Secure Cloud Computing

Page 1

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

Secure Cloud Computing

Harshada Shrikant Desai1 , Arati Sunil Kasurde2, Dr.S.P. Jadhav3, Asst.prof.S.S. Jadhav4

1stHarshada Shrikant Desai, MCA YTC, Satara 2ndArati Sunil Kasurde, MCA YTC Satara

3rd Dr S P. Jadhav,4 Prof.S S. Jadhav Dept. of MCA Yashoda Technical Campus, Satara-415003 ***

ABSTRACT- Itisnothingbutwaytodelivercomputing sourceinCloudComputing.Itrangesfromdatastorage andprocessingtosoftwarei.e.,customerrelationship managementsystems,whichisavailableinstantlyand indemand.

Manipulation,configurationandaccessingisreferedby

Cloud Computing h/w & s/w source monitor. Online datastorage,infrastructureandapplicationisoffered by it. In this research paper the researcher has discussed about the introduction part of the cloud computing, types of cloudcomputing. Aresearch has alsofocusonBenefitslimitationandfutureworkingof the cloud computing. In overall conceptual are discussion of cloud computing with the research has alsofocusesinfuturedevelopment.

1. INTRODUCTION

A social media is the depending with the cloud computing. cloud computing isimple line meaning is transportofthecomputingwiththeservice.

TypesofCloudComputingareasfollows:  Infrastructureasaservice(IaaS)

Platformasaservice(PaaS)

Softwareasaservice(SaaS)

Cloudcomputingcaninteractswithnetworksit’srules andregulations whichisjoinedtoitsrole.So,tostart withthe,wehavealreadylistentheassetofknowingto codeforcloudcomputing.

1.1

. What are Cloud Computing Security?

Collection of security measures are designed to securecloud-basedinfrastructure,dataandapplication. The other name of Cloud Computing security is collectionofsecuritymeasures.Theabovewaysassure useranddeviceverification.Intoday’serathereishigh demandtoworkinCloudComputingfield.

1.1. Use of Cloud Computing:

CC allows to the access file, resources, data, files wheneverwearenotconnectedtonetworkthecloud computingisallowstoaccesstotheirnetworkwiththe helpofinternet.

1.2. Types of cloud Computing:

Commonlyusingthecloudcomputingusecases:

IaaS

1]IaaS:IaaSisnothingbuttheh/wasaservice.the access are in many clients and source internet used withonlinepayingSystem.Iaasisusingthreetypesof thecloudfirstisthepublicsecondisprivateandthird one is hybrid cloud. The cloud computingis used for helps to changing clients in the requirements and services.

2]PaaS:itisthepurchaseonlinemodeforavailable in this platform. This platform as a service in cloud serviceprovider.thisisthedevelopingthedeveloper platform application. there are many languages is availableinthislikeajava,php,perlandsoon.

3]SaaS: this application stands for software as a service. This application is also known as the requirement for software. and also, customer with relationship is the management system making a electronicdevices.

2. 7 CASES IN CLOUD COMPUTING:

1. InfrastructureasaService(IaaS)

PlatformasaService(PaaS)

SoftwareasaService(SaaS)

Hybridcloudandmulticloud

Testanddevelopment

ReachRobotics

Bigdataanalytics.

©
| Page1314
2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal
 PaaS  SaaS
5.
2.
3.
4.
6.
7.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

3. APPLICATION IN CLOUD COMPUTING AND DIIFERENT SECTORS:

i]

Online data Storage:

Thecloudcomputingisnothingbuttheaccessingthe varioussourcefilehugeamountofdataandfilesfrom withhelpofonlinedatastoragesystem.

Childrenloveinteractingwithinternethandlingwith them, and people are seeing excellent results in happiness and communication skills for children and studentslearningdifficultieswiththehelpofisvideos andaudiosfromdevices.

ii] Backup and recovery:

Thecloudcomputingisexampleofthedatabackupand restorage recover data in system with help of cloud computing.

Fore.g.:WhatsApp,Instagramandsoonlikewise

iii] big data analysis: -

Most important part of application in cloud computinginnetworkthehugeamountofdataorbig datacanbeimpossibletosaveorstoreinthesystem with help of cloud computing wecan easily save our dataincloudcomputing.

iv] Testing and Development: -

The cloud computing is provided for easy and time consuming for the resources and also this is used in businessesandflexibleservicesofbusiness.

v] Antivirus Application:antivirusapplicationisnothingbutthemonitoringto system virus and antivirus system such like as the malware,detectsthesecuritythreatsinthenetworking.

vi] E-commerce Application:e-commerceisthenewtechnologytoresponsequick opportunities to connecting with the e-commerce system.

vi]

Cloud computing in Education:-

the cloud computing is the best way to learning virtuallysourceforthestudent.Therearemanysources to learn educational things from various cloud computingplatforms

Example: Children making android application to learn from the virtual applications like as zoom meeting,Vedantuappetc.

