Survey on Security in Cloud Hosted Service & Self Hosted Services

Abstract

As more and more organizations consider moving their applications and data from dedicated hosting infrastructure, which they own and operate, to shared infrastructure leased from `the cloud', security remains a key sticking point. Tenants of cloud hosting providers have substantially less control over the construction, operation, and auditing of infrastructure they lease than infrastructure they own. Because cloud-hosted infrastructure is shared, attackers can exploit the proximity that comes from becoming a tenant of the same cloud hosting provider. As a result, some have argued that that cloud-hosted infrastructure is inherently less secure than the self-hosted infrastructure, and that it will never be appropriate for high-stakes applications such as health care or financial transaction processing. We strive to present a more balanced treatment of the potential security impacts of transitioning to cloud-hosted infrastructure, surveying both the security costs and security benefits of doing so. The costs include exposure to new threats, some of which are technological, but many others of which are contractual, jurisdictional, and organizational. We also survey potential countermeasures to address these threats, which are also as likely to be contractual or procedural as technological. Transitioning to a cloud-hosted infrastructure may also have security benefits; some security measures have high up-front costs, may become affordable when amortized at cloud scale, and impact threats common to both cloud- and self-hosted infrastructures. Surbhi Khare | Dr. Uday Kumar"Survey on Security in Cloud Hosted Service & Self Hosted Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15941.pdf http://www.ijtsrd.com/computer-science/computer-network/15941/survey-on-security-in-cloud-hosted-service-and-self-hosted-services/surbhi-khare

Authors and Affiliations

Keywords

Related Articles

Peer To Peer File Transfer with Torrent

Peer to peer data transfer received a lot of attention in recent years. A peer-to-peer network allows users to communicate or send data over a network without any server. A peer is any computer client or user. So that it...

A Performance Degradation Tolerance Way Tagged Cache

For an electronic product or chip if functional faults exist, then the product or chip is of no use. Therefore, if we take a cache memory, a secondary memory for high-speed retrieval of data stored where functional fault...

Responding to the Challenges of Living in Peace and Harmony among Female Inmates thru Psycho Education

This study determined effects of the psycho education for aggression of female inmates at Metro Bacolod District Jail, BrgyHandumanan, Bacolod City. Researcher used pretest posttest control group experimental design surv...

Environmental Cost Disclosure and Corporate Performance of Quoted Foods and Beverages Firms in Nigeria

This study determined the effect of Environmental Cost Disclosure and Performance of Quoted foods and beverages firms in Nigeria. Ex post facto research design and content analysis was adapted for the study. Sample size...

FPGA Based Digital Logic Circuits Operation for Beginners

This paper presents the operations of digital circuits based on FPGA. The long term of FPGA is field programmable gate array. FPGA is an integrated circuit designed to be configured by a customer or a designer after manu...

Download PDF file
  • EP ID EP389395
  • DOI -
  • Views 65
  • Downloads 0

How To Cite

(2018). Survey on Security in Cloud Hosted Service & Self Hosted Services. International Journal of Trend in Scientific Research and Development, 2(5), 812-819. https://europub.co.uk/articles/-A-389395