Security and Privacy Issues in Cloud Computing - ITC595

Verified

Added on  2021/06/17

|4
|4001
|93
Report
AI Summary
This report delves into the critical security and privacy challenges inherent in cloud computing, an innovative technology offering remote storage and computing services. It highlights the vulnerabilities associated with data storage at remote locations, multi-tenancy, and the potential for data breaches. The paper examines various security concerns, including privileged user access, regulatory compliance, data segregation, and the impact of different cloud service models (SaaS, PaaS, IaaS) and deployment models. The report reviews existing literature, emphasizing the importance of addressing issues such as identity management, DDoS attacks, data confidentiality, and data integrity. It also explores the legal and compliance challenges arising from data locality laws and multi-jurisdictional issues. The report aims to enhance the understanding of security and privacy challenges in cloud computing and to provide a basis for developing effective countermeasures to fortify cloud infrastructure.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Security and Privacy Issues and Prevention Methods
in Cloud Computing
A. Author
ITC595 MIT, School of Computing & Mathematics, Charles Sturt University
author@first-third.edu.au
ABSTRACT – The present paper focusses on the privacy and
security issues in the cloud computing technology and their
prevention methods. It is an innovative technology, which
provides remote storage facility. It means that the small and
medium organization do not have to invest in infrastructural
facility to store the vast amount of data. However, there are
several issues related to privacy and security of the business
organizations. The users have to save the information at a remote
location and they do not have any control over the storage.
Therefore, the security and privacy breach is possible. Moreover,
it is a multi-tenant facility, which means that the users have to
share the resources with multiples users. It means that various
users have the access to the same resources. Therefore, slight
negligence can result in serious breach of the data.
Keywords— cloud computing, SaaS (Software as a Service),
Cloud Platform as a Service (PaaS) and Cloud Infrastructure as a
Service (IaaS)
INTRODUCTION
The cloud computing is an innovative technology, which can
be used to improve the computation services and storage
capabilities. The cloud technology has generated a significant
level of interest in academia and business leaders. It is based on
economic utility model by creating existing approaches of
distributed services, applications and information infrastructure
(Chen & Zhao, 2012, March). Cloud computing is an important
paradigm, which can be used to reduce the cost by increasing
the operational and economic efficiency in business
organizations. Cloud computing is focused on increasing
collaboration, agility and scale of operations to create a large-
scale computing model. Most of the small and medium-sized
business organizations have also realized the importance of
cloud computing to access complex business applications and
enhance the computing resources of the organization. The
cloud computing has three service models, namely, Cloud
software as a Service (SaaS), Cloud Platform as a Service
(PaaS) and Cloud Infrastructure as a Service (IaaS) (Takabi,
Joshi, & Ahn, 2010). There are four deployment models,
namely, private cloud, community cloud, public cloud and
hybrid model. The cloud computing has several benefits over
the traditional storage software. However, one of the biggest
barrier in the adoption of cloud computing is security concerns.
There are several issues related to privacy and security of the
information, which prevents the users in accessing this
information.
Research Problem
The cloud computing is the cost-effective and efficient
infrastructure for the business enterprises. However, there are
several security and privacy concerns associated with the cloud
services. Further, the deployment of cloud services is not as
safe as claimed by the cloud vendors. In the past years, there
have been a number of accidents, which have showed that the
clouds are vulnerable to external thefts and security
compromises. The cloud services are different from the
traditional IT infrastructure. The customers can avoid one-time
investment, operating cost and increase their agility by using
the cloud services whenever needed. However, cloud has a
unique infrastructure, which raises various security and privacy
concern for the organizations, which are using the cloud
services. The security issues associated with the cloud services
can be categorized into one of the following dimensions,
namely, privileged user access, long term viability, regulatory
compliance, investigative report, data location, data recovery
and data segregation (Zhou, Zhang, Xie, Qian, & Zhou, 2010,
November). The security issues of the cloud services can be
categorized as under security and privacy issues, compliance
issues and contractual issues. As the cloud services are spread
over different countries, the legal compliance of the vendors is
also a challenge. The research problem of the current paper can
be formed as:
ï‚· What are the security and privacy challenges in the
cloud computing?
ï‚· What countermeasures can used to enhance the
security of the cloud infrastructure?
