Cloud Computing: Security Issues and Challenges Research Report
VerifiedAdded on  2022/12/26
|9
|2237
|2
Report
AI Summary
This report provides a comprehensive overview of the security issues and challenges associated with cloud computing. It begins with an introduction to the growing use of cloud technology and its advantages, while also acknowledging the associated challenges. The discussion covers key topics such as security breaches, data availability, employee training, migration problems, and the high costs of implementation. The report then proposes various mitigation strategies, including maintaining proper security measures, ensuring data availability through offline backups, providing employee training, establishing clear migration rules, and viewing the implementation costs as a one-time investment. The conclusion emphasizes the importance of proper cloud implementation and maintenance to achieve desired outcomes, highlighting the critical role of security in cloud computing and the need for proactive solutions. The report references multiple academic papers, providing a strong foundation for its analysis and recommendations.

Running head: CLOUD COMPUTING: SECURITY ISSUES AND CHALLANGES
Cloud computing security issues and challenges
Name of the student:
Name of the University:
Author Note:
Cloud computing security issues and challenges
Name of the student:
Name of the University:
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1CLOUD COMPUTING: SECURITY ISSUES AND CHALLANGES
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Some of the issues those are related to the security of the cloud are as follows:...................2
Ways for the mitigation of the risks in the cloud computing:................................................4
Conclusion..................................................................................................................................6
References..................................................................................................................................7
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Some of the issues those are related to the security of the cloud are as follows:...................2
Ways for the mitigation of the risks in the cloud computing:................................................4
Conclusion..................................................................................................................................6
References..................................................................................................................................7

2CLOUD COMPUTING: SECURITY ISSUES AND CHALLANGES
Introduction
It has been seen that with the improvement of the technology, the use of the emerging
technologies are growing in the industries of the different sectors. Regarding this, it has been
seen that the use of the cloud technology is using in a significant way [4]. Certain advantages
of using the cloud architecture that has made the organizations from the different industries to
use this cloud technology. However, there are certain challenges those are associated with
the use of the cloud storage architecture in organization [6]. The main aim of this paper is to
evaluate different security issues and the challenges regarding cloud computing architecture.
Apart from that the solutions and recommendations can be made on the basis of the factors
discussed in the paper.
Discussion
The cloud computing architecture provides way for the online storage of data in
industry. One of the advantage of using the cloud computing architecture is that data can be
accessible from anywhere and any place [12]. Moreover, the security of data can be enhanced
through the use of cloud computing architecture.
Along with advantages of using cloud computing architecture, there are certain issues
and challenges those can create problem while using the cloud computing architecture in the
organisation. It has been seen that the security is the main issue for the regarding the cloud
architecture in the organization [1]. Apart from that there are other issues those can be both
technical and non-technical in nature.
Some of the issues those are related to the security of the cloud are as follows:
Security: Maintaining issues in a proper way is one of the important issues regarding
use of cloud computing architecture in organization. There are various cloud deployment
models those can be deployed [5]. The selection for the deployment of the cloud is dependent
Introduction
It has been seen that with the improvement of the technology, the use of the emerging
technologies are growing in the industries of the different sectors. Regarding this, it has been
seen that the use of the cloud technology is using in a significant way [4]. Certain advantages
of using the cloud architecture that has made the organizations from the different industries to
use this cloud technology. However, there are certain challenges those are associated with
the use of the cloud storage architecture in organization [6]. The main aim of this paper is to
evaluate different security issues and the challenges regarding cloud computing architecture.
Apart from that the solutions and recommendations can be made on the basis of the factors
discussed in the paper.
Discussion
The cloud computing architecture provides way for the online storage of data in
industry. One of the advantage of using the cloud computing architecture is that data can be
accessible from anywhere and any place [12]. Moreover, the security of data can be enhanced
through the use of cloud computing architecture.
Along with advantages of using cloud computing architecture, there are certain issues
and challenges those can create problem while using the cloud computing architecture in the
organisation. It has been seen that the security is the main issue for the regarding the cloud
architecture in the organization [1]. Apart from that there are other issues those can be both
technical and non-technical in nature.
