Cloud Computing Security Report: Analysis of Issues and Solutions

Verified

Added on  2020/03/28

|9
|1876
|46
Report
AI Summary
This report delves into the security issues surrounding cloud computing. It begins by outlining the core concepts of cloud computing, emphasizing its reliance on shared resources and the importance of data security. The report identifies key security challenges, including data loss, data mining, eavesdropping, DNS spoofing, and denial-of-service attacks. It explores the technologies involved, such as grid computing and virtualization, and their applications. The report then presents research questions regarding security measures for confidential issues and denial-of-service attacks. It summarizes the issues, referencing sources like Mathew (2012) and Abbas et al. (2017). Furthermore, it discusses issues not addressed in the existing literature, such as the lack of COBIT 5 implementation and the need for a service-oriented structure. The impact of these issues is analyzed, along with lessons learned. Finally, the report emphasizes the importance of physical and logical safety measures and the role of APIs in monitoring and controlling cloud services. The conclusion highlights the significance of security plugins and automatic updates to address security concerns.
Document Page
Cloud computing
Report
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Document Page
Contents
Introduction......................................................................................................................................1
Security issues for the cloud computing..........................................................................................1
Summary of the issues.....................................................................................................................3
Issues not addressed.........................................................................................................................4
Impact of the above issues...............................................................................................................5
Lesson Learnt...................................................................................................................................5
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
Document Page
Introduction
The standards for the cloud computing is completely based on working over the demands where
the network need to handle the access of the different shared pools with the easy configuration of
the different resources. the provisioning is based on working over the management of the efforts
with the cloud providers taking hold of the interaction. The cloud computing is mainly
considered to be emerging with the major privacy concerns that are also related to the security
measures (Hashizume et al., 2013). There are zero investments for the infrastructure
development of the IT which has been the major concern for the cloud computing
Security issues for the cloud computing
Challenges
As per the research, there are different issues related to the data loss of control with the
dependency standards set for the cloud commuting. The challenge is also related to the data
mining techniques where the functions, storing and the processing is depending upon the
sensitivity of the day with the services that are related to work on the services for the cloud
computing. The devices are set to take hold of the storage of the data with the computation which
includes that there is a need to drive the services which could be important for the transfer from
one to the other devices (Almorsy et al, 2016). The cloud computing measures are depending
upon the access to the different measures which includes the eaves dropping, DNS spoofing and
then setting the Denial of Service attacks as well.
Problems
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The issues are also related to the system measures which includes the deletion of the data and
then working over the concerns which includes the detection of the copies with the different
levels of the data collection (Modi et al, 2013). The protection of the data is based on the privacy
which includes the reliability measures with the secured forms of the communication. The
computing is depending upon the measures where the availability and the approach is depending
upon the utilities and how it can take hold of the changes related to the functionality and the
pricing or the liability factors.
Technologies
To take hold of the different technologies, it includes the grid computing, virtualisation and the
VMWare setup which is important for the procurement and taking hold of the easy storage of the
data or the charges. This depends on the transferring of the data and then set the access which is
dependent on handling the questions which are related to the issues of the use of network. The
forms are also related to the operating methods which includes how it is easy to access the
different measures and the behaviour which could easily access to the system with the storage
that is mainly without the specific details. The virtualisation layer is mainly to take forms which
include how the execution and the work can compute the resources with the easy access to the
different resources. (Stojmnovic et al, 2014)
Applications set for this
There are different measures that includes the computation of the resources and then work over
the execution forms that include the processing of the software. The different programs are
related to the processing which includes the handling of the customisation programs of the
computer systems. It is also related to the working of the system which leads to the monitoring of
Document Page
the system and then working over the processes which could easily be set with the remote
information of the computer. The forms are related to the corporations which also completely
reply on the system working with the different rights that are important for the achievement of
the goals. The system processes are related to the working in the corporations with the focus on
the processing of the power and then working over the different patterns of the back-end access
with the speeding of the different calculations.
Clarification on the vague areas
It includes the measures for the different resources which includes the storage and the easy
handling of the processes with the handling of the system space with the services and the
compliance. The standards are also set to take hold of the safety patterns and then work over the
alignment of the privacy and security forms. (Hashem et al., 2015)
Research Questions
Q1: What are some of the measures which needs to be taken case for the security standards
which are based on the confidential issues?
Q2: How is it possible to work on the different cloud services which include the denial of the
service attacks?
Summary of the issues
Mathew, A. (2012). Security and Privacy Issues of Cloud Computing; Solutions and Secure
Framework. International Journal of Multidisciplinary Research, 2(4).
The issues are related to the system process which includes the patterns related to the control of
the data. This also works with the forms which related to the forms of the network security and
Document Page
the other forms of the public cloud services. The provider of the cloud also need to take hold of
the forms which works with the easy access of the systems which includes the security breach
and handling the control of the data over the setup where some of the customers tend to lack the
control on the system patterns.
Abbas, H., Maennel, O., & Assar, S. (2017). Security and privacy issues in cloud computing.
The issues are related to the working with the cloud assisted systems which includes the
information leakage and the work is on how the user can handle the classification of the data
with the different privacy issues. The data is then transmitted with the over with the forms that
includes the art research and development. The forms include the services and how the DDoS
mitigation is set with the performance based on the victim service resizing forms. The security
measures are depending upon the security and the attacks which are related to the cloud based
environments.
Issues not addressed
Issue 1:
Mathew (2012), could have included the handling of the COBIT 5 which is important for the
transparency and storing the data in an effective manner. The control is set with the risks to
ensure the confidentiality of the system, integrity and the authentication control in a proper
manner. The obligatory standards are also depending upon the management, contracts and the
other enforcements which are legal.
Issue 2:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abbas et al., (2017), can focus on the service oriented structures which includes the handling of
the in-house managed enterprise. It includes the capability and the working through easy
emergence of the security risks. (Khetri, 2013) The external tracking of the threats need to be
handled with the attempt that includes the hardware attack and the social engineering.
Impact of the above issues
Issue 1:
COBIT 5 could be for the IT governance and easy risks mitigation process. It is based on the
different deployment models, where the computation is based on accessing the control and then
working over the framework which includes the use of the SaaS hosted applications.
Issue 2:
The forms are set with the secured cloud computing works on the security challenges and then
working over the functions related to providing the passwords and the host side firewalls. The
security policies are related to the access of the restrictions with the security measures. The
providers are also equipped with the easy handling of the services and the patch updates or the
logs.
Lesson Learnt
The forms are related to the cloud computing where the scalability is based on measuring the
management of the IT forms. (Puthal et al., 2015) Here, the resources are also related to work on
the privacy and the security standards which includes how the consumers can work and follow
the IT resources with the easy processing power and the storage, with service and the
Document Page
compliance. The organisation need to focus on the safety measures which are related to the
alignment of the privacy requirements.
Conclusion
The cloud computing has been considered important to measure the physical and the logical
safety measures. It works on the standards where the client works over the consideration of the
VPN with the forms that include how the API can handle the monitoring and the working with
easy control, monitoring and setting the cloud services. This is important with the API that
includes the protection of the accidental forms with the different plugins that are related to the
automatic updates which relates to the security concerns.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]