logo

Cloud Computing Security Aspects

   

Added on  2023-01-19

16 Pages3985 Words85 Views
Running head: CLOUD COMPUTING
Cloud Computing
[Name of the Student]
[Name of the University]
[Author note]
Cloud Computing Security Aspects_1
1CLOUD COMPUTING
Table of Contents
Introduction:....................................................................................................................................3
Cloud computing security aspects:..................................................................................................3
Confidentiality:............................................................................................................................3
Authentication and Authorization:..............................................................................................3
Non-repudiation:..........................................................................................................................4
Privacy and control:.....................................................................................................................4
Audit:...........................................................................................................................................4
Compliance:.................................................................................................................................5
Security issues in the cloud environment:.......................................................................................5
General Security challenges........................................................................................................5
Security threats:...........................................................................................................................5
Privacy issues:.............................................................................................................................6
Application issues:.......................................................................................................................7
Threat issues:...............................................................................................................................7
Breach of data:.............................................................................................................................7
Loss of Data:................................................................................................................................8
Hijacking of accounts:.................................................................................................................8
Insecure APIs:..............................................................................................................................9
Denial of Service or the DoS:......................................................................................................9
Cloud Computing Security Aspects_2
2CLOUD COMPUTING
Malicious insider:........................................................................................................................9
Abuse of the cloud services:......................................................................................................10
Due diligence which are insufficient:........................................................................................10
Shared Technological issues:.....................................................................................................11
Security threats and Mitigation Techniques:.................................................................................11
Conclusion:....................................................................................................................................13
References:....................................................................................................................................14
Cloud Computing Security Aspects_3
3CLOUD COMPUTING
Introduction:
The cloud security is considered to be one of the most import issue which is to be taken
into consideration in today’s world and the reason behind this is that the security of the data is at
high risk. The risk faced by the data is mainly because of the safety and the security situations
which are not provided correctly for the transmission and function of the data [1]. Because of the
fact that the cloud computing is capable of providing a potential for an amount of consumers for
gaining access to the data that is saved and for this reason there remains an opportunity for the
obtaining of the high data risk. Due to all this reason there is an essential need of implementing
and identifying the security issues as well as the clarifications for the purpose of managing all the
issues.
Cloud computing security aspects:
Below are the listed major security aspects of cloud computing which needs to be focused
upon and this mainly includes the following:
Confidentiality:
This is mainly associated with including those areas which is associated with making sure
of the fact that the personal data are being presented as private, secure and in restricted form
anywhere around the users who are not authorized to access the data [2]. One of the most famous
and authentic way of maintaining the confidentiality includes the encryption of the data before
the data is hosted into the clouds.
Authentication and Authorization:
This is process which generally refers to the process of providing verification of the
identity of any individual along with verifying what an individual is authorized to do. In case of
Cloud Computing Security Aspects_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber-security Assesment Report
|4
|890
|8

Report On Cloud Computing Security | Data Protection
|9
|2109
|168

Analysis of Security Issue in Cloud Computing
|10
|2125
|210

Information Security Assignment | Security and Privacy
|9
|2067
|44

Cloud Privacy and Security
|19
|6060
|166

Project Proposal and Plan, Cloud Security - ITC 568
|12
|2096
|1387