Some of the issues those are related to the security of the cloud are as follows:
Security: Maintaining issues in a proper way is one of the important issues regarding
use of cloud computing architecture in organization. There are various cloud deployment
models those can be deployed [5]. The selection for the deployment of the cloud is dependent

3CLOUD COMPUTING: SECURITY ISSUES AND CHALLANGES
on the requirements and the budget for the implementation of cloud computing for the
organization.
It has been seen that the security measurement of for the different types of cloud
deployment has different types of the security architecture [3]. The security of public cloud
is managed by cloud providing organization. The type of deployment the access of the
information can be done by any person in the organization or outside of the organization.
However, for the use of the industry, it has been seen that the hybrid model of the cloud
architecture is used.
Hybrid cloud architecture has characteristics of both public cloud and private cloud.
Some of the files and the information are stored in public cloud and most confidential data
and information can be stored in the private cloud [2]. Security of the public cloud is initiated
by cloud providing vendor. The security of private cloud is maintained by either organization
or cloud provider itself.
It can be possible for the cloud vendor not to maintain the proper security measures.
That can cause breaching of the data and the information stored in the system. Apart from
that there is a chance that the confidentiality and the privacy of the data getting violated [7].
In this context, the example of the data breaching from the icloud can be mentioned. icloud is
the cloud service provided by the ios. The breaching of the data is related to the violation of
the security for the many people.
Availability of the data: It has been seen that use of the cloud computing architecture
is largely based on internet connectivity. Main advantage of the cloud computing is
availability of the data. However, it can be assumed that the loss of the internet connectivity
will make the access of the data from the cloud unavailable [9]. It can be said that depending
much upon the internet connectivity is one of the issues in the cloud computing architecture.
on the requirements and the budget for the implementation of cloud computing for the
organization.
It has been seen that the security measurement of for the different types of cloud
deployment has different types of the security architecture [3]. The security of public cloud
is managed by cloud providing organization. The type of deployment the access of the
information can be done by any person in the organization or outside of the organization.
However, for the use of the industry, it has been seen that the hybrid model of the cloud
architecture is used.
Hybrid cloud architecture has characteristics of both public cloud and private cloud.
Some of the files and the information are stored in public cloud and most confidential data
and information can be stored in the private cloud [2]. Security of the public cloud is initiated
by cloud providing vendor. The security of private cloud is maintained by either organization
or cloud provider itself.
It can be possible for the cloud vendor not to maintain the proper security measures.
That can cause breaching of the data and the information stored in the system. Apart from
that there is a chance that the confidentiality and the privacy of the data getting violated [7].
In this context, the example of the data breaching from the icloud can be mentioned. icloud is
the cloud service provided by the ios. The breaching of the data is related to the violation of
the security for the many people.
Availability of the data: It has been seen that use of the cloud computing architecture
is largely based on internet connectivity. Main advantage of the cloud computing is
availability of the data. However, it can be assumed that the loss of the internet connectivity
will make the access of the data from the cloud unavailable [9]. It can be said that depending
much upon the internet connectivity is one of the issues in the cloud computing architecture.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4CLOUD COMPUTING: SECURITY ISSUES AND CHALLANGES
Giving proper training thee to the employees. Through the use of the cloud
architecture is one of the common technology to be used in the industry, it has been seen that
most of the time the employees in the organization are unaware about the managing and
controlling the use of the cloud computing architecture.
In order to make the employees in the organization aware about the using of the
cloud, the organization has to provide the proper training. Providing the proper training to the
employees will cost the organization extra capital that can have certain effect on the revenue
of the organization.
Migration problem: One of the main problems regarding the use of the cloud
computing in the organization is migration problem. It has been seen that most of the
companies face problem during the migration of the service from one cloud architecture to
another [10]. In that situation the organizations has to know the difference in the maintenance
law for the different company. Apart from that in some cases, the organization has to upgrade
some of the infrastructures during the process of migration. This can cost the company and
can affect the revenue.
