VM based Shared Resource Protecting in Cloud Environment
Abstract. Cloud computing is the prevalent change occurring in the area of data innovation. At present a
significant concern in cloud appropriation is towards its security and protection. In the progression of distributed
computing the application part of virtualization in the long run builds, the extent of the security and protection
steadily extends. The clients profit from cloud innovation for two main considerations that are Data protection
and security. Cloud security conveys all the administrations dependent on clients need-firewalls, URL channels,
sandboxes, SSL assessment, antivirus and the rest in a unified platform. It is an airtight security without the
expense and multifaceted nature of apparatuses which shuts the security holes made by BYOD and portability.
Despite the fact that distributed computing gives security there are some backlogs. The absence of information
excess and consistency guidelines hazards the cloud security.This paper presents the security calculation by
utilizing SRP convention which is a solid confirmation protocol (one-time guess per association endeavor) that
oppose all well-known dynamic and detached assault over the system.
Keywords: cloud computing, cloud severs, SRP, security, authentication, virtual machine
1. Introduction
The major challenges in the cloud computing is categorized into three. They are Data Protection, User
Authentication, Disaster and Data Breach. Data Protection isthe process for implementing the cloud
computing. Here the data is handled to the third parity for providing the enhanced security when it is at
rest as well as during transfer of data. The encryption of data must be done for every and only way to
verify the confidentiality of encryption that belongs to the server storage to manage and own encryption
keys. The next challenge is user authentication which allows only the authorized user to access the data
that are stored in the cloud. It is ensured bymonitoring that who is accessing the company’s data and
also make sure about the probity of user’s authentication. Here the companies should keep track of their
data in the cloud that only the authenticated users alone accessing it by verifying the access logs and
audit trails which are maintained securely by companies for future requirements.
Another challenge is Disaster and Data Breach. If the company is provided with single centralized
storage repository in cloud, then there occur any natural disasters there may be risk of losing of data.
So, the companies should have conscious to store their data with high protectivity and they need to
ensure how the providers are providing such security to the data. When considering cloud computing
providers, a company must address about the inaccessibility of their data, expose of confidentiality of
data and storage of data during natural disasters. Further,companies should have a plan what if these
above-mentioned issues happen or during the cloud provider breakdown.
Cloud computing is delivery of hardware and software services over the internet. It gets updated
regularly with latest technology, more flexible to work, reduces the cost rather than the managing and
maintaining the IT systems. So, in business sectors cloud computing technology is used.In recent years,
nearly 85 percentage of the business sectors are using multiple cloud computing technology. Theusers
mainly try to optimize the cost of the cloud and access their applications at an average of 1.8 public
clouds and 2.3 private clouds. The workloads of the respondents are supervised to run 41 percent in in
public cloud and 38 percent in private cloud in general cases but among the enterprises, the workloads
are done 32 percent in public and 43 percent in private cloud. Further enterprise central IT has enhanced
the percentage of use in cloud as 65 percent in public cloud and choosing the private cloud in 63 percent.
In contrast, respondents in enterprises are less likely to entrust central IT for selecting public clouds for
41 percent, 45 percent of determining which apps move to cloud, and 38 percent in choosing private
clouds.
In this paper, itexamines the problem in cloud and the solution to sort out those issues.The work is
explained as sections. In first two section, it describes about the cloud computing technologies and
varies approaches that are used in this field to enhance their usage with high security of data in cloud.
In the third section, it explains about the features that are involved in propounded systems. In
forthsection, the discussion is made on merits and demerits of cloud computing technology. Section
five exposes some challenges facing in cloud, its existing solutions and implementation of the
innovation. At last, it is concluded with future work that need to be done in this are for enhancing the
technology.
2. Background work
The proposed system, a secured communication is provided between the data owner and user a security
algorithm with SRP protocol is used. Secure Remote Protocol (SRP) is a Password-authenticated Key
agreement (PAKE), mainly designed to work around copyrights. This protocol is used for authentication
purpose, when an user need to access the data, verification must be done on the user by providing the
password. SRP is used to keep the password secured from the hackers. The SRP is the most secured
medium where no one can break the security by guessing the password even though the active and
passive techniques are used. In SRP that provide security that allows user to attempt the wrong password
only once. SRP has number of desirable properties, one among them is, even one or two cryptographic
primitives are used for breaking the information it is still secured.
The concept of cloud computing technology is said to be prolonged due to the following capabilities:
2.1. Serverless Computing
Serverless computing gaining importance these years because in cloud all the services are provide
through internets. So, there is no need of large number of machines. it will save cost of infrastructure
and operation.Amazon, IBM, Microsoft use serverless computing technology and also called as cloud
service providers.
2.2. Providers to Focus on Long-term Customer Success
The cloud owners’ challenges have been reduced. So, they focus on the customers’ requirements
and provide them the requiring product services. And it made more versatile for everyone. They
also provide combined services for easy working to produce maximum productivity. Security
among the transactions in reliability and transparency has been enhanced which improves the
customers support.
2.3. Cloud Monitoring as a Service
The enterprises use cloud monitoring as a service (CMaS) used to oversee their resource and
infrastructure which leads to:
1) End-to-end monitoring: monitoring the resources and infrastructure of the cloud continuously.
2) providing optimal performance for the IT infrastructure
3) Any fault occurs in infrastructure or cloud, they are identifying instantly and rectified by the
cloud admin.
2.4. The Multi-Vendor Approach
it uses both public and private clouds, so the enterprises have shifted to the multi-vendor approach. it is
indispensable to follow a particular solution.
2.5. Securing and Auditing Services
when enterprises move the data between clouds it can be hacked so they try to safeguard their
data from being hacked. according tothe General Data Protection Regulation (GDPR), integrating
and enhancing the data protection is very essential. the data governance policy is handed over during
the auditing policy.