Security Issues in Cloud Computing
VerifiedAdded on 2023/06/09
|17
|4150
|415
AI Summary
This report addresses cloud security based on three layered approach in which outcomes of each layer is affecting next layer. Various security risks in the cloud computing and their underlying mechanism has been discussed in the report.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/e191b511-f107-4c19-9e5a-a8904c61ac34-page-1.webp)
Running head: SECURITY ISSUES IN CLOUD COMPUTING
Security Issues in Cloud Computing
Name of the Student
Name of the University
Author’s Note
Security Issues in Cloud Computing
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/8d999ec1-3f65-4047-ba79-abbefb93cebd-page-2.webp)
2
SECURITY ISSUES IN CLOUD COMPUTING
Table of Contents
Assessment 1...................................................................................................................................3
Problem Statement.......................................................................................................................3
Previous work..............................................................................................................................3
Methods.......................................................................................................................................4
Assignment 2...................................................................................................................................6
Background..................................................................................................................................6
References......................................................................................................................................14
Appendices....................................................................................................................................17
Questionnaires...............................................................................................................................17
SECURITY ISSUES IN CLOUD COMPUTING
Table of Contents
Assessment 1...................................................................................................................................3
Problem Statement.......................................................................................................................3
Previous work..............................................................................................................................3
Methods.......................................................................................................................................4
Assignment 2...................................................................................................................................6
Background..................................................................................................................................6
References......................................................................................................................................14
Appendices....................................................................................................................................17
Questionnaires...............................................................................................................................17
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/bd4bb555-09e1-4d35-90ea-5cae19f14623-page-3.webp)
3
SECURITY ISSUES IN CLOUD COMPUTING
Assessment 1
Problem Statement
Cloud computing has immensely changes the way of computing and its resources. Cloud
computing has been creating a great revolution in the data storage services over the internet.
Cloud computing has encompasses activities including the use of social networking websites and
other databases. However, there have been various security issues included in the cloud
computing related to sensitive data and information (Bhadauria et al. 2014). Various
organizations and users upload and store their data over the cloud storage. However, this become
risky for them to store their data and information over cloud. However, the cloud computing has
been able to fix security problems in the operations. Rather, there several loopholes present in
the security protocols of the cloud computing.
This report addresses cloud security based on three layered approach in which outcomes
of each layer is affecting next layer. Initially, major threats and risks to the cloud computing
including DoS attacks. Research on these measures will help in understanding nature of problem.
Secondly, new emerged security risks sin the cloud computing and their underlying mechanism
has been discussed in the report. This knowledge will help in understanding existing loopholes
in the security protocols. Various illegal techniques used in order to breach data and information
from online database of cloud storage. Thirdly, the flaws in the security procedures and present
security techniques and strengths of security hazards.
Previous work
Various researches have been done on cloud computing and security issues in the cloud
computing. The security issues in the cloud computing have been creating problems for
SECURITY ISSUES IN CLOUD COMPUTING
Assessment 1
Problem Statement
Cloud computing has immensely changes the way of computing and its resources. Cloud
computing has been creating a great revolution in the data storage services over the internet.
Cloud computing has encompasses activities including the use of social networking websites and
other databases. However, there have been various security issues included in the cloud
computing related to sensitive data and information (Bhadauria et al. 2014). Various
organizations and users upload and store their data over the cloud storage. However, this become
risky for them to store their data and information over cloud. However, the cloud computing has
been able to fix security problems in the operations. Rather, there several loopholes present in
the security protocols of the cloud computing.
This report addresses cloud security based on three layered approach in which outcomes
of each layer is affecting next layer. Initially, major threats and risks to the cloud computing
including DoS attacks. Research on these measures will help in understanding nature of problem.
Secondly, new emerged security risks sin the cloud computing and their underlying mechanism
has been discussed in the report. This knowledge will help in understanding existing loopholes
in the security protocols. Various illegal techniques used in order to breach data and information
from online database of cloud storage. Thirdly, the flaws in the security procedures and present
security techniques and strengths of security hazards.
Previous work
Various researches have been done on cloud computing and security issues in the cloud
computing. The security issues in the cloud computing have been creating problems for
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/cfbcd7d7-df3a-4dab-93e4-5133e4cb3a50-page-4.webp)
4
SECURITY ISSUES IN CLOUD COMPUTING
organization. As identified by Ochani and Dongre (2017), there have been seven security issues
in cloud computing model including privileged user access, regulatory compliance, data location,
data segregation, data recovery, research support and long-term viability. Cloud Computing has
been providing on-demand services to the users. Cloud computing has helped in providing
several services to users and organizations. Data and information transmitted form customer
through internet that create high degree of risk as data might get lost on the way. The internet
security protocols have been installed in organization. The regulation for misuse of legal
authorities in the cloud security has been continuously broken in the market. Therefore, thus has
been an important decision of various governments for increasing security of cloud data over the
internet. The management of security has been an important topic in every organization.
