Solent University MAA103: Cloud Security Literature Review Report
VerifiedAdded on  2023/01/09
|10
|2741
|28
Report
AI Summary
This report provides a comprehensive literature review on the security of storing corporate and private data on cloud storage services. It begins with an abstract and table of contents, followed by an introduction that defines cloud storage and cloud security, emphasizing data encryption and enhanced security measures compared to local storage. The report's aim is to explore the security aspects of cloud storage, with research objectives focusing on vendor-provided cloud security, options for data storage, and ways to ensure data security. The literature review covers the concept of cloud security provided by vendors, including strategies, access management, password control, and monitoring practices. It also discusses the options firms and individuals should consider before storing data on the cloud, such as vendor certifications, bandwidth limitations, SLAs, and data restoration/recovery processes. The report outlines ways to ensure data security, including advanced firewalls, intrusion detection, event logging, and encryption. The approach utilized is qualitative, using secondary research to gather information from existing sources. The conclusion summarizes the key findings, highlighting the importance of a multifaceted approach to cloud security that involves both the vendor and the user.

Research Methods
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Abstract
Cloud computing refers to delivery of on-demand computing services that involves
storage to applications along with processing power. This concept entails security off cloud
environments from unauthenticated or unauthenticated access. Cloud security comprises of
certain procedures as well as technology that are liable for securing cloud computing
environment with reference to both insider as well as external cyber security threats. This will
provide centralized security. Cloud service provider has the option to make use of normal or
advanced firewall but advance enables them to verify the content of packet integrity. They
ensures that they make use of relevant methods through which adequate levels of security can be
attained.
Cloud computing refers to delivery of on-demand computing services that involves
storage to applications along with processing power. This concept entails security off cloud
environments from unauthenticated or unauthenticated access. Cloud security comprises of
certain procedures as well as technology that are liable for securing cloud computing
environment with reference to both insider as well as external cyber security threats. This will
provide centralized security. Cloud service provider has the option to make use of normal or
advanced firewall but advance enables them to verify the content of packet integrity. They
ensures that they make use of relevant methods through which adequate levels of security can be
attained.

Table of Contents
Abstract............................................................................................................................................2
Topic: Security of Storing Corporate or Private Data onto Cloud Storage Services.......................1
Introduction......................................................................................................................................1
Aim.........................................................................................................................................1
Research Objectives...............................................................................................................1
Research Questions................................................................................................................1
Literature review..............................................................................................................................2
Concept of cloud security provided by vendor in context of storage of data.........................2
Options that firm or an individual have to consider before storing data on the cloud...........3
Ways by which security of data can be ensured on the storage space provided by cloud
vendors...................................................................................................................................4
Approach utilised....................................................................................................................5
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
Abstract............................................................................................................................................2
Topic: Security of Storing Corporate or Private Data onto Cloud Storage Services.......................1
Introduction......................................................................................................................................1
Aim.........................................................................................................................................1
Research Objectives...............................................................................................................1
Research Questions................................................................................................................1
Literature review..............................................................................................................................2
Concept of cloud security provided by vendor in context of storage of data.........................2
Options that firm or an individual have to consider before storing data on the cloud...........3
Ways by which security of data can be ensured on the storage space provided by cloud
vendors...................................................................................................................................4
Approach utilised....................................................................................................................5
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Topic: Security of Storing Corporate or Private Data onto Cloud Storage
Services
Introduction
Cloud storage refers to cloud computing model that is liable for storing data on internet
via cloud computing provider who operates as well as manage data storage like a service. These
are being served when demands are made by individuals. Cloud security involves set of controls,
policies, technologies and procedures which work together for protecting cloud based system,
infrastructure and data from any kind of theft, deletion as well as leakage (Alam, 2020). Data
stored on the cloud is mostly stored in encrypted form which makes it difficult for intruder to
have access to information. Cloud stored data is safer as compared locally stored data as in
context of cloud services utilise more critical security methods for furnishing enhanced levels of
protection.
Aim
To explore the security aspects for storing private or corporate data onto the cloud storage
services.
Research Objectives
ï‚· To explore the concept of cloud security provided by vendor in context of storage of data.
