Cloud Computing Security Challenges
VerifiedAdded on  2020/04/01
|10
|1947
|418
AI Summary
This assignment delves into the security issues associated with cloud computing. It analyzes problems such as controlling access to systems, securing SaaS applications, and relying on vendor security measures. The text highlights the importance of risk management, clear communication with providers, and robust logging and auditing practices to mitigate these challenges.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
security and privacy: Cloud Computing
Report
Report
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Executive Summary
The cloud computing has been gaining control over the system where it is able to handle the loss
of control over the data, dependency on the cloud computing provider. The cloud computing
provides the ability to perform the data mining techniques for the analysis of the user data. The
sensitivity of the function is when data mining techniques with the sensitive approach to store
and process the sensitive data using cloud computing services.
The cloud computing has been gaining control over the system where it is able to handle the loss
of control over the data, dependency on the cloud computing provider. The cloud computing
provides the ability to perform the data mining techniques for the analysis of the user data. The
sensitivity of the function is when data mining techniques with the sensitive approach to store
and process the sensitive data using cloud computing services.
Contents
Introduction......................................................................................................................................3
Challenges........................................................................................................................................3
Problems..........................................................................................................................................3
Relevant technology........................................................................................................................4
Applications of the technologies.....................................................................................................4
Clarification.....................................................................................................................................5
Summary of issues...........................................................................................................................5
Issues not addressed.........................................................................................................................6
Impact of the above issues...............................................................................................................7
Lesson learnt....................................................................................................................................7
Conclusion.......................................................................................................................................8
References........................................................................................................................................9
Introduction......................................................................................................................................3
Challenges........................................................................................................................................3
Problems..........................................................................................................................................3
Relevant technology........................................................................................................................4
Applications of the technologies.....................................................................................................4
Clarification.....................................................................................................................................5
Summary of issues...........................................................................................................................5
Issues not addressed.........................................................................................................................6
Impact of the above issues...............................................................................................................7
Lesson learnt....................................................................................................................................7
Conclusion.......................................................................................................................................8
References........................................................................................................................................9
Introduction
The cloud computing is for innovation with the list of all the benefits where the business and the
governmental standards, small or the medium sized organisations can match with cutting down
the costs and reducing the complexities of the infrastructural configurations. The issue is related
to work on the emerging information with the enhancement of the different security standards.
Challenges
As per the analysis, there is a major loss which leads to the number of the security and the legal
related patterns, identity management, and the control of access, risk management and the
regulatory or the legislative compliance (Dinh et al., 2013). The issues are also related to the
forms where the danger is mainly to let the control of the data out of the hands and then store the
data in the cloud computing provider. The data must be compromised with the cloud computing
which handles the lack of transparency for the customers on how, why and the data is processes.
(Manvi et al., 2014).
Problems
The issues are related to the deletion of the data along with handling the detection which is
mainly related to data collections. The forms are related to the data protection and the privacy
which includes the ability to work and take hold of the provider ability which includes the
secured communications. The mobile devices are set with the limited storage and computing
based on the services to make use of the software on the individual computers. The cloud
computing is based on accessing with transfer line which includes the DNS spoofing, Denial of
Denial attacks (Sultan, 2014). The computing provider, risk management and the compliance
The cloud computing is for innovation with the list of all the benefits where the business and the
governmental standards, small or the medium sized organisations can match with cutting down
the costs and reducing the complexities of the infrastructural configurations. The issue is related
to work on the emerging information with the enhancement of the different security standards.
Challenges
As per the analysis, there is a major loss which leads to the number of the security and the legal
related patterns, identity management, and the control of access, risk management and the
regulatory or the legislative compliance (Dinh et al., 2013). The issues are also related to the
forms where the danger is mainly to let the control of the data out of the hands and then store the
data in the cloud computing provider. The data must be compromised with the cloud computing
which handles the lack of transparency for the customers on how, why and the data is processes.
(Manvi et al., 2014).
