Analyzing Security Challenges in Cloud Computing Environments
VerifiedAdded on 2020/06/03
|10
|2783
|338
AI Summary
The evolution of cloud computing has introduced numerous benefits but also brings significant security challenges. Among these are unauthorized access, coding errors, and server vulnerabilities that can lead to severe data breaches. This paper delves into these issues by examining how they manifest in the realm of cloud computing and the consequent risks posed to both organizations and individuals. Solutions such as encryption techniques, holistic approaches for comprehensive security strategies, and continuous monitoring are explored for their efficacy in mitigating these threats. Through an analysis of various studies, including works by Beloglazov et al., Calheiros et al., and others, the paper highlights how adopting a multifaceted approach to cloud security can not only prevent unauthorized access but also ensure data integrity and confidentiality. Furthermore, it discusses the importance of evolving security measures in tandem with technological advancements to address emerging threats proactively. In conclusion, securing cloud computing environments is imperative for leveraging their full potential while safeguarding against significant risks.

Communications
Network Security
Network Security
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
INTRODUCTION...........................................................................................................................1
TASK 1............................................................................................................................................1
Overview of cloud computing.....................................................................................................1
Security information and security problems................................................................................4
Solutions for current security problems.......................................................................................6
TASK 2............................................................................................................................................6
Covered in PPT............................................................................................................................6
CONCLUSION................................................................................................................................6
REFERENCES................................................................................................................................8
INTRODUCTION...........................................................................................................................1
TASK 1............................................................................................................................................1
Overview of cloud computing.....................................................................................................1
Security information and security problems................................................................................4
Solutions for current security problems.......................................................................................6
TASK 2............................................................................................................................................6
Covered in PPT............................................................................................................................6
CONCLUSION................................................................................................................................6
REFERENCES................................................................................................................................8

INTRODUCTION
Network securities are some kind of policies and practices which are adopted by some
organizations in order to prevent the misuse of data (Subashini and Kavitha, 2011). Along with
this, activities should be monitored by them so that unauthorised access can be reduced and
security can be maintained. These all things are controlled by the administrator department so
that they will be able to attain their goals. The present report is based on cloud computing which
is used by companies and individual so that they can save their data at safe place. In this context,
it explains the concept of cloud computing and its networking issues or problems which are
faced by companies.
TASK 1
Overview of cloud computing
Cloud computing is an effective or more growing idea which is now a days adopted by
companies so that they will be able to ensure the security. By adopting this kind of technique,
they will be able to store their data or information on internet rather than computer. Whenever,
they have to access that data then they can use any computer by connecting it with the internet. It
is very easy for the organizations to quickly access the data which is stored on cloud. This play a
significant role in order to achieve success in the market as no one can use the confidential data
as it is protected with some encryption techniques or passcode (Calheiros and et. al., 2011). In
this type of approach, all data processing services are reliable or efficient in nature which can be
helpful for the organizations in achieving the goals.
The cloud computing can reduce the infrastructure cost to some extent so this will be
beneficial for firm as they can achieve specific goals. Through this, an enterprise can be focused
on their core business rather than resources which are required to maintain computers. There are
three types of cloud computing models which can be used by business organizations and these
can be grouped into some categories. These models are explained below:
Software as a service: It can also be known as SaaS. In this, current software application is
delivered to the end users or clients on their demand. For different users, it is not necessary to do
some investment and take any licence. But the service provider will be able to get advantage like
cost get lowered down. Some software’s are provided by Google and Microsoft.
1
Network securities are some kind of policies and practices which are adopted by some
organizations in order to prevent the misuse of data (Subashini and Kavitha, 2011). Along with
this, activities should be monitored by them so that unauthorised access can be reduced and
security can be maintained. These all things are controlled by the administrator department so
that they will be able to attain their goals. The present report is based on cloud computing which
is used by companies and individual so that they can save their data at safe place. In this context,
it explains the concept of cloud computing and its networking issues or problems which are
faced by companies.
