2
Most read
8
Most read
9
Most read
Yateesh Avula
(@yatee15)
What is Cloud Computing?
 Cloud is Common
Location –independent
Online
Utility
available on Demand Services.
 Cloud computing means "a type of Internet-based computing," where different services — such as
servers, storage and applications —are delivered to an organization's computers and devices through the
internet.
 Cloud computing is the broader concept of converged infrastructure and shared services.
 It not just promises cheaper IT, but also faster, easier, more flexible and more effective IT.
 It is also versatile and flexible application of internet.
 This are fully managed by the cloud provider; the consumer requires only a computer and internet
access.
Clouds can be classified as public, private or hybrid.
Private Cloud (Low Security Risk):
> Typically owned by the respective Enterprise.
> Functionalities are not directly exposed to customers.
Public Cloud ( More Security Risk ):
> Enterprises may use Cloud functionalities from others .
> Scope of functionalities may differ.
Hybrid Cloud ( High Security Risk ):
> Mixed employment of private & Public cloud.
> Provide highly customized, enhanced offerings to local companies &
world class application
Deployment TypeDeployment Type
Cloud Computing Security Challenges
Locations & ServicesLocations & Services
 PaaS as well as SaaS are hosted on top of IaaS; thus, any breach in IaaS will impact the security of both
PaaS and SaaS services.
 PaaS offers a platform to build and deploy SaaS applications, which increases the security dependency
between them.
 These relationships and dependencies between cloud models may also be a source of security risks.
 A SaaS provider may rent a development environment from a PaaS provider, which might also rent an
infrastructure from an IaaS provider.
 Each provider is responsible for securing his own services, which may result in an inconsistent
combination of security models.
 It also creates confusion over which service provider is responsible once an attack happens.
Cloud computing security challenges fall into three broad categories:
Data Protection
> Securing your data both at rest and in transit.
User Authentication
> Limiting access to data and monitoring who accesses the data.
Disaster and Data Breach
> Contingency Planning.
 Data breaches:
> It is an incident in which sensitive, protected or confidential data has potentially been
viewed, stolen or used by an individual unauthorized.
 Data loss:
> Valuable data disappear into the ether without a trace.
 Account or service traffic hijacking:
> An attacker gains access to your account, he or she can eavesdrop on your activities and
redirect your clients to illegitimate sites.
 Insecure interfaces and APIs:
> Cloud computing providers expose a set of software interfaces or APIs that customers use to
manage and interact with cloud services.
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
 Denial of service:
> DoS outages can cost service providers customers and prove pricey to customers who
are billed based on disk space consumed.
 Malicious insiders:
> It can be a current or former employee, a contractor, or a business partner who gains
access to a network, system, or data for malicious purposes.
 Cloud abuse:
> A bad guy using a cloud service to break an encryption key which is too difficult to
crack on a standard computer.
 Shared technology vulnerabilities:
> Cloud service providers share infrastructure, platforms, and applications to deliver their
services in a scalable way.
Cont……Cont……
How to ensure Users that bothHow to ensure Users that both
Data and Code are safe ?Data and Code are safe ?
 Very hard for the customers to actually verify the currently implemented security
practices and initiatives of a cloud computing service provider because the customer
generally has no access to the provider’s facility which can be comprised of multiple
facilities spread around the globe.
Solution:
 Provider should get some standard certificates from some governing institution that
ensure users that provider has established adequate internal control and these control
are operating efficiently.
ConclusionConclusion
Cloud computing can be seen as a new phenomenon which is set to
revolutionise the way we use the Internet, there is much to be cautious about.
There are many new technologies emerging at a rapid rate, each with
technological advancements and with the potential of making human’s lives
easier. However, one must be very careful to understand the security risks and
challenges posed in utilizing these technologies.
Cloud Computing Security Challenges

More Related Content

PPT
Security Issues of Cloud Computing
PPTX
Cloud computing security issues and challenges
PPTX
Cloud computing and data security
PPTX
Data security in cloud computing
PDF
Cloud Security: A New Perspective
PPTX
Cloud Computing Security
PPTX
Cloud security ppt
PPT
Cloud Security
Security Issues of Cloud Computing
Cloud computing security issues and challenges
Cloud computing and data security
Data security in cloud computing
Cloud Security: A New Perspective
Cloud Computing Security
Cloud security ppt
Cloud Security

What's hot (20)

