Ask a question to Desklib · AI bot

Ask NowBETA

Challenges in Cloud Computing- Report

Added on -2019-09-24

| 13 pages
| 4086 words
| 213 views

Trusted by 2+ million users,
1000+ happy students everyday

Task 31
Table of ContentsIntroduction:....................................................................................................................................3Overview of the cloud computing and the relevant technologies:..................................................3Security issues associated with the cloud:.......................................................................................4Identification of gaps in existing literature:...................................................................................10Future research directions:.............................................................................................................11Conclusion:....................................................................................................................................11References:....................................................................................................................................122
Introduction:The cloud computing is one of the emerging technologies in the recent years. The cloudcomputing provides the users with many benefits including the enhanced flexibility, improvedefficiency and the better strategic value. However, the cloud computing highly depends on theinternet and so; it is being highly vulnerable to the security threats. Therefore, in recent days, theusers of cloud computing are focusing more on enhancing security of the data shared over thecloud services (An & Kim, 2018). As the hacking techniques are getting improved every day,protecting confidentiality of the data shared over the cloud service is also getting difficult. Theorganizations which are using the cloud services need to focus more on identification of thesolutions to mitigate the security threats. The current research report deals with analysis on thesecurity challenges faced by the users of cloud computing. The research report also givesimportance on identification of the gaps in existing literature and providing the future researchdirections.Overview of the cloud computing and the relevant technologies:Cloud computing security or cloud security refers to the set of policies, technologies, andcontrols used to ensure applications, data, and associated infrastructure of the cloud computing.It is a sub-domain of PC security, network security, and, more extensively, information security.The approach of cloud computing is actually forcing organizations to change their techniques.Already, contracting another worker means furnishing him with a work area, computer anddifferent other hardware or software which requires investment of huge amount of capital and theCloud computing enables them to lessen these capital expenditures fundamentally. Presentlyeach of the employees needs is a computer with a web association with access the work data.Work areas and office gear may in any case be vital; however the cost of storage hardware canbe reduced by taking help from the cloud computing organizations. Upon switching to the cloudcomputing services, need of the hardware and software on the business' side drastically(BRANQUINHO, 2018). As the labor costs per employee does down, the organization becomesempowered to hire more number of workers. Due to use of the cloud technology, productivity ofthe organization expands, which increases the proficiency and profits of the business.3
Security issues associated with the cloud:The key reason behind the increasing importance of cloud computing is the benefits it providesto the business organizations. The cost reduction is one of the key factors that attract thebusinesses to use the cloud services. Apart from the benefits obtained from the cloud computing,there are a number of concerns about cloud computing exist, specifically regarding the privacyand security of data shared over cloud. Entrepreneurs and administrators may hesitate to expose their confidential data to an outsidersystem considering all the security issues associated with it (Ivanchenko ey al.2018) .Losingaccess to the own data or having it compromised can reduce competitiveness of the organizationsin the market . One major advantage against the security concern, is the fact that cloudcomputing provides the organizations with the opportunity to increase the productivity and theprofitability . Despite the intensity of this motivating force, there are many businesses which stillhesitate to use the cloud technology.When it comes to ensuring privacy of the data, the key concern is making the interactionbetween the client's computer and the cloud system secured. Privacy could undoubtedly becompromised by corrupted people who could access individual information like credit cardnumbers when the users system and the cloud system is interacting. A solution for this issue is toutilize authentication and encryption to protect the data. The practical concerns related to losing confidentiality of the protected data can be reduced tosome degree through the authentication process. When the authentication process isimplemented, the users need to verify their identity before getting access to the data in severalstages. As a result, getting access to the data by the unauthorized individuals becomes difficult.Data theft is one of the biggest threats associated with cloud based systems. Implementation ofthe authentication system helps the users to keep the data secured.Cloud computing and storage gives users capabilities to store and process their data in outsiderdata centers Organizations utilize the cloud in a wide range of service models (PaaS, SaaS, andIaaS) and deployment models (private, hybrid, public, and community) (Hashem et al.2015).Security concerns associated with cloud computing fall into two general categories: securityissues looked by cloud providers (organizations which provide platform-, software-, , or4

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Students who viewed this