Cloud security has been shaping the future of the IT although there has been a dark side
in respect to security of data md information. Several studies have been focused on the security
issues in cloud computing. A detailed analysis has been provided in those literatures and
researches. As commented by Almorsy, Grundy and Müller (2016), cloud computing used to
minimize complexity and helps in providing fast and easier services. Researchers have found that
virtualization has been helping in enhancing IT interventions. Previous research works have
focused on traditional concept of the cloud computing that have been creation a basic approach
to the research works. The security issues identified in the cloud computing have been obsolete.
There have been new threats and risks involved in the cloud computing that have not been
explained in the previous literature.
Methods
This report has focused on identifying security issues in the cloud computing in order to handle
software engineering context. This report has reviewed previous literature work for
SECURITY ISSUES IN CLOUD COMPUTING
organization. As identified by Ochani and Dongre (2017), there have been seven security issues
in cloud computing model including privileged user access, regulatory compliance, data location,
data segregation, data recovery, research support and long-term viability. Cloud Computing has
been providing on-demand services to the users. Cloud computing has helped in providing
several services to users and organizations. Data and information transmitted form customer
through internet that create high degree of risk as data might get lost on the way. The internet
security protocols have been installed in organization. The regulation for misuse of legal
authorities in the cloud security has been continuously broken in the market. Therefore, thus has
been an important decision of various governments for increasing security of cloud data over the
internet. The management of security has been an important topic in every organization.
Cloud security has been shaping the future of the IT although there has been a dark side
in respect to security of data md information. Several studies have been focused on the security
issues in cloud computing. A detailed analysis has been provided in those literatures and
researches. As commented by Almorsy, Grundy and Müller (2016), cloud computing used to
minimize complexity and helps in providing fast and easier services. Researchers have found that
virtualization has been helping in enhancing IT interventions. Previous research works have
focused on traditional concept of the cloud computing that have been creation a basic approach
to the research works. The security issues identified in the cloud computing have been obsolete.
There have been new threats and risks involved in the cloud computing that have not been
explained in the previous literature.
Methods
This report has focused on identifying security issues in the cloud computing in order to handle
software engineering context. This report has reviewed previous literature work for
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/d6f7d3c1-083b-40b4-be2d-ee6b5b2cd28b-page-5.webp)
5
SECURITY ISSUES IN CLOUD COMPUTING
acknowledging current literature work. Some research questions have been prepared for the
research:
What are security issues identified in the cloud computing?
What are the various security techniques used for preventing unauthorized access to data
in the Cloud?
How to handle security problems that can be expected in future cloud computing?
However, most of the research work have been done with traditional literature review
approach with low scientific value. The research has used survey and interview for gathering
data and information. The research has used a descriptive research design for a descriptive
analysis of the research questions. The use of the A quantitative research approach has been
used in this research. In survey, the researcher used to select respondents from population and
maintaining a standardized questionnaire (Hashem et al. 2015). In this research, the sample size
has been 50 participants who are using cloud computing services. A simple random sample
technique have been used in order to select participants from population. Survey questionnaire
have been prepared using Google Forms and sent online to participants.
SECURITY ISSUES IN CLOUD COMPUTING
acknowledging current literature work. Some research questions have been prepared for the
research:
What are security issues identified in the cloud computing?
What are the various security techniques used for preventing unauthorized access to data
in the Cloud?
How to handle security problems that can be expected in future cloud computing?
However, most of the research work have been done with traditional literature review
approach with low scientific value. The research has used survey and interview for gathering
data and information. The research has used a descriptive research design for a descriptive
analysis of the research questions. The use of the A quantitative research approach has been
used in this research. In survey, the researcher used to select respondents from population and
maintaining a standardized questionnaire (Hashem et al. 2015). In this research, the sample size
has been 50 participants who are using cloud computing services. A simple random sample
technique have been used in order to select participants from population. Survey questionnaire
have been prepared using Google Forms and sent online to participants.
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/a9173908-6668-4d23-b089-5341d6a69802-page-6.webp)
6
SECURITY ISSUES IN CLOUD COMPUTING
Assignment 2
Background
Cloud Computing has got hold on the potential for eliminating requirements for gearing
up high cost computing services and infrastructures in the market. The use of IT based solutions
provided by any organization needs to be maintained by a well-developed software package for
minimizing the complexity. The use of the cloud computing helps in minimizing cost of
computing resources in the market. The tenancy of the cloud computing feature have been
helping in providing a better approach to the complexity of the systems in the company. The
configurable devices in the network connected with cloud have to be well maintained under
security protocol (Sen 2014). The use of cloud computing has been helping in providing a better
opportunity to the organization and businesses for maintaining great approach in the market.
