Innovations in Computing and Information Technology (Cognition 2015) |
Foundation of Computer Science USA |
COGNITION2015 - Number 1 |
July 2015 |
Authors: Amit Wadhwa, Ruchi Kamra |
19ca6509-30bc-4474-8077-7ef16b6b5baf |
Amit Wadhwa, Ruchi Kamra . Analysing Security Threats and Solutions during Transition to Cloud Environment. Innovations in Computing and Information Technology (Cognition 2015). COGNITION2015, 1 (July 2015), 24-26.
Cloud computing as one and all know is a computing area which has evolved from grid, utility computing, virtualization and SOA. As per the knowledge a cloud based infrastructure is based on certain elements like extended elasticity, [3]metered service, on demand service availability[3], clustered resources and large network access. For providing these services or features it follows certain cloud service adoption models. All these models face some security concerns or the others. In the past many security models[1] are presented by many researchers for resolving them and giving out a better known solution to IT industry adopting cloud. This paper aims at analyzing issues involved with virtualized architecture incurred while cloud migration, figuring out various security measures from varying risk levels and present a refined or distinguished security model or solution based on all those issues discussed throughout the study. Main focus of the analysis carried here is on issues involved while adopting virtualization based infrastructure for moving in cloud, authentication based risks, risks incurred while data migration, attack on VM’s, issues while adopting virtualization, risk generated from malicious insiders are few to be discussed here.