Costing: another non-technical issues regarding the implementation of the cloud
computing is the high rate of costing. It has been seen that during the development of the
cloud deployment, the organization or the company has to invest large amount of money for
the deployment of the cloud.
Ways for the mitigation of the risks in the cloud computing:
The issues or the problems regarding the cloud computing has been identified. It has
been seen that with the deployment of the cloud architecture, these issues can be mitigated
through taking proper steps and the measures [7]. Some of the steps those are useful for the
mitigation of the issues in the cloud computing are follows:
Giving proper training thee to the employees. Through the use of the cloud
architecture is one of the common technology to be used in the industry, it has been seen that
most of the time the employees in the organization are unaware about the managing and
controlling the use of the cloud computing architecture.
In order to make the employees in the organization aware about the using of the
cloud, the organization has to provide the proper training. Providing the proper training to the
employees will cost the organization extra capital that can have certain effect on the revenue
of the organization.
Migration problem: One of the main problems regarding the use of the cloud
computing in the organization is migration problem. It has been seen that most of the
companies face problem during the migration of the service from one cloud architecture to
another [10]. In that situation the organizations has to know the difference in the maintenance
law for the different company. Apart from that in some cases, the organization has to upgrade
some of the infrastructures during the process of migration. This can cost the company and
can affect the revenue.
Costing: another non-technical issues regarding the implementation of the cloud
computing is the high rate of costing. It has been seen that during the development of the
cloud deployment, the organization or the company has to invest large amount of money for
the deployment of the cloud.
Ways for the mitigation of the risks in the cloud computing:
The issues or the problems regarding the cloud computing has been identified. It has
been seen that with the deployment of the cloud architecture, these issues can be mitigated
through taking proper steps and the measures [7]. Some of the steps those are useful for the
mitigation of the issues in the cloud computing are follows:

5CLOUD COMPUTING: SECURITY ISSUES AND CHALLANGES
Maintaining the proper security: The negotiation of the security between the
organization and the cloud provider is needed to be done in a proper way. Apart from that the
cloud vendor has to be more careful maintaining the standards of security [ 8]. Apart from
that the user access must be refined and controlled through different measures. This will
decrease the chances of the security attacks from the intruders.
Availability of the data: it has been seen that the availability of the data is possible
through the proper internet connection. In this case, the cloud providing vendor can
implement the facility of the offline backup of the required data. The users can bookmark or
save the data or information for the further access in offline mode. The offline storage of the
data can be done through sever or the temporary access file in the system [5]. This will make
the data available even if there is no internet connectivity and the storage in the mobile will
not be wasted.
Training of the employees: Giving proper training of the employees in the
organization is important. The cost for giving the training to the employees can be regarded
as the one time investment. The trained employees in the organization will deliver better
productivity through the handling of the cloud computing architecture.
Migration of the service: It has been seen that there is no proper rules and regulations
regarding the migration process from one cloud service to another [3]. The lack of proper
rules and regulations can be problematic for the organization to manage the migration
process. In order to mitigate this issue, there is a need for the initialization of proper rules and
regulations for the migration of the cloud services. This will help the organizations to follow
the basic rules of the cloud computing architecture.
Costing: It has been seen that the implementation of the cloud architecture in the
organization is expensive. However, the use of the cloud computing will help the
Maintaining the proper security: The negotiation of the security between the
organization and the cloud provider is needed to be done in a proper way. Apart from that the
cloud vendor has to be more careful maintaining the standards of security [ 8]. Apart from
that the user access must be refined and controlled through different measures. This will
decrease the chances of the security attacks from the intruders.
Availability of the data: it has been seen that the availability of the data is possible
through the proper internet connection. In this case, the cloud providing vendor can
implement the facility of the offline backup of the required data. The users can bookmark or
save the data or information for the further access in offline mode. The offline storage of the
data can be done through sever or the temporary access file in the system [5]. This will make
the data available even if there is no internet connectivity and the storage in the mobile will
not be wasted.