Problems
The issues are related to the deletion of the data along with handling the detection which is
mainly related to data collections. The forms are related to the data protection and the privacy
which includes the ability to work and take hold of the provider ability which includes the
secured communications. The mobile devices are set with the limited storage and computing
based on the services to make use of the software on the individual computers. The cloud
computing is based on accessing with transfer line which includes the DNS spoofing, Denial of
Denial attacks (Sultan, 2014). The computing provider, risk management and the compliance
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
issues are based on the trust factor with the regulatory and legislative compliance which is also
problematic.
Relevant technology
The technologies that included in this is set with the grid computing, VMWare with the utility
standards to take hold of the easy storage with the easy transfer which depends on the accessing
for the different requests. The forms are set with the operating systems where the users can easily
access the servers with the enforcement of the mandatory standards which includes the data that
is gathered and stored. The issues and the concern is related to the specific computing provider
which includes the availability to go bankrupt and then stop providing the services.
Applications of the technologies
The cloud computing features are based on the computing with the elasticity, multitenancy with
the potential for the maximised resource utilisation. The on-demand nature is set with the high
levels of the virtualisation, automation, and easy accessibility with reliable intent which allows
the scaling up and using the minimum resources(Aazam et al.,2014). The issues are related to the
data control lack which includes the lack of the trust with the access, uncertainty about the status
of data. The forms are set with the data protection with the data security that plays an important
role with the computing environment where the encryption technology whether the data at rest or
transmitted is set over the internet. The user control works on offering the control of the
consumer data to the service provider with data visibility and control that is found to be limited.
problematic.
Relevant technology
The technologies that included in this is set with the grid computing, VMWare with the utility
standards to take hold of the easy storage with the easy transfer which depends on the accessing
for the different requests. The forms are set with the operating systems where the users can easily
access the servers with the enforcement of the mandatory standards which includes the data that
is gathered and stored. The issues and the concern is related to the specific computing provider
which includes the availability to go bankrupt and then stop providing the services.
Applications of the technologies
The cloud computing features are based on the computing with the elasticity, multitenancy with
the potential for the maximised resource utilisation. The on-demand nature is set with the high
levels of the virtualisation, automation, and easy accessibility with reliable intent which allows
the scaling up and using the minimum resources(Aazam et al.,2014). The issues are related to the
data control lack which includes the lack of the trust with the access, uncertainty about the status
of data. The forms are set with the data protection with the data security that plays an important
role with the computing environment where the encryption technology whether the data at rest or
transmitted is set over the internet. The user control works on offering the control of the
consumer data to the service provider with data visibility and control that is found to be limited.
Clarification
The forms are set with the legal issues which include offering the control to the consumer data
with the data visibility and control is found to be limited (Erl et al., 2013). The data transparency
is missing where the data exposure which could be for the possible data with law of accessing
data. The employee training and knowledge woks on the unauthorised usage with the forms that
include the data ranging from the targeted advertising with the re-sale of the data on the cloud.
Research Questions
Q1: What are some of the security issues which are related to loss of control of cloud
computing?
Q2: How the security of the network works on the denial of service attacks with the public cloud
standards?
Summary of issues
Mathew, A. (2012). Security and Privacy Issues of Cloud Computing; Solutions and Secure
Framework. International Journal of Multidisciplinary Research, 2(4).
The issues are related to the availability with the zero maintenance, subscription based services.
The cloud platform woks on allowing the consumers to deploy the applications which does not
include the management or control of the infrastructure. It includes the IT resources, processing
of the power with storage and the data centre space. The organisation need to set with the
measures and then working over the cloud computing which is for the data management business
that strengthen the client-side security. The web browsers are considered to take hold of the
The forms are set with the legal issues which include offering the control to the consumer data
with the data visibility and control is found to be limited (Erl et al., 2013). The data transparency
is missing where the data exposure which could be for the possible data with law of accessing
data. The employee training and knowledge woks on the unauthorised usage with the forms that
include the data ranging from the targeted advertising with the re-sale of the data on the cloud.
