The Era of Cloud Computing
Issues In Cloud Computing And Recommended Solutions
Virtualization security issues
Issues
Virtualization of network controllers allows users to combine their networking hardware resources and run multiple virtual machines concurrently on consolidated hardware. Virtualization also provides the user a rich set of features such as I/O sharing, consolidation, isolation and migration, and simplified management with provisions for teaming and failover. Virtualization is not restricted to large enterprises. The Hypervisor sits between hardware and the operating system. Virtualization allows multiple operating systems and applications. Server virtualization, especially when coupled with blade technology, increases computing and storage density while making IT assets more flexible. Virtualization is one of the important component of the cloud computing. It provides an illusion of something like virtual computer, storage device, and network, hardware platform resources.We tried to solve some security issues with their possible solutions, which can be described as:
1. A Cross Virtual Machine Side-Channel Attacks: In this attacker attack through side-channel. Through the channel information get leaked by stealing the cryptographic key.
Possible Solution: For security of the key if substitution method is applied in the key with two level securities like generate the OTP (One Time Password).
2. VM Image Sharing: - In this, threat is inside the image and forward it to others. By this act data can be leaked or it harm in many ways.
Possible Solution: While sharing any image in the network be alert as a sender and provide some security features like apply some cryptographic techniques in encapsulate the image in the form of text and then share it.
3. VM (Virtual machine) Isolation: In this single machine contains more than one virtual machine has its own guest operating system. If one operating system get fails other start work.
Possible Solution: Each VM in a single system has secured independently by anti-virus, so that by sharing hardware resources of the system.
4. VM Escape:-In this VMM (virtual machine manager) manages the data malicious user escape from the manager from which it directly communicate with the host operating system.
Possible Solution: Whenever any unauthorized user try to interact with the host operating system the alarm generate to the manager in the form of pop-up message.
5. VM Migration: - Virtual machine migration is the task of moving a virtual machine from one physical hardware surroundings to another. It is part of administration hardware virtualization systems and is something that providers look at as they offer virtualization services. Virtual machine migration is also known as teleportation.
Possible Solution: In this solution provides security at each level and when virtual machine migration is in process rest all process should not be idle inside the machine so that attacker must not be benefited.
6. VM Rollback:-This process gives more flexibility to the user. When VM rollback to the previous state but the state is not static, so when user gives the command of rollback they disable the previous state.
Possible Solution: In this always check the previous state if it is correct, so try to validate the state.
7. Hypervisor Issues: - Hypervisor or VMM (virtual machine monitor) hardware that creates and runs VM. The hypervisor run on host and having guest operating system. It manages the execution of the operating system and assigning the resources.
Possible Solution: Each VMM of the host must have some secure cryptographic techniques so the attacker should not get benefited.
After making system virtualized now the next step is process with cloud computing. On working with various types of cloud as discussed above, here are some of the issues that can be noticed and we tried to propose some of the best solutions that can be implemented to resolve them in a better way.
Cloud Computing Issues and challenges
In cloud computing security is a wide topic to discuss. It is combination of technologies and policies to protect the data, services and infrastructure. This mixture is an objective of all possible attacks. There is plethora of issues and challenges on cloud computing, one most important is reliability on new technology, dependency on cloud services, selecting perfect cloud setup, hacking of brand, recovery of lost data, transparency of service provider and many more. But here we have done research and are working on some issues provided possible solutions which are implemented. On some issues we are trying to get the desired outcome. Furthermore new possible solutions required in cloud computing which can protect the data in an efficient manner. Some issues facing by the cloud computing are as the following:1. Data security
2. Malicious Insider
3. Denial of Service
4. Service Hijacking
5. Data Location
Table1: Issues of cloud computing with the possible solutions
S. No. |
Issues |
Problem |
Possible Solution |
1. |
Virtual Machine |
|
Generate OTP (One Time Password) or alarm can be created. Pop-up message can be generated. Other process of the machine should not be idle. |
2. |
VM (Virtual Machine) Isolation |
|
Anti-virus must be installed on the each machine where operation is performed. |
3. |
VM (Virtual Machine) Migration |
|
Apply some cryptographic techniques. |
4. |
Data Security |
|
Apply encryption techniques. Tokenization method can be applied. |
5. |
Malicious Insider |
|
Implement the password protection on the instance of cloud provider. |
6. |
Denial of service |
|
Alert generate on the dashboard. Mail can be sent to authorized person and service on server stops automatically. |
7. |
Service Hijacking |
|
Use IAM service of the cloud to assign the policy to every user with the limitation in access the services. Another method MFA is another service of the cloud. |
8. |
Data Location |
|
Apply some encryption technique like SSL (Secure Socket Layer) |
While trying to solve these issues, some of the challenges are generated this can be explained as:
2.2 Cloud computing challenges are as follows:
1. Security
2. Managing cloud Spending
3. Lack of resources
4. Migration
5. Vendor lock-in
Detailed descriptions of challenges with their recommended solutions are given in table 2.
S. No. |
Challenges |
Problem |
Possible Solution |
1. |
Security |
|
Cloud flare prevents from DDoS attack and provides security |
2. |
Managing Cloud Spending |
|
For example cloud health is one of the cloud provider which provides cloud services |
3. |
Lack of resources |
|
Higher the skilled workers |
4. |
Migration |
|
SMS (Server Migration Service) is an agent less service which makes easier and faster. |
5. |
Vendor lock- in |
|
Image of an instance which is launch on cloud provider |
Table 2:-Challenges of cloud computing and their possible solutions
IV Present Scenario Of Cloud
There are different cloud providers for example in public, cloud provider such as Amazon AWS, Microsoft Azure and GCP (Google Cloud provider), private has VMware cloud provider and Hybrid cloudcontains different cloud provider which uses these cloud for their self network and open for public use also like IBM, AWS and Azure. If machine learning, data mining, deep learning with cloud computing is used then there will be more applications. The cloud computing has many applications in different services of cloud like it offers:1. It provides scalable resources.They move to migrate from in-house data centers to cloud without having to spend in setup and preservation of costly transportation.
2. Chatbots can offer modify solution, messages through cloud provider. Siri, Alexa and Google Assistant are all cloud-based natural-language bright bots.
3. For communication cloud uses dissimilar application like skype, whatsApp. In view of efficiency concern, office tools like Microsoft Office 365 are used.
4. For business management applications like customer relationship management (CRM) and enterprise resource planning (ERP) are based on a cloud service provider. Salesforce, Hubspot, Marketo are all relevance of cloud.
5. In Social Media the most accepted and hidden purpose of cloud computing are Facebook, LinkedIn, MySpace, Twitter, and lots of other sites use cloud computing.
6. Cloud computing enables data scientists to strike into any managerial data to investigate it for patterns and insights, find future crisis and help in data backed judgment making. Hadoop,Cassandra, is one of the gears used in cloud computing.
7. The cloud can provide an environment to cut operating cost and launch the apps in the market faster. LoadStorm and Blaze Meter are accepted testing tools.
8. The cloud also provides more elasticity in the sense that client can have large storage and on-demand backups. Drop box, Google Drive and Amazon S3 are stylish examples of cloud backup solutions.
9. This can rapidity and simplify the development process. Amazon Lumberyard is a popular mobile game development instrument used in the cloud.
10. Serverless cloud computing presents the chance for researchers in cloud computing from a new viewpoint, interoperability, optimization, virtualization management, fault tolerance, simulation and a lot more.