Cloud Computing: Security and Privacy

Verified

Added on  2020/04/07

|10
|2234
|41
AI Summary
This assignment delves into the security and privacy considerations associated with cloud computing. It emphasizes the importance of aligning security policies with provider practices to safeguard sensitive data. The text highlights the need for secure client-side connections (e.g., VPNs) and controlled access via APIs. It also discusses potential vulnerabilities stemming from automatic updates and plugins, stressing the significance of robust standards governing data usage and manipulation in cloud environments.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Security and privacy issues in cloud computing

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
Introduction......................................................................................................................................1
Security and privacy issues in Cloud computing.............................................................................1
Summarise the issues.......................................................................................................................3
Important issues not addressed in the paper....................................................................................4
Impact of the above issues not discussed and application in real world.........................................5
Lesson learnt....................................................................................................................................6
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
Document Page
Introduction
The cloud computing is considered as an important model which focus on the demand network
with the access to the shared pool and handling the configuration of the different computing
resources. It includes the provisioning with the minimal management effort or the cloud provider
interaction (Mathew, 2012). The cloud computing is mainly to handle the emerging information
with the privacy concerns that are related to enhancement of the security measures. The zero
investments in the IT infrastructure and then working over the security concerns is the major
source that is formidable.
Security and privacy issues in Cloud computing
Challenges
The challenges are related to the loss of control over data with the dependence on the cloud
computing factors which include the privacy and the loss of the control over the data. The
dependency is on the cloud computing provider where the issues are related to how the
customers are aware of the danger of letting the data control out of their hands and then storing
the data with the cloud computing provider (Abbas et al., 2017). The challenge is also for
performing the data mining techniques with the analysis of the user data that is for the sensitive
functions, storing and processing the sensitive data through the services of cloud computing. The
mobile devices are set with the limited storage and handling the computing capabilities that can
drive the services with the transferring from one to the other mobile device. The cloud
computing could be accessed in the remote forms which includes the eaves dropping, DNS
spoofing and the Denial of the service attacks.
Document Page
Problems
The issues are related to the data deletion and the major concern is about handling the detection
of the copies as it becomes difficult to handle the different data collections. The data protection
and the privacy is also based on the reliability with secured communication (Sen, 2013). The
cloud computing is based on the concerns elated to the provider availability and the approach
where the services and the utilities are based on the difficulty to change and handle with respect
to the functionality change, pricing and the liability.
Relevant technologies
The technologies related are the grid computing, virtualisation, VMWare and the utility
computing that are important for handling the procurement and setting the easy storage of the
charges, data transfer depending upon the access for the different requests (Ullah et al., 2014).
The use of the network is defined with the behaviour of the operating systems for the users
where the users can easily access the servers or the storage without any specific details the
virtualisations layer tends to execute and work with the computing resources by easily accessing
the appropriate resources.
Applications of the technologies
The applications are related right middleware with the computing systems that could easily lead
to the execution of the different programs with processing software to handle the customisation
of the computer systems. The cloud computing systems leads to the reduction of the advanced
software on the client side with the processing that includes the monitoring and handling the
enough power to process and handle the remote computer information (Wei et al., 2014).
Through this, the corporations also rely on the computers to make sure of the different rights of

