Cloud Computing Security Solution: Emerging Technologies & Innovation

Verified

Added on  2023/06/04

|14
|694
|187
Report
AI Summary
This report provides an overview of cloud-based security solutions, analyzing security issues in cloud computing derived from recent research. It highlights the basic services cloud computing offers, the threats it faces, and proposed solutions to minimize these issues. The report emphasizes the importance of information control and connectivity, discussing security issues such as data breaches, fake APIs, and malware injection. Proposed solutions include operational and organizational security measures, data security strategies, threat evasion techniques, safe access protocols, and privacy enhancements, exemplified by Google's security practices. The conclusion underscores the significance of the overall analysis in addressing security challenges in cloud computing.
Document Page
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
The cloud computing is the process which involves the storing and
accessing of the data over internet rather than computer network.
The series of networks that are handles data over internet is
estimated to be 5.4 billion dollars globally (Sadeghi, Wachsmann &
Waidner, 2015)
Cloud security are the service provider that provides the users to
access the data through secure channels without opening the firewall
ports.
Document Page
System Overview Data
Flow
The diagram shows the data flow and
the working of the computer system in
cloud computing .
Document Page
Research Issues
The security fails that have been observed in the recent years are
recorded are stated as follows.
Data breach
Unknown risk profile
Shared technology issues
Malware
Account or service hacking or hijacking
Denial of the services
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Information Flow Control
It is the effective mechanism that is used to ensure the policy
requirements for data protection and security regulations. The
information flow control is used to maintain
Transparency
Data Erasure
Purpose specification
Document Page
Connectivity
The interaction of the on
premises environment and the
public domain is called cloud
connectivity (Kalaiprasath,
Elankavi & Udayakumar, 2017).
It provides end to end
execution for the connectivity
to the cloud.
Facilitate the data storage
Provide better user interface
Document Page
Information Flow Control
Security Issues
Data breach
Fake API
Denial of services
Cloud bleed
SQl injections
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cloud Connectivity Security
Issues
Malware injection
High network latency
Misconfiguration
Lack of testing
Lack of Monitoring
Document Page
Security Interaction Model
Document Page
Proposed Solution for the
Security Issues
The security issues in the cloud can be minimized by implementing
them over following fields (Chatzigiannakis, Vitaletti & Pyrgelis,
2016).
Operational and Organizational Security
Data Security
Threat evasion
Safe Access
Privacy
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Experimental Analysis of the
Proposed Solutions
The Google have taken few security practices in order to minimise the
security issues considering all the fields
organizational and operational security -avoiding local storage , giving
verified accessibility, hiring a new team for security and screening and
training the employees about new approaches to persisting threats
(Colombo et al., 2014).
Privacy- safe access, maintaining own IP address, denial to access user
data.
Data security-Physical security, reduncacy,following new code of
Conduct “ Don’t be evil’.
Document Page
Continued ..
Threat evasion-Protection against network attacks, provide network
protection against spam and virus protection.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]