UNISYS_20
-
Upload
saba-wasim -
Category
Documents
-
view
215 -
download
0
Transcript of UNISYS_20
-
8/3/2019 UNISYS_20
1/2
UNISYS 20/20 cloud computing version 3.0 technical paper contest.
Section: Security for Cloud Computing
Topic :Clouds Possible threats and ways to protect data from that
using proposed model known as - SeCloud
By:-
Saba Wasim
Could Computing is emerging as a enticing field in IT sector because of its
numerous benefits ranging from its efficiency to scalability .Cloud Computing
changes the total scenario of today's IT infrastructure because of its
flexibility and computational performance. Cloud has a major advantages of
all the above technologies by providing cent percent piracy free software
environment , low manpower load on software updates and maintenance.
Cloud gives the power to the consumer to access related data anywhere with
much more computational power without any extra hardware cost. Cloud
computing is a increased level of Virtualization, grid computing and SOA.
However compromises are being made because of security .Since cloud
computing share resources via the network. Thus arises security problems to
develop cloud computing application. Security is the major concern of cloud
computing .Almost 70% of consumers before adoption show there concerns
on cloud's security. The tag "access anywhere" gives the security concern a
boost.
This paper propose a secure cloud model known as SeCloud. Some important
security services, including authentication, confidentiality and integrity, are
provided in cloud computing system. This paper covers the cloud security
details like its loopholes, its vulnerabilities , effective exploits ,possible
backdoor, various hacking techniques like SQL injections, Xss , RFI, xml
signatures, XDos and server misconfiguration , may used in it and the
effective way to prevent all of the above using SeCloud.
Using an appropriate model with its effective audit by examining the various
vulnerabilities , we can make a cloud architecture which is secure.CCM(cloud computing Model) cannot be implemented without a proper security
model to be introduce into CCM.API plays important role in the security
breach of clouds, implementation of better API controls.
For a better cloud model which is secure we should follow authentication,
authorization, and audit (AAA) model. Also giving certain guidelines on SSO,
identity management, regulations for proper usage and logs thus preventing
-
8/3/2019 UNISYS_20
2/2
the data leakage in clouds. By securing the cloud we can easy implement the
architecture of enterprise cloud model and use the cloud computing power
to its fullest.
Keywords-cloud computing; trusted computing; cloud security.