Cloud computing has been helping in providing a better opportunity to the companies in the
market. Cloud computing technology has been helping in maintaining the cost of the computing
services. The cost of computing services have been reduced in the market. Therefore, the total
expenditure of the company have been increased. Cloud computing is may use for data storage.
Sensitive data and information of the companies have been stored over the internet.
There has been various security issues in the Cloud computing as it includes various
technology including databases, networking, databases and operating systems. These
technologies in has been updating the software and the functions of the companies in the market.
The cliud comouting has been helping in minimizing the co plxituies in the servyces provided by
the cmonaies in the market. The use of cloud computing technology has been heloing in
orivididng several servyces in the company. The networking analysis of companies have been
SECURITY ISSUES IN CLOUD COMPUTING
Assignment 2
Background
Cloud Computing has got hold on the potential for eliminating requirements for gearing
up high cost computing services and infrastructures in the market. The use of IT based solutions
provided by any organization needs to be maintained by a well-developed software package for
minimizing the complexity. The use of the cloud computing helps in minimizing cost of
computing resources in the market. The tenancy of the cloud computing feature have been
helping in providing a better approach to the complexity of the systems in the company. The
configurable devices in the network connected with cloud have to be well maintained under
security protocol (Sen 2014). The use of cloud computing has been helping in providing a better
opportunity to the organization and businesses for maintaining great approach in the market.
Cloud computing has been helping in providing a better opportunity to the companies in the
market. Cloud computing technology has been helping in maintaining the cost of the computing
services. The cost of computing services have been reduced in the market. Therefore, the total
expenditure of the company have been increased. Cloud computing is may use for data storage.
Sensitive data and information of the companies have been stored over the internet.
There has been various security issues in the Cloud computing as it includes various
technology including databases, networking, databases and operating systems. These
technologies in has been updating the software and the functions of the companies in the market.
The cliud comouting has been helping in minimizing the co plxituies in the servyces provided by
the cmonaies in the market. The use of cloud computing technology has been heloing in
orivididng several servyces in the company. The networking analysis of companies have been
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/8d44b903-b00a-4648-a368-708bd49d4b42-page-7.webp)
7
SECURITY ISSUES IN CLOUD COMPUTING
hoeing in minatining a keen approach to the development of the network security in the
company. Cloud is where we can access services that help to store, run software application
anywhere in the world through internet when needed. The cloud can scale down resources on
what we need which is cheaper than buying hardware.
Infrastructure as a Service (IaaS): This model describes about providing physical
hardware computing resources to the clients in the market. The company used to share various
computing resources in order to maintain a low cost of the computing hardware in the market.
The use if the IaaS services helps in maintaining a keen approach to the development in the
company in the market (Inukollu, Arsi and Ravuri, 2014). This prompts the client being more in
charge of dealing with their own particular information security with the seller being more in
charge of physical security, since they claim and deal with the physical gadgets being utilized as
framework. Cases of IaaS company administrations incorporate GoGrid, Amazon Elastic
Compute Cloud (EC2) and Rackspace Cloud.
Platform as a Service (PaaS): PaaS gives clients a chance to utilize company's cloud
foundation to convey client made web software/programming. Normally company controls and
keeps up the physical PC equipment, working frameworks and server software while the client
just controls and keeps up their created programming software. Clients would along these lines
be essentially in charge of any security misuses that could focus on their software, while
company is not in charge of physical security, yet additionally for any security abuses that could
target organize associations, information stockpiling and information get to (Singh, Jeong and
Park 2016). Cases of PaaS seller administrations incorporate Google App Engine, Force.com,
Amazon Web Services Elastic Beanstalk, and the Microsoft Windows Azure stage.
SECURITY ISSUES IN CLOUD COMPUTING
hoeing in minatining a keen approach to the development of the network security in the
company. Cloud is where we can access services that help to store, run software application
anywhere in the world through internet when needed. The cloud can scale down resources on
what we need which is cheaper than buying hardware.
Infrastructure as a Service (IaaS): This model describes about providing physical
hardware computing resources to the clients in the market. The company used to share various
computing resources in order to maintain a low cost of the computing hardware in the market.
The use if the IaaS services helps in maintaining a keen approach to the development in the
company in the market (Inukollu, Arsi and Ravuri, 2014). This prompts the client being more in
charge of dealing with their own particular information security with the seller being more in
charge of physical security, since they claim and deal with the physical gadgets being utilized as
framework. Cases of IaaS company administrations incorporate GoGrid, Amazon Elastic
Compute Cloud (EC2) and Rackspace Cloud.
