Analyzing the Major Issues in Cloud Computing Environments
VerifiedAdded on 2023/01/11
|8
|1820
|86
Essay
AI Summary
This essay provides a comprehensive overview of the key issues and challenges associated with cloud computing. It delves into the security risks, including data theft, software vulnerabilities, authentication problems, and cyberattacks, highlighting the importance of addressing these concerns to ensure customer satisfaction. The essay examines various techniques for mitigating these risks, such as the use of strong security measures, tools for preventing spam and malware, and the implementation of CIA assessment methodologies. It also addresses the challenges of cost control, utilization monitoring, and the complexities of cloud management, emphasizing the need for IT to adapt to the cloud environment. The essay references several studies and articles that support the discussion, and it concludes by underscoring the importance of understanding these issues to harness the full potential of cloud computing while minimizing its drawbacks.

Assessment
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
REFERENCES................................................................................................................................6
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
REFERENCES................................................................................................................................6

INTRODUCTION
Cloud computing provides on-demand system services without specific active user
control, particularly the storage and processing capacity of data (Rittinghouse and Ransome,
2016). The term is used commonly to identify data centers for other web users. This is very
useful for users in order to store data in an effective manner. Each technique has some issues and
benefits. Same as cloud computing also has some problems such as risk of data theft, security
issues and many more. In the project report an essay is mentioned on the topic named as” Issues
in cloud computing”.
MAIN BODY
In this aspect of essay, key issues of cloud computing is mentioned in detailed manner which is
as follows:
According to M. Jouini and Rabai (2014), Security risks related to virtualization, software
vulnerabilities, system bugs, data leaks, authentication issues and privacy issues are the key
challenges identified with cloud computing. To resolve the above issues, there are different
methods such as the use of veracity, stronger software for replication and strong usernames to
eliminate safety violations. Good internal functionality from the client is also important to
provide the end user with protection (Singh, Jeong and Park, 2016). They may enhance
protection for consumers by adopting the above techniques. Eventually, security issues are
needed to be cleared as soon as possible because any delay in this aspect may lead to customer
dissatisfaction.
According to Khan, Oriol, Kiran, Jiang and Djemame (2012), there are various kinds of dangers
involved with the usage of cloud storage. It primarily focuses on the identification and theft of
extremely sensitive data and threats happening externally from server to device during data
transmission (Tabassam, 2017). There are different techniques for evaluating the risks involved
in the transfer of data before granting the consumer access and the usage of tools which can
Cloud computing provides on-demand system services without specific active user
control, particularly the storage and processing capacity of data (Rittinghouse and Ransome,
2016). The term is used commonly to identify data centers for other web users. This is very
useful for users in order to store data in an effective manner. Each technique has some issues and
benefits. Same as cloud computing also has some problems such as risk of data theft, security
issues and many more. In the project report an essay is mentioned on the topic named as” Issues
in cloud computing”.
MAIN BODY
In this aspect of essay, key issues of cloud computing is mentioned in detailed manner which is
as follows:
According to M. Jouini and Rabai (2014), Security risks related to virtualization, software
vulnerabilities, system bugs, data leaks, authentication issues and privacy issues are the key
challenges identified with cloud computing. To resolve the above issues, there are different
methods such as the use of veracity, stronger software for replication and strong usernames to
eliminate safety violations. Good internal functionality from the client is also important to
provide the end user with protection (Singh, Jeong and Park, 2016). They may enhance
protection for consumers by adopting the above techniques. Eventually, security issues are
needed to be cleared as soon as possible because any delay in this aspect may lead to customer
dissatisfaction.
According to Khan, Oriol, Kiran, Jiang and Djemame (2012), there are various kinds of dangers
involved with the usage of cloud storage. It primarily focuses on the identification and theft of
extremely sensitive data and threats happening externally from server to device during data
transmission (Tabassam, 2017). There are different techniques for evaluating the risks involved
in the transfer of data before granting the consumer access and the usage of tools which can
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

avoid spam and malware attacks. This will provide the consumer with protection by
implementing the above technique, and avoid malware attacks.
According to Sendi and Cheriet (2014), various threats linked to the usage of the device from
cyber attacks in particular. This is important to know how to insure the protection of cyber
threats for the consumers. There are different types of methodology includes the application of
the CIA assessment and even some of the operational instruments and methods included in the
usage of cloud storage to enable consumers to defend themselves from cyber threats and
vulnerabilities. Thus, this can be helpful for defending users from cyber-attacks and weaknesses
in cloud storage utilizing the above-mentioned technologies (Bhushan and Gupta, 2017).