TASK 1
Overview of cloud computing
Cloud computing is an effective or more growing idea which is now a days adopted by
companies so that they will be able to ensure the security. By adopting this kind of technique,
they will be able to store their data or information on internet rather than computer. Whenever,
they have to access that data then they can use any computer by connecting it with the internet. It
is very easy for the organizations to quickly access the data which is stored on cloud. This play a
significant role in order to achieve success in the market as no one can use the confidential data
as it is protected with some encryption techniques or passcode (Calheiros and et. al., 2011). In
this type of approach, all data processing services are reliable or efficient in nature which can be
helpful for the organizations in achieving the goals.
The cloud computing can reduce the infrastructure cost to some extent so this will be
beneficial for firm as they can achieve specific goals. Through this, an enterprise can be focused
on their core business rather than resources which are required to maintain computers. There are
three types of cloud computing models which can be used by business organizations and these
can be grouped into some categories. These models are explained below:
Software as a service: It can also be known as SaaS. In this, current software application is
delivered to the end users or clients on their demand. For different users, it is not necessary to do
some investment and take any licence. But the service provider will be able to get advantage like
cost get lowered down. Some software’s are provided by Google and Microsoft.
1
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Platform as a service: It is an another layer of software where a client can build some
applications. On the basis of these, they will be able to meet all the requirements by testing all
different kind of applications (Beloglazov, Abawajy and Buyya, 2012). For example, some
platforms are there like Google’s app engine, LAMP platform and so on.
Infrastructure as a service: These provide some storage capabilities which can help them
in storing the data on internet. Some different servers, data centre space, networking equipment
are available so that overall load can be managed in an effective manner. People can also deploy
their software or run the applications on such platforms. Some examples are there like 3 Tera and
GoGrid.
Figure 1: Cloud computing models
(Source: Sharan, 2017)
All kind of cloud computing services work in different manner as per their functioning and
it also depends upon the provider who is offering such kind of services. There are many benefits
which are achieved by industries after using the concept of cloud computing. This is the modern
concept in the sector of information technology and this play an important role in the company as
compare to other traditional approaches. Some of these advantages are explained below:
2
applications. On the basis of these, they will be able to meet all the requirements by testing all
different kind of applications (Beloglazov, Abawajy and Buyya, 2012). For example, some
platforms are there like Google’s app engine, LAMP platform and so on.
Infrastructure as a service: These provide some storage capabilities which can help them
in storing the data on internet. Some different servers, data centre space, networking equipment
are available so that overall load can be managed in an effective manner. People can also deploy
their software or run the applications on such platforms. Some examples are there like 3 Tera and
GoGrid.
Figure 1: Cloud computing models
(Source: Sharan, 2017)
All kind of cloud computing services work in different manner as per their functioning and
it also depends upon the provider who is offering such kind of services. There are many benefits
which are achieved by industries after using the concept of cloud computing. This is the modern
concept in the sector of information technology and this play an important role in the company as
compare to other traditional approaches. Some of these advantages are explained below:
2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cost reduction: Cloud computing can reduce the overall cost or capital expenses which
occur at the time of purchasing some software and hardware. For this, no need to develop
infrastructure and maintain the computers on continuous basis.
Speed: The cloud computing services are offered by providers to the people as per their
demands and requirements (Voorsluys, Broberg and Buyya, 2011). Business
organizations will be able to get many resources which can offer them flexibility and they
can also be able to perform capacity planning in an effective manner.
The firm can get relevant data or information at any place wherever they perform their
operations. This is very beneficial as through this they will be able to access data
anywhere as they didn’t require any non-portable device.
Productivity- Cloud computing can help the industry in order to enhance their
productivity level. In traditional systems, different stacking and racking activities are
performed which consume time and cloud computing saves this time. So, in this way IT
department can be focused on some specific activities which will help them in achieving
their goals.
Performance: Cloud computing services can be run in all over the world. There are some
network centres which are upgraded from time to time so this may be helpful for
enterprises as they can secure the data (Xu, 2012). Through this, their overall
performance can be enhanced and stability in economy of scale can be achieved.