Platform as a Service (PaaS): PaaS gives clients a chance to utilize company's cloud
foundation to convey client made web software/programming. Normally company controls and
keeps up the physical PC equipment, working frameworks and server software while the client
just controls and keeps up their created programming software. Clients would along these lines
be essentially in charge of any security misuses that could focus on their software, while
company is not in charge of physical security, yet additionally for any security abuses that could
target organize associations, information stockpiling and information get to (Singh, Jeong and
Park 2016). Cases of PaaS seller administrations incorporate Google App Engine, Force.com,
Amazon Web Services Elastic Beanstalk, and the Microsoft Windows Azure stage.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/aa6c737a-1430-4efa-8b32-ddd3fa34219c-page-8.webp)
8
SECURITY ISSUES IN CLOUD COMPUTING
Software as a Service (SaaS): In this model, the seller gives clients programming
software utilizing their cloud foundation and cloud stages (Puthal et al. 2015). The seller is for
the most part in charge of guaranteeing all types of security in this administration. Cases of SaaS
company administrations incorporate Google Docs, Google Gmail and Microsoft Office 365.
From this subsection, it is genuinely clear at this point level of duty shared amongst CSPs and
CSPs varies in light of the administration show being utilized.
The security issues in the cloud computing have been creating major impact in the
bu8sness of the company in the market. The use of cloud computing in the company has been
helping in providing various services in the market. The cloud computing is mainly used for
storing huge amount of data online. Various data and information of the company has been
stored over the cloud that helps in minimizing the complexity of hardware storage. Therefore,
this has been creating risks over the online data storage as various cyber threats have been
providing in yhe marjete. The online threat security has been a major issue in the research field
(Ali, Khan and Vasilakos 2015). DDoS (Cloud Denial of Service) attack has been an attack that
have been affecting the security if the cloud computing over the internet (Dou, Chen and Chen,
2013). Virtual machines have been introduced for both hardware and software solution to the
cyber threats. However, there has been various technical difficulties in the virtual machines
including key logger examinations. This application helps in meeting needs of various
application for daily purposes. Therefore, for a secure cloud storage management, a proper
resources in the virtual machines needs to be prop eared (Stojmenovic et al. 2016). Thus, in
distributed computing setting, a concern related to security is always some make out of peril yet
any danger cannot be unpredictably judged to be a security concern. Bit of commitments among
SECURITY ISSUES IN CLOUD COMPUTING
Software as a Service (SaaS): In this model, the seller gives clients programming
software utilizing their cloud foundation and cloud stages (Puthal et al. 2015). The seller is for
the most part in charge of guaranteeing all types of security in this administration. Cases of SaaS
company administrations incorporate Google Docs, Google Gmail and Microsoft Office 365.
From this subsection, it is genuinely clear at this point level of duty shared amongst CSPs and
CSPs varies in light of the administration show being utilized.
The security issues in the cloud computing have been creating major impact in the
bu8sness of the company in the market. The use of cloud computing in the company has been
helping in providing various services in the market. The cloud computing is mainly used for
storing huge amount of data online. Various data and information of the company has been
stored over the cloud that helps in minimizing the complexity of hardware storage. Therefore,
this has been creating risks over the online data storage as various cyber threats have been
providing in yhe marjete. The online threat security has been a major issue in the research field
(Ali, Khan and Vasilakos 2015). DDoS (Cloud Denial of Service) attack has been an attack that
have been affecting the security if the cloud computing over the internet (Dou, Chen and Chen,
2013). Virtual machines have been introduced for both hardware and software solution to the
cyber threats. However, there has been various technical difficulties in the virtual machines
including key logger examinations. This application helps in meeting needs of various
application for daily purposes. Therefore, for a secure cloud storage management, a proper
resources in the virtual machines needs to be prop eared (Stojmenovic et al. 2016). Thus, in
distributed computing setting, a concern related to security is always some make out of peril yet
any danger cannot be unpredictably judged to be a security concern. Bit of commitments among
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/dff2ba06-0907-4f7f-82c1-66a44f4f1a0b-page-9.webp)
9
SECURITY ISSUES IN CLOUD COMPUTING
the get-togethers related with a distributed computing system may achieve experiencing
abnormality which may definitely incite a situation with security vulnerabilities.
There has been various security risks in the cloud computing. Some of the security risks
are discussed below:
Physical security risks: The hardware location of data center of the cloud might be in risk
as there have been various network attacks in the data center. Several virus attacks have been
reported in the data center if the cloud in recent years. The physical theft of data and information
has been operating in different parts of world (Hashizume et al., 2013). The infrastructural theft
in the cloud has been reflecting in organizations that have been causing financial loss to the
company. The skill development plan including training on cyber securities have been helping in
awarding people related to the cyber risks involved in the cloud computing.