According to Kanaker, Saudi and Marhusin, 2014, this is necessary to establish a method to
classify the worms' problems. There are numerous issues pertaining to the potential monsters
threatening cloud computing. Any of the threats that exist due to worms affect the cloud storage
infrastructure and applications. A detection model is useful for solving the problems raised by
the worm (Bokhari, Shallal and Tamandani, 2016). The attacks are automatically detected using
this identification model and caution is taken.
In the opinion of N. Mannane, and et.al (2017), Cloud computing's exploitable bugs were the
main concern in 2018 as 77 per cent of respondents reported. The percentage one expressed
cloud challenge for the longest period of time has been the absence of resources /
knowledge. This raises the dangers of cloud computing that may occur throughout cloud
deployment or management. It also stated that data breaches, stolen passwords and breached
security, hacked applications and APIs, hijacking of accounts has not served to ease fears. All of
which makes it hard to handle comfortable, confidential and patented information to a private
company for others and, indeed, show the complexities of cloud computing (Abawajy and
Hassan, 2017). Fortunately advanced security technologies are continually developing as cloud
services and customers. The list of drawbacks of cloud services includes expenses. Cloud
computing will save companies money for most part which further support in increasing results.
A company can quickly extend its computing capacity within the cloud without making
significant expenditures in new devices. Alternatively, companies can receive extra computing
from public cloud vendors via pay-as-you-go systems. Moreover, the on-demand and flexible
implementing the above technique, and avoid malware attacks.
According to Sendi and Cheriet (2014), various threats linked to the usage of the device from
cyber attacks in particular. This is important to know how to insure the protection of cyber
threats for the consumers. There are different types of methodology includes the application of
the CIA assessment and even some of the operational instruments and methods included in the
usage of cloud storage to enable consumers to defend themselves from cyber threats and
vulnerabilities. Thus, this can be helpful for defending users from cyber-attacks and weaknesses
in cloud storage utilizing the above-mentioned technologies (Bhushan and Gupta, 2017).
According to Kanaker, Saudi and Marhusin, 2014, this is necessary to establish a method to
classify the worms' problems. There are numerous issues pertaining to the potential monsters
threatening cloud computing. Any of the threats that exist due to worms affect the cloud storage
infrastructure and applications. A detection model is useful for solving the problems raised by
the worm (Bokhari, Shallal and Tamandani, 2016). The attacks are automatically detected using
this identification model and caution is taken.
In the opinion of N. Mannane, and et.al (2017), Cloud computing's exploitable bugs were the
main concern in 2018 as 77 per cent of respondents reported. The percentage one expressed
cloud challenge for the longest period of time has been the absence of resources /
knowledge. This raises the dangers of cloud computing that may occur throughout cloud
deployment or management. It also stated that data breaches, stolen passwords and breached
security, hacked applications and APIs, hijacking of accounts has not served to ease fears. All of
which makes it hard to handle comfortable, confidential and patented information to a private
company for others and, indeed, show the complexities of cloud computing (Abawajy and
Hassan, 2017). Fortunately advanced security technologies are continually developing as cloud
services and customers. The list of drawbacks of cloud services includes expenses. Cloud
computing will save companies money for most part which further support in increasing results.
A company can quickly extend its computing capacity within the cloud without making
significant expenditures in new devices. Alternatively, companies can receive extra computing
from public cloud vendors via pay-as-you-go systems. Moreover, the on-demand and flexible
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

design of cloud computing systems often makes identifying and forecasting the volumes and
costs challenging.
According to the opinion of G. Kulkarni and et.al., (2012) enhanced the IT's challenge in
delivering the requisite management, enforcement, risk and data quality assurance. To reduce the
different challenges and complexities involved with transformation to the cloud, IT must change
the conventional mechanisms of IT regulation and control to accommodate the cloud. Across the
past few years, the position of core IT teams in the cloud has grown to that effect. Central IT,
together with company divisions, is gradually playing a part in the collection, brokering and
management of cloud computing (Rimal and Maier, 2016). In addition to this third-party cloud
computing / management services are increasingly offering assistance in governance and best
practices.
