Cloud Computing Security: Challenges, Solutions, and Future Trends

Verified

Added on  2022/08/19

|13
|2910
|12
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
CLOUD COMPUTING SECURITY
Name of the Student:
Name of the University:
Author’s Note:
Running head: CLOUD COMPUTING SECURITY
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CLOUD COMPUTING SECURITY
Document Page
2CLOUD COMPUTING SECURITY
Table of Contents
Introduction:-...................................................................................................................................3
Discussion:-.....................................................................................................................................3
Application:-................................................................................................................................3
Security Issues:-...........................................................................................................................4
Data breaches:-........................................................................................................................4
Unauthorized Access:-.............................................................................................................6
Data Loss:-...............................................................................................................................6
Security Solution:-.......................................................................................................................7
Data breach:-............................................................................................................................7
Unauthorized Access:-.............................................................................................................8
Data loss:-................................................................................................................................9
Conclusion:-.....................................................................................................................................9
References:-...................................................................................................................................10
Document Page
3CLOUD COMPUTING SECURITY
Introduction:-
Cloud computing is the on-demand accessibility of computer system resources,
particularly computing power and data storage, lacking direct active management by the
operator. The term is usually using to define data centers accessible to several operators over the
Internet. With cloud computing, operators can access documents and use applications from any
operator that can access the Internet (Kumar 2015). The security of cloud computing mentions to
a comprehensive set of rules, applications, technologies, and controls applied to defend
virtualized data, IP, services, applications, and the related structure of cloud computing. It is a
sub-domain of network security, computer security, and more approximately information
security. In this report, the writer will be discussing the security issues of cloud computing and
possible mitigation plan.
Discussion:-
Application:-
These securities of cloud computing measures are constructing to protect the information,
support supervisory amenability, and safeguard consumers' confidentiality as well as setting
certification instructions for specific devices and users (Duncan and Whittington 2016). These
security rules managed and configured in one place; management overheads are decreasing, and
IT teams sanctioned to concentrate on other business areas. It has developed different regions of
business processes. The user can use the cloud for several applications. These applications are
very much helpful to enhance modern technology and innovation.
The cloud providers take steps to defend data that’s in transit. Security approaches
include encryption, VPN, or masking. VPN permits remote workers to connect their corporate
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CLOUD COMPUTING SECURITY
networks. It also accommodates smartphones and computers for remote access (Pawlick,
Farhang and Zhu 2015). An overall instruction is to deliver employees’ access to only the tools
they want to do their work. By continuing strict access control, the business authority can keep
critical documents from malevolent hackers with stolen credentials.
Any business authority needs to recognize its cloud architecture system, irrespective if it
is an on-premise cloud or one possessed by a cloud service provider (Sohal et al. 2018).
Generally, enterprises need to study the process of cloud security architecture to recognize gaps
in security analysis, what the business is answerable for, and how to protected weak arguments
in cloud computing. Items that companies may want to execute instruction detection systems,
virtual firewalls, and IPS. Accepting the security architecture is the crucial step to recognizing
cloud computing security.
Some features are essential for the security of cloud computing. Certain cloud providers
offer IDS monitoring, and it will modernize their safety guidelines for their firewalls to counter
risk signals and dangerous IP addresses that they identify for all of their cloud operators. Secure
encryption can reduce the threat of stolen data being used against the company clients before
they have an opportunity to aware of them so they can take steps to defend their identities (Weiss
et al. 2015). The cloud environment denotes one last prospect for hackers and manufacturing
spies to steal your most essential data. When adequate direct access to the hardware that runs the
cloud, hackers have free supremacy to take information or upload malware openly to the
systems.
Document Page
5CLOUD COMPUTING SECURITY
Security Issues:-
Data breaches:-
A data breach is a safety event in which evidence is accessing without approval. It can
hurt consumers and businesses in a variety of ways. They are a costly expenditure that can harm
reputations and lives and take time to restore.As technology developments, much vital
information has been affecting to the digital world. As an outcome, cyber-attacks have become
gradually common and expensive (Juliadotter and Choo 2015). Cybercrime is a profitable
business for hackers and lasts to grow. Hackers look for individually recognizable information to
steal huge money, compromise individualities, or vend over the dark web. It can happen for
several explanations, including unintentionally, but targeted occurrences are usually carrying out
in some ways.
Insecure and weak user passwords are easier for attackers to assumption, mainly if a
password covers entire phrases or words. That's why specialists recommend putting complex and
unique passwords (Rallapalli, Gondkar and Ketavarapu 2016). Hackers use phishing and spam
email strategies to try to downloading malware attachments or pointing users to responsive
websites.