Data Security Risks: data and information has been the most important asset for any
company in the market. Therefore, several companies used to store their sensitive data rated to
financial department of the company over the cloud database. Therefore, the secuirty over the
cliud needs to be increased in due case (Rakhmi, Sahoo and Mehfuz, 2013). However, there have
been several data theft over the cloud computing that have been creating problems for the
company. The loss of sensitive data and information of the company have been creating loss for
the company (Fernandes et al. 2014). The cyber laws and regulations have been implemented
over the companies for minimizing the cyber treats and attacks over the internet.
SECURITY ISSUES IN CLOUD COMPUTING
the get-togethers related with a distributed computing system may achieve experiencing
abnormality which may definitely incite a situation with security vulnerabilities.
There has been various security risks in the cloud computing. Some of the security risks
are discussed below:
Physical security risks: The hardware location of data center of the cloud might be in risk
as there have been various network attacks in the data center. Several virus attacks have been
reported in the data center if the cloud in recent years. The physical theft of data and information
has been operating in different parts of world (Hashizume et al., 2013). The infrastructural theft
in the cloud has been reflecting in organizations that have been causing financial loss to the
company. The skill development plan including training on cyber securities have been helping in
awarding people related to the cyber risks involved in the cloud computing.
Data Security Risks: data and information has been the most important asset for any
company in the market. Therefore, several companies used to store their sensitive data rated to
financial department of the company over the cloud database. Therefore, the secuirty over the
cliud needs to be increased in due case (Rakhmi, Sahoo and Mehfuz, 2013). However, there have
been several data theft over the cloud computing that have been creating problems for the
company. The loss of sensitive data and information of the company have been creating loss for
the company (Fernandes et al. 2014). The cyber laws and regulations have been implemented
over the companies for minimizing the cyber treats and attacks over the internet.
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/ad0c0f69-36ef-4911-87a9-4fc4ec28d439-page-10.webp)
10
SECURITY ISSUES IN CLOUD COMPUTING
Figure 1: Data Security over the cloud
(Source: Rao and Selvamani 2015)
One of difficulties for cloud computing is in its level of deliberation and additionally
effect in affordability which brings about inadequately characterized security or infrastructural
limit (Chen and Zhao, 2012). Research on these measures will help in understanding nature of
problem. Secondly, new emerged security risks in the cloud computing and their underlying
mechanism has been discussed in the report. This knowledge will help in understanding existing
loopholes in the security protocols. Various illegal techniques used in order to breach data and
information from online database of cloud storage. Information misfortune and different botnets
can come without hesitation for breaking out security protocols. Additionally, multi-occupancy
display is likewise a viewpoint that need to be provided consideration (Chang, Kuo and
Ramachandran 2016). The use of cloud computing in the company has been helping in providing
various services in the market. The cloud computing is mainly used for storing huge amount of
data online. Various data and information of the company has been stored over the cloud that
helps in minimizing the complexity of hardware storage. Therefore, this has been creating risks
SECURITY ISSUES IN CLOUD COMPUTING
Figure 1: Data Security over the cloud
(Source: Rao and Selvamani 2015)
One of difficulties for cloud computing is in its level of deliberation and additionally
effect in affordability which brings about inadequately characterized security or infrastructural
limit (Chen and Zhao, 2012). Research on these measures will help in understanding nature of
problem. Secondly, new emerged security risks in the cloud computing and their underlying
mechanism has been discussed in the report. This knowledge will help in understanding existing
loopholes in the security protocols. Various illegal techniques used in order to breach data and
information from online database of cloud storage. Information misfortune and different botnets
can come without hesitation for breaking out security protocols. Additionally, multi-occupancy
display is likewise a viewpoint that need to be provided consideration (Chang, Kuo and
Ramachandran 2016). The use of cloud computing in the company has been helping in providing
various services in the market. The cloud computing is mainly used for storing huge amount of
data online. Various data and information of the company has been stored over the cloud that
helps in minimizing the complexity of hardware storage. Therefore, this has been creating risks
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/e42edce2-0ada-4f17-b223-fd78f312adc7-page-11.webp)
11
SECURITY ISSUES IN CLOUD COMPUTING
over the online data storage as various cyber threats have been providing in the market. (Mircea,
2012). All conventional security risks are in this manner pertinent with included level of
intensity in a cloud foundation which makes the continuous achievement of cloud computing a
very difficult one. Privacy, accessibility and uprightness are summed up classes into which
security worries of a cloud domain falls. Risks for a cloud framework are pertinent both to
information and foundation (Yi, Qin and Li 2015).
