Cloud Computing Report: Exploring Security Challenges in Cloud Systems

Verified

Added on  2022/10/11

|4
|737
|40
Report
AI Summary
This report provides an overview of cloud computing, its architecture, and the services it offers, including IaaS, PaaS, and SaaS. It emphasizes the increasing adoption of cloud computing by businesses for data management and storage. The study highlights the significance of cloud computing in enhancing business processes and reducing system complexity. A key focus is on the security challenges associated with cloud-based networks, such as DDoS and malware attacks, and their impact on data breaches. The report includes a literature review, discussing the current research on cloud computing security, and examines the advantages and disadvantages of cloud computing. It concludes with recommendations for improving cloud security, such as implementing security policies, employee training, and using firewalls and encryption techniques.
Document Page
CLOUD COMPUTING 0
Cloud computing
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CLOUD COMPUTING 1
Abstract
The term cloud computing is the practice of utilizing of the remote control systems hosted
on the internet in order to manage, record and process data. It is an advanced technology
that is used by the business communities for controlling and storing a large amount of data.
It is observed that cloud computing is the on-demand availability of computing device
resources that are able to store and handle the data of the consumers [1]. There are major
three parts of cloud-based services that help the companies for improving the business
process which includes PaaS, SaaS, and IaaS. The major characteristic of cloud computing is
that it reduces complexity from the systems [2].
The major significance of this research is to explore the concept behind cloud computing
and identify the security challenges associated with cloud-based networks. It is identified
that security is a serious problem for companies and hackers are able to detect and enter
into the computing devices used by the organizations. This study provides depth
examination about cloud computing and evaluates the security challenges linked with
cloud computing [3]. A literature search is also included in this research in order to
understand the findings or opinions of the recent articles based on cloud computing. From
recent research, it is found that cloud computing is able to enhance the performance of the
data centers and help the companies for securing data from hackers. It is observed that a
cloud may be private or public depends on customer requirements.
A public cloud mainly provides services to anyone through internet connections while
private cloud is defined as a proprietary network that is mainly used by the companies for
managing data of the consumers [4]. The major advantage of cloud computing is that it
store and manage large data sets effectively that lead the business process in an
appropriate manner. This research study covers the key aspects of cloud computing along
with the advantages and disadvantages and also highlights the security-related challenges
faced by companies while utilizing cloud-based servers. In this generation, there are
numerous companies that provide cloud-based services to the consumers including
Microsoft Azure, Google cloud platform, and amazon web services and so on.
Document Page
CLOUD COMPUTING 2
The researchers adopted various research methods in this study, for example, qualitative
design, inductive type of approach, content analysis method and secondary data gathering
process. Using such kinds of methods the author is able to handle and enhance the quality
of the investigation effectively. It is found that DDOS and malware both are common
security attacks that occurred in cloud computing due to which the companies are suffering
from data breach problems. This research shows the challenges and issues linked with
cloud computing. Therefore, it is recommended that companies should develop security
policies and provide proper training to employees while using cloud-based servers and
computing networks. Moreover, the utilization of firewalls and encryption-related
techniques may help the companies for addressing unwanted signals and malware
activities from the computer systems.
Keywords: cloud computing, IaaS, PaaS, SaaS, firewall, and encryption
Document Page
CLOUD COMPUTING 3
References
[1].M.A., Khan, “A survey of security issues for cloud computing,” Journal of network and
computer applications, vol. 71, no. 6, pp.11-29, 2016.
[2].D., Puthal, B.P.S., Sahoo, S. Mishra and, S., Swain, “Cloud computing features, issues,
and challenges: a big picture,” In 2015 International Conference on Computational
Intelligence and Networks, vol. 12, no. 8, pp. 116-123, 2015.
[3].S., Singh, Y.S. Jeong and, J.H., Park, “A survey on cloud computing security: Issues,
threats, and solutions,” Journal of Network and Computer Applications, vol. 75, no. 6,
pp.200-222, 2016.
[4].J., Sen, “Security and privacy issues in cloud computing,” In Cloud Technology:
Concepts, Methodologies, Tools, and Applications, vol. 12, no. 6, pp. 1585-1630, 2015.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]