Data Security and Privacy Protection Issues in Cloud Computing Supported by Core Electronic Device, High General Chip and Basic Software program of China: 2011ZX XXXXXXXXXX Supported by National...

1 answer below »
please check the files attached below.


Data Security and Privacy Protection Issues in Cloud Computing Supported by Core Electronic Device, High General Chip and Basic Software program of China: 2011ZX01043-001-001 Supported by National Natural Science Foundation of China: 60803131 Supported by Electronic Information Industry Development Fund Project: "Multi-industries oriented Information Technology Services Knowledge Base System Development." Supported by National basic research program of China (973): 2012CB724107 Data Security and Privacy Protection Issues in Cloud Computing Deyan Chen1 College of Information Science and Engineering Northeastern University1 Shenyang, China Email:[email protected] Hong Zhao1,2 Academy Neusoft Corporation2 Shenyang, China Abstract—It is well-known that cloud computing has many potential advantages and many enterprise applications and data are migrating to public or hybrid cloud. But regarding some business-critical applications, the organizations, especially large enterprises, still wouldn’t move them to cloud. The market size the cloud computing shared is still far behind the one expected. From the consumers’ perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. This paper provides a concise but all-round analysis on data security and privacy protection issues associated with cloud computing across all stages of data life cycle. Then this paper discusses some current solutions. Finally, this paper describes future research work about data security and privacy protection issues in cloud. Keywords-access control; cloud computing; cloud computing security; data segregation; data security; privacy protection. I. INTRODUCTION From initial concept building to current actual deployment, cloud computing is growing more and more mature. Nowadays many organizations, especially Small and Medium Business (SMB) enterprises, are increasingly realizing the benefits by putting their applications and data into the cloud. The adoption of cloud computing may lead to gains in efficiency and effectiveness in developing and deployment and save the cost in purchasing and maintaining the infrastructure. Regarding definition of cloud computing model, the most widely used one is made by NIST as “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.”[1] The cloud computing model NIST defined has three service models and four deployment models. The three service models, also called SPI model, are: Cloud Software as a Service (SaaS), Cloud Platform as a Service (PaaS) and Cloud Infrastructure as a Service (IaaS). The four deployment models are: Private cloud, Community cloud, Public cloud and Hybrid cloud. Compared with the traditional IT model, the cloud computing has many potential advantages. But from the consumers’ perspective, cloud computing security concerns remain a major barrier for the adoption of cloud computing. According to a survey from IDCI in 2009, 74% IT managers and CIOs believed that the primary challenge that hinders them from using cloud computing services is cloud computing security issues [2]. Another survey carried out by Garter in 2009, more than 70% CTOs believed that the primary reason not to use cloud computing services is that there are data security and privacy concerns. Although cloud computing service providers touted the security and reliability of their services, actual deployment of cloud computing services is not as safe and reliable as they claim. In 2009, the major cloud computing vendors successively appeared several accidents. Amazon's Simple Storage Service was interrupted twice in February and July 2009. This accident resulted in some network sites relying on a single type of storage service were forced to a standstill. In March 2009, security vulnerabilities in Google Docs even led to serious leakage of user private information. Google Gmail also appeared a global failure up to 4 hours. It was exposed that there was serious security vulnerability in VMware virtualization software for Mac version in May 2009. People with ulterior motives can take advantage of the vulnerability in the Windows virtual machine on the host Mac to execute malicious code. Microsoft's Azure cloud computing platform also took place a serious outage accident for about 22 hours. Serious security incidents even lead to collapse of cloud computing vendors. As administrators’ misuse leading to loss of 45% user data, cloud storage vendor LinkUp had been forced to close. Security control measures in cloud are similar to ones in traditional IT environment. As multi-tenant characteristic, service delivery models and deploy models of cloud computing, 2012 International Conference on Computer Science and Electronics Engineering 978-0-7695-4647-6/12 $26.00 © 2012 IEEE DOI 10.1109/ICCSEE.2012.193 647 compared with the traditional IT environment, however, cloud computing may face different risks and challenges. Traditional security issues are still present in cloud computing environments. But as enterprise boundaries have been extended to the cloud, traditional security mechanisms are no longer suitable for applications and data in cloud. Due to the openness and multi-tenant characteristic of the cloud, cloud computing is bringing tremendous impact on information security field: (1) Due to dynamic scalability, service abstraction, and location transparency features of cloud computing models, all kinds of applications and data on the cloud platform have no fixed infrastructure and security boundaries. In the event of security breach, it’s difficult to isolate a particular physical resource that has a threat or has been compromised. (2) According to the service delivery models of cloud computing, resources cloud services based on may be owned by multiple providers. As there is a conflict of interest, it is difficult to deploy a unified security measures; (3) As the openness of cloud and sharing virtualized resources by multi-tenant, user data may be accessed by other unauthorized users. (4) As the cloud platform has to deal with massive information storage and to deliver a fast access, cloud security measures have to meet the need of massive information processing. This paper describes data security and privacy protection issues in cloud. This paper is organized as follows: Section II gives a brief description of what exactly cloud computing security-related issues are. Section III discusses data security and privacy protection issues associated with cloud computing across all stages of data life cycle. Section IV shows current solutions for data security and privacy protection issues in cloud. Section V summarizes the contents of this paper. Section VI describes future research work. II. CLOUD COMPUTING SECURITY ISSUSES A. Cloud Computing Security Wikipedia [3] defines Cloud Computing Security as “Cloud computing security (sometimes referred to simply as "cloud security") is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.” Note that cloud computing security referred to here is not cloud-based security software products such as cloud-based anti-virus, anti-spam, anti-DDoS, and so on. B. Security Issues Associated with the Cloud There are many security issues associated with cloud computing and they can be grouped into any number of dimensions. According to Gartner [4], before making a choice of cloud vendors, users should ask the vendors for seven specific safety issues: Privileged user access, regulatory compliance, data location, data segregation, recovery, investigative support and long-term viability. In 2009, Forrester Research Inc. [5] evaluated security and privacy practices of some of the leading cloud providers (such as Salesforce.com, Amazon, Google, and Microsoft) in three major aspects: Security and privacy, compliance, and legal and contractual issues. Cloud Security Alliance (CSA) [6] is gathering solution providers, non-profits and individuals to enter into discussion about the current and future best practices for information assurance in the cloud. The CSA has identified thirteen domains of concerns on cloud computing security [7]. S. Subashini and V. Kavitha made an investigation of cloud computing security issues from the cloud computing service delivery models (SPI model) and give a detailed analysis and assessment method description for each security issue [8]. Mohamed Al Morsy, John Grundy and Ingo Müller explored the cloud computing security issues from different perspectives, including security issues associated with cloud computing architecture, service delivery models, cloud characteristics and cloud stakeholders [9]. Yanpei Chen, Vern Paxson and Randy H. Katz believed that two aspects are to some degree new and essential to cloud: the complexities of multi-party trust considerations, and the ensuing need for mutual auditability. They also point out some new opportunities in cloud computing security [10]. According to the SPI service delivery models, deployment models and essential characteristics of cloud, there are security issues in all aspects of the infrastructure including network level, host level and application level. Figure 1. Cloud computing security architecture III. DATA SECURITY AND PRIVACY PROTECTION ISSUES The content of data security and privacy protection in cloud is similar to that of traditional data security and privacy protection. It is also involved in every stage of the data life cycle. But because of openness and multi-tenant characteristic of the cloud, the content of data security and privacy protection in cloud has its particularities. The concept of privacy is very different in different countries, cultures or jurisdictions. The definition adopted by Organization for Economic Cooperation and Development (OECD) [11] is "any information relating to an identified or 648 identifiable individual (data subject)." Another popular definition provided by the American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants (CICA) in the Generally Accepted Privacy Principles (GAPP) standard is “The rights and obligations of individuals and organizations with respect to the collection, use, retention, and disclosure of personal information.” Generally speaking, privacy is associated with the collection, use, disclosure, storage, and destruction of personal data (or personally identifiable information, PII). Identification of private information depends on the specific
Answered Same DayMar 30, 2021MITS6001

