logo

Security Threats in Cloud Computing

   

Added on  2023-03-23

3 Pages2604 Words41 Views
Security Threats in Cloud Computing
[Please fill author name]
[Please fill university details]
ABSTRACT The main motive of this report is to deal with the
methodology and security threats of cloud computing. This
methodology is said to be an effective technology which tends to be
a popular option regarding the businesses as well as for people for
effective savings of cost, the increased rate of productivity,
efficiency as well as speed providing the users with high
performance and enhanced security. Thus the report will focus on
the technology as well as the relevant applications that uses this
technology to facilitate their consumers. However, the technology
has some drawbacks too which are identified as well assessed
within the report with clear analysis. The report will further deal
with the challenges that persist in the technology. There are certain
parts of the report that addresses the main critical issues associated
with the technology. Moreover, the report will give a clear
reflection about the issues that still persist with the implementation
of this technology. The last part of the report also identifies some
future research area within the cloud computing technology. Hence
it can be said that the overall report provides a critical assessment
and overview regarding the overall cloud computing technology
assessing all the main aspects and terminologies.
INTRODUCTION
Cloud computing is said to be the procedure of storing as
well as accessing of the programs and data all over the
Internet rather than storing the data in the hardware of a
specific computer. This term involves the delivery of the
services that are hosted all over the internet (Ali, Khan &
Vasilakos, 2015). The cloud computing holds the resources
such as the tools as well as the applications that are likely to
be storage of data, the databases, servers as well as software
and networking of data resources. However, there are certain
security threats that are associated with the usage of this
technology. This report will deal with the detailed analysis of
these threats as well as will provide a clear overview of the
preventive measures regarding this threats.
TECHNOLOGY OVERVIEW
The name of the technology itself justifies that the
information is stored remotely in the cloud that can be
accessed by any individual or a business from anywhere. This
technology facilitates the users with the storage of the data on
remote servers of the organization that are providing the
cloud services. This enhances the consumer’s data to be
stored in a much vast space in the cyberspace thus allowing
safekeeping of the data as well as ease of access of those data
by the users of this technology (Botta et al., 2016). This
technology can be used in both the forms that is private as
well as public. The public services of the clouds allows the
consumers to use the services of the technology for free
whereas the private services are provide to a limited amount
of people thus facilitating them with the advanced features of
the technology. There is also a third option regarding the
technology of the cloud computing which combines both
features of the public as well as private features present
within this technology. There are certain functions that are
facilitated by the usage of the cloud computing services. These
includes Email, analysis of data, streaming of audio as well as
videos , creation as well as testing of innovated applications
and many more.
RELEVANT APPLICATIONS
The categories of the applications regarding the cloud
computing technology is described in the following table.
Categories Applications
Online Storage of Files Hotfile, megaupload,
mediafire and many more.
Software for photo editing Pixlr, Picnik
Software for digital video Hulu
Web Application regarding
Antivirus Cloud Antivirus
Software for E commerce
The e-application based on
the cloud technology helps
to understand as well as
focus on the data storage in
the cloud.
The above stated applications are used by many of the
users as well as business organizations to deal with the various
types of works that they are associated with. By using this type
of applications the users are very well facilitated with the
effective storage of the within the remote servers of the
organization that are very reliable and easy to access from
anywhere (Chang & Ramachandran, 2015).
CHALLENGES IN THE TECHNOLOGY
The focus of this technology is to enable the global access
to the users as well as business to the wide pool of the
resources that are stored in the relevant remote servers of any
organization that provides the cloud services to their
consumers (Aljawarneh & Yassein, 2016). There are mainly six
identified challenges that can occur with the cloud computing
technology, which are briefly explained as follows.
Cost: The technology is quite affordable regarding an
individual whereas to meet with the business needs of an
organization it might get expensive (Rittinghouse & Ransome,
2016). Moreover, for small scale industries or project there
will be a lot of expense regarding the transfer of data to the
public clouds.
The reliability of service provider: The capacity as well as
the capability of a cloud technology service provider is also a
important criteria in association with the price regarding
execution of the technology. The service provider sometimes
may not be reliable and might not be available at certain
times. This will turn out to be an important challenge as faced

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security in Cloud Computing and Preventive Methods Assignment
|14
|3523
|58

Security Threats in Cloud Computing
|4
|668
|210

Impact of cloud computing Assignment
|8
|1952
|136

Cloud Computing in Data Backup and Data Recovery Research Report 2022
|5
|1445
|23

Network Security Assignment Solution
|10
|2709
|111

Faculty of Engineering and Environment
|13
|2659
|12