ï‚· To identify the options that firm or an individual have to consider before storing data on
the cloud.
ï‚· To determine the ways by which security of data can be ensured on the storage space
provided by cloud vendors.
Research Questions
ï‚· What is the concept of cloud security provided by vendors in context of storage of data?
ï‚· What are the options that firm or an individual have to consider before storing data on the
cloud?
ï‚· Determine the ways by which security of data can be ensured on the storage space
provided by cloud vendors?
1
Services
Introduction
Cloud storage refers to cloud computing model that is liable for storing data on internet
via cloud computing provider who operates as well as manage data storage like a service. These
are being served when demands are made by individuals. Cloud security involves set of controls,
policies, technologies and procedures which work together for protecting cloud based system,
infrastructure and data from any kind of theft, deletion as well as leakage (Alam, 2020). Data
stored on the cloud is mostly stored in encrypted form which makes it difficult for intruder to
have access to information. Cloud stored data is safer as compared locally stored data as in
context of cloud services utilise more critical security methods for furnishing enhanced levels of
protection.
Aim
To explore the security aspects for storing private or corporate data onto the cloud storage
services.
Research Objectives
ï‚· To explore the concept of cloud security provided by vendor in context of storage of data.
ï‚· To identify the options that firm or an individual have to consider before storing data on
the cloud.
ï‚· To determine the ways by which security of data can be ensured on the storage space
provided by cloud vendors.
Research Questions
ï‚· What is the concept of cloud security provided by vendors in context of storage of data?
ï‚· What are the options that firm or an individual have to consider before storing data on the
cloud?
ï‚· Determine the ways by which security of data can be ensured on the storage space
provided by cloud vendors?
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Literature review
The survey of scholarly sources with respect to particular topic is referred to as literature
review. This renders overview related with current knowledge that allows identification of
significant theories, methods along with gaps within existent research. In context of security
aspects related with storage on cloud, literature review is specified below:
Concept of cloud security provided by vendor in context of storage of data
According to Deyi, Guisheng and Haisu (2020), cloud security is defined as practice and
discipline that is liable for protection of cloud computing environment, data, information and
applications. This concept entails security off cloud environments from unauthenticated access or
use, DDoS (distributed denial of service) attacks, hacking, virus, malwares and many more. To
ensure the security of information stored by clients, vendors makes use of different practices,
they are specified below:
 Strategy & policies: A cloud security must account for accountability and ownership of
risks, gaps in compliance and identifying controls required to mature security along with
attainment of required end state.
 Identification & access management along with privileged access management:
Control robust authentication as well as management process for making sure that only
authenticated users will be given access to cloud environment, data and applications
(Deyi, Guisheng and Haisu, 2020). For an example, only those resources must be
illustrated to internet which is necessary and unneeded features, capabilities and access
must be deactivated. Privileges must be ensured depending upon role based along with
this privileged access must be recorded and audited through session monitoring.
 Password Control (Both privileged as well as non-privileged passwords): Cloud vendor
must never allow usage of shared passwords. Passwords must be integrated with other
systems for authentication of sensitive areas.
 Alerting, monitoring & reporting: Implementation of continual security as well as user
monitoring around all instances and environment. Vendors must centralize and integrate
data from cloud providers from in-house solution. This will aid them within having
holistic image related with what activities are taking place within the environment.
2
The survey of scholarly sources with respect to particular topic is referred to as literature
review. This renders overview related with current knowledge that allows identification of
significant theories, methods along with gaps within existent research. In context of security
aspects related with storage on cloud, literature review is specified below:
Concept of cloud security provided by vendor in context of storage of data
According to Deyi, Guisheng and Haisu (2020), cloud security is defined as practice and
discipline that is liable for protection of cloud computing environment, data, information and
applications. This concept entails security off cloud environments from unauthenticated access or
use, DDoS (distributed denial of service) attacks, hacking, virus, malwares and many more. To
ensure the security of information stored by clients, vendors makes use of different practices,
they are specified below:
 Strategy & policies: A cloud security must account for accountability and ownership of
risks, gaps in compliance and identifying controls required to mature security along with
attainment of required end state.
