This article discusses the importance of cloud computing and the need for enhanced security measures. It explores various tools and techniques such as encryption, firewall, and antivirus software for secure data storage in cloud computing.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CLOUD COMPUTING AND ITS SECURITY Cloud Computing and its Security Name of the student: Name of the university: Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CLOUD COMPUTING AND ITS SECURITY Introduction: Cloud computing is actually a simple idea where computing capabilities are taken to be used in products and those capabilities are turned into services that are available instantly on demand. The services in cloud computing are generally divided into three layers. One is the infrastructure layer, the next is the platform layer and the last one is the software layer. The infrastructure layer consists of the servers which can be borrowed through cloud computing as per needs. With cloud computing rather than buying a whole stack of servers and having them sit idly around most of the time, a whole bunch of software us available in cloud computing which can be returned after use.As technology can help in solving the major challenges that are faced inn organisations, the popularity of cloud computing is gradually increasing day by day. Technology impacts everything we do it has also the power to disrupt the norm. As cloud computing serves as the platform that can be maintained with low maintenance and huge data can be stored there, it is essential that security feature of the cloud should be enhanced. As cloud offers storing of huge data of different fields it is also possible that a risk may occur where the private information in these spaces can be seen by other people. The study here aims in discussing about certain tools and techniques that have developed to provide secure data storage in cloud computing and hence safeguarding the information of users. As major of the organizations are using cloud interface to store their crucial data, cloud security needs to be established in cloud computing. By cloud security we mean the use of latest technologies and tool with the help of programming and various other techniques to secure the applications, data and the infrastructure that are hosted on the cloud (Ali, Khan & Vasilakos, 2015). It is necessary that all the techniques and tools that are used to secure cloud environment should be updated frequently as possible because every day new threats are
2CLOUD COMPUTING AND ITS SECURITY gradually emerging. In terms of securing cloud based applications, some of the techniques and tools that are used commonly includes- Encryption:As day by day huge data sets and information gets stored in cloud, securing the perimeter of the cloud is not the only solution to ensure data security within it. In order to ensure data security in cloud, it is necessary to find a way to protect sensitive data that is stored in and moving to the cloud (Coppolino et al., 2017). Here in lies the use of encryption in cloud computing. Data encryption in cloud security is referred to as the method of encoding data before moving it to the cloud storage (Wang et al., 2016). Data encryption process is often offered by cloud service providers to encrypt sensitive data and enabling encrypted key in order to decrypt the information to be used by authenticated users. Cloud encryption is almost similar to in house encryption method the only difference in it is that the users need to learn about the policies and SLAs that are provided by the cloud providers and hence the encryption procedure starts. Business organisations find cloud encryption to be extremely useful as the encryption keys can benefit in providing prevention against security risks which can be managed through controls, contracts and audits. Firewall:Implementing cloud based firewall provides another solution for securing data in cloud environment. Cloud based software are platforms that are deployed in cloud environment to prevent unwanted access in private cloud networks. Cloud based firewalls are designed such a way to meet modern business needs and securing credentials from hackers (Fernandez, Yoshioka & Washizaki, 2014). The benefits that are served with the implementation of cloud based firewalls are scalability, availability, extensibility, migration security and identity protection.
3CLOUD COMPUTING AND ITS SECURITY Scalability: As deploying firewall in cloud is much simpler, organisations find it much easier for providing security solutions (Salah, 2015). With the increase of bandwidths cloud firewall have the ability to automatically scale themselves and maintains the parity while adjusting. Availability: Cloud firewalls provide built in cost of high availability. And so this can be used whenever it is needed. This availability of cloud firewall is hard to match the firewalls that are found on premises as the cost there is very much high and an organisation needs to pay huge amount in order to deploy one with their applications or business sites to safeguard the credentials (Jeyanthi & Mogankumar, 2014). Extensibility: Cloud firewalls has the provision that can be used and installed in any organisation around any part of the world and this provides the protection of the network path thus used in the cloud environment (Peterson et al., 2015). Migration security: A clod firewall has the ability to filter traffic from various sources. It ensures the security by guaranteeing the connections established between the cloud and the data centers across the world. This serves as to be extremely beneficial for organisations who tends to move or migrate their existing solutions to a cloud based environment. Antivirus software:Another important tool that can be used to protect data in cloud is the use of cloud anti-virus software. Cloud antivirus software protects important credentials over the cloud by getting processed on the internet (Khalil, Khreishah & Azeem, 2014). It is both affordable as well as beneficial in terms of securing data in cloud that is used by many business organisations. Conclusion: Business organisations use the cloud based environment for different service replicas. The service models in cloud computing are Software as a service, platform as a service and infrastructure as a service. In cloud computing these facilities get arranged using various
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4CLOUD COMPUTING AND ITS SECURITY placement models such as private, public and hybrid. While using cloud based environment for deploying applications, there are several issues and concerns associated with it. These issues are comprised of security disputes faced by cloud breadwinners and the security issues faced by the customers. It is the concern of the cloudbenefactors to ensure security with the infrastructure with the help of various tools and techniques as mentioned. Thus it can be concluded that as important cloud computing platforms are for the business organisations it is more important to provide proper security measures to prevent data being stolen by black hat peoples.
5CLOUD COMPUTING AND ITS SECURITY References: Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges.Information sciences,305, 357-383. Coppolino, L., D’Antonio, S., Mazzeo, G., & Romano, L. (2017). Cloud security: Emerging threats and current solutions.Computers & Electrical Engineering,59, 126-140. Fernandez,E.B.,Yoshioka,N.,&Washizaki,H.(2014).Patternsforcloud firewalls.AsianPLoP (pattern languages of programs), Tokyo. Jeyanthi, N., & Mogankumar, P. C. (2014). A virtual firewall mechanism using army nodes toprotectcloudinfrastructurefromddosattacks.CyberneticsandInformation Technologies,14(3), 71-85. Khalil,I.,Khreishah,A.,&Azeem,M.(2014).Cloudcomputingsecurity:A survey.Computers,3(1), 1-35. Peterson, L., Baker, S., De Leenheer, M., Bavier, A., Bhatia, S., Wawrzoniak, M., ... & Hartman, J. (2015, June). Xos: An extensible cloud operating system. InProceedings of the 2nd International Workshop on Software-Defined Ecosystems(pp. 23-30). ACM. Salah,K.(2015,October).Ananalyticalmodeltoachieveelasticityforcloud-based firewalls. In2015 IEEE 40th Conference on Local Computer Networks (LCN)(pp. 173-176). IEEE. Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-basedencryptionschemeincloudcomputing.IEEETransactionson Information Forensics and Security,11(6), 1265-1277.