Email is a familiar technique for malware to end up on any system. With the help of
malicious email, the hackers were quickly hacking any kind of order (Esposito et al. 2017). With
maximum data breaches, cybercriminals want to steal email addresses, names, passwords,
usernames, and credit card details. However, cybercriminals will steal any documents that can be
traded, used to breach other IDs, steal personal identity, or make duplicitous purchases.
It is a kind of attack that takes benefit of software vulnerabilities, which cyber-attackers
use to gain unlawful access to a structure and its documents (Kolevski and Michael 2015). These
Document Page
6CLOUD COMPUTING SECURITY
weaknesses lie hidden within the system code, and it is a competition between the criminals and
the cybersecurity investigators to see who can discover them first. Phishing attacks are one type
of data breaches, and it is the fraudulent effort to find penetrating evidence like passwords,
usernames, and credit card details by concealing oneself as a dependable object in an electronic
communication.
Unauthorized Access:-
It is when somebody gains entrance illegally to a program, website, service, server, or
further system. It mainly states that people who gain physical or logical access without the
approval of any system, network, data, application, or other sources. Tailgating is the one type of
attack which happens when many people monitor an approved user over a door. Frequently the
user will grip the door for an illegal separate out of common consideration, unintentionally
exposing the construction to risk. One way to reduce the probability of tailgating is by providing
training to all credentialed operators on awareness and security.
With the additional benefit of recognizing approved users who put down in with an
access regulator reader, automated key cards are a more high-tech alternative to outdated keys
(Alasmari Anwar 2016). On the other hand, they are susceptible to the same threats related to
keys, namely the possibility to be stolen, lost, or shared with an official or illegal person.
Unauthorized access can generate hazardous circumstances for any organization or
business, so it’s significant to select access control skills that will combat this danger. It is
dynamic not only to consider but to recognize some extensive types of unauthorized access like
access cards, tailgating, etc. (Juliadotter and Choo 2015). If any business organization is
vulnerable for all dangers, it’s significant to search for the solution that will execute those
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CLOUD COMPUTING SECURITY
specific risks to decrease or even reject the prospect of unauthorized access. It also confirms the
highest level of safety for the capability.
Data Loss:-
Data loss is any procedure or event that outcomes in data being deleted, corrupted, and
made illegible by a user and application or software (Yu et al. 2014). It is the deliberate or
accidental data destruction initiated by persons or develops from outside or inside of an
organization. Data loss is comparable to a data breach, in that data is negotiated. However, the
data breach is usually unharmed but in the incorrect hands. Data loss can happen in a data
breach, but the documents itself is damaged.
There are several reasons for data loss, and those can differ by business. Particular
administrations may be more concerned about external attacks, while others are principally
concerned about susceptibility to internal human mistakes. Data loss can happen throughout
standard IT measures such as relocation, or through malicious attacks through ransomware or
malware.
Common accidental causes of data loss contain human error software corruption,
hardware malfunction, and natural disasters. Information can also be lost throughout migrations
and in power outages or inappropriate stoppages of systems (Yu et al. 2016). Natural disasters
can cause the reason of data loss because it harms to hardware or initiating operations to fail
without documents being backing up. Taking a disaster recovery strategy and numerous
stoppages are the best approaches for avoiding this kind of data loss.
Document Page
8CLOUD COMPUTING SECURITY
Security Solution:-
Data breach:-
Businesses must confirm that data is sufficiently protected to avoid theft or loss. Where a
breach has occurred, companies may want to inform persons as well as face a negative influence
on the business's brand and client loyalty (Esposito et al. 2016). Personal information must at
least be encrypted, counting on work operators distributed to staff. As an alternative to using
stoppage tapes that can be stolen or lost, documents can be backed up to isolated services by the
Internet.
Taking a third party carry out a risk assessment permits an outside and outside opinion of the up-
to-date breach risks. A Data Security professional can recommend the best explanations specific
to every company to decrease the data breach risk. These also establish a thoughtful intention to
confirm data protection.
Implementing regular reviews to recognize possible new gaps in passivity or governance
will support in authenticating any security position. A security inspection will be a more detailed
valuation of the security strategies related to the susceptibility assessment or dispersion testing.
A safety assessment considers the progressive nature of the business as well as how the industry
grips data safety. One of the critical parts is proper training. Every organization should train its
employees to prevent any technical issues very clearly. One experience and skillful employee are
very much aware of any type of data breaches.
Unauthorized Access:-
These are dangerous if the user is using the internet on a LAN where the file-sharing
characteristics are permitting unrestricted users. To keep any documents secure, a user must
Document Page
9CLOUD COMPUTING SECURITY
disable this feature. If the user does not want to restrict it, share folders and files only with
operators and systems know.
