Data security in cloud computing

15 pts.
Tags:
Cloud Computing
Data-security
SSL
Just asking for your favour for the information regarding how the following process mentioned herewith is maintained/implemented in existing Cloud architectures.Whether the following encryption/decryption of hardware related information for security aspects are followed or not YES/No in existing Cloud architectures?
I have developed a proposed solution for the following weakness present in cloud architecture by an encryption program written for encrypting/decrypting the information used for creating following problems of developing a malware. Suppose, attacker gained the control of a cloud system or somehow managed to get the system info somehow. Now she/he is thinking to perform more damage (that means POST attack scenario). As an example, after getting RAM info, Memory info, Data Center Server info (Talking about hardware info, which is generated in rawdata form in Cloud Reports tool ), it is possible to create a permanent backdoor or hardware malware to damage the physical system permanently or to gain access to other systems (I mean, gain in one part and then spreading the malware). To create hardware malware, every single server information is very important, like processing speed, memory up/down phase etc. Also, in a cloud infrastructure there are many phases. Even you can gain access to one part then it is not sure that you can get control to whole Data Center grid. So, some POST attack planning is required to extend to attack scenario. Is SSL client socket and SSL server socket also involved in accessing such hardware information for malware threats?

Software/Hardware used:
Cloudsim tool, Cloud Reports(a gui for cloudsim)

Answer Wiki

Thanks. We'll let you know when a new response is added.

Data security is one of the major concerns while selecting a public cloud network. Specially you are dealing with a mission critical application which handles some highly confidential information. Security of data also depends on your programs and it’s public interfaces.

Discuss This Question:  

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following

Share this item with your network: