logo

Security Threats in Cloud Computing and Preventive Methods - Doc

3 Pages2498 Words194 Views
   

Added on  2021-06-14

Security Threats in Cloud Computing and Preventive Methods - Doc

   Added on 2021-06-14

ShareRelated Documents
Security threats in cloud computing and preventivemethods[Name of the Author][Name of the University][Available at]ABSTRACT – Cloud computing is closely related to thevirtualization. It is better to say that cloud computing hastaken the virtualization in next level of evolution. Clouds aremainly used for various purposes. Cloud computing is anInformation Technology paradigm which is associated withenabling a ubiquitous rate of access to the pool of systemresources which are generally configurable and are shared.This technology can be provisioned by putting a little amountof management effort and are accessed by making use of theinternet. This report is mainly associated with discussingabout the major security risks in cloud computing and whatare the preventive measures to save the information presentin the clouds.Keywordscloud computing, security of cloud computing, risksfaced by cloud computing, prevention from security issues.INTRODUCTIONCloud computing generally consists of the cloud, whichgenerally means the Internet. This is associated withfacilitating the users to get access of the device, which areresiding at place of the internet and this is done mainly inorder to share various types of information in different forms.Along with this, the cloud-computing environment is also usedfor accessing different kind of software and database. Thistype of accessing is mainly done by making use of the SaaS orthe Software as a Service [1]. Besides this, users would also becapable of using updated software without any kind of need ofinstalling the software in the system of the user. LITEERATURE REVIEWCloud computing is responsible for reducing the costsassociated with the installation and purchasing of new devicesat a drastic rate. This mainly has happened due to presence ofa singular network where all the devices are connected andthey share the network amongst themselves.Cloud computing has some outstanding features and thismainly includes the following:This helps a lot in reducing the cost which aregenerally required for the purpose of buying any kindof external device. Favoring the device by providing mobility of thelocations. Which means that an user can access adevice or service irrespective of their location.Providing virtual technology, which means that it isassociated with providing the facility of sharing theservers as well as the sources [2]. Provide multitenancy, which means that it isassociated with providing of the facility to enable theusers to share their resources by means ofcentralization.Cloud computing is also associated with enhancing theload capacity.Along with all this cloud computing also, favor a lot invarious type of processes and for this reason it is very muchpopular amongst the users of the internet.A.Research problemsAlong with the various type of benefits and its popularity,the cloud computing technology has been associated withvarious type of drawbacks, which are unavoidable, and thishas ultimately resulted the technology to face various type ofsecurity breaches. Some of the common security challengesfor the cloud technology mainly involves the breach of thedata, loss of the data, hijacking of the traffic, APIs which areunsecure, Denial of service attack, attacks from the malware,abuse of the clouds knowledge’s which are insufficient and thevulnerabilities related to the haring of the technology [3].The security challenges of the cloud technology has beendiscussed I brief in the following section of the report.Breach of the data: In case if the backups of the dataare stored in offline form then the risks related to theloss of data is relatively less whereas this would begreatly increasing the risk related to the exposure ofthe data. It is possible for the virtual machine to geteasy access of the side channels timing information inorder to derive the private cryptographic keys. Thesekeys are generally used by the other virtual machines,which are present in the same network. In case whenthe designing is not done in a proper way then theattacker would become capable of reaching out to thedata of the user and use it for various maliciouspurposes [4].Abuse of the clouds: IaaS or Infrastructure as a Serviceis one of the feature of the cloud computing isassociate with providing virtualization of the devices aswell as the storages and the networks. However, thisproviding of virtualization does not consist of any typeof secured registration process. Which means that it ispossible for anyone who is having the correctcredentials can sign up for the cloud and are capable ofusing the cloud services instantly. For this reason, manyof the cloud network can become a victim of varioustype of malicious attacks, spam mails and many more[5].API, which are insecure: API or the Application UserInterface along with the software and other type ofinterfaces generally gets shared by the users present ata particular cloud network. The security, which ispresent for this type of shared resources, are mainlydependent upon the different type of security policies,which are used by the respective software and the APIs.Therefore, it is very much essential to have a tightsecurity in the APIs and the software that are going tobe shred on the clouds [6].
Security Threats in Cloud Computing and Preventive Methods - Doc_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing: Types, Advantages and Disadvantages
|8
|1314
|485

Security, privacy and trust in cloud computing: A comparative
|5
|2306
|205

Cloud Computing
|10
|2280
|86

ITC595 – Information Security
|4
|4934
|65

Cloud Computing Technology - PDF
|11
|3174
|81

Cloud Computing: Benefits, Resource Allocation, and Data Security
|8
|582
|150