Reliability: On the basis of such kind of cloud computing services, companies can
recover their data, get the backup of their services and the business can be establishing in
an efficient manner.
Storage: Companies can use cloud computing in order to store their data and maintain the
large amount of information in an effective manner. Through this, practical issues can
also be reduced like unauthorised users can’t access the confidential information.
3
occur at the time of purchasing some software and hardware. For this, no need to develop
infrastructure and maintain the computers on continuous basis.
Speed: The cloud computing services are offered by providers to the people as per their
demands and requirements (Voorsluys, Broberg and Buyya, 2011). Business
organizations will be able to get many resources which can offer them flexibility and they
can also be able to perform capacity planning in an effective manner.
The firm can get relevant data or information at any place wherever they perform their
operations. This is very beneficial as through this they will be able to access data
anywhere as they didn’t require any non-portable device.
Productivity- Cloud computing can help the industry in order to enhance their
productivity level. In traditional systems, different stacking and racking activities are
performed which consume time and cloud computing saves this time. So, in this way IT
department can be focused on some specific activities which will help them in achieving
their goals.
Performance: Cloud computing services can be run in all over the world. There are some
network centres which are upgraded from time to time so this may be helpful for
enterprises as they can secure the data (Xu, 2012). Through this, their overall
performance can be enhanced and stability in economy of scale can be achieved.
Reliability: On the basis of such kind of cloud computing services, companies can
recover their data, get the backup of their services and the business can be establishing in
an efficient manner.
Storage: Companies can use cloud computing in order to store their data and maintain the
large amount of information in an effective manner. Through this, practical issues can
also be reduced like unauthorised users can’t access the confidential information.
3

Figure 1: Top 14 Ravishing Advantage of Cloud Computing
(Source: Top 14 Ravishing Advantage of Cloud Computing, 2017)
So, all these are the benefits which are achieved by business organization after
implementing the cloud computing at the workplace. By using this, some limitations which are
associated with traditional system are get reduced and this can provide more benefits. Like, in
traditional system many computers are connected to each other and if any single system is get
crashed then overall data system will not work (Low, Chen and Wu, 2011). Due to such kind of
activity, business can have lost their overall data or information. So, in this manner modern
approach is more beneficial for organizations as they will be able to ensure their networking
security.
Security information and security problems
Whenever, an organization implemented some strategies then it is necessary for them to
perform some practices so that overall data can be prevented and after that unauthorised users
will not be able to access the company’s information. The term security information is used
when an enterprise has to secure their electronic as well as physical data. This can also be
referred as cyber security which is used to prevent the computers from any theft. Along with this,
it is a kind of damage which get occur with the software and hardware’s. Due to this, when
relevant information and reports are get deleted from such system then this will affect their
4
(Source: Top 14 Ravishing Advantage of Cloud Computing, 2017)
So, all these are the benefits which are achieved by business organization after
implementing the cloud computing at the workplace. By using this, some limitations which are
associated with traditional system are get reduced and this can provide more benefits. Like, in
traditional system many computers are connected to each other and if any single system is get
crashed then overall data system will not work (Low, Chen and Wu, 2011). Due to such kind of
activity, business can have lost their overall data or information. So, in this manner modern
approach is more beneficial for organizations as they will be able to ensure their networking
security.
Security information and security problems
Whenever, an organization implemented some strategies then it is necessary for them to
perform some practices so that overall data can be prevented and after that unauthorised users
will not be able to access the company’s information. The term security information is used
when an enterprise has to secure their electronic as well as physical data. This can also be
referred as cyber security which is used to prevent the computers from any theft. Along with this,
it is a kind of damage which get occur with the software and hardware’s. Due to this, when
relevant information and reports are get deleted from such system then this will affect their
4
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

performance in negative manner. The growth of current field is getting improved as now a days
the importance of computers are get increased in corporate world (Kreutz, Ramos and Verissimo,
2013). So, at present this is very important to secure the information by using some IT
techniques like Cloud computing.