 Identification & access management along with privileged access management:
Control robust authentication as well as management process for making sure that only
authenticated users will be given access to cloud environment, data and applications
(Deyi, Guisheng and Haisu, 2020). For an example, only those resources must be
illustrated to internet which is necessary and unneeded features, capabilities and access
must be deactivated. Privileges must be ensured depending upon role based along with
this privileged access must be recorded and audited through session monitoring.
 Password Control (Both privileged as well as non-privileged passwords): Cloud vendor
must never allow usage of shared passwords. Passwords must be integrated with other
systems for authentication of sensitive areas.
 Alerting, monitoring & reporting: Implementation of continual security as well as user
monitoring around all instances and environment. Vendors must centralize and integrate
data from cloud providers from in-house solution. This will aid them within having
holistic image related with what activities are taking place within the environment.
2

Apart from all these aspects or practices, vendor needs to ensure that they conduct regular
vulnerability scans along with security audits (Giannakoulias, 2019). Furthermore, if any
vulnerability is found then it must be patched as soon as possible so that intruder to get access to
it. In addition to this, firms or individuals who have opted for services from cloud needs to make
sure that their data is in encrypted form so that even cloud vendor cannot access their private or
confidential information. Cloud based business a network comprises of various devices as well
as endpoints which might make it difficult for management while dealing with BYOD or
shadowIT. Through management of entities it will centrally enhance traffic analysis along with
web filtering. Furthermore, disaster recovery plans can be executed and auctioned easily as they
are managed within identical place.
Options that firm or an individual have to consider before storing data on the cloud
According to Kaur and Pal (2019), the amount of electronic data (i.e. images, documents,
videos or emails) firms furnish is staggering. Storing digital data can be expensive for any firm
as for this there is need of relevant infrastructure, its updation, relevant workforce and many
other aspects. But before opting for services from cloud it is important that users must be clear
about their requirements. For an instance either they need high performance or only a space for
archival data (Kaur and Pal, 2019). The different aspects that database administrator need to take
into consideration are specified below:
 Ensure that cloud vendor has updated on data centre & industry certifications:
Individual or firm need to make sure that they are compliant with industry’s security and
privacy compliance requirements. The major concern is that if service provider can
encrypt data then they can also decypt it. Therefore, it is important to ensure that vendor
comply with new regulations like SSAE 16 (critical audit standard) for firms those have
financial data and also the industries in which integrity as well as data security is
important.
 Acknowledge bandwidth limitations: If cloud will be utilised as backup strategy then
bandwidth restrictions must be taken into consideration for initial backup of huge amount
of data and when data will be restored then what will take place. All the queries like will
service provider allow bulk capabilities for transfer, what are the bandwidth restrictions
and many more.
3
vulnerability scans along with security audits (Giannakoulias, 2019). Furthermore, if any
vulnerability is found then it must be patched as soon as possible so that intruder to get access to
it. In addition to this, firms or individuals who have opted for services from cloud needs to make
sure that their data is in encrypted form so that even cloud vendor cannot access their private or
confidential information. Cloud based business a network comprises of various devices as well
as endpoints which might make it difficult for management while dealing with BYOD or
shadowIT. Through management of entities it will centrally enhance traffic analysis along with
web filtering. Furthermore, disaster recovery plans can be executed and auctioned easily as they
are managed within identical place.
Options that firm or an individual have to consider before storing data on the cloud
According to Kaur and Pal (2019), the amount of electronic data (i.e. images, documents,
videos or emails) firms furnish is staggering. Storing digital data can be expensive for any firm
as for this there is need of relevant infrastructure, its updation, relevant workforce and many
other aspects. But before opting for services from cloud it is important that users must be clear
about their requirements. For an instance either they need high performance or only a space for
archival data (Kaur and Pal, 2019). The different aspects that database administrator need to take
into consideration are specified below:
 Ensure that cloud vendor has updated on data centre & industry certifications:
Individual or firm need to make sure that they are compliant with industry’s security and
privacy compliance requirements. The major concern is that if service provider can
encrypt data then they can also decypt it. Therefore, it is important to ensure that vendor
comply with new regulations like SSAE 16 (critical audit standard) for firms those have
financial data and also the industries in which integrity as well as data security is
important.