Research Questions
Q1: What are some of the security issues which are related to loss of control of cloud
computing?
Q2: How the security of the network works on the denial of service attacks with the public cloud
standards?
Summary of issues
Mathew, A. (2012). Security and Privacy Issues of Cloud Computing; Solutions and Secure
Framework. International Journal of Multidisciplinary Research, 2(4).
The issues are related to the availability with the zero maintenance, subscription based services.
The cloud platform woks on allowing the consumers to deploy the applications which does not
include the management or control of the infrastructure. It includes the IT resources, processing
of the power with storage and the data centre space. The organisation need to set with the
measures and then working over the cloud computing which is for the data management business
that strengthen the client-side security. The web browsers are considered to take hold of the
computing services which is for providing the consumers with the API and the other monitoring
of the cloud services.
Abbas, H., Maennel, O., & Assar, S. (2017). Security and privacy issues in cloud computing.
As per the research paper, the details include the issues which include the information leakage
and then working over the system standards. Here, the DDoS mitigation methods are used which
focus on the evaluation of the performance with the affinity based victim service techniques. The
forms are also related classification where the client side is set for the physical and the logical
safety that is provided to the clients which is another big challenge. Hence, to maintain the
security of the client organisations. There is a need to focus on the security practices with the
employing and setting the factors to make sure of the security through the VPN to connect to the
provider.
Issues not addressed
Issue 1:
Mathew, (2012) has the possibility to look for the different measures which could be using
COBIT 5 to handle the loss of the data. Through this, the network security concern and the EC2
cloud service and the modification of the security services need to be handled for the employees
to include the contractors, organisational affiliate and then accessing to the organisation
networks (Moreno et al., 2013). The public cloud services are set with the exposure to the data
which is secured mainly using firewalls. The authentication process includes the confidence
about storing the secured data patterns and then measures the forms which include the restricted
user access.
of the cloud services.
Abbas, H., Maennel, O., & Assar, S. (2017). Security and privacy issues in cloud computing.
As per the research paper, the details include the issues which include the information leakage
and then working over the system standards. Here, the DDoS mitigation methods are used which
focus on the evaluation of the performance with the affinity based victim service techniques. The
forms are also related classification where the client side is set for the physical and the logical
safety that is provided to the clients which is another big challenge. Hence, to maintain the
security of the client organisations. There is a need to focus on the security practices with the
employing and setting the factors to make sure of the security through the VPN to connect to the
provider.
Issues not addressed
Issue 1:
Mathew, (2012) has the possibility to look for the different measures which could be using
COBIT 5 to handle the loss of the data. Through this, the network security concern and the EC2
cloud service and the modification of the security services need to be handled for the employees
to include the contractors, organisational affiliate and then accessing to the organisation
networks (Moreno et al., 2013). The public cloud services are set with the exposure to the data
which is secured mainly using firewalls. The authentication process includes the confidence
about storing the secured data patterns and then measures the forms which include the restricted
user access.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Issue 2:
Abbas (2017), can focus on the different forms of the information assets with the security risks
standards. Here, there is a need to make use of the system with the hardware attack, social
engineering and handling the supply chain attacks. It works with the data leakage which needs to
be controlled with handling the leakage of the data which is potential for the competitor.
Impact of the above issues
Issue 1:
COBIT 5 could be helpful for controlling the access and then working over the system standards
which could be easily set with the incorporate with the tests that are based on SaaS hosted
applications.
Issue 2:
The enhancement methods are based on using the secured VPN with the use of the default
vendor passwords and the firewalls. The security policies are also to take hold of the security
forms with easy access to the restriction which could be important for the patch updates. Here,
the providers also need to focus on handling the services which are being removed from the
cloud.
