logo

Security Challenges in Cloud Computing PDF

   

Added on  2020-01-28

38 Pages10339 Words29 Views
Professional DevelopmentVisual ArtsData Science and Big DataDisease and Disorders
 | 
 | 
 | 
What are the security
challenges for consumers
regarding cloud computing
Security Challenges in Cloud Computing PDF_1

Abstract
Aim of the present research is to carry research on security challenges of consumer in
term of cloud computing. With the help of present research, there are many benefits can be
created at workplace regarding easy access of consumable data that considered scalability, cost
efficiency and high reliability of the data. These benefits assists to provide storage services that
provided in cloud computing. Hence, data could be assess for providing relevant information at
workplace. In this project, quantitative research methods has been used that assists to find out
results on the basis of questions. Survey and interviews are also such important elements that
assists to collect relevant information. However, findings determines in easy way that assists to
face challenges that are related find different aspects.
Security Challenges in Cloud Computing PDF_2

Table of Contents
Introduction......................................................................................................................................3
Aims ................................................................................................................................................3
Outline of the research.....................................................................................................................4
Purpose of research .........................................................................................................................4
Research Rationale...........................................................................................................................4
Research context..............................................................................................................................5
Literature review..............................................................................................................................5
Primary Research Methods..............................................................................................................8
Conclusion.......................................................................................................................................8
CHAPTER 3: RESEARCH METHODOLOGY.............................................................................1
Mixed methodology....................................................................................................................1
CHAPTER 4: DATA COLLECTION.............................................................................................5
4.1 Introduction...........................................................................................................................5
4.2 Thematic analysis..................................................................................................................5
CHAPTER 5: CONCLUSION AND RECOMMENDATIONS...................................................21
5.1 Conclusion...........................................................................................................................21
5.2 Recommendations...............................................................................................................21
REFERENCES..............................................................................................................................23
Appendix........................................................................................................................................26
Security Challenges in Cloud Computing PDF_3

Introduction
Cloud computing is a technique which facilitates the sharing of data and resources for
different computers simultaneously. Despite being a great opportunity for the world of
technology, it has a number of security issues. The cloud computing deals with a large amount of
data that is very important for the companies. It helps them to deal with it and therefore needs to
be handled very sensitively. Cloud computing is a computing model which enables the sharing of
data, resources, and software by different computers simultaneously. The data is present in a
central database and all the computers are connected to the database with a proper networking
system. However, the security issues related to the cloud computing has proved to be a barrier to
the smooth implementation of the technology in the market. The data handled by the cloud is
very large as well as important and needs to be properly and sensitively handled. After the proper
analysis, it has been discovered that there are many risks associated with the security of data.
These risks involve the factors like misplacement of the intellectual property, interference with
the privacy of data, manipulation of the important data as well as loss of proper control over the
data. According to Shiau and Chau (2016, p.358), there are several challenges to the security of
the data like the protection of data, authentication of data as well as breach of data.
Aims
The aims is to recognize the security challenges for consumers regarding cloud computing and
how to resolved these challenges to increase the effectiveness of cloud computing.
The sub questions will help me to achieve that:
To Identify security challenge in cloud computing.
To discuss consumers knowledge in cloud computing.
Security Challenges in Cloud Computing PDF_4

To determine what prevent consumers from using cloud computing.
Outline of the research
There are several security challenges to the consumers regarding the data sharing in cloud
computing. The security is highly complicated due to the data being distributed in a very wide
area and being accessed by a number of systems. Zhang et al.(2016, p.807) mentioned that, the
different challenges are the protection of data while it is stored as well as in transmission mode,
the authorization of data- the access to the data should be granted only to the one who have the
authority and the violation of data in an illegal manner. There are several security models which
serve to eliminate or minimize these challenges namely IaaS, PaaS and SaaS.
Purpose of research
It has been years since the concept of cloud computing has been introduced into the market.
Despite being a significant innovation in the 5th field of technology, the dependability is still
questionable due to some security issues. The companies which have a desire to involve in this
technology need to be confident of some critical factors. The data they are sharing with the
computing system must be safe and secure. The companies sharing the data must be convinced
that there shall be no unauthorized access to their data. They also need to be assured of the fact
that their data will not be breached or violated in any circumstances.
Research Rationale
What is the issue
There are several issues regarding the security in the cloud computing technology (Kaur and
Kaur, 2016, p.29). The data stored in the cloud is very confidential for the companies and must
be protected under all conditions. These may consist of some private data of individuals recorded
by the company for certain purposes. The companies may fear the loss of control over the data
provided to the cloud.
Security Challenges in Cloud Computing PDF_5

