logo

Issues in Cloud Computing

8 Pages1820 Words86 Views
   

Added on  2023-01-11

About This Document

This essay discusses the key issues and challenges in cloud computing, including security risks, data theft, and cyber threats. It explores different methods to mitigate these risks and ensure the protection of data. The essay also highlights the importance of proper management and governance in cloud computing.

Issues in Cloud Computing

   Added on 2023-01-11

ShareRelated Documents
Assessment
Issues in Cloud Computing_1
Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
REFERENCES................................................................................................................................6
Issues in Cloud Computing_2
INTRODUCTION
Cloud computing provides on-demand system services without specific active user
control, particularly the storage and processing capacity of data (Rittinghouse and Ransome,
2016). The term is used commonly to identify data centers for other web users. This is very
useful for users in order to store data in an effective manner. Each technique has some issues and
benefits. Same as cloud computing also has some problems such as risk of data theft, security
issues and many more. In the project report an essay is mentioned on the topic named as” Issues
in cloud computing”.
MAIN BODY
In this aspect of essay, key issues of cloud computing is mentioned in detailed manner which is
as follows:
According to M. Jouini and Rabai (2014), Security risks related to virtualization, software
vulnerabilities, system bugs, data leaks, authentication issues and privacy issues are the key
challenges identified with cloud computing. To resolve the above issues, there are different
methods such as the use of veracity, stronger software for replication and strong usernames to
eliminate safety violations. Good internal functionality from the client is also important to
provide the end user with protection (Singh, Jeong and Park, 2016). They may enhance
protection for consumers by adopting the above techniques. Eventually, security issues are
needed to be cleared as soon as possible because any delay in this aspect may lead to customer
dissatisfaction.
According to Khan, Oriol, Kiran, Jiang and Djemame (2012), there are various kinds of dangers
involved with the usage of cloud storage. It primarily focuses on the identification and theft of
extremely sensitive data and threats happening externally from server to device during data
transmission (Tabassam, 2017). There are different techniques for evaluating the risks involved
in the transfer of data before granting the consumer access and the usage of tools which can
Issues in Cloud Computing_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Online Coursework on Computer and System Security
|6
|1112
|484

Cyber Security Assignment PDF
|9
|2867
|2114

Importance of Cyber Security in Protecting Against Cyber Attacks
|26
|8270
|85

Information Security Assignment | Trends in Malware
|14
|2540
|93

CHAPTER FIVE 4 Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Ant
|14
|2481
|157

IS Security and Risk Management Assignment PDF
|10
|3410
|84