SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2499
Security Concern: Analysis of Cloud Security Mechanism
Vaneet Kumar1, Samandeep Singh2, Lovepreet3
1Student, Dept of Computer Science Engineering, GIMET Amritsar, Punjab, India
2,3Assistant Professor, Dept of Computer Science Engineering, GIMET Amritsar, Punjab ,India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud computing paradigm used to provide
resource on share basis to multiple machines. Due to
availability of resources this mechanism becoming extremely
popular for accessing resources as and when desired by
machines. Reliability however the issue associated with cloud
computing. Data transferred and stored over the cloud will be
under siege due to the malicious access or attacks. This paper
present the comprehensive survey of techniques used in order
to encrypt the data and enhance reliability of cloud. Cloud
reliability enhancement ensured using the encryption
algorithms which are researched over the past era. Efficient
parameters are extracted and qualitative comparison is
presented to depict the efficient encryption mechanism that
can be used in future works.
Key Words: Cloud Computing, Reliability, Encryption
1. INTRODUCTION
In today’s era cloud computing becomes the hottest topic
due to its ability to reduce cost associated with computing.
Cloud computing provides the on demand services like
storage, servers, resources etc. to the users without
physically acquiring them and the payment is according to
pay per use. Since cloud provides the storage, reduces
managing cost and time for organization to user but security
and confidentiality becomes one of biggest obstacle in front
of us. The major problem with cloud environment is, the
number of user is uploading their data on cloud storage so
sometimes due to lack of security there may be chances of
loss of confidentiality. To overcome these obstacles a third
party is required to prevent data, data encryption, and
integrity and control unauthorized accessfor datastorageto
the cloud. With the rapid development of hardware and
software cloud computing brings the revolution in the
business industry[1]. It provides resources like
computational power, storage, computation platform ad
applications to user on demand through internet. Some of
the cloud providers are Amazon, IBM, Google, Salesforce,
Microsoft etc. Cloud computing features included resource
sharing, multi-tenancy, remote data storage etc. but it
challenges the security system to secure,protectandprocess
the data which is the property of the individual, enterprises
and governments. Even though, there is no requirement of
knowledge or expertise to control the infrastructure of
clouds; it is abstract to the user. It is a service of an Internet
with high scalability, quality of service, higher throughput
and high computing power[2]. Cloud computing providers
deploy common online business applications which are
accessed from serversthrough web browser.Datasecurityis
the biggest issue in cloud computing and it is not easy to
resolve it.
1.1Security issues in cloud Computing:
In cloud environment usual data transmission occurs
between client and server using third party. So
confidentiality of your data becomes primary problem.
Security issues for a significant number of theseframeworks
and innovations are pertinent to distributed computing[3].
For instance, the system that interconnects the frameworks
in a cloud must be secure and mapping the virtual machines
to the physical machines must be completed safely.
Information security includesencoding the informationand
additionally guaranteeing that suitable strategies are
implemented for information sharing[4]. Cloudsecurityisn't
to be mistaken for "cloud-based" security benefit over the
conventional danger. This security administration can be
upgraded with the distributed computing, ensuring against
DDOS, Trojan, Virus and Spam and so on more viably than
any other time in recent memory[5].
Fig- 1: Data storage structure of Cloud Computing
However, the qualities of distributed storage make clients'
information looked with numerous security dangers,
incorporates: (1) the conventional security district parcel is
invalid. On account of the distributed storagebenefitmustbe
adaptable, security limits and assurance hardware can't be
unmistakably characterized, which builds some trouble for
the usage of particular assurance measures; [6, 2]the
distributed storage transmits information through the
system. The benefit interferences, information devastation,
data stolen furthermore, altered caused by the noxious
assaults in the organize represent a serious test to the
security of information correspondences,gettoconfirmation
and classification; [7, 3] from the client's view, the
distributed storage of information makes distributed
computing specialist co-op gets the information get to
control, and the client's information is looked with
protection security dangers. Individualsstress over that the
touchy individual information will be exposure, abuse or
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2500
missing by putting the information in cloud condition[8].To
tackle the above issues, as of late, scientists made a parcel of
research work in the information security to control
systems, information respectability,confirmation,ciphertext
to recover and information encryption system of cloud
figuring condition[9].
There are lots of security issues with cloud computing
because of technologies utilization including networks,
operating systems, databases, resource scheduling,
virtualization, load balancing, transaction management,
memory management and concurrencycontrol.Forexample,
the network should be secure on cloud so that mapping the
virtual machines to the physical machines has to be carried
out securely[10]. Data security not only involves encrypting
the data but also gives surety of appropriate policies. Cloud
computing suffers from some various security concerns
which are given below.
