logo

Article on Use of Cloud Computing and Security Issues

17 Pages4899 Words86 Views
   

Added on  2020-05-28

Article on Use of Cloud Computing and Security Issues

   Added on 2020-05-28

ShareRelated Documents
Running Head: EMERGING TECHNOLOGIES AND INNOVATIONEmerging Technologies and InnovationName of the StudentName of the University
Article on Use of Cloud Computing and Security Issues_1
1EMERGING TECHNOLOGIES AND INNOVATIONArticle 1: Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligentcryptography approach for secure distributed big data storage in cloudcomputing.Information Sciences,387, 103-115.In this article, the authors have discussed about the use of cloud computing and itssecurity issues faced during big data management. The authors have emphasized that cloudcomputing has a wide range of uses in business organizations and hence, there should be nocompromise with the security of the cloud during big data management. Big data management isan extremely complex task as it involves management of large and complex datasets and cloudcomputing helps to handle and manage these operations according to requirements. Most of thedatasets handled by big data are confidential and secure information of business organizationsand hence, they are the preferred targets of unethical internet users and hackers. Hence, cloudsecurity is the most essential requirement for business organizations so that their confidentialdata and information are not lost due to breach of security attacks.Article 2: Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., &Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open researchissues.Information Systems,47, 98-115.In this article, the authors have described about the relations between cloud computing,big data management and Hadoop technology. The discussion of the relations between thedifferent technologies enabled the authors to realize the amount of data that is daily managedthrough big data and need for proper security. As per the authors, the volume of data entered intothe big data are rising at an exponential pace as more and more data servers are virtualizedinstead of using physical storage spaces. As a result, hackers are using more advanced techniques
Article on Use of Cloud Computing and Security Issues_2
2EMERGING TECHNOLOGIES AND INNOVATIONto break into such data servers and steal confidential information from them. Even though thebusiness organizations are using suitable security measures like data encryption, system andnetwork firewalls, security softwares and others, every day, thousands of gigabytes of data andinformation are stolen by the hackers and other unethical third party users. This is because theirhacking technologies are also evolving and getting stronger at a rapid pace.Article 3: Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associatedwith big data in cloud computing.International Journal of Network Security & ItsApplications,6(3), 45.The authors have mainly studied about the hacking technologies that are mostlyresponsible for breaching the security of the cloud computing in big data management. Theyhave emphasized on the need to develop and upgrade current security systems at a faster pacethat the hacking technologies that are the main threats of cloud computing. As per the authors,the hackers use decoding technologies to break through data encryptions and steal data from thedecrypted data packet. The most common technique used by them is the injection of maliciousfiles into the system that can work itself to reach data packets and start decryption work on thesame. While some malicious files can be detected easily by the system firewalls and ejected outof the system, some others are non-detectable until they have completed the decryption processentirely. These types of malicious files are masked with different identified and hence are hard todetect as spam. These files generally come through online advertisements, emails and others.Article 4: Lu, R., Zhu, H., Liu, X., Liu, J. K., & Shao, J. (2014). Toward efficientand privacy-preserving computing in big data era.IEEE Network,28(4), 46-50.
Article on Use of Cloud Computing and Security Issues_3
3EMERGING TECHNOLOGIES AND INNOVATIONThe authors have explored how the masking of the spam files enter into the systemwithout alerting the system firewalls. While using the systems, some users browse the internetfor various websites and in many of these, various advertisement links pop up. While some areauthentic advertisements, others are malicious files masked as advertisements. Furthermore,most of the masked files advert for very popular organizations like amazon and quickly raise theinterest of the user. Whenever the user clicks on the link, instead of redirecting to the companypage, the link downloads the malicious file into the system of the user. Once downloaded, thefile works itself to spread into other systems connected to the same server and even the centraldatabase server. In each of the places, the files capture data packets and in case of encrypteddata, the files use their decryption techniques for breaking into the packets and captureinformation. Article 5: Sookhak, M., Gani, A., Khan, M. K., & Buyya, R. (2017). Dynamic remotedata auditing for securing big data storage in cloud computing.Information Sciences,380,101-116.The authors investigated another possible reason that causes the security issues in cloudcomputing. They stated that the users of cloud can manage the data that is used in cloud but haveno control over the data once they are stored inside the server i.e. the users can determine thedata management processes to be conducted by the cloud they cannot determine the locationwhere the data will be stored. As a result, from the user’s end, data storage location cannot besecured and hence, if a malicious file is injected inside the cloud storage, the user cannot recoverthe contents from the server. Hence, it is recommended that the entire network connected to thecloud should be secured so that the malicious injections do not work at all.
Article on Use of Cloud Computing and Security Issues_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Crime for New Threats of 2018 - Desklib
|6
|477
|389

Article on Network Security
|6
|1219
|38

Introduction to the Hacker Ethics
|13
|4094
|243

Unethical and Security Issues of AEnergy Company
|5
|1195
|272

Computer Security Risk Management and Legal Issues - Uber Data Breach
|3
|840
|149

Cloud Computing and Cloud Migration: A Comprehensive Study
|13
|846
|274