Why is it an issue
The loss of such confidential data from the database or the misuse of those data may lead the
company to bear an irreparable loss in terms of revenue as well as the reputation of the company.
Why is it an issue now
A number of data hacking techniques have emerged which have lead to the misuse of the
confidential data stored in the cloud. This the reason for the security of the technology has been
questioned.
What does the research shed light on?
The research conducted sheds light upon the different challenges faced by the customers in the
security issue of cloud computing as well as the different models of security which can be
applied to meet those challenges.
Research context
The advancement of technology has lead ways for the evolution of globalization. There are a
number of companies who are trying to expand their business throughout the world. In that case,
they need to have a central body which shall be able to control all the different branches of the
companies. These companies need to share a lot of common data among the branches for the
smooth functioning of the entire system. This problem can be solved with the use of cloud
computing. As said by Pancholi and Patel (2014, p.19), there are several issues related to the
security of the data like the protection of their data, the proper authorization for the use of their
data so that their data is not used by some unwanted party, Also, the data should not be violated
or misused for any illegal purpose. Proper research is been done on the different security models
which meet these challenges.
Literature review
Cloud computing is a computing model which enables the sharing of data, resources, and
software by different computers simultaneously. The data is present in a central database and all
the computers are connected to the database with a proper networking system. There are several
issues regarding the cloud computing security. This part of the study mainly describes the
models that can be helpful to mitigate these issues.However, the security issues related to the
cloud computing has proved to be a barrier to the smooth implementation of the technology in
the market. The data handled by the cloud is very large as well as important and needs to be
Security Challenges in Cloud Computing PDF_6

properly and sensitively handled. After the proper analysis, it has been discovered that there are
many risks associated with the security of data. These risks involve the factors like misplacement
of the intellectual property, interference with the privacy of data, manipulation of the important
data as well as loss of proper control over the data. There are several impacts of these risks on
the users like loss of revenue and goodwill of the company, the loss of trust of customers on the
companies as well as a violation of certain laws due to the leakage of highly confidential data.
There is several security models designed to solve these issues. The models IaaS, SaaS, and PaaS
shall be discussed in details in the project.
Rittinghouse and Ransome (2016, p.62) stated that the SaaS model is used in office and
messaging software, DBMS software, payroll and accounts, Computed Automated Drawing
(CAD), CRM (Customer Relationship Management) and HRM (Human Resource Management)
and service desk management. It has entered deep into all leading software companies.Bokhari et
al. (2016, p.10), has stated that in the present time, there are many organizations which are
storing their huge in advance system to the future use. But with less availability of updation of
existing software increases insecurity of the data.
Jumagaliyev (2016, p. 53) stated that in the present time, the transaction of money has done
through online mediums like Go Recharge and Freecharge. During these mode, security and
safety of users transactions have most of the time has created issues. Along with this, the
essential personal information of the user has not secured that much as it has expected by them.
In most of the cases, the sensitive information of private enterprise using the cloud computing is
stored outside their domain or accessibility.
According to Calheiros, Ranjan and et.al. (2011, p. 23-50), PaaS allows the customers to use the
platform or the operating system and the servers to use along with the infrastructure. Generally,
the vendor controls and maintains the physical computer hardware, operating systems, and server
applications while the customer only controls and maintains their developed software
applications. Customers would, therefore, be mainly responsible for any security exploits that
could target their applications, while the vendor is not only responsible for physical security but
also for any security exploits that could target network connections such cloud storage, data
storage, and data access. This has created the security issues regarding revile the information of
the users by hackers and other third parties for personal benefits.
Security Challenges in Cloud Computing PDF_7

The availability of computing resources all over the internet is done by the help of IaaS. There
are many security features provided by the IaaS which solve the challenges of cloud computing.
Rittinghouse and Ransome (2016, p. 80) mentioned that in the shared cloud network every user
share the same cloud for accessing the infrastructure. It has developed a security issue for its
users while storing and access the information. The cloud has a two IP addresses. One of them is
the public IP address for the application user and another one is private IP address for the cloud.
The public IP address is either permanent or temporary whereas the private IP address is always
temporary. This provides network security and solves the security challenges existing in the
cloud computing. Most of the time, these have hacked by the people to get the important
information of the users.Tchernykh et al.(2016, p.17) said that it also controls the network traffic
to and from the cloud. The firewall also provides the benefit to allow a specific user to access a
specific set of cloud and computing resources using a specific set of rules and thus improves the
security aspect of cloud. IaaS also helps to protect rogue. It also helps to provide secure
extension and securely connects the enterprise sites to the clouds with the use of static IP
connection (Hussein and Khalid 2016, p.53). It also helps to secure the remote access to
individual’s server. It ensures that individual machine is accessed to cloud by a secure network.
The access is based on credentials that a single user is allocated a single server of the cloud. Is
also provides the benefit of remote VPN access. It allows the employees to securely connect to
the cloud by using the VPN clients. It includes the central authentication of the employees that
verifies the identity prior to providing access to the cloud. Alqahtany et al.(2016, p.443) stated
that IaaS gives the facility of Virtual Local Area Network (VLAN) that is an isolated network
with a private IP subnet and a layer of 2 separation constructs. It provides inter-datacenter
communication between different cloud customers. In this way, it reduces the risk of shared
network. The VPN and VLAN in the IaaS mitigate the security challenges of cloud computing
and thus satisfy the users of cloud computing.
According to Islam et al. (2015, p.479), there are several challenges to the security of data stored
in the cloud. The problems arising due to these challenges have a deep impact on the people. The
data shared by the companies can be highly confidential for the company. The data can be
considered as the intellectual property of the company and the loss of such data may prove
disastrous to the company. Some organizations maintain the records of the confidential data of
Security Challenges in Cloud Computing PDF_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing Security Challenges
|15
|4893
|403

Data as a Service (DaaS) Cloud offering
|46
|18221
|26

Application and Effectiveness of Watermarking Technique in Cloud Computing
|25
|9644
|87

Cloud Computing in Banking Sector - Project Proposal and Plan
|12
|2743
|163

Internet of Things - Assignment
|43
|10564
|250

Influence of Cloud Technology on Organizational Productivity
|27
|7233
|291