logo

Security Threats in Cloud Computing and Preventive Methods

13 Pages3873 Words83 Views
   

Added on  2023-03-23

About This Document

This research project explores the security threats in cloud computing and suggests preventive methods to protect data. It discusses various threats such as malware attacks, data loss, and account hacking, and provides insights on preventive measures. The project also covers different cloud technologies and their applications.

Security Threats in Cloud Computing and Preventive Methods

   Added on 2023-03-23

ShareRelated Documents
RESEARCH PROJECT 0
Security threats in cloud
computing and preventive
methods
Security Threats in Cloud Computing and Preventive Methods_1
RESEARCH PROJECT 1
Abstract
Cloud computing is an emerging innovation and it has become one of the most
widely recognized services in the corporate world because it gives remote accessibility
to its users. It has achieved huge fame for previous years. However, it is still facing
severe threats to internet security. Cloud computing has benefits like capital cost
reduction, globalization of the workforce, economic savings and service flexibility etc.
Cloud computing has many positive edges but IT businesses have expressed their
apprehension about safety concerns which is a threat to them such as data security,
which directly impacts on the user's data or information. There are various kinds of
security issues which will be discussed in this research such as malware attack, loss of
data, account/service hacking, phishing and so on. Taking a glance over the threats,
many prevention methods emerge such as transparent cloud protection system (TOPS),
using client-based privacy manager, using migrate image management system,
architecture security and the most crucial that is data security. Therefore, this paper
shows the security threats and risks linked with cloud computing and suggests several
steps for securing cloud computing. I have selected this topic because the use of internet
and cloud computing is growing rapidly and many users store their data on cloud which
create numbers of risk, so it is very important for users to identify the risks factors
linked with the cloud computing. From this investigation, we will provide methods and
techniques to prevent security-related threats and risk in cloud computing.
Security Threats in Cloud Computing and Preventive Methods_2
RESEARCH PROJECT 2
Table of Contents
Overview of the technology..................................................................................................................3
Relevant technologies and their applications........................................................................................4
Public cloud technology.....................................................................................................................4
Applications.......................................................................................................................................4
Private cloud technology...................................................................................................................5
Applications.......................................................................................................................................5
Hybrid cloud technology....................................................................................................................5
Applications.......................................................................................................................................5
IaaS technology.................................................................................................................................5
Applications.......................................................................................................................................6
PaaS technology................................................................................................................................6
Applications.......................................................................................................................................6
SaaS technology.................................................................................................................................6
Applications.......................................................................................................................................6
Challenges and issues linked with cloud computing..............................................................................7
Data Breach.......................................................................................................................................7
Loss of data........................................................................................................................................7
Account hacking................................................................................................................................7
Denial of service attack......................................................................................................................7
Malware attack..................................................................................................................................8
Shared technology problems.............................................................................................................8
Gaps in the literature.............................................................................................................................8
Future research direction......................................................................................................................9
Conclusion.............................................................................................................................................9
References...........................................................................................................................................10
Security Threats in Cloud Computing and Preventive Methods_3
RESEARCH PROJECT 3
Overview of the technology
The term cloud computing is defined as the communication technology which is
mainly used for describing data centres available to many consumers over the computer
networks and the internet. It is one of the best technology which is now used by many
companies and consumers but security is a common concern with cloud computing. A
recent study identified that cloud computing delivers the self-service capability to
consumers with scalable features in order to enhance usage on the requirement
(Almorsy, Grundy, & Müller, 2016). Moreover, it has the ability to store a large number
of data sets in third-party data centres.
Security of cloud is completely based on major two aspects such as safety issues
confronted by the cloud workers and safety problems tackled by the clients (AlZain,
Pardede, Soh, & Thom, 2012). The major goal of cloud technology is to deliver effective
services to their consumers and manage their large amount of data or information.
Arora, Wadhawan, & Ahuja, (2012) identified that privacy is a very significant issue for
cloud technology in terms of lawful obedience and user’s faith.
Due to such kind of issues companies and users may be lost their private details
and data files and cloud-based services use internet connectivity which are also
associated with the security risks. It is analysed that cloud technology is a calculating
framework which allows the distribution of capitals on request in an effective manner
(Ashktorab, & Taghizadeh, 2012). There are numerous advantages of cloud-based
services such as cost saving, improved suppleness and provide better scalability to the
users. It is observed that cloud computing provides the major three kinds of services
which are described below:
Infrastructure as a facility
Platform as a service
Software as a service
IaaS is defined as the foundation of cloud computing which is used to provide
services like store space, managing organizational data, and processing collected data.
The PaaS kind of services are developed for providing application related services to the
consumers and companies can be used for improving their business performance (Chen,
Security Threats in Cloud Computing and Preventive Methods_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Threats and Vulnerabilities of Cloud Computing: A Review
|4
|723
|381

Security Threats in Cloud Computing
|4
|668
|210

Issues in Cloud Computing
|8
|1820
|86

Risks Associated with Cloud Computing Technology
|5
|851
|438

Security threats in cloud computing and preventive methods
|11
|2278
|63

Wireless Network Security and Preventive Techniques
|13
|2943
|220