logo

Effectiveness of Security in Cloud Computing

   

Added on  2023-04-10

71 Pages14520 Words443 Views
Professional DevelopmentTheoretical Computer ScienceData Science and Big DataPhilosophyWeb DevelopmentDatabasesPolitical Science
 | 
 | 
 | 
Running head: EFFECTIVENESS OF SECURITY IN CLOUD COMPUTING
Effectiveness of Forensics or Security in Cloud Computing
Name of the Student
Name of the University
Effectiveness of Security in Cloud Computing_1

2EFFECTIVENESS OF SECURITY IN CLOUD COMPUTING
Abstract
In this majorly prevalent cloud-computing era, the data centres play one of the crucial roles as
cloud infrastructure providers. However, these cloud data centres face exponential amount of
security threats related to cloud computing networks, platforms, intranets and internet. The
various forms of cloud security issues range from the provider’s security failure, reliability
and availability issues, external customer attacks, regulatory and legal issues, broken
perimeter security models, insecure API (Application Programming Interface), malicious
insiders, data leakage or loss, shared technology vulnerabilities and so on. Therefore, the
cloud service providers and cloud service users both need to follow certain implementation
guidelines and principles to take a step further towards ensuring cloud security. In order to
overcome the major security challenges of cloud computing, the cloud providers establish a
number of security measures and controls. Based on the type of cloud providers these
security measures vary significantly. The major solutions to cloud computing security
problems include access control, authentication, and encryption mechanisms. However, it is
important to analyse the effectiveness of these solutions. In this research paper, the
effectiveness of these cloud security solutions will be evaluated in order to identify existing
security issues if any and thereby, make recommendations for improvement.
Effectiveness of Security in Cloud Computing_2

3EFFECTIVENESS OF SECURITY IN CLOUD COMPUTING
Acknowledgement
Conducting this research has been one of the most enriching experiences of my life. The
contribution of this research to enhance my knowledge base and analytical skill has been
paramount. It gave me the opportunity to face challenges in the process and overcome them.
This would not have been possible without the valuable guidance of my professors, peers and
all the people who have contributed to this enriching experience. I would like to take this
opportunity to thank my supervisor _____________________________________ for the
constant guidance and support provided to me during the process of this research. It would
not be justified if I did not thank my academic guides for their important and valuable
assistance and encouragement throughout the research process. I would also like to thank my
friends who had provided me with help and encouragement for collecting primary data and
valuable resources. Finally, I would like to thank the professionals from the retail industry
who have participated in the research survey and provided with valuable inputs into the
subject. The support of all these people has been inspiring and enlightening throughout the
process of research in the subject.
Heartfelt thanks and warmest wishes,
Yours Sincerely,
Effectiveness of Security in Cloud Computing_3

4EFFECTIVENESS OF SECURITY IN CLOUD COMPUTING
Table of Contents
Chapter 1 – Introduction............................................................................................................6
1.1 Introduction......................................................................................................................6
1.2 Research Aim...................................................................................................................6
1.3 Research Objectives.........................................................................................................7
1.4 Research Questions..........................................................................................................7
1.5 Background of the Topic..................................................................................................8
1.6 Rationale of the Study......................................................................................................9
1.7 Purpose of the Study........................................................................................................9
1.8 Structure of the Study.....................................................................................................10
1.9 Summary........................................................................................................................12
Chapter 2 – Literature Review.................................................................................................13
2.1 Introduction....................................................................................................................13
2.2 Cloud Computing Basic Concepts.................................................................................13
2.2.1 Cloud Computing Service Models..........................................................................14
2.2.2 Cloud Computing Deployment Models..................................................................16
2.3 Advantages of Cloud Computing...................................................................................21
2.4 Security in the Cloud......................................................................................................22
2.4.1 Types of Security Threats and Risks in Cloud Computing.....................................23
2.4.2 Types of Security Solutions in Cloud Computing..................................................25
2.5 Benefits of the Cloud Security Mechanisms..................................................................27
Effectiveness of Security in Cloud Computing_4

