logo

(PDF) Top Threats to Cloud Computing Security

13 Pages2463 Words122 Views
   

Added on  2021-05-30

(PDF) Top Threats to Cloud Computing Security

   Added on 2021-05-30

ShareRelated Documents
Running Head: CLOUD COMPUTING SECURITY THREATS1SECURITY THREATS IN CLOUD COMPUTING
(PDF) Top Threats to Cloud Computing Security_1
CLOUD COMPUTING SECURITY THREATS2Abstract Cloud computing is an innovation that has transformed the traditional way of accessingsoftware’s, storage structures, servers and managed services by allowing users to access them viathe Internet. As such, it offers a lot of benefits including cost savings, quicker innovation, fastermarketing, operations flexibility and easy data and information access. Cloud computing hasgrown extensively since its launch as a result of the substantial benefits it offers individuals andbusinesses according to Gartner. However, since it is a rapidly emerging development it is stillfacing huge challenges both as a concept and in reality such as difficulty in interoperabilityinsecurity. This report describes cloud computing including technologies that are used in cloudcomputing, such as implementation models. It also identifies and discusses some of the majorcloud computing security challenges. Specifically, the report discusses security and privacyissues through data breaches and regulatory challenges in cloud systems. Following, measures toreduce these issues have been suggested. Additionally, areas lacking in cloud computing securityresearch has been identified alongside a summarized discussion on future research areas withregard to cloud computing technology.
(PDF) Top Threats to Cloud Computing Security_2
CLOUD COMPUTING SECURITY THREATS3Table of ContentsAbstract.......................................................................................................................................2Introduction to Cloud Computing...............................................................................................4Cloud Computing Service Models..............................................................................................4Cloud Computing Delivery Models............................................................................................5Security Challenges in Cloud Computing...................................................................................5Cloud Security Threats................................................................................................................6Research Gap for Cloud Security................................................................................................8Measures to Reduce Security Threats.........................................................................................8Conclusion and Future Research Direction.................................................................................9References.................................................................................................................................11
(PDF) Top Threats to Cloud Computing Security_3
CLOUD COMPUTING SECURITY THREATS4Introduction to Cloud ComputingAccording toNational Institute for Standards and Technology (NIST), cloud computingis atechnology that facilitates suitable access to configurable computing resources and infrastructuresuch as software, servers, networks, storage infrastructure[ CITATION NIS18 \l 1033 ]. Cloudcomputing services can be accessed with little efforts from an organization’s management orservice providers [ CITATION Jay11 \l 1033 ]. Another basic way to define cloud computing isthat it is a development that delivers software’s and IT resources such as managed services overthe Internet and through software and hardware in datacenters. Google, Microsoft and Amazonare some of the popular companies that provide cloud computing services for Industries[ CITATION Sta18 \l 1033 ]. Cloud Computing Service Models Cloud computing can be implemented in form of several services including as software,infrastructure and platform in services termed software as a service, infrastructure as a serviceand platform as a service[ CITATION Dan11 \l 1033 ]. Software as a service allow customers to access any applications over the Internet without the need to necessarily install it in the machines. This way they don’t bother withupdates and upgrades because they always access an updated copy of the application. Infrastructure as a service allow users to be able to access IT infrastructure components such as servers, storage drives, networks and morePlatform as a service enable mostly developers and system designers access applications for developing environments solely online. Such a service protects developers from loss of code since everything is stored on the cloud and can be accessed from anywhere.
(PDF) Top Threats to Cloud Computing Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Systems and Applications - Q&A
|8
|2987
|14

Cloud Computing Strategy for Regional Gardens Limited
|18
|5931
|187

Security and Privacy Issues in Cloud Computing - Assignment
|12
|2557
|36

Cloud Computing Security PDF
|13
|3038
|39

Security Threats in Cloud Computing and Preventive Methods
|4
|2565
|96

Cloud Computing Security Challenges
|15
|4893
|403