As per the opinion of D. R. Bharadwaj, Bhattacharya and M. Chakravarthy (2018), Cloud
information security or, more generally, cloud protection refers to a wide range of policies,
technology, and controls that are applied to secure cloud storage data, software, and related
infrastructure. The cloud offers customers with storing data and processing power in private
individual data centres. Groups have used the cloud in various application structures (with
acronyms like SaaS, PaaS, and IaaS) and implementation models (private, public, hybrid, and
community). Customers around sectors are searching for cost-saving measures to help prevent
their IT spending from reducing profits or slashing to key company expenses. This is difficult to
reconcile the need to reduce these expenses without reducing professional staff or having any
effect on customer support (Ferris and Riveros, Red Hat Inc, 2016). Cloud computing gives
companies many opportunities but it still poses some obstacles. The advantages (scalability,
access, protection, etc.) are easy to see but it is also important to consider how switching to the
cloud impacts the company. A big issue that leads to the difficulties of cloud cost control is the
difficulty companies have utilization monitoring and forecast. The research conducted for the
Software ONE Handling and Knowing On-Premises and Cloud Spend report showed that one of
the main cloud management pressure points for 37 percent of respondents was high project
prices, while 30 percent had trouble with a lack of clarity and visibility (El-Gazzar, Hustad and
Olsen, 2016).
costs challenging.
According to the opinion of G. Kulkarni and et.al., (2012) enhanced the IT's challenge in
delivering the requisite management, enforcement, risk and data quality assurance. To reduce the
different challenges and complexities involved with transformation to the cloud, IT must change
the conventional mechanisms of IT regulation and control to accommodate the cloud. Across the
past few years, the position of core IT teams in the cloud has grown to that effect. Central IT,
together with company divisions, is gradually playing a part in the collection, brokering and
management of cloud computing (Rimal and Maier, 2016). In addition to this third-party cloud
computing / management services are increasingly offering assistance in governance and best
practices.
As per the opinion of D. R. Bharadwaj, Bhattacharya and M. Chakravarthy (2018), Cloud
information security or, more generally, cloud protection refers to a wide range of policies,
technology, and controls that are applied to secure cloud storage data, software, and related
infrastructure. The cloud offers customers with storing data and processing power in private
individual data centres. Groups have used the cloud in various application structures (with
acronyms like SaaS, PaaS, and IaaS) and implementation models (private, public, hybrid, and
community). Customers around sectors are searching for cost-saving measures to help prevent
their IT spending from reducing profits or slashing to key company expenses. This is difficult to
reconcile the need to reduce these expenses without reducing professional staff or having any
effect on customer support (Ferris and Riveros, Red Hat Inc, 2016). Cloud computing gives
companies many opportunities but it still poses some obstacles. The advantages (scalability,
access, protection, etc.) are easy to see but it is also important to consider how switching to the
cloud impacts the company. A big issue that leads to the difficulties of cloud cost control is the
difficulty companies have utilization monitoring and forecast. The research conducted for the
Software ONE Handling and Knowing On-Premises and Cloud Spend report showed that one of
the main cloud management pressure points for 37 percent of respondents was high project
prices, while 30 percent had trouble with a lack of clarity and visibility (El-Gazzar, Hustad and
Olsen, 2016).

⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

REFERENCES
Books and journal:
Jouini, M. and Rabai, L.B.A., 2014, November. Surveying and analyzing security problems in
cloud computing environments. In 2014 Tenth International Conference on
Computational Intelligence and Security (pp. 689-693). IEEE.
Khan, A.U., Oriol, M., Kiran, M., Jiang, M. and Djemame, K., 2012, December. Security risks
and their management in cloud computing. In 4th IEEE International Conference on
Cloud Computing Technology and Science Proceedings (pp. 121-128). IEEE.
Sendi, A.S. and Cheriet, M., 2014, March. Cloud computing: a risk assessment model. In 2014
IEEE International Conference on Cloud Engineering (pp. 147-152). IEEE.
Kanaker, H.M., Saudi, M.M. and Marhusin, M.F., 2014, August. Detecting worm attacks in
cloud computing environment: Proof of concept. In 2014 IEEE 5th Control and System
Graduate Research Colloquium (pp. 253-256). IEEE.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Kulkarni, G., Chavan, N., Chandorkar, R., Waghmare, R. and Palwe, R., 2012, October. Cloud
security challenges. In 2012 7th International Conference on Telecommunication
Systems, Services, and Applications (TSSA) (pp. 88-91). IEEE.
Mannane, N., Bencharhi, Y., Boulafdour, B. and Regragui, B., 2017, October. Survey: Risk
assessment models for cloud computing: Evaluation criteria. In 2017 3rd International
Conference of Cloud Computing Technologies and Applications (CloudTech) (pp. 1-5).
