Аудит безопасности в облачной среде
Аннотация
Cloud computing is one of immerging active area of research due to many security threats throughout different circumstances these days. In this paper, we have tried to show the aspect of the major security threats analysis of cloud computing systems and privacy issues. We have also tried to figure out cloud computing model because of security architecture. Cloud based services and service providers are being evolved resulting a new business trend based on cloud computing. The flexibility and opportunities that cloud computing has to offer will be less trustworthy if security is not robust and consistent. This paper presents a clear aspect of cloud computing concepts as well as privacy and security issues.
Cloud computing is transforming the way of information technology (IT) for consuming and managing, promising improving cost efficiencies, accelerate innovations, faster time-to-market and the ability to scale applications on demand. According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial. However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy issues still pose significant challenges. In this article we described various service and deployment models of cloud computing and identify major challenges. In particular, we discuss three critical challenges: regulatory, security and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment.
This thesis outlines the characteristics, network access, rapid elasticity, deployment models and service models in the first chapter. In this chapter, mainly the introductory analysis of the basic literature have been emphasized. Then after privacy, issues came up with the significant computer paradigm and cloud security alliance. Cloud security alliance (CSA) highlights the advancement of best practices for giving security confirmation of distributed computing and instruction on the utilization of distributed computing for securing every single. In chapter, three we have underlined on threats & security consequences. Security is the most significant issue in cloud computing. As security is becoming a major issue in large companies and so on organizations cloud, computing is attractive more and more today for its high security outcome. Another influential term operational efficiency have been discussed in the chapter four. In this chapter, we have tried to shine up provisioning rules, elastic design, part of IT economics and scalable physical design. Later on, we talked about risk assessment in chapter five. We tried to figure out risk assessment methodology with system characterization and vulnerability identification. In this chapter, we have also discussed about security type and security criteria. Risk analysis is the primary procedure within the administration philosophy. Associations utilize probability appraisal to determine the degree of the potential danger and therefore the risk connected with an IT framework at some stage in its SDLC. In the last chapter we pointed out risk alleviation, the additional movement of risk organization, incorporates sorting out, evaluating, and executing the balanced peril diminishing controls proposed from the setback examination handle.
Cloud computing is transforming the way of information technology (IT) for consuming and managing, promising improving cost efficiencies, accelerate innovations, faster time-to-market and the ability to scale applications on demand. According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial. However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy issues still pose significant challenges. In this article we described various service and deployment models of cloud computing and identify major challenges. In particular, we discuss three critical challenges: regulatory, security and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment.
This thesis outlines the characteristics, network access, rapid elasticity, deployment models and service models in the first chapter. In this chapter, mainly the introductory analysis of the basic literature have been emphasized. Then after privacy, issues came up with the significant computer paradigm and cloud security alliance. Cloud security alliance (CSA) highlights the advancement of best practices for giving security confirmation of distributed computing and instruction on the utilization of distributed computing for securing every single. In chapter, three we have underlined on threats & security consequences. Security is the most significant issue in cloud computing. As security is becoming a major issue in large companies and so on organizations cloud, computing is attractive more and more today for its high security outcome. Another influential term operational efficiency have been discussed in the chapter four. In this chapter, we have tried to shine up provisioning rules, elastic design, part of IT economics and scalable physical design. Later on, we talked about risk assessment in chapter five. We tried to figure out risk assessment methodology with system characterization and vulnerability identification. In this chapter, we have also discussed about security type and security criteria. Risk analysis is the primary procedure within the administration philosophy. Associations utilize probability appraisal to determine the degree of the potential danger and therefore the risk connected with an IT framework at some stage in its SDLC. In the last chapter we pointed out risk alleviation, the additional movement of risk organization, incorporates sorting out, evaluating, and executing the balanced peril diminishing controls proposed from the setback examination handle.