Training of the employees: Giving proper training of the employees in the
organization is important. The cost for giving the training to the employees can be regarded
as the one time investment. The trained employees in the organization will deliver better
productivity through the handling of the cloud computing architecture.
Migration of the service: It has been seen that there is no proper rules and regulations
regarding the migration process from one cloud service to another [3]. The lack of proper
rules and regulations can be problematic for the organization to manage the migration
process. In order to mitigate this issue, there is a need for the initialization of proper rules and
regulations for the migration of the cloud services. This will help the organizations to follow
the basic rules of the cloud computing architecture.
Costing: It has been seen that the implementation of the cloud architecture in the
organization is expensive. However, the use of the cloud computing will help the

6CLOUD COMPUTING: SECURITY ISSUES AND CHALLANGES
organizations from different perspective. This will save the cost for the organization [6]. In
that case, it can be said that the costing for the implementation can be treated as the one time
investment.
Conclusion
The discussion is regarding use of the cloud architecture and related issues and
challenge. There are certain advantages of using the cloud those can help the organizations to
achieve the business goals. However, it is said if implementation of cloud is not done in a
proper way, the advantages can become the challenges for the organization. The main
concern regarding the cloud computing architecture is about the security of the cloud
computing. Apart from that there are other non-technical issues regarding the use of the
cloud computing architecture. The issues regarding the non-technical reference are the
costing of the implementation, giving proper training to the employees in the organization.
From the discussion it can be said that with the proper implementation of the cloud
computing will have the mitigation plans for the issues highlighted in the discussion. Apart
from that proper maintenance of the cloud computing is needed to get the right outcome from
the deployment of cloud.
organizations from different perspective. This will save the cost for the organization [6]. In
that case, it can be said that the costing for the implementation can be treated as the one time
investment.
Conclusion
The discussion is regarding use of the cloud architecture and related issues and
challenge. There are certain advantages of using the cloud those can help the organizations to
achieve the business goals. However, it is said if implementation of cloud is not done in a
proper way, the advantages can become the challenges for the organization. The main
concern regarding the cloud computing architecture is about the security of the cloud
computing. Apart from that there are other non-technical issues regarding the use of the
cloud computing architecture. The issues regarding the non-technical reference are the
costing of the implementation, giving proper training to the employees in the organization.
From the discussion it can be said that with the proper implementation of the cloud
computing will have the mitigation plans for the issues highlighted in the discussion. Apart
from that proper maintenance of the cloud computing is needed to get the right outcome from
the deployment of cloud.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CLOUD COMPUTING: SECURITY ISSUES AND CHALLANGES
References
[1] Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in cloud
computing: Opportunities and challenges." Information sciences 305 (2015): 357-383.
[2] Almorsy, Mohamed, John Grundy, and Ingo Müller. "An analysis of the cloud
computing security problem." arXiv preprint arXiv:1609.01107 (2016).
[3] Puthal, Deepak, B. P. S. Sahoo, Sambit Mishra, and Satyabrata Swain. "Cloud
computing features, issues, and challenges: a big picture." In 2015 International
Conference on Computational Intelligence and Networks, pp. 116-123. IEEE, 2015.
[4] Rao, R. Velumadhava, and K. Selvamani. "Data security challenges and its solutions
in cloud computing." Procedia Computer Science 48 (2015): 204-209.
[5] Zhou, Jun, Zhenfu Cao, Xiaolei Dong, and Athanasios V. Vasilakos. "Security and
privacy for cloud-based IoT: Challenges." IEEE Communications Magazine 55, no. 1
(2017): 26-33.
[6] Yi, Shanhe, Zhengrui Qin, and Qun Li. "Security and privacy issues of fog
computing: A survey." In International conference on wireless algorithms, systems,
and applications, pp. 685-695. Springer, Cham, 2015.
[7] Singh, Ashish, and Kakali Chatterjee. "Cloud security issues and challenges: A
survey." Journal of Network and Computer Applications 79 (2017): 88-115.