The common users have a habit of mistreating email safety despite recognizing it. It is
imperative to overlook email statements they accept from unknown resources. Additionally, the
user doesn't open any supplements incorporated from a resource that they do not believe (Kumar
2015). One of the oldest techniques to send viruses and malware is over the email attachments. It
is vital to use a specific password for all of the accounts to avoid unauthorized access. A user has
to be more cautious about this if they habit a mutual system. Any hackers cannot decode the
strong password easily.
Data loss:-
Backup is an essential way to prevent data loss. Every essential document must be stored
in another folder as a backup. The operator never certifies the backup documents until disaster
strikes. Software upgrades generally occur to patch known susceptibilities. The vulnerabilities
that can let certain appealing bad things happen to the data. So to evade that, keep any system
software updated. One necessary process is that the implementation of the 3-2-1 plan. These will
confirm viability and redundancy when the user needs their data most. Once the user does
standby their data, authenticate that the whole thing was keeping correctly.
Use virus-detection defense programs and upgraded them. Use anti-virus software and
update this regularly. The last important point is that to avoid human error (Andronie 2015).
Most of the data loss is occurring from human error. If the employee of any organization or any
user is very much aware of this risk, then they should avoid this difficulty properly.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10CLOUD COMPUTING SECURITY
Conclusion:-
In this report, the writer is discussing the security structure of cloud computing. With the
help of cloud computing, the user can secure the network structure. This report is talking about
some security issues of cloud computing, like data loss, data breaches, and unauthorized access.
This report also develops some mitigation plans for these security issues of cloud computing.
The user can follow these security solution plans and avoid these types of technical errors
correctly.
References:-
Alasmari, S. and Anwar, M., 2016, December. Security & privacy challenges in IoT-based health
cloud. In 2016 International Conference on Computational Science and Computational
Intelligence (CSCI) (pp. 198-201). IEEE.
Andronie, M., 2015, June. Ensuring Security of Data Used by Economic Organizations for
Decision Support. In International conference KNOWLEDGE-BASED ORGANIZATION (Vol.
21, No. 3, pp. 770-775). De Gruyter Open.
Duncan, B. and Whittington, M., 2016. Cloud cyber-security: Empowering the audit trail.
International Journal on Advances in Security Volume 9, Number 3 & 4, 2016.
Document Page
11CLOUD COMPUTING SECURITY
Esposito, C., Castiglione, A., Martini, B. and Choo, K.K.R., 2016. Cloud manufacturing:
security, privacy, and forensic concerns. IEEE Cloud Computing, 3(4), pp.16-22.
Esposito, C., Castiglione, A., Pop, F. and Choo, K.K.R., 2017. Challenges of connecting edge
and cloud computing: A security and forensic perspective. IEEE Cloud Computing, 4(2), pp.13-
17.
Juliadotter, N.V. and Choo, K.K.R., 2015. Cloud attack and risk assessment taxonomy. IEEE
Cloud Computing, 2(1), pp.14-20.
Kolevski, D. and Michael, K., 2015, October. Cloud computing data breaches a socio-technical
review of literature. In 2015 International Conference on Green Computing and Internet of
Things (ICGCIoT) (pp. 1486-1495). IEEE.
Kumar, S., 2015, June. Secure and efficient design and implementation of out-of-band storage
virtualization. In 2015 IEEE International Advance Computing Conference (IACC) (pp. 1021-
1025). IEEE.
Pawlick, J., Farhang, S. and Zhu, Q., 2015, November. Flip the cloud: Cyber-physical signaling
games in the presence of advanced persistent threats. In International Conference on Decision
and Game Theory for Security (pp. 289-308). Springer, Cham.
Rallapalli, S., Gondkar, R.R. and Ketavarapu, U.P.K., 2016. Impact of processing and analyzing
healthcare big data on cloud computing environment by implementing hadoop cluster. Procedia
Computer Science, 85, pp.16-22.
Sohal, A.S., Sandhu, R., Sood, S.K. and Chang, V., 2018. A cybersecurity framework to identify
malicious edge device in fog computing and cloud-of-things environments. Computers &
Security, 74, pp.340-354.
Document Page
12CLOUD COMPUTING SECURITY
Weiss, R.S., Boesen, S., Sullivan, J.F., Locasto, M.E., Mache, J. and Nilsen, E., 2015, February.
Teaching cybersecurity analysis skills in the cloud. In Proceedings of the 46th ACM Technical
Symposium on Computer Science Education (pp. 332-337).
Yu, Y., Ni, J., Au, M.H., Mu, Y., Wang, B. and Li, H., 2014. On the security of a public auditing
mechanism for shared cloud data service. IEEE Transactions on Services Computing, 8(6),
pp.998-999.
Yu, Y., Xue, L., Au, M.H., Susilo, W., Ni, J., Zhang, Y., Vasilakos, A.V. and Shen, J., 2016.
Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future
Generation Computer Systems, 62, pp.85-91.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]