 Acknowledge bandwidth limitations: If cloud will be utilised as backup strategy then
bandwidth restrictions must be taken into consideration for initial backup of huge amount
of data and when data will be restored then what will take place. All the queries like will
service provider allow bulk capabilities for transfer, what are the bandwidth restrictions
and many more.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

 Read the SLA carefully: Providers render choices for different storage service levels
along with storage service must comprise on-demand scalability for keeping application
executing, snapshots related with crash consistent local or offline backup, disaster
recovery, offsite backup availability and many more questions are there so all the queries
must be addressed (Namane and Goualmi, 2019). Furthermore, all the aspects mentioned
within the SLA agreement must be carefully read and in case of any query related with
any aspect must be clarified at that instance of time only so that at later moment of time
conflicts do not take place.
 Ensure data restoration/recovery: When individual or firm commit data to their vendors
then they need find out whether they will be able to access to data in any case of
disruption or data loss, what will be the restoration process, how much surety is there that
entire data can be retrieved, what support will be provided by service provider in case if
issues take place. This will let to set anticipation for business and also aid within
minimisation of downtime. Also it has to be checked, that whether vendor will provide
data in hard drives or will provide methods to restore it. In addition to this, it must be
identified that any extra charges will be there for these services before SLA agreement
takes place.
These are some critical aspects that have to be taken into consideration by service taker
while opting for cloud services. These are mandatory aspects as it will be difficult for a new firm
or an individual who are looking for services as they might not be aware about what has to be
considered while having cloud services.
Ways by which security of data can be ensured on the storage space provided by cloud vendors.
According to Wang and et. al, (2020), all the files that are stored on cloud servers are
benefited from higher level of security. The security credentials with which users are familiar is
not the only way through which data is being secured by service provider instead they make use
of different mediums for ensuring privacy of data of their customers (Wang and et. al, 2020) .
User before signing the SLA must have a clear knowledge about levels of security or different
ways in which there data will be secured so that if any disruption occurs then they can retrieve it
or may avoid any kind of conflicts. Some of ways which are being used by service providers are
specified below which will aid user to ensure that their information is protected.
4
along with storage service must comprise on-demand scalability for keeping application
executing, snapshots related with crash consistent local or offline backup, disaster
recovery, offsite backup availability and many more questions are there so all the queries
must be addressed (Namane and Goualmi, 2019). Furthermore, all the aspects mentioned
within the SLA agreement must be carefully read and in case of any query related with
any aspect must be clarified at that instance of time only so that at later moment of time
conflicts do not take place.
 Ensure data restoration/recovery: When individual or firm commit data to their vendors
then they need find out whether they will be able to access to data in any case of
disruption or data loss, what will be the restoration process, how much surety is there that
entire data can be retrieved, what support will be provided by service provider in case if
issues take place. This will let to set anticipation for business and also aid within
minimisation of downtime. Also it has to be checked, that whether vendor will provide
data in hard drives or will provide methods to restore it. In addition to this, it must be
identified that any extra charges will be there for these services before SLA agreement
takes place.
These are some critical aspects that have to be taken into consideration by service taker
while opting for cloud services. These are mandatory aspects as it will be difficult for a new firm
or an individual who are looking for services as they might not be aware about what has to be
considered while having cloud services.
Ways by which security of data can be ensured on the storage space provided by cloud vendors.
According to Wang and et. al, (2020), all the files that are stored on cloud servers are
benefited from higher level of security. The security credentials with which users are familiar is
not the only way through which data is being secured by service provider instead they make use
of different mediums for ensuring privacy of data of their customers (Wang and et. al, 2020) .