For adaptable cloud computing, physical level limitations has breathed life into experts
for proposing fuse of different level of cloud named as 'compact cloud' for helping getting ready
of the specific handling what's all the more, planning for flexible figuring devices (Islam,
Manivannan and Zeadally 2016). The earlier cleared up impart nature of satellite correspondence
and related security issues are likewise applicable to the convenient cloud computing on account
of its being remote correspondence. The use of cloud computing in the company has been
helping in providing various services in the market. The cloud computing is mainly used for
storing huge amount of data online. Various data and information of the company has been
stored over the cloud that helps in minimizing the complexity of hardware storage. Therefore,
this has been creating risks over the online data storage as various cyber threats have been
providing in the market. The dynamic game-plan of cloud computing energizes various level of
extensibility for the cloud customers with different level of security issues (Jouini and Rabai
2016). In an arrangement of activity, risks for purchasers are related to and subject to the
appropriate procedures and methodologies of the cloud pro centers the purchasers are
overseeing. Using cloud things or organizations may incite security stresses for the buyers in
case they are unquestionably not especially mindful with the sort and particulars of the things or
organizations they are to anchor or to use in a cloud area; this is in like manner related to the
SECURITY ISSUES IN CLOUD COMPUTING
over the online data storage as various cyber threats have been providing in the market. (Mircea,
2012). All conventional security risks are in this manner pertinent with included level of
intensity in a cloud foundation which makes the continuous achievement of cloud computing a
very difficult one. Privacy, accessibility and uprightness are summed up classes into which
security worries of a cloud domain falls. Risks for a cloud framework are pertinent both to
information and foundation (Yi, Qin and Li 2015).
For adaptable cloud computing, physical level limitations has breathed life into experts
for proposing fuse of different level of cloud named as 'compact cloud' for helping getting ready
of the specific handling what's all the more, planning for flexible figuring devices (Islam,
Manivannan and Zeadally 2016). The earlier cleared up impart nature of satellite correspondence
and related security issues are likewise applicable to the convenient cloud computing on account
of its being remote correspondence. The use of cloud computing in the company has been
helping in providing various services in the market. The cloud computing is mainly used for
storing huge amount of data online. Various data and information of the company has been
stored over the cloud that helps in minimizing the complexity of hardware storage. Therefore,
this has been creating risks over the online data storage as various cyber threats have been
providing in the market. The dynamic game-plan of cloud computing energizes various level of
extensibility for the cloud customers with different level of security issues (Jouini and Rabai
2016). In an arrangement of activity, risks for purchasers are related to and subject to the
appropriate procedures and methodologies of the cloud pro centers the purchasers are
overseeing. Using cloud things or organizations may incite security stresses for the buyers in
case they are unquestionably not especially mindful with the sort and particulars of the things or
organizations they are to anchor or to use in a cloud area; this is in like manner related to the
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/cd48a2e0-603d-4f0b-b989-6c58b1cbe2b5-page-12.webp)
12
SECURITY ISSUES IN CLOUD COMPUTING
cloud providers' character and enduring quality. The survey questionnaires used in the research
has been based on the research questions that have been initiated in the first. The use of these
survey questionnaires have been helping in maintaining a keen approach to the research study.
The data analysis of the survey questionnaires have been helping in getting a meaningful
approach o the research questions. The respondents have been able to answer properly to
questions. The Likert scale used in the data analysis has helped in proper presentation of
outcomes of the survey results. The tables and graphs of the survey questionnaires have been
helping in proper understanding if the readers to understand the outcomes of the research.
However, the research has been able to satisfy all the research questions initiated in the first if
the research. One of the inborn issues in this setting is that, the customers may customarily not
have limit with regards to recognize or foresee each one of the risks drew in with the specific
cloud trade they are overseeing or connected with.
SECURITY ISSUES IN CLOUD COMPUTING
cloud providers' character and enduring quality. The survey questionnaires used in the research
has been based on the research questions that have been initiated in the first. The use of these
survey questionnaires have been helping in maintaining a keen approach to the research study.
The data analysis of the survey questionnaires have been helping in getting a meaningful
approach o the research questions. The respondents have been able to answer properly to
questions. The Likert scale used in the data analysis has helped in proper presentation of
outcomes of the survey results. The tables and graphs of the survey questionnaires have been
helping in proper understanding if the readers to understand the outcomes of the research.
However, the research has been able to satisfy all the research questions initiated in the first if
the research. One of the inborn issues in this setting is that, the customers may customarily not
have limit with regards to recognize or foresee each one of the risks drew in with the specific
cloud trade they are overseeing or connected with.
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/f337a4d0-439e-47dd-8ceb-44d70d20fc69-page-13.webp)
13
SECURITY ISSUES IN CLOUD COMPUTING
References
Bhadauria, R., Chaki, R., Chaki, N. and Sanyal, S., 2014. SECURITY ISSUES IN CLOUD
COMPUTING. Acta Technica Corvininesis-Bulletin of Engineering, 7(4).
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise
of “big data” on cloud computing: Review and open research issues. Information Systems, 47,
pp.98-115.
