Cloud reliability enhancement mechanisms: A Survey

Abstract— In today’s era cloud computing becomes the hottest topic due to its ability to reduce the cost associated with computing. Cloud computing provides the on demand services like storage, servers, resources etc. to the users without physically acquiring them and the payment is according to pay per use. Since cloud provides the storage, reduces the managing cost and time for organization to the user but security and confidentiality becomes the one of the biggest obstacle in front of us. The major problem with cloud environment is, the number of user is uploading their data on cloud storage so sometimes due to lack of security there may be chances of loss of confidentiality. To overcome these obstacles a third party is required to prevent data, data encryption, and integrity and control unauthorized access for data storage to the cloud. To optimize better results we will review some paper and find the better results to remove the security barriers.


I. INTRODUCTION
With the rapid development of hardware and software cloud computing brings the revolution in the business industry [1]. It provides resources like computational power, storage, computation platform ad applications to user on demand through internet. Some of the cloud providers are Amazon, IBM, Google, Salesforce, Microsoft etc. Cloud computing features included resource sharing, multi-tenancy, remote data storage etc. but it challenges the security system to secure, protect and process the data which is the property of the individual, enterprises and governments. Even though, there is no requirement of knowledge or expertise to control the infrastructure of clouds; it is abstract to the user. It is a service of an Internet with high scalability, quality of service, higher throughput and high computing power [2]. Cloud computing providers deploy common online business applications which are accessed from servers through web browser. Data security is the biggest issue in cloud computing and it is not easy to resolve it. In our review paper we will review the different ways to manage the confidentiality of the data [3].

II. OBJECTIVES
With the rapid development of hardware and software cloud computing brings the revolution in the business industry [1]. It provides resources like computational power, storage, computation platform ad applications to user on demand through internet. Some of the cloud providers are Amazon, IBM, Google, Salesforce, Microsoft etc. Cloud computing features included resource sharing, multi-tenancy, remote data storage etc. but it challenges the security system to secure, protect and process the data which is the property of the individual, enterprises and governments. Even though, there is no requirement of knowledge or expertise to control the infrastructure of clouds; it is abstract to the user. It is a service of an Internet with high scalability, quality of service, higher throughput and high computing power [2]. Cloud computing providers deploy common online business applications which are accessed from servers through web browser. Data security is the biggest issue in cloud computing and it is not easy to resolve it. In our review paper we will review the different ways to manage the confidentiality of the data [3].

III. SECURITY ISSUES IN CLOUD COMPUTING
In cloud environment usual data transmission occurs between client and server using third party. So the confidentiality of your data becomes the primary problem. Security issues for a significant number of these frameworks and innovations are pertinent to distributed computing [5]. For instance, the system that interconnects the frameworks in a cloud must be secure and mapping the virtual machines to the physical machines must be completed safely. Information security includes encoding the information and additionally guaranteeing that suitable strategies are implemented for information sharing [6]. Cloud security isn't to be mistaken for "cloud-based" security benefit over the conventional danger. This security administration can be upgraded with the distributed computing, ensuring against DDOS, Trojan, Virus and Spam memory [7]. However, the qualities of distributed storage make clients' information looked with numerous security dangers, incorporates: (1) the conventional security district parcel is invalid. On account of the distributed storage benefit must be adaptable, security limits and assurance hardware can't be unmistakably characterized, which builds some trouble for the usage of particular assurance measures; [8](2) the distributed storage transmits information through the system. The benefit interferences, information devastation, data stolen furthermore, altered caused by the noxious assaults in the organize represent a serious test to the security of information correspondences, get to confirmation and classification; [9](3) from the client's view, the distributed storage of information makes distributed computing specialist co-op gets the information get to control, and the client's information is looked with protection security dangers. Individuals stress over that the touchy individual information will be exposure, abuse or missing by putting the information in cloud condition [10]. To tackle the above issues, as of late, scientists made a parcel of research work in the information security to control systems, information respectability, confirmation, cipher text to recover and information encryption system of cloud figuring condition [11]. There are heaps of security issues with distributed computing in light of advances usage including systems, working frameworks, databases, asset booking, virtualization, stack adjusting, exchange administration, memory administration and simultaneousness control. For instance, the system ought to be secure on cloud with the goal that mapping the virtual machines to the physical machines must be done securely [12]. Information security includes scrambling the information as well as gives surety of proper approaches. Distributed computing experiences some different security concerns which are given beneath. V.