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
the software to achieve the goals. The cloud computing systems for the corporations is mainly to
work on the processing power for the different computer on the back ends with the speeding of
the calculations.
Clarification on vague areas
The cloud computing is mainly to work on the IT resources, storage and handling the data centre
space, with services and compliance. The organisation need to work on the safety measures and
the polices that are by the provider and aligned depending upon the privacy and the security
standards.
Research questions
Q1: What are some of the security factors which needs to be taken care of for the
confidential issues?
Q2: How the network security with the public cloud services include the denial of service
attacks?
Summarise the issues
The issues are related to the lack of control over the data, issues with the network security, and
the public cloud services over the internet. The cloud provider has the incidents like the sabotage
of information, theft of any confidential information and the incidents that are sent across
through the sensitive data to the wrong recipient (Hashizume et al., 2013). The EC2 cloud
service and the security breach is the major issue for the cloud computing model where the
customers lack the control over the data.
Document Page
Mathew, A. (2012). Security And Privacy Issues Of Cloud Computing; Solutions And Secure
Framework. International Journal of Multidisciplinary Research, 2(4).
The issues are related to the cloud assisted systems with the leakage of information and the user
classified data and the privacy issues as the data is stored and then transmitted over the cloud and
the borders. There are patterns where the art research and the development also includes the
service resizing for the DDoS mitigation in the cloud computing environment with the focus on
evaluating the performance based on the affinity based victim service resizing technique. The
issues are also related to the secured wireless networks with the security and the attacks on the
cloud based environments.
Abbas, H., Maennel, O., & Assar, S. (2017). Security and privacy issues in cloud computing.
Important issues not addressed in the paper
Issue 1:
Mathew, (2012), can focus on the risk mitigation measures which could be through COBIT 5 and
handling the risk management through the contracts between the cloud computing between the
customer and the provider. It will also enable the transparency with regards to the processing and
storing the data. The services provided need to be handled with the regulation depending upon
the needs of the customer with allowing the customers to be compliance with the regulation and
the legislation (Xiao et al., 2013). The control is mainly over the risks to ensure the
confidentiality, integrity and the authentication control. It is mainly to handle the obligatory
standards with the services that are depending upon the organisational aspects like management,
contracting and the legal enforcement.
Issue 2:
Document Page
Abbas et al., (2017)., need to focus on the service oriented architecture with the focus on the in-
house managed enterprise. The internal and external threats are set with the risks mitigation and
risk acceptance. The threats are mainly against the information assets that reside in the cloud
computing environment. The capability is to handle the security risks which are associated with
the cloud and the major focus is on the emerging with the cloud security risks. The external
tracker threats need to be handled with the attempt for the hardware attack, social engineering
and the supply chain attacks by the dedicated attackers. The data leakage needs to be handled
with the widespread of the data leakage among the potential competitor organisations.
Impact of the above issues not discussed and application
in real world
Issue 1:
The COBIT 5 needs to be handed at the different effective levels. This is important for handling
the IT governance and risk mitigation is based on the deployment models (Kshetri, 2013). With
this, the computation is based on the access controls with the incorporation into the framework
and test on the SaaS hosted applications to make sure of the features that are functional and
working.
Issue 2:
The security enhancement for the cloud computing is mainly to improve the security challenges
with the employing and maintaining the secured infrastructure on the client side. The secured
VPN, with the change in the default vendor providing passwords and the host side firewalls with
the patch management. The security policies work on setting and planning the security factors,

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
with the check of the employees, accessing the restrictions and setting to staff. The obligatory
functions are set with the password change with the stipulated time. The data backup and the
recovery is set and important for the patch updates and logs which can easily be carried out at
different regular intervals (Hashem et al., 2015). The providers are completely equipped with he
services that are removed from the cloud.
Lesson learnt
The cloud computing includes the scalability and the efficiency with the management of the IT
resources in organisations (Suo et al., 2013). It works on the flexibility with the cloud that brings
the change in the privacy and the security. The providers and the consumers tend to follow the IT
resources, processing power, storage, data centre with service and compliance. The organisations
are working on the cloud computing with the consideration based on data sensitivity to plan
beyond the firewall. The organisation focus on the safety measures and the policies that is
followed by the provider with the alignment to the privacy and the security requirements.
Conclusion
The cloud computing encompasses the client and the server where the security of the data
management business strengthens the client side. The physical and the logical safety is based on
maintaining the secured client, where the clients need to consider the secured VPN to connect to
the providers. The cloud providers tend to work with the API with the controlled, monitoring and
setting the cloud services. It is important to focus on the API with the protection against any of
the accidental and the malicious attempts (Almorsy et al., 2016). There are different plugins and
the applications related t the automatic updates which tend to append the security concerns. The
Document Page
standards are set with the data use,maipulationand the modification of the data which has been
stored in the cloud for the customers.
References
Abbas, H., Maennel, O., & Assar, S. (2017). Security and privacy issues in cloud computing.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv
preprint arXiv:1609.01107.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big
data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security
issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.
Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional
evolution. Telecommunications Policy, 37(4), 372-386.
Mathew, A. (2012). Security And Privacy Issues Of Cloud Computing; Solutions And Secure
Framework. International Journal of Multidisciplinary Research, 2(4).
Sen, J. (2013). Security and privacy issues in cloud computing. Architectures and Protocols for Secure
Information Technology Infrastructures, 1-45.
Suo, H., Liu, Z., Wan, J., & Zhou, K. (2013, July). Security and privacy in mobile cloud computing.
In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th
International (pp. 655-659). IEEE.
Ullah, K., & Khan, M. N. A. (2014). Security and Privacy Issues in Cloud Computing Environment: A
Survey Paper. International Journal of Grid and Distributed Computing, 7(2), 89-98.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for
storage and computation in cloud computing. Information Sciences, 258, 371-386.
Document Page
Xiao, Z., & Xiao, Y. (2013). Security and privacy in cloud computing. IEEE Communications Surveys &
Tutorials, 15(2), 843-859.
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]