• Access to Servers & Applications
• Data Transmission
• Virtual Machine Security
• Network Security
• Data Security
• Data Privacy
• Data Integrity
• Data Location
• Data Availability
• Data Segregation
• Security Policy and Compliance
• Patch management
1.2 Cloud Security Challenges:
Some of the cloud security challenges that come in front of
users are given below:
I. Authentication: The data on the internetisavailable
to all the unauthorized users. Therefore the
confidentiality of the data can be lost.
II. Access Control: To give access to only legalized
users some control policiesare used. Theseservices
must be adjustable, well planned, and their
allocation is overseeing conveniently[11].
III. Policy Integration: There are many cloud providers
they use their own policies and approaches. Some
of them are Amazon, Google who provides services
to end users.
IV. Service Management: In this different cloud
providers such as Amazon, Google, comprise
together to provide services to meet their
customers need.
V. Trust Management: The trust management
approach must be developed so that trust remains
between both parties such as user and provide.
2. BACKGROUND ANALYSIS
The cloud security is always a concern and researchers are
working towards this issue to enhance security of cloud
using optimal strategies. This section present the
comprehensiveliterature survey ofmostefficientencryption
strategies used to enhance security concerns. In [12]
reviewed strategiesused to enhance cloud security.Security
requirementsand objectives of cloud security isdiscussedin
this literature. Accessing resourcesof the cloud andsecurely
allocating it for effective utilization ofcloudissuggested.[12]
The problem with this literature is qualitative analysis.
Parameters are not extracted and compared using this
literature. In [13] proposed hybrid symmetric encryption
mechanism for cloud security. Secure and protected data
storage is presented using this literature. In this model,
sender outsourced the data towards the destination and
decryption key is hidden from the intruder. The
authorization is required in order to access the key. The key
is used to decrypt the data. Use of hybrid encryption makes
the data more secure and less prone to attacks. In [14]
proposed order preserving encryption mechanism.
Differential attacks were conducted to judge the security of
order preserving encryption mechanism. Estimated
distribution can be calculated by the sender in order to
determine the attack. The attack is limited due to encryption
mechanism employed withinorderpreservingencryption.In
[15] suggested and reviewed the techniques used within
cloud to ensure integrity of data stored within cloud
computing. Risk and advantages associated with encryption
algorithmssuch asRSA wasanalysed. Qualitative analysisof
parameters is not done in this literature. In [16] proposed a
data access mechanism using authorization in multi
authority cloud system. Concept of update andsecretkeyare
used in order to encrypt and decrypt the information.
Encryption and decryption mechanisms are securely
performed by the use of secret keys. Reliability is enhanced
by the application of data access mechanism. Data access
mechanism distributes data access controls to the users.
Users can access only that part of the cloud to which they
have authority. Security and protection of datastoredwithin
the cloud is greatly enhanced using this mechanism. In [17]
proposed block level encryption standards. The mechanism
first of all fetches the similar blocks from the files stored
within the cloud. The fetched blocks are encrypted and
stored back over the cloud. The similar blocks are indexed
and hence less storage requirements exist in this case. In
cloud cost is encountered on the pay per use basis. Hence
cost is significantly reduced. In [18] proposed query based
homomorphic encryption slandered in cloud. This type of
encryption performs computation on cipher text. This
computation generates a encrypted result. During
decryption, the generated plain text exhibits same
computation as on cipher text. This encryption is one of the
most secure mechanism for securing and protecting data
stored within cloud computing. Related work suggest that
there is a room for improvement in the security concern
within cloud computing. The most secure cloud security
mechanism is homomorphic encryptionthatcanbeextended
by including block level redundancy handling mechanismto
save space and subsequently cost associated with storage.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2501
3. Comparison analysis of Security in Cloud Computing
This section presents comparison of techniques used to ensure security within cloud computing.
Title Technique Parameters Merits Demerits
Query based computations on
encrypted data through
homomorphic encryption in cloud
computing security[18]
Homomorphic
Encryption
Availability
Execution time
Execution time is
decreased and
availability is
enhanced
Space conservation
is poor
Cloud Computing Security: From
Single Cloud to Multi-Clouds using
Digital Signature[19]
Digital Signature Execution time Security is enhanced
and execution time
is decreased
Block level security
enhancement is
missing.
Security transparency: the next
frontier for
security research in the cloud
Moussa Ouedraogo1*, Severine
Mignon1, Herve Cholez1, Steven
Furnell2 and Eric Dubois1[20]
Security
Transparency
between cloud
service providers
and users
No parameters
specified
Transparency is
suggested to ensure
better security
No quantitative
analysis of security
parameters
An Efficient Protocol with
Bidirectional Verification for
Storage Security in Cloud
Computing[21]
Bidirectional
verification for
storage security in
cloud
Computational
overhead
Computation
overhead is reduced
Space utilization is
high so cost and
space must be
optimised
Secure Algorithm for Cloud
Computing and Its
Applications[22]
HE-RSA Execution time Execution time is
reduced
Space complexity is
high due to
redundancy
Security and Reliability
Performance Analysis for Cloud
Radio Access Networks With
Channel Estimation Errors[23]
Security algorithm
for Cloud radio
Channels
Execution time Execution time is
reduced by the
application of this
technique
Space andredundant
parameters are not
considered
BL-MLE: Block-Level Message-
Locked Encryption for Secure
Large File Deduplication[24]
Block level
message locked
deduplication
Execution time
Space
utilization
Execution time is
reduced and space
utilizationisreduced
Bit level redundancy
handling mechanism
can increase the
performance of this
approach
Optimal Scheduling In Cloud
Computing EnvironmentUsingthe
Bee Algorithm[25]
Optimised
scheduling of
resources in cloud
for security
enhancement
Makespan Makespan isreduced Security parameters
can be enhanced
further considering
encryption within
allocation
Modern Applications of QR-Code
for Security
[26]
QR based Security Execution time Execution time is
reduced
Generating QR code
is exceedingly
difficult
Data Security Issues and
Challenges in Cloud Computing: A
Conceptual Analysis and
Review[27]
Review of security
mechanisms are
presented
No parameters
specified
Different security
techniques are
analysed which can
be used for future
enhancement
Qualitative analysis
of parameters is
missing
Table 1: Comparison of Security concerns in cloud computing
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2502
The analysed techniques can be used to fetched efficient
techniques for future endeavours.
4. CONCLUSION AND FUTURE SCOPE
Above will be the research hotspot of cloudCloudcomputing
not only provides the resources to the users but also give a
big challenge of security. There are securities requirements
for both users and cloud providers but sometimes it may
conflict in some way. Security of the cloud depends upon
trusted computing and cryptography. In our review paper
some issues related to data location, security, storage,
availability and integrity. Establishing trust in the cloud
security is the biggest requirement. These issues mentioned
computing. The homomorphic filtering with redundancy
handling mechanism can be future scope for this literature.
REFERENCES
[1] X. Yu, “Intelligent Urban Traffic Management System
Based on Cloud Computing and Internet of Things,”
pp. 2169–2172, 2012.
[2] B. Mills, T. Znati, and R. Melhem, “Shadow
Computing: An energy-aware fault tolerant
computing model,” 2014 Int. Conf. Comput. Netw.
Commun., pp. 73–77, 2014.
[3] C. A. Chen, M. Won, R. Stoleru, and G. G. Xie, “Energy-
efficient fault-tolerant data storageandprocessingin
mobile cloud,” IEEE Trans. Cloud Comput., vol. 3, no.
1, pp. 28–41, 2015.
[4] S. S. Lakshmi, “Fault Tolerance in Cloud Computing,”
vol. 04, no. 01, pp. 1285–1288, 2013.
[5] R. Buyya, C. S. Yeo, and S. Venugopal, “Market-
oriented cloud computing: Vision, hype, and reality
for delivering IT services as computing utilities,”
Proc. - 10th IEEE Int. Conf. High Perform. Comput.
Commun. HPCC 2008, pp. 5–13, 2008.
[6] Z. Xiao, W. Song, and Q. Chen, “Dynamic Resource
Allocation Using Virtual Machines for Cloud
Computing Environment,” IEEE Trans. Parallel
Distrib. Syst., vol. 24, no. 6, pp. 1107–1117,Jun.2013.
[7] U. Wajid, C. Cappiello, P. Plebani, B. Pernici, N.
Mehandjiev, M. Vitali, M. Gienger, K. Kavoussanakis,
D. Margery, D. G. Perez, and P. Sampaio, “On
Achieving Energy Efficiency and Reducing CO 2
Footprint in Cloud Computing,” vol.7161,no.c,2015.
[8] Y. Xie, H. Wen, B. Wu, Y. Jiang, and J. Meng,
“Transactions on Cloud Computing,” vol. 13, no. 9,
2015.
[9] D. Ardagna, G. Casale, M. Ciavotta, J. F. Pérez, and W.
Wang, “Quality-of-service in cloud computing :
modeling techniques and their applications,” pp. 1–
17, 2014.