PPTX
Cloud Security
PPTX
Cloud sim
PPT
Unit 4 -Cloud Computing and security
PPTX
Load balancing in cloud
PPTX
Cloud security
PDF
Cloud computing system models for distributed and cloud computing
PDF
Cloud Computing Architecture
PDF
CS8791 Cloud Computing - Question Bank
PDF
Evolution of Cloud Computing
PPTX
Virtual machine security
PPTX
SHA- Secure hashing algorithm
PPT
Unit 4
PPT
Unit 3 -Data storage and cloud computing
PDF
Cloud Security, Standards and Applications
PPTX
Data-Intensive Technologies for Cloud Computing
PPTX
NIST Cloud Computing Reference Architecture
PPT
Evolution of the cloud
PPT
Issues in cloud computing
PPTX
Cloud security and security architecture
Cloud Security
Cloud sim
Unit 4 -Cloud Computing and security
Load balancing in cloud
Cloud security
Cloud computing system models for distributed and cloud computing
Cloud Computing Architecture
CS8791 Cloud Computing - Question Bank
Evolution of Cloud Computing
Virtual machine security
SHA- Secure hashing algorithm
Unit 4
Unit 3 -Data storage and cloud computing
Cloud Security, Standards and Applications
Data-Intensive Technologies for Cloud Computing
NIST Cloud Computing Reference Architecture
Evolution of the cloud
Issues in cloud computing
Cloud security and security architecture
Ad

Viewers also liked (20)

PDF
Presentation cloud security the grand challenge
PDF
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
PPTX
5 Ways To Fight A DDoS Attack
PPTX
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
PPTX
The Cloud: Privacy and Forensics
PPTX
Security challenges of cloud computing
PPTX
IoT DDoS Attacks: the stakes have changed
PDF
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
PPSX
The security of SAAS and private cloud
PPTX
Cloud computing security & forensics (manu)
PDF
Trying to bottle the cloud forensic challenges with cloud computing
PPSX
Cloud Forensics
PDF
2017 03-01-forensics 1488330715
PDF
(130928) #fitalk cloud storage forensics - dropbox
PPTX
IoT Security: Cases and Methods
PDF
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics
DOC
Cloud security
PPTX
How IoT Is Breaking The Internet
PDF
Assessing the Security of Cloud SaaS Solutions
PPT
Cloud computing-security-issues
Presentation cloud security the grand challenge
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
5 Ways To Fight A DDoS Attack
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
The Cloud: Privacy and Forensics
Security challenges of cloud computing
IoT DDoS Attacks: the stakes have changed
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
The security of SAAS and private cloud
Cloud computing security & forensics (manu)
Trying to bottle the cloud forensic challenges with cloud computing
Cloud Forensics
2017 03-01-forensics 1488330715
(130928) #fitalk cloud storage forensics - dropbox
IoT Security: Cases and Methods
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics
Cloud security
How IoT Is Breaking The Internet
Assessing the Security of Cloud SaaS Solutions
Cloud computing-security-issues
Ad

Similar to Cloud Computing Security Challenges (20)

PDF
An Overview on Security Issues in Cloud Computing
PDF
Cloud Security - Emerging Facets and Frontiers
PDF
G0314043
PDF
Lecture27 cc-security2
PPTX
cloud computing security in intenet.pptx
DOCX
UNIT -V.docx
PPT
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
PDF
A Comparative Review on Data Security Challenges in Cloud Computing
PDF
Various Security Issues and their Remedies in Cloud Computing
PDF
Review on Security Techniques using Cloud Computing
PPT
Presentation copy
PPT
Cloud computing..
PDF
Security Issues in Cloud Computing by rahul abhishek
PDF
A survey on data security in cloud computing issues and mitigation techniques
PDF
Literature Review: Security on cloud computing
PPT
Securing Apps & Data in the Cloud by Spyders & Netskope
PPTX
security_and_privacy_in_cloud_computing (1).pptx
PPT
4831586.ppt
PPTX
Cloud computing
PDF
Iaetsd cloud computing and security challenges
An Overview on Security Issues in Cloud Computing
Cloud Security - Emerging Facets and Frontiers
G0314043
Lecture27 cc-security2
cloud computing security in intenet.pptx
UNIT -V.docx
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
A Comparative Review on Data Security Challenges in Cloud Computing
Various Security Issues and their Remedies in Cloud Computing
Review on Security Techniques using Cloud Computing
Presentation copy
Cloud computing..
Security Issues in Cloud Computing by rahul abhishek
A survey on data security in cloud computing issues and mitigation techniques
Literature Review: Security on cloud computing
Securing Apps & Data in the Cloud by Spyders & Netskope
security_and_privacy_in_cloud_computing (1).pptx
4831586.ppt
Cloud computing
Iaetsd cloud computing and security challenges

More from Yateesh Yadav (8)

DOC
My life
PPT
Digital India
PPT
ANN Based SVC Switching at Distribution Level for Minimal Injected Harmonics
PPT
Friendship
PPT
Child labour
PPT
Road power generation
PPT
PPT
ann based svc switching at distribution level for minimal injected harmonics
My life
Digital India
ANN Based SVC Switching at Distribution Level for Minimal Injected Harmonics
Friendship
Child labour
Road power generation
ann based svc switching at distribution level for minimal injected harmonics

Recently uploaded (20)

PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PDF
Present and Future of Systems Engineering: Air Combat Systems
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PPT
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
PDF
Cryptography and Network Security-Module-I.pdf
PDF
Principles of operation, construction, theory, advantages and disadvantages, ...
PPT
Programmable Logic Controller PLC and Industrial Automation
DOCX
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
PPTX
CT Generations and Image Reconstruction methods
PDF
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PDF
Design of Material Handling Equipment Lecture Note
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
PDF
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
PPTX
Unit_1_introduction to surveying for diploma.pptx
PDF
Beginners-Guide-to-Artificial-Intelligence.pdf
PPTX
AI-Reporting for Emerging Technologies(BS Computer Engineering)
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PPTX
Agentic Artificial Intelligence (Agentic AI).pptx
distributed database system" (DDBS) is often used to refer to both the distri...
Present and Future of Systems Engineering: Air Combat Systems
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
Cryptography and Network Security-Module-I.pdf
Principles of operation, construction, theory, advantages and disadvantages, ...
Programmable Logic Controller PLC and Industrial Automation
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
CT Generations and Image Reconstruction methods
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
20250617 - IR - Global Guide for HR - 51 pages.pdf
Design of Material Handling Equipment Lecture Note
Management Information system : MIS-e-Business Systems.pptx
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
Unit_1_introduction to surveying for diploma.pptx
Beginners-Guide-to-Artificial-Intelligence.pdf
AI-Reporting for Emerging Technologies(BS Computer Engineering)
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Agentic Artificial Intelligence (Agentic AI).pptx

Cloud Computing Security Challenges

  • 2. What is Cloud Computing?  Cloud is Common Location –independent Online Utility available on Demand Services.  Cloud computing means "a type of Internet-based computing," where different services — such as servers, storage and applications —are delivered to an organization's computers and devices through the internet.  Cloud computing is the broader concept of converged infrastructure and shared services.  It not just promises cheaper IT, but also faster, easier, more flexible and more effective IT.  It is also versatile and flexible application of internet.  This are fully managed by the cloud provider; the consumer requires only a computer and internet access.
  • 3. Clouds can be classified as public, private or hybrid. Private Cloud (Low Security Risk): > Typically owned by the respective Enterprise. > Functionalities are not directly exposed to customers. Public Cloud ( More Security Risk ): > Enterprises may use Cloud functionalities from others . > Scope of functionalities may differ. Hybrid Cloud ( High Security Risk ): > Mixed employment of private & Public cloud. > Provide highly customized, enhanced offerings to local companies & world class application Deployment TypeDeployment Type
  • 6.  PaaS as well as SaaS are hosted on top of IaaS; thus, any breach in IaaS will impact the security of both PaaS and SaaS services.  PaaS offers a platform to build and deploy SaaS applications, which increases the security dependency between them.  These relationships and dependencies between cloud models may also be a source of security risks.  A SaaS provider may rent a development environment from a PaaS provider, which might also rent an infrastructure from an IaaS provider.  Each provider is responsible for securing his own services, which may result in an inconsistent combination of security models.  It also creates confusion over which service provider is responsible once an attack happens.
  • 7. Cloud computing security challenges fall into three broad categories: Data Protection > Securing your data both at rest and in transit. User Authentication > Limiting access to data and monitoring who accesses the data. Disaster and Data Breach > Contingency Planning.
  • 8.  Data breaches: > It is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized.  Data loss: > Valuable data disappear into the ether without a trace.  Account or service traffic hijacking: > An attacker gains access to your account, he or she can eavesdrop on your activities and redirect your clients to illegitimate sites.  Insecure interfaces and APIs: > Cloud computing providers expose a set of software interfaces or APIs that customers use to manage and interact with cloud services. SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
  • 9.  Denial of service: > DoS outages can cost service providers customers and prove pricey to customers who are billed based on disk space consumed.  Malicious insiders: > It can be a current or former employee, a contractor, or a business partner who gains access to a network, system, or data for malicious purposes.  Cloud abuse: > A bad guy using a cloud service to break an encryption key which is too difficult to crack on a standard computer.  Shared technology vulnerabilities: > Cloud service providers share infrastructure, platforms, and applications to deliver their services in a scalable way. Cont……Cont……
  • 10. How to ensure Users that bothHow to ensure Users that both Data and Code are safe ?Data and Code are safe ?  Very hard for the customers to actually verify the currently implemented security practices and initiatives of a cloud computing service provider because the customer generally has no access to the provider’s facility which can be comprised of multiple facilities spread around the globe. Solution:  Provider should get some standard certificates from some governing institution that ensure users that provider has established adequate internal control and these control are operating efficiently.
  • 11. ConclusionConclusion Cloud computing can be seen as a new phenomenon which is set to revolutionise the way we use the Internet, there is much to be cautious about. There are many new technologies emerging at a rapid rate, each with technological advancements and with the potential of making human’s lives easier. However, one must be very careful to understand the security risks and challenges posed in utilizing these technologies.