OUTSORCED FEATURE IN CLOUD COMPUTING
There are several main challenges for building assurance to the user:

A. Outsourcing
Outsourcing chops down both capital utilization and operational use for cloud customers. Regardless, outsourcing furthermore suggests that customers physically lose control on their information and endeavors. The loss of control issue has ended up being one of the fundamental drivers of cloud uncertainty [14]. To address outsourcing security issues, at first, the cloud provider ought to be solid by giving trust and secure figuring and information storing; second, outsourced information and calculation may be clear to customers to the extent order, trustworthiness, and other security organizations. Moreover, outsourcing will perhaps achieve security infringement, due to how fragile information is out of the proprietor's control [2].

B. Massive data and intense computation
Cloud computing is fit for handling mass data stockpiling and intense computing assignments. Thusly, customary security components may not do the trick because of terrible computation or correspondence overhead. For instance, to check the respectability of data that is remotely put away, it is unreasonable to hash the whole data set. To this end, new systems and conventions are normal [15].

VI. SECURITY ISSUES
Organization seeks security and reliability consideration seriously since information stored within the database is critical for the user. To tackle the issue, cloud service providers deal with the service security through security mechanisms implementations.

A. Data Security
Information Security raises as a mystery, reliability and openness. These are the huge issues for cloud shippers. Arrangement is portrayed as a security of information. Mystery is proposed to keep the sensitive information from unapproved or wrong individuals [16]. In this stores the encryption key information from enormous business C, set away at mixed arrangement in huge business D. That information must be secure from the specialists of enormous business D. Uprightness is portrayed as the rightness of information, there is no consistent techniques exist for attested information exchanges. Availability is portrayed as information is open on time.

B. Administrative Compliance
Clients are over the long haul capable when the security and climatic phase of their own information is taken by an expert co-op. [17] Traditional pro associations more slanted to outsource diagrams and security affirmation. Distributed computing providers reject to tolerate the examination as hailing so these customers can simply make utilization of unimportant operations.

C. Data Locations
At the point when customers use, they likely won't know absolutely where their information will encouraged and which zone it will secure in. Honestly, they won't not appreciate what country it will be secured in. Master associations ought to be asked whether they will accomplish to securing and change information particularly tact, and on the preface of their customers will they make a sensible accomplishment to take after neighborhood assurance need [18].

D. Special client access
Client may require data or information at any moment of time. For this purpose special access to client may have to be granted. This feature is provided within the cloud through SLA.

E. Put stock in Issue
Trust is critical in ensuring the cloud is used effectively by the user. Cloud is house of data stored by the user. In case this information is lost or corrupted than trust is lost but cloud user strength maintenance is target of every cloud service provider. [19].

F. Data Recovery
This is the mechanism of recovering the information which is corrupted or lost due hardware or software failure.

VII. USING THE SECURITY SOLUTIONS
Four typical aspect are reviewed in this paper for evaluation so that any of the technique can be selected for future enhancement..

Security solutions Description
Continuation Mechanism This the mechanism of migrating service from one cloud service provider to another cloud service provider IDM Trust insurance security enhancement mechanism by which size of user community is increased in cloud Data security Security is ensured using cryptography, encryption etc. virtualization security Virtualization mechanism ensures that resources are available as and when required.
A. Continuation of service from traditional platform to cloud platform In this era every person is shifting his business applications on cloud. Even though, it is a good technology but it brings some risks in front of them. [20] B. Identity and access management Unauthorized access to the information on the cloud becomes a big issue because all the confidential data is on internet so anybody can access or trap the network. So it must be require updating the traditional approach of identity mechanism in order to get higher level of security. Identity federation, security assertion markup, biometric sensors are some of the ways to secure data from unauthorized access.

C. Data Security
Data security is the common issue in the cloud environment. In order to maintain confidentiality of data, availability and completeness some encryption techniques can also be applied. For more security data wiping is also necessary so that sensitive information can't be leaked out [21].

D. Virtualization Security
Virtualization guarantees the cost saving, ease of administration etc. Virtual environment includes access control, virtual machine monitor; virtual firewall which provides security to the user that data is secure on the system. [22] VIII. CONCLUSION Distributed computing gives the assets to the clients as well as give a major test of security. There are securities necessities for the two clients and cloud suppliers yet at times it might struggle somehow. Security of the cloud relies on put stock in registering and cryptography. In our audit paper a few issues identified with information area, security, stockpiling, accessibility and uprightness. Building up confide in the cloud security is the greatest prerequisite. These issues said above will be the examination hotspot of distributed computing. There is almost certainly that distributed computing has splendid future