International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Cloud Computing Safety Concerns in Infrastructure as a Service

Author Affiliations

  • 1King Saud University, Saudi Arabia, Nationality INDIA
  • 2College of Pharmacy, King Saud University, SAUDI ARABIA

Res. J. Recent Sci., Volume 3, Issue (6), Pages 116-123, June,2 (2014)

Abstract

Cloud computing is current exhortation in the market. It is pattern in which the assets can be leveraged on user basis and by this way reducing the cost and complication of service providers. Cloud computing guarantee to slice operational and capital costs and more prominently let IT departments focus on planned projects instead of maintenance datacenters running. Cloud computing is much more than easy internet. It is a build that permits user to access applications that in reality exist at location rather than user’s own computer or other Internet-connected devices. There are many benefits of this build. For example other corporation hosts user application, this means that they need to bear the cost of servers, deal with software updates and depending on the contract and by this way user need to pay less i.e. for the service only. Secrecy, Integrity, Availability, Authenticity, and Privacy are important concerns for both Cloud providers and customers as well. Infrastructure as a Service (IAAS) gives out as the groundwork layer for the other delivery models, and a lack of safety in this layer will definitely change the other delivery models, i.e., PAAS, and SAAS that are built upon IAAS layer. This paper gives a detailed study of IAAS components’ security and finds out vulnerabilities and countermeasures. Service Level Agreement should be considered with very much importance.

References

  1. Jensen M., Schwenk J., Gruschka N. and Lo Iacono L., On Technical Security Issues in Cloud ComputingIEEE, (2009)
  2. http://www.computerweekly.com/news/2240089111/Top-five-cloud-computing-security-issues
  3. http://www.twilio.com/(2013)
  4. http://www.terremark.com/services/it-infrastructure/cloud-services/enterprise-cloud/(2013)
  5. Berger S., Caceres R., Pendarakis D., Sailer R., Valdez E., Perez R., Schildhauer W. and Srinivasan D., Security for the cloud infrastrcture: trusted virtual data center (TVDc), 53(4), 6 (2009) [Online]. Available: www.kiskeya.net/ramon/work/pubs/ibmjrd09.pdf
  6. http://www.cloudsecurity.org, accessed on April 10, (2009)
  7. Al Ajmi, Sharma and Khan S., Growing Cloud Computing Efficiency, 3(5), (2012)available on http://thesai.org/Publications/ViewPaper?Volume=3&Issue=5&Code=IJACSA&SerialNo=26
  8. Wesam Dawoud, Ibrahim Takouna, Christoph Meinel Infrastructure as a Service Security, (2013)
  9. Service Level Agreement Definition and contents, http://www.service-level-agreement.net, accessed on March 10, (2009)
  10. Sampling issues we are addressing, http://cloudsecurityalliance.org/issues.html#15, accessed on April 09, (2009)
  11. Mike Kavis, Real time transactions in the cloud, http://www.kavistechnology.com/ blog/?p=789, accessed on April 12, (2009)
  12. Secure group addresses cloud computing risks, http://www.secpoint.com/security-group-addresses-cloudcomputing-risks.html, April 25, (2009)
  13. Cloud security alliance: Security guidance for critical areas of focus in cloud computing V2.1, Dec (2009) Available at: www.cloudsecurityalliance.org.
  14. Kamran Ahsan, Nazish Nouman, Anum Kamran, Farhana Hussain, and Saboohi Naeem Ahmed Cloud-Based Shared Food Ordering System with Context Awareness: A Location Base Services Approach, 2(11), 84-89, November (2013) http://www.isca.in/rjrs/archive/v2/i11/12.ISCA-RJRS-2013-046.pdf
  15. Kamran Ahsan, Nazish Nouman,Anum Kamran, Farhana Hussainand Saboohi Naeem Ahmed, Cloud-Based Shared Food Ordering System with Context Awareness:A Location Base Services Approach, Research Journal of Recent Sciences, 2(11), 84-89, (2013)
  16. Greg Boss, Padma Malladi, Denis Quan, Linda Legregni, Harold Hall, Cloud Computing, http://www.ibm.com/ developerswork/ websphere/ zones/hip ods/library.html, 4-4 (2007)
  17. Frankova G., Service Level Agreements: Web Services and Security, ser. Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 4607, (2007)
  18. Service Level Agreement and Master Service Agreement, http://www.softlayer.com/sla.html, accessed on April 05, (2009)