There are some security problems which are associated with the organization and their
confidentiality level of information. It is the responsibility of IT department to analyse some
threats which can affect their performance in negative manner. These security issues can be
applied to the both valuable or non-valuable assets. For evaluating some issues, it is necessary
that staff members of information technological department should have knowledge and skills
regarding to the network security and their issues. Some list of issues is there like company’s
staff members, coding mistakes, unauthorised machines or devices, servers, local admin,
disabled security software’s, applications and so on. As per the research of James (2017), it has
been analysed that employees are the one who can be a source of risk which can act like a threat
for company. Sometimes, dissatisfied or frustrated staff members can damage their systems and
computers so due to this the confidential data can be shared with some unauthorised users.
Sometimes, a small error in coding can create a big blunder and due to which whole
system can be damaged. Mostly errors can get occurred in the SQL queries and if these will not
run appropriately then information will not be managed in a systematic manner. If work has been
performed by companies on some unauthorised machines, then due to this chances of security
can be enhanced (Kim and Feamster, 2013). Some applications like cloud computing is very easy
for the business organization as they can save their data at secured place but it become easy for
hackers as they can easily access the information which is saved on internet. Some devices like
laptop, tablet, computer are used by users so that information can be accessed or it can be used
for some wrong purpose. The files should be protected with some techniques or applications so
that transformation of such files can be reduced to some extent.
So, these are some of the issues which are faced by organizations at the time of storing data
on clouds. Sometimes, due to these their privacy is get influenced and due to which their
competitors will also be able to know about their services. On the basis of these, respective firms
will not be able to sustain their competitive advantage as these can lead them towards success.
5
the importance of computers are get increased in corporate world (Kreutz, Ramos and Verissimo,
2013). So, at present this is very important to secure the information by using some IT
techniques like Cloud computing.
There are some security problems which are associated with the organization and their
confidentiality level of information. It is the responsibility of IT department to analyse some
threats which can affect their performance in negative manner. These security issues can be
applied to the both valuable or non-valuable assets. For evaluating some issues, it is necessary
that staff members of information technological department should have knowledge and skills
regarding to the network security and their issues. Some list of issues is there like company’s
staff members, coding mistakes, unauthorised machines or devices, servers, local admin,
disabled security software’s, applications and so on. As per the research of James (2017), it has
been analysed that employees are the one who can be a source of risk which can act like a threat
for company. Sometimes, dissatisfied or frustrated staff members can damage their systems and
computers so due to this the confidential data can be shared with some unauthorised users.
Sometimes, a small error in coding can create a big blunder and due to which whole
system can be damaged. Mostly errors can get occurred in the SQL queries and if these will not
run appropriately then information will not be managed in a systematic manner. If work has been
performed by companies on some unauthorised machines, then due to this chances of security
can be enhanced (Kim and Feamster, 2013). Some applications like cloud computing is very easy
for the business organization as they can save their data at secured place but it become easy for
hackers as they can easily access the information which is saved on internet. Some devices like
laptop, tablet, computer are used by users so that information can be accessed or it can be used
for some wrong purpose. The files should be protected with some techniques or applications so
that transformation of such files can be reduced to some extent.
So, these are some of the issues which are faced by organizations at the time of storing data
on clouds. Sometimes, due to these their privacy is get influenced and due to which their
competitors will also be able to know about their services. On the basis of these, respective firms
will not be able to sustain their competitive advantage as these can lead them towards success.
5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Solutions for current security problems
When some security issues are arising then due to these company’s overall performance can
get affected in negative manner. So, IT person should be more competent enough that they can
help the firm in developing some solutions for the identified threats. For this, some modern
techniques can be used by an enterprise which can help them resolving issues or challenges.
There are some solutions which are described below:
Holistic approach: A new approach should be adopted by an enterprise so that overall
activities can be managed and by getting some solutions from user’s security issues can be
overcome (Hu, Hao and Bao, 2014). Through this, it can be ensured that the firm is secured
against some hackers who hacked the personal data of an enterprise.
