International Journal of Engineering Trends and Technology (IJETT) – Volume 6 number 3 - Dec 2013 ISSN: 2231-5381 http://www.ijettjournal.org Page 118 Security Aspects in Cloud Computing Apurva Shitoot 1 , Sanjay Sahu 1 , Rahul Chawda 1 1. School of Information Technology, MATS University, Raipur, C.G, INDIA-493447. Abstract— Cloud computing, sometime known as on-demand computing is one of the newest developments in the computer technology. Security in Cloud computing is a significant and critical aspect, associated with many issues and problems to use or deployment of it. The objective of this research contribution is to focus on various security issues occurs from the usage of Cloud services. As well as to discover probable problems, based on existing researches; finally observe and present appropriate key solution for each problem. Keywords— Cloud Computing, cloud security, public cloud I. INTRODUCTION Cloud computing is a technology that make use of the internet and central remote servers to retain data and applications. Cloud computing permit consumers and company to use applications without installation and access their private files at any computer with internet access. It provides the full scalability, consistency, high performance and comparatively low cost possible solution as compared to devoted infrastructures [1]. This technology let for much more capable computing by compact storage, memory, processing and bandwidth. Many researchers are looking forward to use the cloud approach for many different applications. Since it is a new proposed model and new to the technology world, managing security is still a main issue [2]. II. CLOUD COMPUTING SCENARIO The two most significant influencing elements leading the future uptake of public cloud computing are the accessibility of public cloud infrastructure and the trust put into security and compliance. The public cloud computing infrastructure will need to be available and accessible around the globe. If such an extensive infrastructure is going to be used, enterprises will have to be sure that their data will be safe and compliant. As per as the research papers [3] [4], cloud computing is defined as: The happy cloud scenario is the scenario that most cloud providers are banking on. In this scenario there is a extensively accessible public cloud transportation and it turns out that public cloud is truly more safe and obedient than legacy IT implementations. Business clients will gladly get their IT from the cloud and there will be only some responsibilities missing for the IT department. The patchy cloud scenario is a scenario in which there is a broadly accessible public cloud infrastructure but there are genuine matter around security and compliance. In this scenario, only request that are non important and have no conformity requests will be put into the public cloud. The IT department will make private clouds and will state cloud access. The exclusive cloud is a scenario where there is a partial accessibility of public cloud transportation and public cloud has establish to be more safe and obedient than legacy IT working. In this scenario, the Internet is no longer content neutral and as a result there will be less public cloud transportation. Those that can give it will be able to get it, but at a value. There will be demand for public cloud because of its higher availability and on-demand feature. The blue skies scenario is a scenario where there is a partial accessibility of public cloud transportation and there stay real concern around security and observance. In this scenario, the Internet is no longer content neutral and as a result there will be fewer public cloud transportation. In addition, the custom of the transportation that is there is loaded by security and conformity problems. The IT department will make private clouds and there will be small to no cloud access. III. CLOUD COMPUTING ATTACKS Nowadays most of the companies use cloud computing services for confidential data sharing, many attackers is also trying to breach the security to access cloud resources. Some of the probable attacks that attackers may attempt to damage data are as follows: Denial of Service (DoS) attacks Some security professionals have dispute on that the cloud is more disposed to DoS attacks, since it is shared by various users, which makes DoS attacks much more destructive. When the Cloud Computing operating system observes the high workload on the flooded service, it will start to offer additional computational power (more virtual machines, more service instances) to supervise the additional workload [6]. Hence, the server hardware restrictions for maximum workload to process do no longer hold. In that sense, the Cloud system is annoying to work adjacent to the attacker (by providing additional computational power), but in