UNISYS_20

download UNISYS_20

of 2

Transcript of UNISYS_20

  • 8/3/2019 UNISYS_20

    1/2

    UNISYS 20/20 cloud computing version 3.0 technical paper contest.

    Section: Security for Cloud Computing

    Topic :Clouds Possible threats and ways to protect data from that

    using proposed model known as - SeCloud

    By:-

    Saba Wasim

    Could Computing is emerging as a enticing field in IT sector because of its

    numerous benefits ranging from its efficiency to scalability .Cloud Computing

    changes the total scenario of today's IT infrastructure because of its

    flexibility and computational performance. Cloud has a major advantages of

    all the above technologies by providing cent percent piracy free software

    environment , low manpower load on software updates and maintenance.

    Cloud gives the power to the consumer to access related data anywhere with

    much more computational power without any extra hardware cost. Cloud

    computing is a increased level of Virtualization, grid computing and SOA.

    However compromises are being made because of security .Since cloud

    computing share resources via the network. Thus arises security problems to

    develop cloud computing application. Security is the major concern of cloud

    computing .Almost 70% of consumers before adoption show there concerns

    on cloud's security. The tag "access anywhere" gives the security concern a

    boost.

    This paper propose a secure cloud model known as SeCloud. Some important

    security services, including authentication, confidentiality and integrity, are

    provided in cloud computing system. This paper covers the cloud security

    details like its loopholes, its vulnerabilities , effective exploits ,possible

    backdoor, various hacking techniques like SQL injections, Xss , RFI, xml

    signatures, XDos and server misconfiguration , may used in it and the

    effective way to prevent all of the above using SeCloud.

    Using an appropriate model with its effective audit by examining the various

    vulnerabilities , we can make a cloud architecture which is secure.CCM(cloud computing Model) cannot be implemented without a proper security

    model to be introduce into CCM.API plays important role in the security

    breach of clouds, implementation of better API controls.

    For a better cloud model which is secure we should follow authentication,

    authorization, and audit (AAA) model. Also giving certain guidelines on SSO,

    identity management, regulations for proper usage and logs thus preventing

  • 8/3/2019 UNISYS_20

    2/2

    the data leakage in clouds. By securing the cloud we can easy implement the

    architecture of enterprise cloud model and use the cloud computing power

    to its fullest.

    Keywords-cloud computing; trusted computing; cloud security.