Cloud Computing and its Security

Verified

Added on  2023/04/10

|6
|1303
|492
AI Summary
This article discusses the importance of cloud computing and the need for enhanced security measures. It explores various tools and techniques such as encryption, firewall, and antivirus software for secure data storage in cloud computing.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CLOUD COMPUTING AND ITS SECURITY
Cloud Computing and its Security
Name of the student:
Name of the university:
Author note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CLOUD COMPUTING AND ITS SECURITY
Introduction:
Cloud computing is actually a simple idea where computing capabilities are taken to
be used in products and those capabilities are turned into services that are available instantly
on demand. The services in cloud computing are generally divided into three layers. One is
the infrastructure layer, the next is the platform layer and the last one is the software layer.
The infrastructure layer consists of the servers which can be borrowed through cloud
computing as per needs. With cloud computing rather than buying a whole stack of servers
and having them sit idly around most of the time, a whole bunch of software us available in
cloud computing which can be returned after use. As technology can help in solving the
major challenges that are faced inn organisations, the popularity of cloud computing is
gradually increasing day by day. Technology impacts everything we do it has also the power
to disrupt the norm. As cloud computing serves as the platform that can be maintained with
low maintenance and huge data can be stored there, it is essential that security feature of the
cloud should be enhanced. As cloud offers storing of huge data of different fields it is also
possible that a risk may occur where the private information in these spaces can be seen by
other people. The study here aims in discussing about certain tools and techniques that have
developed to provide secure data storage in cloud computing and hence safeguarding the
information of users.
As major of the organizations are using cloud interface to store their crucial data,
cloud security needs to be established in cloud computing. By cloud security we mean the use
of latest technologies and tool with the help of programming and various other techniques to
secure the applications, data and the infrastructure that are hosted on the cloud (Ali, Khan &
Vasilakos, 2015). It is necessary that all the techniques and tools that are used to secure cloud
environment should be updated frequently as possible because every day new threats are
Document Page
2CLOUD COMPUTING AND ITS SECURITY
gradually emerging. In terms of securing cloud based applications, some of the techniques
and tools that are used commonly includes-
Encryption: As day by day huge data sets and information gets stored in cloud, securing the
perimeter of the cloud is not the only solution to ensure data security within it. In order to
ensure data security in cloud, it is necessary to find a way to protect sensitive data that is
stored in and moving to the cloud (Coppolino et al., 2017). Here in lies the use of encryption
in cloud computing. Data encryption in cloud security is referred to as the method of
encoding data before moving it to the cloud storage (Wang et al., 2016). Data encryption
process is often offered by cloud service providers to encrypt sensitive data and enabling
encrypted key in order to decrypt the information to be used by authenticated users. Cloud
encryption is almost similar to in house encryption method the only difference in it is that the
users need to learn about the policies and SLAs that are provided by the cloud providers and
hence the encryption procedure starts. Business organisations find cloud encryption to be
extremely useful as the encryption keys can benefit in providing prevention against security
risks which can be managed through controls, contracts and audits.
Firewall: Implementing cloud based firewall provides another solution for securing data in
cloud environment. Cloud based software are platforms that are deployed in cloud
environment to prevent unwanted access in private cloud networks. Cloud based firewalls are
designed such a way to meet modern business needs and securing credentials from hackers
(Fernandez, Yoshioka & Washizaki, 2014). The benefits that are served with the
implementation of cloud based firewalls are scalability, availability, extensibility, migration
security and identity protection.
Document Page
3CLOUD COMPUTING AND ITS SECURITY
Scalability: As deploying firewall in cloud is much simpler, organisations find it much easier
for providing security solutions (Salah, 2015). With the increase of bandwidths cloud firewall
have the ability to automatically scale themselves and maintains the parity while adjusting.
Availability: Cloud firewalls provide built in cost of high availability. And so this can be used
whenever it is needed. This availability of cloud firewall is hard to match the firewalls that
are found on premises as the cost there is very much high and an organisation needs to pay
huge amount in order to deploy one with their applications or business sites to safeguard the
credentials (Jeyanthi & Mogankumar, 2014).
Extensibility: Cloud firewalls has the provision that can be used and installed in any
organisation around any part of the world and this provides the protection of the network path
thus used in the cloud environment (Peterson et al., 2015).
Migration security: A clod firewall has the ability to filter traffic from various sources. It
ensures the security by guaranteeing the connections established between the cloud and the
data centers across the world. This serves as to be extremely beneficial for organisations who
tends to move or migrate their existing solutions to a cloud based environment.
Antivirus software: Another important tool that can be used to protect data in cloud is the
use of cloud anti-virus software. Cloud antivirus software protects important credentials over
the cloud by getting processed on the internet (Khalil, Khreishah & Azeem, 2014). It is both
affordable as well as beneficial in terms of securing data in cloud that is used by many
business organisations.
Conclusion:
Business organisations use the cloud based environment for different service replicas.
The service models in cloud computing are Software as a service, platform as a service and
infrastructure as a service. In cloud computing these facilities get arranged using various
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CLOUD COMPUTING AND ITS SECURITY
placement models such as private, public and hybrid. While using cloud based environment
for deploying applications, there are several issues and concerns associated with it. These
issues are comprised of security disputes faced by cloud breadwinners and the security issues
faced by the customers. It is the concern of the cloud benefactors to ensure security with the
infrastructure with the help of various tools and techniques as mentioned. Thus it can be
concluded that as important cloud computing platforms are for the business organisations it is
more important to provide proper security measures to prevent data being stolen by black hat
peoples.
Document Page
5CLOUD COMPUTING AND ITS SECURITY
References:
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities
and challenges. Information sciences, 305, 357-383.
Coppolino, L., D’Antonio, S., Mazzeo, G., & Romano, L. (2017). Cloud security: Emerging
threats and current solutions. Computers & Electrical Engineering, 59, 126-140.
Fernandez, E. B., Yoshioka, N., & Washizaki, H. (2014). Patterns for cloud
firewalls. AsianPLoP (pattern languages of programs), Tokyo.
Jeyanthi, N., & Mogankumar, P. C. (2014). A virtual firewall mechanism using army nodes
to protect cloud infrastructure from ddos attacks. Cybernetics and Information
Technologies, 14(3), 71-85.
Khalil, I., Khreishah, A., & Azeem, M. (2014). Cloud computing security: A
survey. Computers, 3(1), 1-35.
Peterson, L., Baker, S., De Leenheer, M., Bavier, A., Bhatia, S., Wawrzoniak, M., ... &
Hartman, J. (2015, June). Xos: An extensible cloud operating system. In Proceedings
of the 2nd International Workshop on Software-Defined Ecosystems (pp. 23-30).
ACM.
Salah, K. (2015, October). An analytical model to achieve elasticity for cloud-based
firewalls. In 2015 IEEE 40th Conference on Local Computer Networks (LCN) (pp.
173-176). IEEE.
Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy
attribute-based encryption scheme in cloud computing. IEEE Transactions on
Information Forensics and Security, 11(6), 1265-1277.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]