[8] Mukherjee, Mithun, Rakesh Matam, Lei Shu, Leandros Maglaras, Mohamed Amine
Ferrag, Nikumani Choudhury, and Vikas Kumar. "Security and privacy in fog
computing: Challenges." IEEE Access 5 (2017): 19293-19304.
[9] Sadeghi, Ahmad-Reza, Christian Wachsmann, and Michael Waidner. "Security and
privacy challenges in industrial internet of things." In 2015 52nd ACM/EDAC/IEEE
Design Automation Conference (DAC), pp. 1-6. IEEE, 2015.
References
[1] Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in cloud
computing: Opportunities and challenges." Information sciences 305 (2015): 357-383.
[2] Almorsy, Mohamed, John Grundy, and Ingo Müller. "An analysis of the cloud
computing security problem." arXiv preprint arXiv:1609.01107 (2016).
[3] Puthal, Deepak, B. P. S. Sahoo, Sambit Mishra, and Satyabrata Swain. "Cloud
computing features, issues, and challenges: a big picture." In 2015 International
Conference on Computational Intelligence and Networks, pp. 116-123. IEEE, 2015.
[4] Rao, R. Velumadhava, and K. Selvamani. "Data security challenges and its solutions
in cloud computing." Procedia Computer Science 48 (2015): 204-209.
[5] Zhou, Jun, Zhenfu Cao, Xiaolei Dong, and Athanasios V. Vasilakos. "Security and
privacy for cloud-based IoT: Challenges." IEEE Communications Magazine 55, no. 1
(2017): 26-33.
[6] Yi, Shanhe, Zhengrui Qin, and Qun Li. "Security and privacy issues of fog
computing: A survey." In International conference on wireless algorithms, systems,
and applications, pp. 685-695. Springer, Cham, 2015.
[7] Singh, Ashish, and Kakali Chatterjee. "Cloud security issues and challenges: A
survey." Journal of Network and Computer Applications 79 (2017): 88-115.
[8] Mukherjee, Mithun, Rakesh Matam, Lei Shu, Leandros Maglaras, Mohamed Amine
Ferrag, Nikumani Choudhury, and Vikas Kumar. "Security and privacy in fog
computing: Challenges." IEEE Access 5 (2017): 19293-19304.
[9] Sadeghi, Ahmad-Reza, Christian Wachsmann, and Michael Waidner. "Security and
privacy challenges in industrial internet of things." In 2015 52nd ACM/EDAC/IEEE
Design Automation Conference (DAC), pp. 1-6. IEEE, 2015.

8CLOUD COMPUTING: SECURITY ISSUES AND CHALLANGES
[10] Guerrero-Ibanez, Juan Antonio, Sherali Zeadally, and Juan Contreras-Castillo.
"Integration challenges of intelligent transportation systems with connected vehicle,
cloud computing, and internet of things technologies." IEEE Wireless
Communications 22, no. 6 (2015): 122-128.
[11] Bhushan, Kriti, and B. B. Gupta. "Security challenges in cloud computing:
state-of-art." International Journal of Big Data Intelligence 4, no. 2 (2017): 81-107.
[12] Li, Ping, Jin Li, Zhengan Huang, Chong-Zhi Gao, Wen-Bin Chen, and Kai
Chen. "Privacy-preserving outsourced classification in cloud computing." Cluster
Computing 21, no. 1 (2018): 277-286.
[10] Guerrero-Ibanez, Juan Antonio, Sherali Zeadally, and Juan Contreras-Castillo.
"Integration challenges of intelligent transportation systems with connected vehicle,
cloud computing, and internet of things technologies." IEEE Wireless
Communications 22, no. 6 (2015): 122-128.
[11] Bhushan, Kriti, and B. B. Gupta. "Security challenges in cloud computing:
state-of-art." International Journal of Big Data Intelligence 4, no. 2 (2017): 81-107.
[12] Li, Ping, Jin Li, Zhengan Huang, Chong-Zhi Gao, Wen-Bin Chen, and Kai
Chen. "Privacy-preserving outsourced classification in cloud computing." Cluster
Computing 21, no. 1 (2018): 277-286.
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.