[10] M. Armbrust, I. Stoica, M. Zaharia, A. Fox, R. Griffith,
A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D.
Patterson, and A. Rabkin, “A view of cloud
computing,” Commun. ACM, vol. 53, no. 4, p. 50,
2010.
[11] S. Saha, S. Pal, and P. K. Pattnaik, “A Novel Scheduling
Algorithm for Cloud Computing Environment,”vol.1,
2016.
[12] P. You, Y. Peng, W. Liu, and S. Xue, “Security Issues
and Solutions in Cloud Computing,” 2012.
[13] S. Kaushik, “Cloud data security with hybrid
symmetric encryption,” pp. 0–4, 2016.
[14] K. Li, W. Zhang, C. Yang, and N. Yu, “Security Analysis
on One-to-Many Order Preserving EncryptionBased
Cloud data Search,” vol. 6013, no. c, pp. 1–9, 2015.
[15] F. Sabahi, “Cloud Computing Security Threats and
Responses,” pp. 245–249, 2011.
[16] X. Wu, R. Jiang, and B. Bhargava, “On the Security of
Data AccessControl for MultiauthorityCloudStorage
Systems,” pp. 1–14, 2015.
[17] Y. Zhao and S. S. M. Chow, “Updatable Block-Level
Message-Locked Encryption,” pp. 449–460, 2017.
[18] V. Biksham, “Query based computations on
encrypted data through homomorphic encryptionin
cloud computing security,” pp. 3820–3825, 2016.
[19] G. A. Prajapati, S. S. Satav, S. Dahiphale, S. More, and
P. N. Bogiri, “Cloud Computing Security : FromSingle
to Multi-Clouds using digital signature,” vol. 2, no. 6,
pp. 204–213, 2014.
[20] M. Ouedraogo, S. Mignon, H. Cholez, S. Furnell, and E.
Dubois, “Security transparency : the next frontierfor
security research in the cloud,” J. Cloud Comput.,
2015.
[21] B. Feng, X. Ma, C. Guo, H. Shi, Z. Fu, T. Qiu, and S.
Member, “An Efficient Protocol with Bidirectional
Verification for Storage,” vol. 3536, no. c, pp. 1–13,
2016.
[22] A. Bhandari, “Secure Algorithm for Cloud Computing
and Its Applications,” pp. 188–192, 2016.
[23] J. I. A. You, Z. Zhong, G. Wang, B. O. Ai, and S. Member,
“Security and Reliability Performance Analysis for
Cloud Radio Access Networks With Channel
Estimation Errors,” vol. 2, 2014.
[24] R. Chen, Y. Mu, G. Yang, and F. Guo, “BL-MLE: Block-
Level Message-Locked Encryption for Secure Large
File Deduplication,” IEEETrans. Inf. ForensicsSecur.,
vol. 10, no. 12, pp. 2643–2652, Dec. 2015.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2503
[25] N. Hesabian, H. Haj, and S. Javadi, “Optimal
Scheduling In Cloud Computing Environment Using
the Bee Algorithm,” vol. 3, no. 6, pp. 253–258, 2015.
[26] K. Saranya and A. Professor-i, “Modern Applications
of QR-Code for Security,” no. March, pp. 1–5, 2016.
[27] O. Harfoushi, B. Alfawwaz, N. a. Ghatasheh, R.
Obiedat, M. M. Abu-Faraj, and H. Faris, “DataSecurity
Issues and Challenges in Cloud Computing: A
Conceptual Analysis and Review,” Commun. Netw.,
vol. 06, no. 01, pp. 15–21, 2014.

More Related Content

PDF
Secure modelling schema of distributed information access management in cloud...
PDF
Secure modelling schema of distributed information access management in cloud...
PDF
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
PDF
1784 1788
PDF
IRJET-Domain Data Security on Cloud
PDF
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
PDF
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
PDF
Data Storage Issues in Cloud Computing
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
1784 1788
IRJET-Domain Data Security on Cloud
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
Data Storage Issues in Cloud Computing

What's hot (15)

PDF
Enforcing multi user access policies in cloud computing
PDF
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
PDF
Security policy enforcement in cloud infrastructure
PDF
Security Issues in Cloud Computing by rahul abhishek
PDF
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
PDF
Security issue in Cloud computing
PDF
Internal & External Attacks in cloud computing Environment from confidentiali...
PDF
Cloud implementation security challenges
PDF
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
PDF
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
PPTX
Aspects of data security
PDF
G0314043
PDF
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
PDF
Cloud Auditing
PPTX
Fundamental cloud security
Enforcing multi user access policies in cloud computing
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Security policy enforcement in cloud infrastructure
Security Issues in Cloud Computing by rahul abhishek
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
Security issue in Cloud computing
Internal & External Attacks in cloud computing Environment from confidentiali...