Sen, J., 2014. Security and privacy issues in cloud computing. In Architectures and protocols for
secure information technology infrastructures (pp. 1-45). IGI Global.
Khan, M.A., 2016. A survey of security issues for cloud computing. Journal of network and
computer software, 71, pp.11-29.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Ahmed, M. and Hossain, M.A., 2014. Cloud computing and security issues in the
cloud. International Journal of Network Security & Its Software, 6(1), p.25.
Inukollu, V.N., Arsi, S. and Ravuri, S.R., 2014. Security issues associated with big data in cloud
computing. International Journal of Network Security & Its Software, 6(3), p.45.
Singh, S., Jeong, Y.S. and Park, J.H., 2016. A survey on cloud computing security: Issues,
threats, and solutions. Journal of Network and Computer Software, 75, pp.200-222.
SECURITY ISSUES IN CLOUD COMPUTING
References
Bhadauria, R., Chaki, R., Chaki, N. and Sanyal, S., 2014. SECURITY ISSUES IN CLOUD
COMPUTING. Acta Technica Corvininesis-Bulletin of Engineering, 7(4).
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise
of “big data” on cloud computing: Review and open research issues. Information Systems, 47,
pp.98-115.
Sen, J., 2014. Security and privacy issues in cloud computing. In Architectures and protocols for
secure information technology infrastructures (pp. 1-45). IGI Global.
Khan, M.A., 2016. A survey of security issues for cloud computing. Journal of network and
computer software, 71, pp.11-29.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Ahmed, M. and Hossain, M.A., 2014. Cloud computing and security issues in the
cloud. International Journal of Network Security & Its Software, 6(1), p.25.
Inukollu, V.N., Arsi, S. and Ravuri, S.R., 2014. Security issues associated with big data in cloud
computing. International Journal of Network Security & Its Software, 6(3), p.45.
Singh, S., Jeong, Y.S. and Park, J.H., 2016. A survey on cloud computing security: Issues,
threats, and solutions. Journal of Network and Computer Software, 75, pp.200-222.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/ba714c34-9589-4901-85e6-878d4ce86fe0-page-14.webp)
14
SECURITY ISSUES IN CLOUD COMPUTING
Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing features,
issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015
International Conference on (pp. 116-123). IEEE.
Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and
challenges. Information sciences, 305, pp.357-383.
Aljawarneh, S.A. and Yassein, M.O.B., 2016. A conceptual security framework for cloud
computing issues. International Journal of Intelligent Information Technologies (IJIIT), 12(2),
pp.12-24.
Stojmenovic, I., Wen, S., Huang, X. and Luan, H., 2016. An overview of fog computing and its
security issues. Concurrency and Computation: Practice and Experience, 28(10), pp.2991-3005.
Rao, R.V. and Selvamani, K., 2015. Data security challenges and its solutions in cloud
computing. Procedia Computer Science, 48, pp.204-209.
Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M. and Inácio, P.R., 2014. Security issues
in cloud environments: a survey. International Journal of Information Security, 13(2), pp.113-
170.
Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, pp.24-41.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and
privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-386.
Islam, T., Manivannan, D. and Zeadally, S., 2016. A classification and characterization of
security threats in cloud computing. Int. J. Next-Gener. Comput, 7(1).
SECURITY ISSUES IN CLOUD COMPUTING
Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing features,
issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015
International Conference on (pp. 116-123). IEEE.
Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and
challenges. Information sciences, 305, pp.357-383.
Aljawarneh, S.A. and Yassein, M.O.B., 2016. A conceptual security framework for cloud
computing issues. International Journal of Intelligent Information Technologies (IJIIT), 12(2),
pp.12-24.
Stojmenovic, I., Wen, S., Huang, X. and Luan, H., 2016. An overview of fog computing and its
security issues. Concurrency and Computation: Practice and Experience, 28(10), pp.2991-3005.
Rao, R.V. and Selvamani, K., 2015. Data security challenges and its solutions in cloud
computing. Procedia Computer Science, 48, pp.204-209.
Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M. and Inácio, P.R., 2014. Security issues
in cloud environments: a survey. International Journal of Information Security, 13(2), pp.113-
170.
Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, pp.24-41.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and
privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-386.
Islam, T., Manivannan, D. and Zeadally, S., 2016. A classification and characterization of
security threats in cloud computing. Int. J. Next-Gener. Comput, 7(1).
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/25e935d9-eb7c-4c44-bb77-fda546592d79-page-15.webp)
15
SECURITY ISSUES IN CLOUD COMPUTING
Jouini, M. and Rabai, L.B.A., 2016. A security framework for secure cloud computing
environments. International Journal of Cloud Software and Computing (IJCAC), 6(3), pp.32-44.