5EFFECTIVENESS OF SECURITY IN CLOUD COMPUTING
2.6 Drawbacks of the Cloud Security Mechanisms.............................................................29
2.7 Summary........................................................................................................................30
Chapter 3 – Research Methodology.........................................................................................31
3.1 Introduction....................................................................................................................31
3.2 Method Outline..............................................................................................................31
3.3 Research Philosophy......................................................................................................31
3.3.1 Justification for selection of the chosen Philosophy...............................................31
3.4 Research Approach........................................................................................................31
3.4.1 Justification for selection of the chosen Approach.................................................31
3.5 Research Design.............................................................................................................31
3.5.1 Justification for selection of the chosen Design......................................................31
3.6 Data Collection Process.................................................................................................31
3.6.1 Data Sources: Primary and Secondary....................................................................31
3.6.2 Data Techniques: Qualitative and Quantitative......................................................32
3.7 Population and Sample.......................................................................................................33
3.7.1 Sampling Method....................................................................................................33
3.7.2 Sample Size.............................................................................................................33
3.9 Ethical Consideration.....................................................................................................34
3.10 Limitations of the study...............................................................................................35
3.11 Summary......................................................................................................................36
Chapter 4 – Data Analysis........................................................................................................37
Effectiveness of Security in Cloud Computing_5

6EFFECTIVENESS OF SECURITY IN CLOUD COMPUTING
4.1 Introduction....................................................................................................................37
4.2 Quantitative Analysis.....................................................................................................37
4.3 Issues identified..............................................................................................................54
4.4 Summary........................................................................................................................55
Chapter 5 – Conclusion and Recommendations......................................................................57
5.1 Conclusion......................................................................................................................57
5.2 Linking with the Objectives...........................................................................................57
5.3 Recommendations..........................................................................................................59
5.4 Future Scope of the Study..............................................................................................60
References................................................................................................................................61
Effectiveness of Security in Cloud Computing_6

7EFFECTIVENESS OF SECURITY IN CLOUD COMPUTING
Table of Figures
Figure 1: Different cloud computing models...........................................................................17
Figure 2: Public cloud deployment model...............................................................................20
Figure 3: Private cloud deployment model..............................................................................21
Figure 4: Hybrid cloud deployment model..............................................................................22
Figure 5: types of data breaches and the percent of incidents of its type.................................25
Figure 6: A DDoS attack..........................................................................................................26
Effectiveness of Security in Cloud Computing_7

8EFFECTIVENESS OF SECURITY IN CLOUD COMPUTING
Chapter 1 Introduction
1.1 Introduction
Cloud computing is the hottest topic in the present era of technology where
companies are making revolutionary changes in their way of implementing information
systems through cloud computing. Cloud services have tremendously helped the IT industry
to reach newer heights by means of offering unlimited data storage and capacity, market
environment as well as a scalable and flexible computing and processing power that matches
the elastic supply and demand and at the same time reduces capital expenditure (Khan, 2016).
Therefore, the adoption of cloud computing environment is spreading in a rapid manner and
bringing more and more opportunities for companies around the world. The profound impact
of the cloud computing capabilities cannot be ignored. As a result of its perceived open
nature, it raises strong privacy, security and trust concerns. The shared and distributed
resources in the cloud essentially reside in an open environment in the network (Almorsy,
Grundy & Müller, 2016). Hence, it naturally attracts a number of security threats and
vulnerabilities. Hence, cloud service providers require safeguarding the security and privacy
of the confidential, personal and private data pertaining to the cloud users or clients, which
the providers host, store and process as third party on behalf of the company. According to
Khan& Al-Yasiri (2018), the most common forms of security issues seen in a cloud
environment can be insecure APIs or Application Programming Interfaces, data crash, traffic
hijacking, wicked insiders, shared technology issues, misuse of cloud computing capabilities.
1.2 Research Aim
The primary aim of this study is to investigate the security requirements in cloud
computing and understand the implications and issues in cloud environment. For this
purpose, the study will involve a thorough research and review of the security threats, issues
Effectiveness of Security in Cloud Computing_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Research Report on IoT into Education
|43
|10248
|369

A Study of Load Balancing in Cloud Computing
|45
|10860
|52

Blockchain Technology Application in Supply Chain Management Acknowledgement
|102
|24027
|354

Project Life Cycle in Property Development Business: A Case Study of Construction Company
|57
|10974
|186

The role of Change Management in Business Process Management Maturity Models
|81
|27055
|409

Case Study on Stress on Employee Performance F&B Industry
|109
|19548
|49