This essay discusses the key issues and challenges in cloud computing, including security risks, data theft, and cyber threats. It explores different methods to mitigate these risks and ensure the protection of data. The essay also highlights the importance of proper management and governance in cloud computing.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Assessment
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Contents INTRODUCTION...........................................................................................................................3 MAIN BODY..................................................................................................................................3 REFERENCES................................................................................................................................6
INTRODUCTION Cloud computing provides on-demand system services without specific active user control, particularly the storage and processing capacity of data (Rittinghouse and Ransome, 2016). The term is used commonly to identify data centers for other web users. This is very useful for users in order to store data in an effective manner. Each technique has some issues and benefits. Same as cloud computing also has some problems such as risk of data theft, security issues and many more. In the project report an essay is mentioned on the topic named as” Issues in cloud computing”. MAIN BODY In this aspect of essay, key issues of cloud computing is mentioned in detailed manner which is as follows: According to M. Jouini and Rabai (2014), Security risks related to virtualization, software vulnerabilities, system bugs, data leaks, authentication issues and privacy issues are the key challenges identified with cloud computing. To resolve the above issues, there are different methods such as the use of veracity, stronger software for replication and strong usernames to eliminate safety violations. Good internal functionality from the client is also important to provide the end user with protection (Singh, Jeong and Park, 2016). They may enhance protection for consumers by adopting the above techniques.Eventually, security issues are needed to be cleared as soon as possible because any delay in this aspect may lead to customer dissatisfaction. According toKhan, Oriol, Kiran, Jiang and Djemame(2012), there are various kinds of dangers involved with the usage of cloud storage. It primarily focuses on the identification and theft of extremely sensitive data and threats happening externally from server to device during data transmission (Tabassam, 2017). There are different techniques for evaluating the risks involved in the transfer of data before granting the consumer access and the usage of tools which can
avoidspamandmalwareattacks.Thiswillprovidetheconsumerwithprotectionby implementing the above technique, and avoid malware attacks. According toSendi and Cheriet (2014), various threats linked to the usage of the device from cyber attacks in particular. This is important to know how to insure the protection of cyber threats for the consumers. There are different types of methodology includes the application of the CIA assessment and even some of the operational instruments and methods included in the usage of cloud storage to enable consumers to defend themselves from cyber threats and vulnerabilities. Thus, this can be helpful for defending users from cyber-attacks and weaknesses in cloud storage utilizing the above-mentioned technologies (Bhushan and Gupta, 2017). According toKanaker, Saudi and Marhusin, 2014, this is necessary to establish a method to classify the worms' problems. There are numerous issues pertaining to the potential monsters threatening cloud computing. Any of the threats that exist due to worms affect the cloud storage infrastructure and applications. A detection model is useful for solving the problems raised by the worm (Bokhari, Shallal and Tamandani, 2016). The attacks are automatically detected using this identification model and caution is taken. In the opinion ofN. Mannane, and et.al (2017), Cloud computing's exploitable bugs were the main concern in 2018 as 77 per cent of respondents reported. The percentage one expressed cloudchallengeforthelongestperiodoftimehasbeentheabsenceofresources/ knowledge.This raises the dangers of cloud computing that may occur throughout cloud deployment or management. It also stated thatdata breaches, stolen passwords and breached security, hacked applications and APIs, hijacking of accounts has not served to ease fears. All of which makes it hard to handle comfortable, confidential and patented information to a private company for others and, indeed, show the complexities of cloud computing (Abawajy and Hassan, 2017). Fortunately advanced security technologies are continually developing as cloud services and customers. The list of drawbacks of cloud services includes expenses. Cloud computing will save companies money for most part which further support in increasing results. A company can quickly extend its computing capacity within the cloud without making significant expenditures in new devices. Alternatively, companies can receive extra computing from public cloud vendors via pay-as-you-go systems. Moreover, the on-demand and flexible