Encryption: This is a technique which can be used by business organizations in order to
secure their information. A data owner can give access to some specific other people that they
can access that information in order to enhance their own understanding level. Through this,
privacy can also be ensured by the owner so that confidentiality can be maintained. In this, data
can be encrypted with some passcode or in other format and that will be analysed in an effective
manner. So, in this way they will be able to perform well and data security can be enhanced.
Some small risks which are identified can also be removed like coding mistakes can be
resolved by updating the software’s on continuous basis. If these will not get overcome, then
major blunders can be happened which can also affect their performance. The manager has to
monitor each and every employee so that if any misconduct will have happened by them than
strict action should be taken (Calheiros and et. al., 2011). The company should never update their
such new software on old system as if both are not suitable then data can be crashed and that can
never be recovered. If some applications are not appropriate for the current system, then those
should be uninstalled or updated. The privacy settings should be enabled in cloud computing
software then only they can maintain the confidentiality level of reports.
TASK 2
Covered in PPT
CONCLUSION
From the above carried out analysis or findings, it can be interpreted that technological
advancements are the kind of practices which are performed by companies in order to enhance
6
When some security issues are arising then due to these company’s overall performance can
get affected in negative manner. So, IT person should be more competent enough that they can
help the firm in developing some solutions for the identified threats. For this, some modern
techniques can be used by an enterprise which can help them resolving issues or challenges.
There are some solutions which are described below:
Holistic approach: A new approach should be adopted by an enterprise so that overall
activities can be managed and by getting some solutions from user’s security issues can be
overcome (Hu, Hao and Bao, 2014). Through this, it can be ensured that the firm is secured
against some hackers who hacked the personal data of an enterprise.
Encryption: This is a technique which can be used by business organizations in order to
secure their information. A data owner can give access to some specific other people that they
can access that information in order to enhance their own understanding level. Through this,
privacy can also be ensured by the owner so that confidentiality can be maintained. In this, data
can be encrypted with some passcode or in other format and that will be analysed in an effective
manner. So, in this way they will be able to perform well and data security can be enhanced.
Some small risks which are identified can also be removed like coding mistakes can be
resolved by updating the software’s on continuous basis. If these will not get overcome, then
major blunders can be happened which can also affect their performance. The manager has to
monitor each and every employee so that if any misconduct will have happened by them than
strict action should be taken (Calheiros and et. al., 2011). The company should never update their
such new software on old system as if both are not suitable then data can be crashed and that can
never be recovered. If some applications are not appropriate for the current system, then those
should be uninstalled or updated. The privacy settings should be enabled in cloud computing
software then only they can maintain the confidentiality level of reports.
TASK 2
Covered in PPT
CONCLUSION
From the above carried out analysis or findings, it can be interpreted that technological
advancements are the kind of practices which are performed by companies in order to enhance
6

their security level. Cloud computing is used by them so that they can secure their data on cloud
and due to which unauthorised access of data can be reduced. Through this, their confidentiality
and integrity level can be ensured in an efficient way. Some issues are like employees,
applications, servers, coding mistake and so on. For these some solutions can be identified like
encryption technique, holistic approach, monitoring techniques and so on.
7
and due to which unauthorised access of data can be reduced. Through this, their confidentiality
and integrity level can be ensured in an efficient way. Some issues are like employees,
applications, servers, coding mistake and so on. For these some solutions can be identified like
encryption technique, holistic approach, monitoring techniques and so on.
7
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

REFERENCES
Books and Journal
Beloglazov, A., Abawajy, J. and Buyya, R., 2012. Energy-aware resource allocation heuristics
for efficient management of data centers for cloud computing. Future generation
computer systems. 28(5). pp.755-768.
Calheiros, R. N. and et. al., 2011. CloudSim: a toolkit for modeling and simulation of cloud
computing environments and evaluation of resource provisioning algorithms.
Software: Practice and experience. 41(1). pp.23-50.
Hu, F., Hao, Q. and Bao, K., 2014. A survey on software-defined network and openflow: From
concept to implementation. IEEE Communications Surveys & Tutorials. 16(4).
pp.2181-2206.