IEEE.
El-Gazzar, R., Hustad, E. and Olsen, D.H., 2016. Understanding cloud computing adoption
issues: A Delphi study approach. Journal of Systems and Software, 118, pp.64-84.
Rimal, B.P. and Maier, M., 2016. Workflow scheduling in multi-tenant cloud computing
environments. IEEE Transactions on Parallel and Distributed Systems, 28(1), pp.290-
304.
Ferris, J.M. and Riveros, G.E., Red Hat Inc, 2016. Monitoring cloud computing environments.
U.S. Patent 9,529,689.
Abawajy, J.H. and Hassan, M.M., 2017. Federated internet of things and cloud computing
pervasive patient health monitoring system. IEEE Communications Magazine, 55(1),
pp.48-53.
Bhushan, K. and Gupta, B.B., 2017. Security challenges in cloud computing: state-of-
art. International Journal of Big Data Intelligence, 4(2), pp.81-107.
Books and journal:
Jouini, M. and Rabai, L.B.A., 2014, November. Surveying and analyzing security problems in
cloud computing environments. In 2014 Tenth International Conference on
Computational Intelligence and Security (pp. 689-693). IEEE.
Khan, A.U., Oriol, M., Kiran, M., Jiang, M. and Djemame, K., 2012, December. Security risks
and their management in cloud computing. In 4th IEEE International Conference on
Cloud Computing Technology and Science Proceedings (pp. 121-128). IEEE.
Sendi, A.S. and Cheriet, M., 2014, March. Cloud computing: a risk assessment model. In 2014
IEEE International Conference on Cloud Engineering (pp. 147-152). IEEE.
Kanaker, H.M., Saudi, M.M. and Marhusin, M.F., 2014, August. Detecting worm attacks in
cloud computing environment: Proof of concept. In 2014 IEEE 5th Control and System
Graduate Research Colloquium (pp. 253-256). IEEE.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Kulkarni, G., Chavan, N., Chandorkar, R., Waghmare, R. and Palwe, R., 2012, October. Cloud
security challenges. In 2012 7th International Conference on Telecommunication
Systems, Services, and Applications (TSSA) (pp. 88-91). IEEE.
Mannane, N., Bencharhi, Y., Boulafdour, B. and Regragui, B., 2017, October. Survey: Risk
assessment models for cloud computing: Evaluation criteria. In 2017 3rd International
Conference of Cloud Computing Technologies and Applications (CloudTech) (pp. 1-5).
IEEE.
El-Gazzar, R., Hustad, E. and Olsen, D.H., 2016. Understanding cloud computing adoption
issues: A Delphi study approach. Journal of Systems and Software, 118, pp.64-84.
Rimal, B.P. and Maier, M., 2016. Workflow scheduling in multi-tenant cloud computing
environments. IEEE Transactions on Parallel and Distributed Systems, 28(1), pp.290-
304.
Ferris, J.M. and Riveros, G.E., Red Hat Inc, 2016. Monitoring cloud computing environments.
U.S. Patent 9,529,689.
Abawajy, J.H. and Hassan, M.M., 2017. Federated internet of things and cloud computing
pervasive patient health monitoring system. IEEE Communications Magazine, 55(1),
pp.48-53.
Bhushan, K. and Gupta, B.B., 2017. Security challenges in cloud computing: state-of-
art. International Journal of Big Data Intelligence, 4(2), pp.81-107.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Singh, S., Jeong, Y.S. and Park, J.H., 2016. A survey on cloud computing security: Issues,
threats, and solutions. Journal of Network and Computer Applications, 75, pp.200-222.
Tabassam, S., 2017. Security and privacy issues in cloud computing environment. J. Inf.
Technol. Softw. Eng., 7(5).
Bokhari, M.U., Shallal, Q.M. and Tamandani, Y.K., 2016, March. Security and privacy issues in
cloud computing. In 2016 3rd International Conference on Computing for Sustainable
Global Development (INDIACom) (pp. 896-900). IEEE.
threats, and solutions. Journal of Network and Computer Applications, 75, pp.200-222.
Tabassam, S., 2017. Security and privacy issues in cloud computing environment. J. Inf.
Technol. Softw. Eng., 7(5).
Bokhari, M.U., Shallal, Q.M. and Tamandani, Y.K., 2016, March. Security and privacy issues in
cloud computing. In 2016 3rd International Conference on Computing for Sustainable
Global Development (INDIACom) (pp. 896-900). IEEE.
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.