International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020
p-ISSN: 2395-0072
www.irjet.net
SECURING CLOUDY CYBERSPACE: AN OVERVIEW OF CRIMES, THREATS AND RISKS SOMPURNA BHADRA PhD scholar, Department of Computer Science and Engineering, Techno India University Kolkata, West Bengal- 700091 ---------------------------------------------------------------------***---------------------------------------------------------------------Abstract:- The present paper gives a general overview of issues confronting cloud computing (CC) which has now become very popular. It is because it allows a novel way of providing computing resources and services to users on internet in view of rapid development of network technology. However, its locale in the cyberspace has been subjected to numerous onslaughts of cybercrime and cloud crimes. This requires inclusion certainly of cyber and information security cultural elements in the framework of cloud threat management in the content of security or control measures. Further, the development of CC in this era of late modernity has added a new dimension in strengthening late modern society into a risk society. All these aspects have addressed in this paper from an interdisciplinary behavioural cyber security perspective. The paper ends optimistically by urging challenging researches on how to prevent and remove uncertainties and uncontrollabilities prevailing in the cybersphere and cloud computing.
Figure 1. Features of Cloud Computing
NIST lists three CC service models. The first one is Software as a Service (SaaS). It is provided by consumers to use the provider’s applications running on a cloud infrastructure which is a collection hardware and software and contain ‘both a physical layer and an abstraction layer. The physical layer consists of the hardware resources that are necessary to support the cloud services being provided, and typically includes server, storage and network components. The abstraction layer consists of the software deployed across the physical layer, which manifests the essential cloud characteristics. Conceptually the abstraction layer sits above the physical layer’. The second one is Platform as a Service (PaaS)which gives the consumer the capability ‘to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider’. Thirdly, in Infrastructure as a Service (IaaS) servicing the consumer is enabled ‘to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications’ [135].The following Figure 2 depicts capability and controllability of the user in the three servicing models [137].Figure 3 show three deployment models.
Key Words: Cloud Computing, Cyberspace, Security Measures, Cyber and Cloud Crimes, Cyber and Information Cultures, Cloud Threats, Risk Society . I. INTRODUCTION: WHAT IS CC? Rapid expansion of internet usage world-wide has made it easier to manage the increasing volume and availability of data through the use of CC. It enables any one to access data from any place in the world via the internet. NIST (The National Institute of Standards and Technology).defines cloud computing as a ‘ model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction’. NIST also enumerates five characteristics CC. 1. On-Demand Self-Service. 2. Broad Network Access.3. Resource Pooling. 4. Rapid Elasticity and 5. Measured Service [135]. The following figure 1, taken from Dataflair Team, exhibits as many as 10 features as shown below [136].
© 2020, IRJET
|
Impact Factor value: 7.34
|
ISO 9001:2008 Certified Journal
|
Page 1900