logo

Cyber Security Research Project 2022

   

Added on  2022-10-04

6 Pages2247 Words27 Views
Research project: Cyber Security
A. Author
Abstract
The document followed is a template. In
this, discussion has been carried on the
concept of cloud computing including
the threats of cloud computing. At the
same time, preventions have also
discussed.
Key words:
Cloud computing, threats and
preventions.
Security threats in cloud computing and
preventive methods
Introduction
Cloud computing is seen as the latest
development in the computer technology.
It is said to be the process of using
different network of the remote servers
that are hosted by internet. Remote server
networks are being use in managing as
well as storing data. It tends to allow the
sharing of the processing computer
resources [8]. Cloud computing makes the
work easier for the big industries that
depends on the web in performing their
operations.
Cloud computing provides several benefits
that are attractive to the business enterprise
and computer users across the globe
[8].Several companies expand in terms of
number of employees or size that demands
the higher number of computers to run
such business. The services that are being
offered by the cloud computing can be
individual services, public or the
integration of both that is known as hybrid
cloud service. Third part network provider
gives or provider the cloud services in the
internet. Due to this, public cloud services
are in huge demand. The most leading
cloud services are web services of
Amazon, Google search engine and
Microsoft Azure at the same. Private cloud
services deliver the data only to internal
users. It helps in preserving the security
and identity of the local data centres.

However, users are not charged for the use
of services. Services of cloud computing is
divided into three categories. It includes
software, platform as a service and
infrastructure as a service. The users
therefore can access these tools over the
internet with the help of portals on the
web.
Research issues and questions
In the recent time, cloud-computing
technology has been facing several issues
and challenges. it will address the
following questions:
What are the threats faced by cloud
computing?
How has the issues has evolved
over the past few years?
What are the measures that can be
taken for preventing the threats of cloud
computing?
Considering the cloud computing
infrastructure, there has been challenges
seen such as transfer rates, performance,
and the limited capability of the cloud
computing. The major research issue is
that the scope of cloud computing is so
vast. Due to this, the possibility of some
missing information can be seen during
research.
Literature Review
Threats that are seen form cloud
computing
[2] has discussed that several threats are
being seen by using cloud computing
technology. Enterprises as well as users
can face huge risks when processes or
stored using cloud computing. The major
threat that can be faced from cloud
computing is the data loss. Whenever data
is stored with the help of cloud computing,
it can be lost due to various reasons. For
example- data can be lost due to drive or
hard failure, or could be delete by CSP
accidentally. SaaS (software as a service)
has also raised several security issues as
users have less control over the security in
processing, transferring, as well as storage
of data. Moreover, “Platform as a service”
also tends to facilitate the deployment of
some of the application that is PaaS
provider. It is responsible for the security.
It results to some of the challenges such as
application development life cycle, third
party relationship, as well as infrastructure
security. Insecurity is also one such threat
that is caused with the adoption of cloud
computing technology. It might be
possible that attackers get some of the
cloud service exposed to the internet and
further use them to compromise the
enterprise by lacking integrity and
confidentially of the data. Lack of
understanding is also one such threat faced

due to cloud computing. Some of the
enterprise and users also not understand
how the application works. This tends to
become the challenge for the enterprise
and users to use the cloud computing.
Other threat due to the cloud computing is
the lack of awareness. Due to the
uneducated enterprises or users, attacks are
occurred which further result into the loss
of data [5].
Moreover, privacy and security is the
biggest challenge faced due to the cloud
computing. When data is being stored with
the help of cloud computing, it lacks the
privacy and security when engineers are
not able to design the cloud services in
appropriate manner; it leads to increase in
privacy risk. At the same time, control in
the cloud system includes the data, its
infrastructure, and applications. At the
same time, cloud computing system
always involve distributed computation on
the wide number of data across the
computer nodes [7].
Cloud has become the growing force in the
computing for meeting the needs and
requirements of businesses. In order to
increase the collaboration across wide
number of locations, it tends to raise the
security concerns. In the recent time, cloud
era has brought the availability of services
to the million people. Most of the cloud
applications and services are using API
(application programming interface) that
directly affects the security of cloud
services. [4] in his journal has found that
the chances of hacking also increases when
companies give the access of API to the
third party. As a result, it will also lose the
credential information in relation to the
customers as well as other parties [6].
Ways to prevent the threat due to cloud
computing
Enterprise and users are required to be
educated on how attacks can bring data
loss. It can be prevent only with the help of
cloud services. Cloud competing service
has the proper responsibility to secure its
enterprise and users from the challenges
and threats. This might help the cloud
service to the customers. Besides this,
cloud services should ensure proper and
enough supply of the network coverage.
This will help in enabling the users to
ensure enough access to the cloud
computing services across the world. The
cloud service should also support the
education to remove the illiteracy among
the people across the world. Cloud
computing service should also create the
awareness to the users [2].
[4] said that ,in order to solve the problem
of data leaking, Fragmentation redundancy
scattering can be sued. It helps in securing
the storage. Cloud migration is also seen as

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing: DTGOV Web Server in AWS Cloud
|18
|1136
|71

Security in Cloud Computing and Preventive Methods Assignment
|14
|3523
|58

Security Threats in Cloud Computing
|4
|668
|210

(PDF) Top Threats to Cloud Computing Security
|13
|2463
|122

Security Threats in Cloud Computing
|3
|2604
|41

Network Security Assignment Solution
|10
|2709
|111