Cloud implementation security challenges
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
Aspects of data security
G0314043
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
Cloud Auditing
Fundamental cloud security
Ad

Similar to IRJET- Security Concern: Analysis of Cloud Security Mechanism (20)

PDF
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
DOC
Security Issues in Cloud Computing by rahul abhishek
PPTX
A study on security issues in cloud based e learning
PDF
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
PDF
Insuring Security for Outsourced Data Stored in Cloud Environment
PDF
Security Issues in Cloud Computing - A Review
PDF
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
PDF
Ijarcet vol-2-issue-4-1405-1409
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
G033030035
PDF
Cloud Computing Using Encryption and Intrusion Detection
PDF
Enhanced security framework to ensure data security
PDF
Cloud Security Challenges, Types, and Best Practises.pdf
PDF
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
PDF
Module 5-cloud computing-SECURITY IN THE CLOUD
DOCX
UNIT -V.docx
PDF
IRJET- A Survey on Cloud Data Security Methods and Future Directions
PDF
Solutions of cloud computing security issues
PDF
Analysis of Cloud Computing Security Concerns and Methodologies
PDF
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
Security Issues in Cloud Computing by rahul abhishek
A study on security issues in cloud based e learning
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Insuring Security for Outsourced Data Stored in Cloud Environment
Security Issues in Cloud Computing - A Review
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
Ijarcet vol-2-issue-4-1405-1409
Enhanced security framework to ensure data security in cloud using security b...
G033030035
Cloud Computing Using Encryption and Intrusion Detection
Enhanced security framework to ensure data security
Cloud Security Challenges, Types, and Best Practises.pdf
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Module 5-cloud computing-SECURITY IN THE CLOUD
UNIT -V.docx
IRJET- A Survey on Cloud Data Security Methods and Future Directions
Solutions of cloud computing security issues
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPT
Project quality management in manufacturing
PPTX
web development for engineering and engineering
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Geodesy 1.pptx...............................................
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
PPT on Performance Review to get promotions
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
composite construction of structures.pdf
PDF
Well-logging-methods_new................
PPTX
Sustainable Sites - Green Building Construction
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Construction Project Organization Group 2.pptx
Project quality management in manufacturing
web development for engineering and engineering
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Structs to JSON How Go Powers REST APIs.pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Mechanical Engineering MATERIALS Selection
Geodesy 1.pptx...............................................
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPT on Performance Review to get promotions
Strings in CPP - Strings in C++ are sequences of characters used to store and...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
composite construction of structures.pdf
Well-logging-methods_new................
Sustainable Sites - Green Building Construction
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CH1 Production IntroductoryConcepts.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Construction Project Organization Group 2.pptx

IRJET- Security Concern: Analysis of Cloud Security Mechanism

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2499 Security Concern: Analysis of Cloud Security Mechanism Vaneet Kumar1, Samandeep Singh2, Lovepreet3 1Student, Dept of Computer Science Engineering, GIMET Amritsar, Punjab, India 2,3Assistant Professor, Dept of Computer Science Engineering, GIMET Amritsar, Punjab ,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing paradigm used to provide resource on share basis to multiple machines. Due to availability of resources this mechanism becoming extremely popular for accessing resources as and when desired by machines. Reliability however the issue associated with cloud computing. Data transferred and stored over the cloud will be under siege due to the malicious access or attacks. This paper present the comprehensive survey of techniques used in order to encrypt the data and enhance reliability of cloud. Cloud reliability enhancement ensured using the encryption algorithms which are researched over the past era. Efficient parameters are extracted and qualitative comparison is presented to depict the efficient encryption mechanism that can be used in future works. Key Words: Cloud Computing, Reliability, Encryption 1. INTRODUCTION In today’s era cloud computing becomes the hottest topic due to its ability to reduce cost associated with computing. Cloud computing provides the on demand services like storage, servers, resources etc. to the users without physically acquiring them and the payment is according to pay per use. Since cloud provides the storage, reduces managing cost and time for organization to user but security and confidentiality becomes one of biggest