Answer To: Data Security and Privacy Protection Issues in Cloud Computing Supported by Core Electronic Device,...

Kuldeep answered on Apr 01 2021
149 Votes
Article Review
Student Name:
Unit Name:
University Name:
Date:
Contents
Introduction    3
Brief Summary    4
Concerns    6
IFC Designs    6
Weaknesses    7
Foundation    7
Critique    8
Introduction
In this article, the authors examine the viability of easily deploying IFC as a part of the new generation safe cloud infrastructure. T
his article is instructive. The main technical challenges in the cloud safety come from the truths that cloud infrastructure combines heterogeneous software, also the service written by severalteams of development without shared approaches to data safety. As a solution, they believe that data-centric safety mechanisms, for example, data flow control or decentralized IFC (DIFC), are particularly likely to greatly enhance today's approaches to cloud security. Some data-centric safety mechanisms that track or force dataflow moreto get better cloud security in a variety of ways. Firstly, developers can coordinate with the cloud providers or control it to how user data is spread across cloud platforms. This helps to comply with the regulatory framework. Up next, multi-tenancy becomes more protected, because despite the flaws in service itself. Third, tracking information flows across various services provides a way for cloud providers to strictly record sensitive action on tenant data, thereby increasing accountability. The author's goal is to show that although many outstanding challenges can be addressed, the IFC model and implementation can be lead to a practical as well as more secure or safe cloud computing infrastructure. Security issues are broadly seen as obstacles to adopting a cloud computing solution. Also, Information flow management or control is an extremely well-known method of compulsory access control. The old models of IFC were aimed at security in a centralized environment, but often in academic research projects, decentralized forms of Information flow control have been designed as well as implemented. As a result, decentralized IFC may have the best cloud security in comparison to this era. In this article, authors define the characteristics of cloud computing, specifically the platform for a good service cloud, a series of Information flow control (IFC) models is to identify the opportunities to use IFC in the context of the cloud computing. As information flow security is tied to information it protects andboth the tenants and cloud service providers can also agree on the security in a way that doesn't require them torecognize and depend on the details of the software stack to implement.
Brief Summary
Cloud service products are generally it is divided into 3 types of infrastructure as a service: customers directly rent computing resources.
IaaS properties are frequently provided to customers in the form of machines. Security risks may come from administrators.
PaaS: Customers need to develop the applications to using the languages ​​and also service APIs particular by a provider, where the supportive languages ​​are usually the most famous ​​in web development. furthermore, the security methods for the services provided are often highly diverse and often come from the other projects that cannot be redesigned. it makes it too difficult to complete reliable security...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here