Lesson learnt
The resources are based on handling the risk management with the easy and well-defined
standards (Xiao et al., 2013). It includes the services that need to be compliant with the
regulation and the customer also need to follow which will enable the regulations based on the
Abbas (2017), can focus on the different forms of the information assets with the security risks
standards. Here, there is a need to make use of the system with the hardware attack, social
engineering and handling the supply chain attacks. It works with the data leakage which needs to
be controlled with handling the leakage of the data which is potential for the competitor.
Impact of the above issues
Issue 1:
COBIT 5 could be helpful for controlling the access and then working over the system standards
which could be easily set with the incorporate with the tests that are based on SaaS hosted
applications.
Issue 2:
The enhancement methods are based on using the secured VPN with the use of the default
vendor passwords and the firewalls. The security policies are also to take hold of the security
forms with easy access to the restriction which could be important for the patch updates. Here,
the providers also need to focus on handling the services which are being removed from the
cloud.
Lesson learnt
The resources are based on handling the risk management with the easy and well-defined
standards (Xiao et al., 2013). It includes the services that need to be compliant with the
regulation and the customer also need to follow which will enable the regulations based on the
protection of the rules. The communication line is set with the cloud computing provider and
then working over the confidentiality, integrity and the authentication control.
Conclusion
It includes the telecommunication network that will help in easy handling of the network devices
which could easily be protected against any type of the malware (Khan et al., 2013). The
adequate logging and the auditing is important for the strengthening and then working over the
regulations to balance the power between the providers and the customers. The critical services
are set with the guarantee and the liability forms which is the major part of the application.
then working over the confidentiality, integrity and the authentication control.
Conclusion
It includes the telecommunication network that will help in easy handling of the network devices
which could easily be protected against any type of the malware (Khan et al., 2013). The
adequate logging and the auditing is important for the strengthening and then working over the
regulations to balance the power between the providers and the customers. The critical services
are set with the guarantee and the liability forms which is the major part of the application.
References
Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014, January). Cloud of Things: Integrating Internet of
Things and cloud computing and the issues involved. In Applied Sciences and Technology
(IBCAST), 2014 11th International Bhurban Conference on (pp. 414-419). IEEE.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture,
applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-
1611.
Erl, T., Puttini, R., & Mahmood, Z. (2013). Cloud computing: concepts, technology & architecture.
Pearson Education.
Khan, A. N., Kiah, M. M., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile cloud computing: A
survey. Future Generation Computer Systems, 29(5), 1278-1299.
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in
cloud computing: A survey. Journal of Network and Computer Applications, 41, 424-440.
Moreno-Vozmediano, R., Montero, R. S., & Llorente, I. M. (2013). Key challenges in cloud computing:
Enabling the future internet of services. IEEE Internet Computing, 17(4), 18-25.
Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and
challenges. International Journal of Information Management, 34(2), 177-184.
Xiao, Z., & Xiao, Y. (2013). Security and privacy in cloud computing. IEEE Communications Surveys &
Tutorials, 15(2), 843-859.
Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014, January). Cloud of Things: Integrating Internet of
Things and cloud computing and the issues involved. In Applied Sciences and Technology
(IBCAST), 2014 11th International Bhurban Conference on (pp. 414-419). IEEE.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture,
applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-
1611.
Erl, T., Puttini, R., & Mahmood, Z. (2013). Cloud computing: concepts, technology & architecture.
Pearson Education.
Khan, A. N., Kiah, M. M., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile cloud computing: A
survey. Future Generation Computer Systems, 29(5), 1278-1299.
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in
cloud computing: A survey. Journal of Network and Computer Applications, 41, 424-440.
Moreno-Vozmediano, R., Montero, R. S., & Llorente, I. M. (2013). Key challenges in cloud computing:
Enabling the future internet of services. IEEE Internet Computing, 17(4), 18-25.
Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and
challenges. International Journal of Information Management, 34(2), 177-184.
Xiao, Z., & Xiao, Y. (2013). Security and privacy in cloud computing. IEEE Communications Surveys &
Tutorials, 15(2), 843-859.
1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.