Jaiswal, P.R. and Rohankar, A.W., 2014. Infrastructure as a service: security issues in cloud
computing. International Journal of Computer Science and Mobile Computing, 3(3), pp.707-
711.
Ullah, K. and Khan, M.N.A., 2014. Security and Privacy Issues in Cloud Computing
Environment: A Survey Paper. International Journal of Grid and Cloud Computing, 7(2), pp.89-
98.
Hussein, N.H. and Khalid, A., 2016. A survey of Cloud Computing Security challenges and
solutions. International Journal of Computer Science and Information Security, 14(1), p.52.
Kaur, R. and Kaur, J., 2015, March. Cloud computing security issues and its solution: A review.
In Computing for Sustainable Global Development (INDIACom), 2015 2nd International
Conference on (pp. 1198-1200). IEEE.
Yi, S., Qin, Z. and Li, Q., 2015, August. Security and privacy issues of fog computing: A survey.
In International conference on wireless algorithms, systems, and software (pp. 685-695).
Springer, Cham.
Ochani, A. and Dongre, N., 2017, February. Security issues in cloud computing. In I-SMAC (IoT
in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017 International Conference on (pp. 783-
787). IEEE.
SECURITY ISSUES IN CLOUD COMPUTING
Jouini, M. and Rabai, L.B.A., 2016. A security framework for secure cloud computing
environments. International Journal of Cloud Software and Computing (IJCAC), 6(3), pp.32-44.
Jaiswal, P.R. and Rohankar, A.W., 2014. Infrastructure as a service: security issues in cloud
computing. International Journal of Computer Science and Mobile Computing, 3(3), pp.707-
711.
Ullah, K. and Khan, M.N.A., 2014. Security and Privacy Issues in Cloud Computing
Environment: A Survey Paper. International Journal of Grid and Cloud Computing, 7(2), pp.89-
98.
Hussein, N.H. and Khalid, A., 2016. A survey of Cloud Computing Security challenges and
solutions. International Journal of Computer Science and Information Security, 14(1), p.52.
Kaur, R. and Kaur, J., 2015, March. Cloud computing security issues and its solution: A review.
In Computing for Sustainable Global Development (INDIACom), 2015 2nd International
Conference on (pp. 1198-1200). IEEE.
Yi, S., Qin, Z. and Li, Q., 2015, August. Security and privacy issues of fog computing: A survey.
In International conference on wireless algorithms, systems, and software (pp. 685-695).
Springer, Cham.
Ochani, A. and Dongre, N., 2017, February. Security issues in cloud computing. In I-SMAC (IoT
in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017 International Conference on (pp. 783-
787). IEEE.
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/3a09489b-cc56-41f8-bfa1-a2744597c569-page-16.webp)
16
SECURITY ISSUES IN CLOUD COMPUTING
Appendices
Questionnaires
1. Which Cloud service model is under more security threats?
Options Responses Response (%) Total respondents
PaaS 15 30% 50
SaaS 20 40% 50
IaaS 10 20% 50
NaaS 5 10% 50
2. Are you also personal data protection officer in the company you work in?
Options Responses Response (%) Total respondents
Yes 33 66% 50
No 17 34% 50
3. What services do you provide to external parties?
Options Responses Response (%) Total respondents
PaaS 13 26% 50
SaaS 18 36% 50
IaaS 14 28% 50
NaaS 7 14% 50
SECURITY ISSUES IN CLOUD COMPUTING
Appendices
Questionnaires
1. Which Cloud service model is under more security threats?
Options Responses Response (%) Total respondents
PaaS 15 30% 50
SaaS 20 40% 50
IaaS 10 20% 50
NaaS 5 10% 50
2. Are you also personal data protection officer in the company you work in?
Options Responses Response (%) Total respondents
Yes 33 66% 50
No 17 34% 50
3. What services do you provide to external parties?
Options Responses Response (%) Total respondents
PaaS 13 26% 50
SaaS 18 36% 50
IaaS 14 28% 50
NaaS 7 14% 50
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/security-issues-cloud-computing/2024/09/07/ef82c817-c1f2-4378-bfb8-5ea97047d4ea-page-17.webp)
17
SECURITY ISSUES IN CLOUD COMPUTING
4. Are you familiar with the legislation in relation to cloud computing?
Options Responses Response (%) Total respondents
Yes 30 60% 50
No 15 30% 50
Do not know 5 10% 50
SECURITY ISSUES IN CLOUD COMPUTING
4. Are you familiar with the legislation in relation to cloud computing?
Options Responses Response (%) Total respondents
Yes 30 60% 50
No 15 30% 50
Do not know 5 10% 50
1 out of 17
Related Documents
![[object Object]](/_next/image/?url=%2F_next%2Fstatic%2Fmedia%2Flogo.6d15ce61.png&w=640&q=75)
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.