Cloud computing security (sometimes referred to simply as "cloud security") is an evolving sub- domain of Computer security, Network security and, more broadly, Information security It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. Cloud security is not to be confused with security software offerings that are "cloud-based" (a.k.a. security-as-a-service).There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software, platform, or infrastructure as a service via the cloud) and security issues faced by their customers. In most cases, the provider must ensure that their infrastructure is secure and that their clients' data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information. The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service. Virtualization alters the relationship between the OS and underlying hardware - be it computing, storage or even networking. This introduces an additional layer - virtualization - that itself must be properly configured, managed and secured .Specific concerns include the potential to compromise the virtualization software, or "hyper visor". While these concerns are largely theoretical, they do exist. Cloud computing offers great potential to improve productivity and reduce costs, but at the same time it possesses many security risks. In this paper we identify the possible security attacks on clouds including: Denial of Service attack, Authentication attack Man-in-the Middle attack, Wrapping attacks, Malware-Injection attacks, Flooding attacks, Browser attacks, and also Accountability checking problems. We identify the root causes of these attacks and propose specific solutions. In this paper, the authors discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, the authors discuss a scheme for secure third party publications of documents in a cloud. Next, the paper will converse secure federated query processing with map Reduce and Hardtop, and discuss the use of secure co-processors for cloud computing. Finally, the authors discuss XACML implementation for Hardtop and discuss their beliefs that building trusted applications from untrusted components will be a major aspect of secure cloud computing. Keywords : Accountability, Authentication attacks, Computer security, Cloud Computing, Flooding attacks, Hypervisor, Virtualization, Wrapping attacks, Browser attacks, secure clouds.
[1]
Elisa Bertino,et al.
Selective and authentic third-party distribution of XML documents
,
2004,
IEEE Transactions on Knowledge and Data Engineering.
[2]
Elisa Bertino,et al.
Protection and administration of XML data sources
,
2002,
Data Knowl. Eng..
[3]
Kevin W. Hamlen,et al.
Aspect-oriented in-lined reference monitors
,
2008,
PLAS '08.
[4]
Elisa Bertino,et al.
Access control for XML documents and data
,
2004,
Inf. Secur. Tech. Rep..
[5]
Kevin W. Hamlen,et al.
Certified In-lined Reference Monitoring on .NET
,
2006,
PLAS '06.
[6]
Christopher Olston,et al.
Building a HighLevel Dataflow System on top of MapReduce: The Pig Experience
,
2009,
Proc. VLDB Endow..
[7]
Scott Moore,et al.
ActionScript bytecode verification with co-logic programming
,
2009,
PLAS '09.
[8]
J. Pettigrew,et al.
The neurophysiology of binocular vision.
,
1972,
Scientific American.
[9]
Yuji Iwahori,et al.
Application Of Fuzzy Theory To Writer Recognition Of Chinese Characters
,
1998
.