Task 3. Table of Contents. Introduction: 3. Overview of

Added on - 23 Sep 2019

  • Dissertation

    type

  • 13

    pages

  • 4040

    words

  • 84

    views

  • 0

    downloads

Showing pages 1 to 4 of 13 pages
Task 31
Table of ContentsIntroduction:....................................................................................................................................3Overview of the cloud computing and the relevant technologies:..................................................3Security issues associated with the cloud:.......................................................................................4Identification of gaps in existing literature:...................................................................................10Future research directions:.............................................................................................................11Conclusion:....................................................................................................................................11References:....................................................................................................................................122
Introduction:The cloud computing is one of the emerging technologies in the recent years. The cloudcomputing provides the users with many benefits including the enhanced flexibility, improvedefficiency and the better strategic value. However, the cloud computing highly depends on theinternet and so; it is being highly vulnerable to the security threats. Therefore, in recent days, theusers of cloud computing are focusing more on enhancing security of the data shared over thecloud services (An & Kim, 2018). As the hacking techniques are getting improved every day,protecting confidentiality of the data shared over the cloud service is also getting difficult. Theorganizations which are using the cloud services need to focus more on identification of thesolutions to mitigate the security threats. The current research report deals with analysis on thesecurity challenges faced by the users of cloud computing. The research report also givesimportance on identification of the gaps in existing literature and providing the future researchdirections.Overview of the cloud computing and the relevant technologies:Cloud computing security or cloud security refers to the set of technologies, policies, andcontrols used to ensure applications, data, as well as the associated infrastructure of the cloudcomputing. It is a sub-domain of PC security, network security, and, more extensively,information security. The approach of cloud computing is actually forcing organizations tochange their techniques. Already, contracting another worker means furnishing him with a workarea, computer and different other hardware or software which requires investment of hugeamount of capital and the Cloud computing enables them to lessen these capital expendituresfundamentally. Presently each of the employees needs is a computer with a web association withaccess the work data. Work areas and office gear may in any case be vital; however the cost ofstorage hardware can be reduced by taking help from the cloud computing organizations. Uponswitching to the cloud computing services, need of the hardware and software on the business'side drastically (BRANQUINHO, 2018). As the labor costs per employee does down, theorganization becomes empowered to hire more number of workers. Due to use of the cloud3
technology, productivity of the organization expands, which increases the proficiency and profitsof the business.Security issues associated with the cloud:The key reason behind the increasing importance of cloud computing is the benefits it providesto the business organizations. The cost reduction is one of the key factors that attract thebusinesses to use the cloud services. Apart from the benefits obtained from the cloud computing,there are a number of concerns about cloud computing exist, specifically regarding the privacyand security of data shared over cloud.Entrepreneurs and administrators may hesitate to expose their confidential data to an outsidersystem considering all the security issues associated with it (Ivanchenkoey al.2018) .Losingaccess to the own data or having it compromised can reduce competitiveness of the organizationsin the market . One major advantage against the security concern, is the fact that cloudcomputing provides the organizations with the opportunity to increase the productivity and theprofitability . Despite the intensity of this motivating force, there are many businesses which stillhesitate to use the cloud technology.When it comes to ensuring privacy of the data, the key concern is making the interactionbetween the client's computer and the cloud system secured. Privacy could undoubtedly becompromised by corrupted people who could access individual information like credit cardnumbers when the users system and the cloud system is interacting. A solution for this issue is toutilize authentication and encryption to protect the data.The practical concerns related to losing confidentiality of the protected data can be reduced tosome degree through the authentication process. When the authentication process isimplemented, the users need to verify their identity before getting access to the data in severalstages. As a result, getting access to the data by the unauthorized individuals becomes difficult.Data theft is one of the biggest threats associated with cloud based systems. Implementation ofthe authentication system helps the users to keep the data secured.Cloud computing as well as the storage services provide the users with the capabilities forstoring and processing the data in the external data centers. The organizations utilize the cloud in4
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Unlock This Document