logo

ITC595 Information Security : Doc

   

Added on  2021-06-18

5 Pages3376 Words100 Views
CLOUD COMPUTING SECURITYTHREATS A. AuthorITC595 MIT, School of Computing & Mathematics, Charles Sturt Universityauthor@first-third.edu.auABSTRACT – Cloud computing is a technology that fulfills the customers energetic resources demands and it creates the job much simpler to focus on the platforms for the users. Cloud computing is the delivery of the computing services over the web [18]. Cloud enables people and organizations to carry out numerous degrees of tasks for example the utilization of the online storage space, adoption of the enterprise programs, progression of the personalized computer software in addition to the development of practical network environment. Security concerns have been given rise to immerging active areas of the research as a result of the many security threats which many businesses have encountered presently.Addressing of these issues entails getting confidence from the users for the cloud applications as well as services. In this research, it identifies major security threats of the cloud computing systems, and at the same time introducing the most suitable preventive methods for them. The research would also cite the aspect that would be focused on when talking about the cloud security. The research illustrates a temporary description of precisely what cloud computing security affiliated are, and discusses the data security along with privacy protection issues that are related to the cloud computing across various stages of the data life cycle [19]. It could accentuate the current preventive methods for the data securityalong with privacy protection issues in cloud computing.Keywords— cloud computing, security threats of cloud computing and loud computing threats ACKNOWLEDGEMENTI would like to thank my lecturers and teachers who have provided me with this opportunity of completing this research project. Next, I would like to thank my friends and teachers for providing me with ample knowledge for completing this research in the mentioned time frame.INTRODUCTIONThe cloud computing technology has changed the way that organizations store, use and share their applications, data and workloads which has resulted in various security threats and challenges. The particular cloud environment becomes a target for every attackers as a number of services are hosted by the cloud which involves transfer of information to the public cloud services. The procedure of protecting the data becomes more complex for the cloud environment as the utilization of cloud services increases [7]. One important factor that needs to be considered is that the cloud services need to be protected from not only the cloud service providers but also the prospective users who are using the cloud network. A number of security threats of cloud computing have been mentioned in the report below. The report also mentions the preventive methods for the particular security threats conclusively.A.Research Problem The landscape of modern technology has been completely revolutionized by cloud computing. It has changed the way that organization operate and has provided them with a huge number of advantages. Theresearch problem revolves around the privacy and security issues which are faced by cloud computing on a daily basis and proposes certain preventative methods for addressing the mentioned issues.B.Research Justification

Cloud computing issues have been previously discussed in other research papers but the justification of this particular research paper is that the topics are all relevant to the current scenario and not hypothetically based.LITERATURE REVIEWOverview of cloud technology The procedure by which the resources of IT are collected through certain tools (web based) of the internet and not from a directly connected server is known as cloud computing. Instead of a local physical storage device, the information is saved in a remote database which is cloud based. The cloud computing technology can be widely differentiated into three types: SaaS, IaaS and PaaS.The cloud computing technology has proved itself to be one of the most innovative technology of the modern era. Just like any other technology, it has its own share of advantages as well as disadvantages. Large organizations such as Amazon and Google use cloud computing services on a daily basis [9]. It provides other organizations the benefit of setting up innovative infrastructure at a reasonable cost, but comes with several security and privacy issues.Relevant technologies and applications of cloud computing There are several applications of cloud computing which are used by organizations to manage, acquire and maintain an IT infrastructure effectively. Cloud computing is also used in private as well as hybrid cloud environments. Instead of setting up additional manpower and physical assets, cloud computing is used in several scenarios for development and test purposes [1]. For analysing and extracting customer information, cloud computing is often paired with big data technology. The technology is used foraccessing information from virtually anywhere. It is also used in disaster recovery and remote backup systems.Security challenges/problems of cloud computing Cloud computing has its own share of security problem and challenges that are mentioned below.The first security challenge of cloud computing technology is its integration with shared technologies. The infrastructure, applications and platforms are all shared in a cloud environment by the service provider. Due to the shared environment, one single security breach can compromise the entire cloud network [17]. The security attack can potentially affect the CPU caches, shared storage and database services which are present in the same network. One of the reason for this security issue is improper defensive processes of the network system.The next security problem of cloud computing is DDoS attack. This security challenge is an application level attack and has the capability to compromise web servers as well as database vulnerabilities. Without completely shutting the system down, the DdoS attack sends a bunch of automated requests which damages the cloud based services [2]. The attackers have kept up pace with the security developments of the cloud technology and have improvised their sophisticated methods to conduct these attacks.Next, comes the security threats from the data loss security factor. A minute chance of data being intercepted by an unscrupulous attacker or a user is always present whenever a user uploads information into a cloud environment. This can result in the loss of millions of dollars for the prospective organization. Last year, the data loss factor has resulted in the loss of around $4 billion for organizations as per the reports claimed by Health Information Trust Alliance.Next, comes the security threat from Advanced Persistent threats or APTs. These threat carries out its malicious operations in a parasitic form and are very hard to detect [4].Another serious security issue of cloud computing is the threat from insiders. In an organization, several employees get access to the cloud network. If an employee decides to leach vital information from his or her company to another competitive company, then it can cost the primary company millions of

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Threats in Cloud Computing PDF
|15
|3403
|51

Cloud Computing in Financial Sector: Current Security, Privacy Issues and its Solutions
|46
|14528
|272

Security Threats in Cloud Computing and Preventive Methods
|13
|3873
|83

Security Threats in cloud Computing PDF
|5
|3296
|46

Security threats in cloud computing and preventive methods
|3
|514
|438

Data Breach in Cloud Services
|4
|536
|96