Literature Review on Cloud Security - Report

Added on - 28 May 2020

  • 11

    pages

  • 2983

    words

  • 3

    views

  • 0

    downloads

Showing pages 1 to 4 of 11 pages
Running head: INTRODUCTION TO RESEARCHIntroduction to Research[Name of the Student][Name of the University][Author note]
INTRODUCTION TO RESEARCH1Table of ContentsIntroduction:...............................................................................................................................3Discussion:.................................................................................................................................3A. Cloud security models and solutions:................................................................................3B. Overview of the challenges in cloud security:..................................................................6C. Challenges Faced by the Business Organizations While Using Cloud.............................7Conclusion:................................................................................................................................9References:...............................................................................................................................10
INTRODUCTION TO RESEARCH2Introduction:There are several researches that show that security is one of the key challenges that isfaced in the cloud computing. When considered form the prospect of the customers of cloudcomputing it can be explained as the fact that they have little or no control over the data orthe application along with the infrastructure that is involved in the computing as the cloudservices are mainly delivered by the cloud providers and the clouds are accessed by the use ofinternet (Benslimane et al., 2014). The cloud service provider explains the concern of securityby considering the vulnerabilities regarding the attacks along with the failure of equipment’s,software’s or controls. These are the factors which results in the becoming of the cloudservices to serious deterrents for the adaptation of the cloud computing. This report is aliterature review on cloud security (Kaur & Kumar, 2014). The analysis will be helping inidentifying the potential gaps in the cloud services.Discussion:A. Cloud security models and solutions:The theme which has been covered frequently in “Cloud Computing Security” is thesolutions regarding the security along with the related models. The literature helps indifferentiating the solutions for individual security and the models for security. This oftencombines several individual solutions for the purpose of addressing a particular issueregarding cloud security (Liang, 2014). Most of the individual cloud security solution coversthe effective security management. The key aspect of the security management effectivelymainly includes the complete adaptation of all the policies which provides the essentialguidelines regarding the protection of the data assets. This asset is the part of approachassociated with risk assessment along with this it helps in protection of the key assets of thestandards associated with security management (Eken, 2013). Standards like ITIL and ISO
INTRODUCTION TO RESEARCH327001/27002 are involved in this case. There are also other aspects like the monitoring ofevents, detection and response to incidents, programs for security training, allocation ofeffective resources. Along with this the prospect of the cloud customers is also considered asa relevant criterion which is mainly used for the right selection of the cloud service providers(Bernardo, 2013).The second most import solution regarding threats to cloud security is by encryptionof the data. Encryption also ensures confidentiality of the data along with integrity. All theencryption process is not equal so it is necessary for the providers along with the customers touse latest version of the encryption algorithm (Shuijing, 2014). It is also necessary to use thelonger keys that will be straining the capabilities of the processors. The majority of theresearches conducted mainly includes the various presentations and the comparisons of thevarious encryption schemes and the algorithms.After encryption comes the “identity management and access control”. This mainlycovers the technologies along with the processes that are responsible for the supporting ofmechanism related to authentication and authorisation. This is done for the entities so as toaccess the resources of the cloud (Kumari, & Nath, 2015). The main focus of this topic is onthe various authentication schemes, management of the identity tools along with schemesrelated to access control. Besides this there is advance solution which mainly focuses on themultiple sources of identity along with focusing on the federate identities of different types ofdomains.There are also solutions regarding the compliance and this mainly refers to thecompliance that exists with different Trusted Computing Group Standards. This trustedcomputing systems and the platforms are mainly designed for the purpose of strengtheningthe securities in the cloud and gain the trust of the customers (Elhouni et al., 2014). There are
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Unlock This Document