4.

ADVANTAGES OF CLOUD COMPUTING

Backupandrestoredata

improvecollaboration.

ExcellentAccessibility.

Lowmaintenancecost

Mobility

Iservicesinthepaperusemodule

Unlimitedstoragecapacity.

Datasecurity

DISADVANTAGES OF SOCIAL CLOUD COMPUTING:

5.

internetconnectivity.

vendorlock-in

limitedcontrol.

security.

IMPORTANCE AND NEEDS OF CLOUD COMPUTING:

6.

-

Cloud computing are enables with users to accesssystemusingawebbrowserregardless of location or what device they used for example:computerandroidmobilesareaccess vianetwork.Usercanconnecttothenetwork fromanywhereandanyplace.

Cloudcomputingisabasedservicethatcan bemeetindemandinstantly.

7 IMPACTS OF CLOUD COMPUTING IN EVERYDAY LIFE:

i]Positive Impacts:

thecloudcomputingisthechangingour livesinmanywaysfromsocialmediashopping, streamingservicesandstoringthefiles

Positive impact in everyday life such as banking,email,mediaetc.

Itiscommittedforthedescribedwithdirectly tothetechnology.

Cloudservicesalsobeingwithuseofsupportis nothingbuttheimpact.

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal |

Page1315

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

ii] Negative Impacts:

i] Humans are depend on the fully socially in cloudcomputingandthatcasemanylossfaces inlife.

10.REFERENCES

[1]GlobalEnvironmentforNetworkInnovations. http://www.geni.net,2006.

ii]Safedataisunsecureinthecloudcomputing platform.Forexample:Instagram,WhatsApp 

iii]CloudlikeistheanyotherITsetupthereare many problems and experience of technical with the problems faces. that can directly impact on damaging business e.g., reboots, network,downtime

8. FUTURE CHALLENGES:

CCismainlyusedandhasbecomeforpopularlatest in market. The cloud computing is nothing but the circulateonpremisesincomputingtotheinternet.

i]security:therearethebestconcernininvolvingcloud computingservicewiththesecurity.

ii]password security: many peoples access your accountbyvulnerablemethod,moreimportantabout yourpasswordsecurity.

iii] cost management: cloud computing access in applicationtosaveormanageinyourpostandmakes affordable.

iv]lackofexpertise:lackofincreasingtheworkloadfor the cloud technology increasing continuously improvingtheirtoolsintechnologies.

V] internet connectivity: the internet connectivity is partofcloudcomputing.thecloudservicesaredepend ontheinternetconnectivity,therearemanynetwork issues.

9. CONCLUSION:

Security is a big problem in CC. This needs to be overcomebeforeservicescanbewidelyadopted.Some aspectsofsecurityarerarelyinthefieldoftechnology, with external solutions, such as laws, regulations in human resource management and the like, it is importanttofindtechnologicalsolutionstoproblems.It offerseffectiveisolationbetweendifferentclientswhile allowing resource sharing. Users can specify and managetheirpersonalsecurityandQoSpolicysettings justastheywouldtraditionalon-sitemanagement

[2]M. Caesar,D. Caldwell, N. Feamster, J.Rexford,A. Shaikh, and J. van der Merwe, Design and Implementation of a Routing Control Platform. In Networked Systems Design and Implementation,2005.

[3] M. Armbrust et al, Above the Clouds: A Berkeley ViewofCloudComputing. http://www.eecs.berkeley.edu,2009.

[4] Dark Reading, Security is chief obstacle to cloud computingadoption,studysays, http://www.darkreading.com

[5] Network World, are security issues delaying adoptionofcloudcomputing? http://www.networkworld.com

[6] D. A. Joseph, A. Tawakoni, and I. Stoica, A Policyaware Switching Layer for Data Centers. In ACM SIGCOMM,2008.

[7]T.Lakshman,T.Nandagopal,R.Ramjee,K.Sabnani, and T. Woo, The SoftRouter Architecture. In ACM HOTNETS,2004.

[8] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, Openflow: Enabling innovation in campus networks. http://www.openflowswitch.org,2008.

[9]JuniperNetworks,LogicalRouterOverview. http://www.juniper.net.

[10]TheInvisibleThingsLab’sblog, http://theinvisiblethings.blogspot.com.

[11]Z.Wang,andX.Jiang,HyperSafe,aLightweight

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page1316

Turn static files into dynamic content formats.

Create a flipbook