Kim, H. and Feamster, N., 2013. Improving network management with software defined
networking. IEEE Communications Magazine. 51(2). pp.114-119.
Kreutz, D., Ramos, F. and Verissimo, P., 2013, August. Towards secure and dependable
software-defined networks. In Proceedings of the second ACM SIGCOMM workshop
on Hot topics in software defined networking (pp. 55-60). ACM.
Low, C., Chen, Y. and Wu, M., 2011. Understanding the determinants of cloud computing
adoption. Industrial management & data systems. 111(7). pp.1006-1023.
Subashini, S. and Kavitha, V., 2011. A survey on security issues in service delivery models of
cloud computing. Journal of network and computer applications. 34(1). pp.1-11.
Voorsluys, W., Broberg, J. and Buyya, R., 2011. Introduction to cloud computing. Cloud
computing: Principles and paradigms. pp.1-41.
Xu, X., 2012. From cloud computing to cloud manufacturing. Robotics and computer-integrated
manufacturing. 28(1). pp.75-86.
Online
James, J., 2017. 10 security problems you might not realize you have. [Online]. Available
through: <http://www.techrepublic.com/blog/10-things/10-security-problems-you-
might-not-realize-you-have/>. [Accessed on 9th September 2017].
Sharan, R., 2017. Cloud computing models. [Online]. Available through: <
sharannetwork.blogspot.in/2011/07/cloud-computing-overview.html>. [Accessed on
9th September 2017].
Top 14 Ravishing Advantage of Cloud Computing. 2017. [Online]. Available through: <
https://solutiondots.com/blog/advantage-of-cloud-computing.html>. [Accessed on 9th
September 2017].
8
Books and Journal
Beloglazov, A., Abawajy, J. and Buyya, R., 2012. Energy-aware resource allocation heuristics
for efficient management of data centers for cloud computing. Future generation
computer systems. 28(5). pp.755-768.
Calheiros, R. N. and et. al., 2011. CloudSim: a toolkit for modeling and simulation of cloud
computing environments and evaluation of resource provisioning algorithms.
Software: Practice and experience. 41(1). pp.23-50.
Hu, F., Hao, Q. and Bao, K., 2014. A survey on software-defined network and openflow: From
concept to implementation. IEEE Communications Surveys & Tutorials. 16(4).
pp.2181-2206.
Kim, H. and Feamster, N., 2013. Improving network management with software defined
networking. IEEE Communications Magazine. 51(2). pp.114-119.
Kreutz, D., Ramos, F. and Verissimo, P., 2013, August. Towards secure and dependable
software-defined networks. In Proceedings of the second ACM SIGCOMM workshop
on Hot topics in software defined networking (pp. 55-60). ACM.
Low, C., Chen, Y. and Wu, M., 2011. Understanding the determinants of cloud computing
adoption. Industrial management & data systems. 111(7). pp.1006-1023.
Subashini, S. and Kavitha, V., 2011. A survey on security issues in service delivery models of
cloud computing. Journal of network and computer applications. 34(1). pp.1-11.
Voorsluys, W., Broberg, J. and Buyya, R., 2011. Introduction to cloud computing. Cloud
computing: Principles and paradigms. pp.1-41.
Xu, X., 2012. From cloud computing to cloud manufacturing. Robotics and computer-integrated
manufacturing. 28(1). pp.75-86.
Online
James, J., 2017. 10 security problems you might not realize you have. [Online]. Available
through: <http://www.techrepublic.com/blog/10-things/10-security-problems-you-
might-not-realize-you-have/>. [Accessed on 9th September 2017].
Sharan, R., 2017. Cloud computing models. [Online]. Available through: <
sharannetwork.blogspot.in/2011/07/cloud-computing-overview.html>. [Accessed on
9th September 2017].
Top 14 Ravishing Advantage of Cloud Computing. 2017. [Online]. Available through: <
https://solutiondots.com/blog/advantage-of-cloud-computing.html>. [Accessed on 9th
September 2017].
8
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.