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
design of cloud computing systems often makes identifying and forecasting the volumes and costs challenging. According to the opinion of G. Kulkarni and et.al., (2012) enhanced the IT's challenge in delivering the requisite management, enforcement, risk and data quality assurance. To reduce the different challenges and complexities involved with transformation to the cloud, IT must change the conventional mechanisms of IT regulation and control to accommodate the cloud. Across the past few years, the position of core IT teams in the cloud has grown to that effect. Central IT, together with company divisions, is gradually playing a part in the collection, brokering and management of cloud computing (Rimal and Maier, 2016). In addition to this third-party cloud computing / management services are increasingly offering assistance in governance and best practices. As per the opinion of D. R. Bharadwaj, Bhattacharya and M. Chakravarthy (2018), Cloud information security or, more generally, cloud protection refers to a wide range of policies, technology, and controls that are applied to secure cloud storage data, software, and related infrastructure. The cloud offers customers with storing data and processing power in private individual data centres. Groups have used the cloud in various application structures (with acronyms like SaaS, PaaS, and IaaS) and implementation models (private, public, hybrid, and community). Customers around sectors are searching for cost-saving measures to help prevent their IT spending from reducing profits or slashing to key company expenses. This is difficult to reconcile the need to reduce these expenses without reducing professional staff or having any effect on customer support (Ferris and Riveros, Red Hat Inc, 2016). Cloud computing gives companies many opportunities but it still poses some obstacles. The advantages (scalability, access, protection, etc.) are easy to see but it is also important to consider how switching to the cloud impacts the company. A big issue that leads to the difficulties of cloud cost control is the difficulty companies have utilization monitoring and forecast. The research conducted for the Software ONE Handling and Knowing On-Premises and Cloud Spend report showed that one of the main cloud management pressure points for 37 percent of respondents was high project prices, while 30 percent had trouble with a lack of clarity and visibility (El-Gazzar, Hustad and Olsen, 2016).
REFERENCES Books and journal: Jouini, M. and Rabai, L.B.A., 2014, November. Surveying and analyzing security problems in cloudcomputingenvironments.In2014TenthInternationalConferenceon Computational Intelligence and Security(pp. 689-693). IEEE. Khan, A.U., Oriol, M., Kiran, M., Jiang, M. and Djemame, K., 2012, December. Security risks and their management in cloud computing. In4th IEEE International Conference on Cloud Computing Technology and Science Proceedings(pp. 121-128). IEEE. Sendi, A.S. and Cheriet, M., 2014, March. Cloud computing: a risk assessment model. In2014 IEEE International Conference on Cloud Engineering(pp. 147-152). IEEE. Kanaker, H.M., Saudi, M.M. and Marhusin, M.F., 2014, August. Detecting worm attacks in cloud computing environment: Proof of concept. In2014 IEEE 5th Control and System Graduate Research Colloquium(pp. 253-256). IEEE. Rittinghouse, J.W. and Ransome, J.F., 2016.Cloud computing: implementation, management, and security. CRC press. Kulkarni, G., Chavan, N., Chandorkar, R., Waghmare, R. and Palwe, R., 2012, October. Cloud securitychallenges.In20127thInternationalConferenceonTelecommunication Systems, Services, and Applications (TSSA)(pp. 88-91). IEEE. Mannane, N., Bencharhi, Y., Boulafdour, B. and Regragui, B., 2017, October. Survey: Risk assessment models for cloud computing: Evaluation criteria. In2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech)(pp. 1-5). IEEE. El-Gazzar, R., Hustad, E. and Olsen, D.H., 2016. Understanding cloud computing adoption issues: A Delphi study approach.Journal of Systems and Software,118, pp.64-84. Rimal, B.P. and Maier, M., 2016. Workflow scheduling in multi-tenant cloud computing environments.IEEE Transactions on Parallel and Distributed Systems,28(1), pp.290- 304. Ferris, J.M. and Riveros, G.E., Red Hat Inc, 2016.Monitoring cloud computing environments. U.S. Patent 9,529,689. Abawajy, J.H. and Hassan, M.M., 2017. Federated internet of things and cloud computing pervasive patient health monitoring system.IEEE Communications Magazine,55(1), pp.48-53. Bhushan,K.andGupta,B.B.,2017.Securitychallengesincloudcomputing:state-of- art.International Journal of Big Data Intelligence,4(2), pp.81-107.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Singh, S., Jeong, Y.S. and Park, J.H., 2016. A survey on cloud computing security: Issues, threats, and solutions.Journal of Network and Computer Applications,75, pp.200-222. Tabassam, S., 2017. Security and privacy issues in cloud computing environment.J. Inf. Technol. Softw. Eng.,7(5). Bokhari, M.U., Shallal, Q.M. and Tamandani, Y.K., 2016, March. Security and privacy issues in cloud computing. In2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)(pp. 896-900). IEEE.