A. Research Justification
Today, the cloud computing has a widespread application
and requirement for the business enterprises. Cloud computing
is unique due to its delivery and deployment models. There are
several benefits of cloud computing such as on-demand self-
service, ubiquitous network access, resource elasticity,
calculated services, pooling services and location independent
resources. However, in spite of all these benefits, the adoption
rate of cloud computing is comparatively low. Therefore, it is
important that the business organizations enhance the security
associated with the cloud solutions (Subashini & Kavitha,
2011). By improving the security, the business organizations
can accelerate the adoption of cloud services at a large scale. It
can also garner the support of regulatory organizations.
Therefore, the present research will be beneficial to enhance
the adoption of cloud computing services.
LITEERATURE REVIEW
In the perspective of Kumar & Lu (2010), the cloud
computing is advancement in web services such as web hosting
and online web storage. The primary feature of the cloud
computing system is the availability of the services to the
customers at any time and at any place. The cloud computing
ensures that the users can access the system from any location
in the world. Therefore, most of the business organizations
provide cloud system at virtual places. However, if the hackers
are able to break into the private data of the web hosting and
the online storage, it can create huge risk for the hackers. The
hackers might steal the private information of the users. The
users have access to vast amount of information from different
users and can use this information for malicious intent. There
are several sensitive category of information such as credit card
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
numbers, software and reports, which are stored at the online
mediums. This information can be stolen for malicious intent.
Pearson & Benameur (2010, November) have analyzed that
the cloud computing environment is a multi-domain
environment; therefore, in this environment each domain can
be use different levels of security, privacy and trust. It is
facilitated by service composition and orchestration. There are
issues regarding the authentication and identity management in
the cloud solutions. In the cloud services, the identity
management mechanism is used to protect the credentials and
characteristics of the users. However, a major issue in the
identity management is the issue of interoperability, which
arises because of the use of different identity tokens and
identity negotiations in protocols.
In the perspective of Popović & Hocenski (2010, May) the
current password based authentication processes has several
inherent risks associated with the account. The cloud is a multi-
tenant environment; therefore, the privacy of an individual user
can be easily breached in the environment. There is also issue
of multi-jurisdiction, which can complicate the cloud protection
laws and jurisdiction. The cloud service provider has to ensure
that the identity of the services is protected from other users of
the service. The distributed-denial-of-service attack is another
service security issue in cloud computing. The cloud
computing has high level of resources; however, it is still prone
to (Distributed Denial of Service) attacks. However, with the
existence of several other technologies, the DDoS attacks have
increased in number. In cloud hosting solutions, the business
organizations have to share their resources, which make them
vulnerable to the attacks by other business organizations.
According to Kaufman (2009) in the SaaS model of cloud
computing, cloud solutions are offered as a service. In the
traditional data storage model, the sensitive data is stored at the
premises of the enterprises and it remains in the boundary of
the organization. This data is subject to the physical, logical,
personal security and access control protocols. However, in
SaaS clouds solutions, the sensitive data is stored outside the
physical premises of the organization. Therefore, it is important
that SaaS vendor adopts additional security measures to protect
the data at the vendor’s location. There should be additional
security measures to prevent data breach due to vulnerabilities
emerging due to malicious employees. The cloud vendors
should have strong encryption techniques for maintaining the
security of the database. In the views of Wang, Wang, Ren &
Lou (2010, March) the malicious users exploit weaknesses in
the data storage infrastructure, so that they gain access to
unauthorized data.
According to Chen & Zhao (2012, March) the network
security is another issue in the security and privacy approaches
of cloud solutions. In the SaaS model, the sensitive data is
captured by SaaS tools, processed through SaaS applications
and stored at a foreign location. All the data stored at the SaaS
locations, should be protected so that sensitive information
cannot be stolen from the organization. The companies can use
different approaches such as secure socket layer (SSL) and
Transport Layer Security (TLS) for enhancing the security of
the organization. These approaches can provide protection
against several approaches such as packet sniffing, IP spoofing,
and manual attacks. The malicious hackers can exploit the
weakness in the network security configuration and use it to
extract information from the users.
Similarly Wang, Wang, Ren & Lou (2010, March) have
stated that other than that there are several laws related to data
locality. According to these laws, certain kind of information
and data cannot be sent outside the country due to the privacy
laws. However, it becomes a challenge for the cloud
organizations as in the cloud; the data is stored at a remote
location. The location of the data is very important in the
enterprise architecture, as it may comprise sensitive
information. It is possible that the privacy and the sensitivity
laws are not applicable in the countries.
In the cloud computing, data integrity is another important
issue in the system. The data integrity can be achieved by
establishing a standalone database. It means establishing a
single database for each organization. The database managers
have to implement constraints and database transactions, so
that they can maintain the data integrity of the secured data.