obstacle in front of us. The major problem with cloud environment is, the number of user is uploading their data on cloud storage so sometimes due to lack of security there may be chances of loss of confidentiality. To overcome these obstacles a third party is required to prevent data, data encryption, and integrity and control unauthorized accessfor datastorageto the cloud. With the rapid development of hardware and software cloud computing brings the revolution in the business industry[1]. It provides resources like computational power, storage, computation platform ad applications to user on demand through internet. Some of the cloud providers are Amazon, IBM, Google, Salesforce, Microsoft etc. Cloud computing features included resource sharing, multi-tenancy, remote data storage etc. but it challenges the security system to secure,protectandprocess the data which is the property of the individual, enterprises and governments. Even though, there is no requirement of knowledge or expertise to control the infrastructure of clouds; it is abstract to the user. It is a service of an Internet with high scalability, quality of service, higher throughput and high computing power[2]. Cloud computing providers deploy common online business applications which are accessed from serversthrough web browser.Datasecurityis the biggest issue in cloud computing and it is not easy to resolve it. 1.1Security issues in cloud Computing: In cloud environment usual data transmission occurs between client and server using third party. So confidentiality of your data becomes primary problem. Security issues for a significant number of theseframeworks and innovations are pertinent to distributed computing[3]. For instance, the system that interconnects the frameworks in a cloud must be secure and mapping the virtual machines to the physical machines must be completed safely. Information security includesencoding the informationand additionally guaranteeing that suitable strategies are implemented for information sharing[4]. Cloudsecurityisn't to be mistaken for "cloud-based" security benefit over the conventional danger. This security administration can be upgraded with the distributed computing, ensuring against DDOS, Trojan, Virus and Spam and so on more viably than any other time in recent memory[5]. Fig- 1: Data storage structure of Cloud Computing However, the qualities of distributed storage make clients' information looked with numerous security dangers, incorporates: (1) the conventional security district parcel is invalid. On account of the distributed storagebenefitmustbe adaptable, security limits and assurance hardware can't be unmistakably characterized, which builds some trouble for the usage of particular assurance measures; [6, 2]the distributed storage transmits information through the system. The benefit interferences, information devastation, data stolen furthermore, altered caused by the noxious assaults in the organize represent a serious test to the security of information correspondences,gettoconfirmation and classification; [7, 3] from the client's view, the distributed storage of information makes distributed computing specialist co-op gets the information get to control, and the client's information is looked with protection security dangers. Individualsstress over that the touchy individual information will be exposure, abuse or
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2500 missing by putting the information in cloud condition[8].To tackle the above issues, as of late, scientists made a parcel of research work in the information security to control systems, information respectability,confirmation,ciphertext to recover and information encryption system of cloud figuring condition[9]. There are lots of security issues with cloud computing because of technologies utilization including networks, operating systems, databases, resource scheduling, virtualization, load balancing, transaction management, memory management and concurrencycontrol.Forexample, the network should be secure on cloud so that mapping the virtual machines to the physical machines has to be carried out securely[10]. Data security not only involves encrypting the data but also gives surety of appropriate policies. Cloud computing suffers from some various security concerns which are given below. • Access to Servers & Applications • Data Transmission • Virtual Machine Security • Network Security • Data Security • Data Privacy • Data Integrity • Data Location • Data Availability • Data Segregation • Security Policy and Compliance • Patch management 1.2 Cloud Security Challenges: Some of the cloud security challenges that come in front of users are given below: I. Authentication: The data on the internetisavailable to all the unauthorized users. Therefore the confidentiality of the data can be lost. II. Access Control: To give access to only legalized users some control policiesare used. Theseservices must be adjustable, well planned, and their allocation is overseeing conveniently[11]. III. Policy Integration: There are many cloud providers they use their own policies and approaches. Some of them are Amazon, Google who provides services to end users. IV. Service Management: In this different cloud providers such as Amazon, Google, comprise together to provide services to meet their customers need. V. Trust Management: The trust management approach must be developed so that trust remains between both parties such as user and provide. 