User before signing the SLA must have a clear knowledge about levels of security or different
ways in which there data will be secured so that if any disruption occurs then they can retrieve it
or may avoid any kind of conflicts. Some of ways which are being used by service providers are
specified below which will aid user to ensure that their information is protected.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

 Advanced Firewall: The essential asset of this is that all the firewall types inspect data
packets that are travelling. This will further aid within mapping contents with known
security threats. Internal firewall ensures that not all accounts should have complete
access to data stored in the cloud (Sharma, Keshwani and Dadheech, 2019). Limiting
secure cloud access through internal firewalls boosts security. This ensures that even a
compromised account cannot gain full access.
 Intrusion Detection: Successful cloud security systems aid within identification of when
someone tends to break into their systems. There exist multiple levels for detection to
ensure that cloud vendors have adequate measures to stop someone to break their
network and have access to the information. This can be referred to as network’s initial
defences.
 Event Logging: Event logs help security analysts understand threats. These logs record
network actions. Analysts use this data to build a narrative concerning network events.
This helps them predict and prevent security breaches.
 Internal Firewalls: Encryption: Encryption keeps data safe from unauthorized users. If
an attacker steals an encrypted file, access is denied without finding a secret key. The
data is worthless to anyone who does not have the key.
It is important that there is balance in between security and access. There are different
ways that are being undertaken by cloud service provider to ensure that information of their
clients is secured but even users need to make sure that they do not give their credentials details
to anyone and in case if accidentally it is being done then as soon they realize this aspect, it
should be informed to service provider. It might allow them to secure their information (Singh
and et. al, 2020).
Approach utilised
Information gathering is critical aspect while doing literature review as without this, it will
not be possible to have relevant and adequate information related with the project. In this case,
qualitative approach is being used. In this secondary research is utilised. The market research
methods that emphasise on attaining data and work with non-numerical data for seeking meaning
from them to understand the problem is referred to as qualitative approach. In case of secondary
research data is collected from existent information that might be in the form of images, audio,
5
packets that are travelling. This will further aid within mapping contents with known
security threats. Internal firewall ensures that not all accounts should have complete
access to data stored in the cloud (Sharma, Keshwani and Dadheech, 2019). Limiting
secure cloud access through internal firewalls boosts security. This ensures that even a
compromised account cannot gain full access.
 Intrusion Detection: Successful cloud security systems aid within identification of when
someone tends to break into their systems. There exist multiple levels for detection to
ensure that cloud vendors have adequate measures to stop someone to break their
network and have access to the information. This can be referred to as network’s initial
defences.
 Event Logging: Event logs help security analysts understand threats. These logs record
network actions. Analysts use this data to build a narrative concerning network events.
This helps them predict and prevent security breaches.
 Internal Firewalls: Encryption: Encryption keeps data safe from unauthorized users. If
an attacker steals an encrypted file, access is denied without finding a secret key. The
data is worthless to anyone who does not have the key.
It is important that there is balance in between security and access. There are different
ways that are being undertaken by cloud service provider to ensure that information of their
clients is secured but even users need to make sure that they do not give their credentials details
to anyone and in case if accidentally it is being done then as soon they realize this aspect, it
should be informed to service provider. It might allow them to secure their information (Singh
and et. al, 2020).
Approach utilised
Information gathering is critical aspect while doing literature review as without this, it will
not be possible to have relevant and adequate information related with the project. In this case,
qualitative approach is being used. In this secondary research is utilised. The market research
methods that emphasise on attaining data and work with non-numerical data for seeking meaning
from them to understand the problem is referred to as qualitative approach. In case of secondary
research data is collected from existent information that might be in the form of images, audio,
5

texts or videos (Wani, Rana and Pandey, 2019). This is being done by making use of books,
journals, articles, magazines, online sources and many more are there. It provides insight into
aspects which have been identified along with scope for future work through analysis of gaps.
Like in this case different ways have been illustrated through data is secured on cloud but still
there are incidents of security breaches which means there is a scope for future analysis.
Conclusion
From above, it can be concluded that, cloud computing is a broad term which provides
on-demand services. The literature review is presented in context of security concerns while
storing information on the cloud. It has been identified that vendors use different methods to
ensure this aspect so that they can accomplish requirements of their clients and meet their desired
expectations. It is important that the individuals who are looking forward to store their data on
cloud must take into consideration certain aspects like SLA agreement seriously and verify each
aspect mentioned on it so that at later instance of time any problems do not occur.