However, maintaining the data integrity is challenging in the
distributed system. The transaction across different data
sources has to be handled in a fail safe manner so that no
external entity can breach the database of the organization.
In the perspective of Takabi, Joshi, & Ahn (2010) in the
cloud computing, multi-tenancy is an integral characteristic of
the database management. It means that different users can
save their data at a single location. It means that the
confidential and non-confidential data of the users will reside at
the same location. In this environment, the intrusion between
the data of two different users can occur. It will be a huge
breach in privacy of the users. The business organizations can
deliberately enter the database of another organization by
hacking the loopholes in the cloud applications or injecting
cloud code in SaaS system of the organization. The unethical
hackers can breach the system of the organization and intrude
the system of another organization. Therefore, it is important
that system boundaries are established not only at the physical
level but also at the application level.
In the views of Itani, Kayssi & Chehab (2009, December)
the data access is another issue in the cloud based system. The
data access is another issue in the cloud computing. In the
cloud, the data access is associated with the security policies
provided to the users, when they access the data. Every
business organization, which takes use of cloud services, has
their own set of security policies. According to these policies,
different employees have different access to user data. These
policies may provide certain access to few employees and other
access to other employees. It is important that the cloud service
providers give the same access to the cloud service providers.
According to Pearson (2009, May) in the cloud solutions, the
data confidentiality is another issue in effective storage of
information. The cloud computing involves sharing or storage
of resources; however, the actual border or limit of sharing is
under a debate. The cloud computing involves sharing the
information at remote servers and accessing them with the
internet. All the storage requirements of the users can be stored
at a single cloud service provider. It can also be stored at
different service provider.
In the views of Kumar & Lu, (2010) other than that, there is
also issue of web application security in the cloud computing.
It means that the SaaS services are deployed over the internet
so that it can run on the personal computer. There are several
characteristics of the cloud computing such as network-based
access, management and managing the applications from a
central location. It allows the customers to access the
information through software components. There is also issue
of data breach in cloud computing. In cloud, the information is
stored at a remote geographical location; therefore, the actual
owner of the information has little control over the storage of
the information. In cloud computing, most of the business
organizations use virtualization to manage the information at
the cloud. According to Hwang & Li (2010), the virtualization
poses several security risks to the users. In the present scenario,
it is very challenging for the business organizations to assure
Document Page
that different processes running on the same physical machine
are completely isolated to each other. Another issue is
controlling the flow of information on the host and the guest
operating machines. There are a few vulnerabilities in the
virtualization software. These vulnerabilities can be exploited
through malicious users.
Another challenge in cloud computing is that a large number
of cloud vendors are present at the market. All these vendors
have different level and approaches to cloud computing.
Therefore, it is important that all the cloud service providers
offer unique security policies. The cloud services are composed
of several different services; therefore, the developers should
focus on developing multiple services so that the application in
high quantity can be addressed.
PROPOSED DESIGN
The research design is the most crucial aspect of the research
process. It is the blueprint of the entire research process. It
guides the researcher regarding the different aspects of the
research and the process of completing the research in an
appropriate manner (Myers, Well & Lorch, 2013). In the
present research, the research method of survey will be used. It
is a cost-effective method to collect the data from the survey
respondents (Creswell & Creswell, 2017). The survey method
can be established as quantitative method of primary data
collection. It means that the data collected is quantitative in
nature. The information collected with quantitative methods
yields information, which can be analyzed through quantitative
methods (Gorard, 2013). The primary data refers to the data
exclusively collected for the present research. The sample size
of the current research is 50. The survey will be collected with
the IT managers of different small and medium sized
companies. The sample will be selected according to the
random sampling method. It is the simplest sampling method
(Maxwell, 2012). According to this method, the research
participants are selected, according to who agrees to participate
in the research. The IT managers will have significant
knowledge about the privacy and security challenge of the
cloud computing. Along with it, literature review will be
conducted to develop a theoretical foundation of the research
(Leavy, 2017). It will be used to collect the current knowledge
in the research area. The literature gap will be used for further
details (Marczyk, DeMatteo & Festinger, 2010).
CONCLUSION
Conclusively, it can be stated that cloud computing is a novel
technology, which can be used to create an innovative
infrastructure for data storage. As discussed on the paper, there
are several advantages of using the cloud-based solutions.