2. BACKGROUND ANALYSIS The cloud security is always a concern and researchers are working towards this issue to enhance security of cloud using optimal strategies. This section present the comprehensiveliterature survey ofmostefficientencryption strategies used to enhance security concerns. In [12] reviewed strategiesused to enhance cloud security.Security requirementsand objectives of cloud security isdiscussedin this literature. Accessing resourcesof the cloud andsecurely allocating it for effective utilization ofcloudissuggested.[12] The problem with this literature is qualitative analysis. Parameters are not extracted and compared using this literature. In [13] proposed hybrid symmetric encryption mechanism for cloud security. Secure and protected data storage is presented using this literature. In this model, sender outsourced the data towards the destination and decryption key is hidden from the intruder. The authorization is required in order to access the key. The key is used to decrypt the data. Use of hybrid encryption makes the data more secure and less prone to attacks. In [14] proposed order preserving encryption mechanism. Differential attacks were conducted to judge the security of order preserving encryption mechanism. Estimated distribution can be calculated by the sender in order to determine the attack. The attack is limited due to encryption mechanism employed withinorderpreservingencryption.In [15] suggested and reviewed the techniques used within cloud to ensure integrity of data stored within cloud computing. Risk and advantages associated with encryption algorithmssuch asRSA wasanalysed. Qualitative analysisof parameters is not done in this literature. In [16] proposed a data access mechanism using authorization in multi authority cloud system. Concept of update andsecretkeyare used in order to encrypt and decrypt the information. Encryption and decryption mechanisms are securely performed by the use of secret keys. Reliability is enhanced by the application of data access mechanism. Data access mechanism distributes data access controls to the users. Users can access only that part of the cloud to which they have authority. Security and protection of datastoredwithin the cloud is greatly enhanced using this mechanism. In [17] proposed block level encryption standards. The mechanism first of all fetches the similar blocks from the files stored within the cloud. The fetched blocks are encrypted and stored back over the cloud. The similar blocks are indexed and hence less storage requirements exist in this case. In cloud cost is encountered on the pay per use basis. Hence cost is significantly reduced. In [18] proposed query based homomorphic encryption slandered in cloud. This type of encryption performs computation on cipher text. This computation generates a encrypted result. During decryption, the generated plain text exhibits same computation as on cipher text. This encryption is one of the most secure mechanism for securing and protecting data stored within cloud computing. Related work suggest that there is a room for improvement in the security concern within cloud computing. The most secure cloud security mechanism is homomorphic encryptionthatcanbeextended by including block level redundancy handling mechanismto save space and subsequently cost associated with storage.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2501 3. Comparison analysis of Security in Cloud Computing This section presents comparison of techniques used to ensure security within cloud computing. Title Technique Parameters Merits Demerits Query based computations on encrypted data through homomorphic encryption in cloud computing security[18] Homomorphic Encryption Availability Execution time Execution time is decreased and availability is enhanced Space conservation is poor Cloud Computing Security: From Single Cloud to Multi-Clouds using Digital Signature[19] Digital Signature Execution time Security is enhanced and execution time is decreased Block level security enhancement is missing. Security transparency: the next frontier for security research in the cloud Moussa Ouedraogo1*, Severine Mignon1, Herve Cholez1, Steven Furnell2 and Eric Dubois1[20] Security Transparency between cloud service providers and users No parameters specified Transparency is suggested to ensure better security No quantitative analysis of security parameters An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing[21] Bidirectional verification for storage security in cloud Computational overhead Computation overhead is reduced Space utilization is high so cost and space must be optimised Secure Algorithm for Cloud Computing and Its Applications[22] HE-RSA Execution time Execution time is reduced Space complexity is high due to redundancy Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors[23] Security algorithm for Cloud radio Channels Execution time Execution time is reduced by the application of this technique Space andredundant parameters are not considered BL-MLE: Block-Level Message- Locked Encryption for Secure Large File Deduplication[24] Block level message locked deduplication Execution time Space utilization Execution time is reduced and space utilizationisreduced Bit level redundancy handling mechanism can increase the performance of this approach Optimal Scheduling In Cloud Computing EnvironmentUsingthe Bee Algorithm[25] Optimised scheduling of resources in cloud for security enhancement Makespan Makespan isreduced Security parameters can be enhanced further considering encryption within allocation Modern Applications of QR-Code for Security [26] QR based Security Execution time Execution time is reduced Generating QR code is exceedingly difficult Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review[27] Review of security mechanisms are presented No parameters specified Different security techniques are analysed which can be used for future enhancement Qualitative analysis of parameters is missing Table 1: Comparison of Security concerns in cloud computing