6
journals, articles, magazines, online sources and many more are there. It provides insight into
aspects which have been identified along with scope for future work through analysis of gaps.
Like in this case different ways have been illustrated through data is secured on cloud but still
there are incidents of security breaches which means there is a scope for future analysis.
Conclusion
From above, it can be concluded that, cloud computing is a broad term which provides
on-demand services. The literature review is presented in context of security concerns while
storing information on the cloud. It has been identified that vendors use different methods to
ensure this aspect so that they can accomplish requirements of their clients and meet their desired
expectations. It is important that the individuals who are looking forward to store their data on
cloud must take into consideration certain aspects like SLA agreement seriously and verify each
aspect mentioned on it so that at later instance of time any problems do not occur.
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

References
Books & Journals
Alam, T., 2020. Cloud Computing and its role in the Information Technology. IAIC Transactions
on Sustainable Digital Innovation (ITSDI), 1(2), pp.108-115.
Deyi, L., Guisheng, C. and Haisu, Z., 2020. Analysis of hot topics in cloud computing. ZTE
Communications, 8(4), pp.1-5.
Giannakoulias, A., 2019. Cloud computing security: protecting cloud-based smart city
applications. Journal of Smart Cities, 2(1), pp.41-52.
Kaur, T. and Pal, P., 2019. Cloud computing network security for various parameters, and its
application.
Namane, S. and Goualmi, N., 2019. Grid and Cloud Computing Security: A Comparative
Survey. International Journal of Computer Networks and Applications (IJCNA)
published on January.
Sharma, A., Keshwani, B. and Dadheech, P., 2019, February. Authentication issues and
techniques in cloud computing security: a review. In Proceedings of International
Conference on Sustainable Computing in Science, Technology and Management
(SUSCOM), Amity University Rajasthan, Jaipur-India.
Singh, S.P. and et. al, 2020. CLOUD COMPUTING: SECURITY CHALLENGES AND
ISSUES. Journal of Natural Remedies, 21(2), pp.101-105.
Wang, Z. and et. al, 2020. An empirical study on business analytics affordances enhancing the
management of cloud computing data security. International Journal of Information
Management, 50, pp.387-394.
Wani, A.R., Rana, Q.P. and Pandey, N., 2019. Analysis and countermeasures for security and
privacy issues in cloud computing. In System performance and management
analytics (pp. 47-54). Springer, Singapore.
7
Books & Journals
Alam, T., 2020. Cloud Computing and its role in the Information Technology. IAIC Transactions
on Sustainable Digital Innovation (ITSDI), 1(2), pp.108-115.
Deyi, L., Guisheng, C. and Haisu, Z., 2020. Analysis of hot topics in cloud computing. ZTE
Communications, 8(4), pp.1-5.
Giannakoulias, A., 2019. Cloud computing security: protecting cloud-based smart city
applications. Journal of Smart Cities, 2(1), pp.41-52.
Kaur, T. and Pal, P., 2019. Cloud computing network security for various parameters, and its
application.
Namane, S. and Goualmi, N., 2019. Grid and Cloud Computing Security: A Comparative
Survey. International Journal of Computer Networks and Applications (IJCNA)
published on January.
Sharma, A., Keshwani, B. and Dadheech, P., 2019, February. Authentication issues and
techniques in cloud computing security: a review. In Proceedings of International
Conference on Sustainable Computing in Science, Technology and Management
(SUSCOM), Amity University Rajasthan, Jaipur-India.
Singh, S.P. and et. al, 2020. CLOUD COMPUTING: SECURITY CHALLENGES AND
ISSUES. Journal of Natural Remedies, 21(2), pp.101-105.
Wang, Z. and et. al, 2020. An empirical study on business analytics affordances enhancing the
management of cloud computing data security. International Journal of Information
Management, 50, pp.387-394.
Wani, A.R., Rana, Q.P. and Pandey, N., 2019. Analysis and countermeasures for security and
privacy issues in cloud computing. In System performance and management
analytics (pp. 47-54). Springer, Singapore.
7
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.