, which enhances the security in both the server and the client side. This architecture also divides the security domains into network and storage domain. Also provides different security mechanisms for eachlayer.The specialty of the architecture is that the even if it is installed on any one of the sides (client or server)it can provide security to a certain extent. A new architecture can be proposed in order to take care of the low level of security in high network speed.This architecture is of a great important as the security threats to cloud computing increases day by day.