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2502 The analysed techniques can be used to fetched efficient techniques for future endeavours. 4. CONCLUSION AND FUTURE SCOPE Above will be the research hotspot of cloudCloudcomputing not only provides the resources to the users but also give a big challenge of security. There are securities requirements for both users and cloud providers but sometimes it may conflict in some way. Security of the cloud depends upon trusted computing and cryptography. In our review paper some issues related to data location, security, storage, availability and integrity. Establishing trust in the cloud security is the biggest requirement. These issues mentioned computing. The homomorphic filtering with redundancy handling mechanism can be future scope for this literature. REFERENCES [1] X. Yu, “Intelligent Urban Traffic Management System Based on Cloud Computing and Internet of Things,” pp. 2169–2172, 2012. [2] B. Mills, T. Znati, and R. Melhem, “Shadow Computing: An energy-aware fault tolerant computing model,” 2014 Int. Conf. Comput. Netw. Commun., pp. 73–77, 2014. [3] C. A. Chen, M. Won, R. Stoleru, and G. G. Xie, “Energy- efficient fault-tolerant data storageandprocessingin mobile cloud,” IEEE Trans. Cloud Comput., vol. 3, no. 1, pp. 28–41, 2015. [4] S. S. Lakshmi, “Fault Tolerance in Cloud Computing,” vol. 04, no. 01, pp. 1285–1288, 2013. [5] R. Buyya, C. S. Yeo, and S. Venugopal, “Market- oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities,” Proc. - 10th IEEE Int. Conf. High Perform. Comput. Commun. HPCC 2008, pp. 5–13, 2008. [6] Z. Xiao, W. Song, and Q. Chen, “Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1107–1117,Jun.2013. [7] U. Wajid, C. Cappiello, P. Plebani, B. Pernici, N. Mehandjiev, M. Vitali, M. Gienger, K. Kavoussanakis, D. Margery, D. G. Perez, and P. Sampaio, “On Achieving Energy Efficiency and Reducing CO 2 Footprint in Cloud Computing,” vol.7161,no.c,2015. [8] Y. Xie, H. Wen, B. Wu, Y. Jiang, and J. Meng, “Transactions on Cloud Computing,” vol. 13, no. 9, 2015. [9] D. Ardagna, G. Casale, M. Ciavotta, J. F. Pérez, and W. Wang, “Quality-of-service in cloud computing : modeling techniques and their applications,” pp. 1– 17, 2014. [10] M. Armbrust, I. Stoica, M. Zaharia, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, and A. Rabkin, “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, p. 50, 2010. [11] S. Saha, S. Pal, and P. K. Pattnaik, “A Novel Scheduling Algorithm for Cloud Computing Environment,”vol.1, 2016. [12] P. You, Y. Peng, W. Liu, and S. Xue, “Security Issues and Solutions in Cloud Computing,” 2012. [13] S. Kaushik, “Cloud data security with hybrid symmetric encryption,” pp. 0–4, 2016. [14] K. Li, W. Zhang, C. Yang, and N. Yu, “Security Analysis on One-to-Many Order Preserving EncryptionBased Cloud data Search,” vol. 6013, no. c, pp. 1–9, 2015. [15] F. Sabahi, “Cloud Computing Security Threats and Responses,” pp. 245–249, 2011. [16] X. Wu, R. Jiang, and B. Bhargava, “On the Security of Data AccessControl for MultiauthorityCloudStorage Systems,” pp. 1–14, 2015. [17] Y. Zhao and S. S. M. Chow, “Updatable Block-Level Message-Locked Encryption,” pp. 449–460, 2017. [18] V. Biksham, “Query based computations on encrypted data through homomorphic encryptionin cloud computing security,” pp. 3820–3825, 2016. [19] G. A. Prajapati, S. S. Satav, S. Dahiphale, S. More, and P. N. Bogiri, “Cloud Computing Security : FromSingle to Multi-Clouds using digital signature,” vol. 2, no. 6, pp. 204–213, 2014. [20] M. Ouedraogo, S. Mignon, H. Cholez, S. Furnell, and E. Dubois, “Security transparency : the next frontierfor security research in the cloud,” J. Cloud Comput., 2015. [21] B. Feng, X. Ma, C. Guo, H. Shi, Z. Fu, T. Qiu, and S. Member, “An Efficient Protocol with Bidirectional Verification for Storage,” vol. 3536, no. c, pp. 1–13, 2016. [22] A. Bhandari, “Secure Algorithm for Cloud Computing and Its Applications,” pp. 188–192, 2016. [23] J. I. A. You, Z. Zhong, G. Wang, B. O. Ai, and S. Member, “Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors,” vol. 2, 2014. [24] R. Chen, Y. Mu, G. Yang, and F. Guo, “BL-MLE: Block- Level Message-Locked Encryption for Secure Large File Deduplication,” IEEETrans. Inf. ForensicsSecur., vol. 10, no. 12, pp. 2643–2652, Dec. 2015.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2503 [25] N. Hesabian, H. Haj, and S. Javadi, “Optimal Scheduling In Cloud Computing Environment Using the Bee Algorithm,” vol. 3, no. 6, pp. 253–258, 2015. [26] K. Saranya and A. Professor-i, “Modern Applications of QR-Code for Security,” no. March, pp. 1–5, 2016. [27] O. Harfoushi, B. Alfawwaz, N. a. Ghatasheh, R. Obiedat, M. M. Abu-Faraj, and H. Faris, “DataSecurity Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review,” Commun. Netw., vol. 06, no. 01, pp. 15–21, 2014.