(PDF) Top Threats to Cloud Computing Security
13 Pages2463 Words122 Views
Added on 2021-05-30
(PDF) Top Threats to Cloud Computing Security
Added on 2021-05-30
ShareRelated Documents
Running Head: CLOUD COMPUTING SECURITY THREATS1SECURITY THREATS IN CLOUD COMPUTING
CLOUD COMPUTING SECURITY THREATS2Abstract Cloud computing is an innovation that has transformed the traditional way of accessingsoftware’s, storage structures, servers and managed services by allowing users to access them viathe Internet. As such, it offers a lot of benefits including cost savings, quicker innovation, fastermarketing, operations flexibility and easy data and information access. Cloud computing hasgrown extensively since its launch as a result of the substantial benefits it offers individuals andbusinesses according to Gartner. However, since it is a rapidly emerging development it is stillfacing huge challenges both as a concept and in reality such as difficulty in interoperabilityinsecurity. This report describes cloud computing including technologies that are used in cloudcomputing, such as implementation models. It also identifies and discusses some of the majorcloud computing security challenges. Specifically, the report discusses security and privacyissues through data breaches and regulatory challenges in cloud systems. Following, measures toreduce these issues have been suggested. Additionally, areas lacking in cloud computing securityresearch has been identified alongside a summarized discussion on future research areas withregard to cloud computing technology.
CLOUD COMPUTING SECURITY THREATS3Table of ContentsAbstract.......................................................................................................................................2Introduction to Cloud Computing...............................................................................................4Cloud Computing Service Models..............................................................................................4Cloud Computing Delivery Models............................................................................................5Security Challenges in Cloud Computing...................................................................................5Cloud Security Threats................................................................................................................6Research Gap for Cloud Security................................................................................................8Measures to Reduce Security Threats.........................................................................................8Conclusion and Future Research Direction.................................................................................9References.................................................................................................................................11
CLOUD COMPUTING SECURITY THREATS4Introduction to Cloud ComputingAccording toNational Institute for Standards and Technology (NIST), cloud computingis atechnology that facilitates suitable access to configurable computing resources and infrastructuresuch as software, servers, networks, storage infrastructure[ CITATION NIS18 \l 1033 ]. Cloudcomputing services can be accessed with little efforts from an organization’s management orservice providers [ CITATION Jay11 \l 1033 ]. Another basic way to define cloud computing isthat it is a development that delivers software’s and IT resources such as managed services overthe Internet and through software and hardware in datacenters. Google, Microsoft and Amazonare some of the popular companies that provide cloud computing services for Industries[ CITATION Sta18 \l 1033 ]. Cloud Computing Service Models Cloud computing can be implemented in form of several services including as software,infrastructure and platform in services termed software as a service, infrastructure as a serviceand platform as a service[ CITATION Dan11 \l 1033 ]. Software as a service allow customers to access any applications over the Internet without the need to necessarily install it in the machines. This way they don’t bother withupdates and upgrades because they always access an updated copy of the application. Infrastructure as a service allow users to be able to access IT infrastructure components such as servers, storage drives, networks and morePlatform as a service enable mostly developers and system designers access applications for developing environments solely online. Such a service protects developers from loss of code since everything is stored on the cloud and can be accessed from anywhere.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Cloud Systems and Applications - Q&Alg...
|8
|2987
|14
Cloud Computing Strategy for Regional Gardens Limitedlg...
|18
|5931
|187
Security and Privacy Issues in Cloud Computing - Assignmentlg...
|12
|2557
|36
Cloud Computing Security PDFlg...
|13
|3038
|39
Security Threats in Cloud Computing and Preventive Methodslg...
|4
|2565
|96
Cloud Computing Security Challengeslg...
|15
|4893
|403