However, there are several practical issues, which are needed
to be solved so that the technology is widely accepted among
the business organizations. In the present, the security of cloud-
based solutions has several loose ends, which scares the
potential buyers of technology. There are several security
issues, which hinder the potential users from taking the full
advantage of the technology. There are several existing
vulnerabilities in the cloud computing, which increases the
potential threat from the hackers. In cloud computing, the
major challenge is sharing data, while protecting the private
information of the users. In cloud computing, the major
challenge is controlling which information to share and which
information to reveal. There is high security vulnerability, that
the information stored in the cloud, can be read by the third
parties without their consent. There are various solutions to
security issues in cloud computing such as segregating the non-
sensitive and sensitive data.
ACKNOWLEDGEMENT
In the accomplishment of the present work, the articles of
various other authors have been cited. The author is grateful to
all these scholars. He is also thankful to professors and friends,
who have supported in completing the research work.
Document Page
REFERENCES
Chen, D., & Zhao, H. (2012, March). Data security and privacy
protection issues in cloud computing. In Computer Science
and Electronics Engineering (ICCSEE), 2012 International
Conference on (Vol. 1, pp. 647-651). IEEE.
Chen, D., & Zhao, H. (2012, March). Data security and privacy
protection issues in cloud computing. In Computer Science
and Electronics Engineering (ICCSEE), 2012 International
Conference on (Vol. 1, pp. 647-651). IEEE.
Creswell, J.W., & Creswell, J.D. (2017). Research Design:
Qualitative, Quantitative, and Mixed Methods Approaches.
SAGE Publications.
Gorard, S. (2013). Research Design: Creating Robust Approaches
for the Social Sciences. SAGE.
Hwang, K., & Li, D. (2010). Trusted cloud computing with secure
resources and data coloring. IEEE Internet
Computing, 14(5), 14-22.
Itani, W., Kayssi, A., & Chehab, A. (2009, December). Privacy as a
service: Privacy-aware data storage and processing in cloud
computing architectures. In Dependable, Autonomic and
Secure Computing, 2009. DASC'09. Eighth IEEE
International Conference on (pp. 711-716). IEEE.
Kaufman, L. M. (2009). Data security in the world of cloud
computing. IEEE Security & Privacy, 7(4).
Kumar, K., & Lu, Y. H. (2010). Cloud computing for mobile users:
Can offloading computation save energy?. Computer, 43(4),
51-56.
Kumar, K., & Lu, Y. H. (2010). Cloud computing for mobile users:
Can offloading computation save energy?. Computer, 43(4),
51-56.
Leavy, P. (2017). Research Design: Quantitative, Qualitative, Mixed
Methods, Arts-Based, and Community-Based Participatory
Research Approaches. Guilford Publications.
Marczyk, G.R., DeMatteo, D., & Festinger, D. (2010). Essentials of
Research Design and Methodology. John Wiley & Sons.
Maxwell, J.A. (2012). Qualitative Research Design: An Interactive
Approach. SAGE Publications.
Myers, J.L., Well, A.D., & Lorch, R.F. (2013). Research Design and
Statistical Analysis: Third Edition. Routledge.
Pearson, S. (2009, May). Taking account of privacy when designing
cloud computing services. In Software Engineering
Challenges of Cloud Computing, 2009. CLOUD'09. ICSE
Workshop on (pp. 44-52). IEEE.
Pearson, S., & Benameur, A. (2010, November). Privacy, security
and trust issues arising from cloud computing. In Cloud
Computing Technology and Science (CloudCom), 2010
IEEE Second International Conference on (pp. 693-702).
IEEE.
Popović, K., & Hocenski, Ž. (2010, May). Cloud computing security
issues and challenges. In MIPRO, 2010 proceedings of the
33rd international convention (pp. 344-349). IEEE.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in
service delivery models of cloud computing. Journal of
network and computer applications, 34(1), 1-11.
Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy
challenges in cloud computing environments. IEEE Security
& Privacy, 8(6), 24-31.
Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy
challenges in cloud computing environments. IEEE Security
& Privacy, 8(6), 24-31.
Wang, C., Wang, Q., Ren, K., & Lou, W. (2010, March). Privacy-
preserving public auditing for data storage security in cloud
computing. In Infocom, 2010 proceedings ieee (pp. 1-9).
Ieee.
Wang, C., Wang, Q., Ren, K., & Lou, W. (2010, March). Privacy-
preserving public auditing for data storage security in cloud
computing. In Infocom, 2010 proceedings ieee (pp. 1-9).
Ieee.
Zhou, M., Zhang, R., Xie, W., Qian, W., & Zhou, A. (2010,
November). Security and privacy in cloud computing: A
survey. In Semantics Knowledge and Grid (SKG), 2010
Sixth International Conference on (pp. 105-112). IEEE.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]