Cloud Infrastructure Security Issues: Challenges and Solutions

Verified

Added on  2023/06/04

|4
|813
|324
Discussion Board Post
AI Summary
This discussion addresses the critical security challenges encountered by commercial cloud service providers (CSPs). The paper identifies two primary security challenges: the lack of knowledge, fear of change, and skills shortages, along with the absence of automation in cloud billing. The discussion highlights how the complexity of cloud technology and the intricacies of billing processes create vulnerabilities and hinder adoption. To mitigate these challenges, the discussion outlines several approaches, including the development of robust security programs and the implementation of encryption methods to protect data. Furthermore, it emphasizes the use of security processes such as biometric recognition and robust technologies to prevent data breaches. The discussion references structured taxonomies from the Security Alliance (CSA) and NIST organizations, providing a comprehensive overview of the security landscape. The paper provides real-world examples and practical solutions to enhance cloud infrastructure security.
Document Page
Running Head: CLOUD-BASED SERVICES
0
Cloud Infrastructure
Security Issues
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CLOUD-BASED SERVICES
1
Security challenges faced by cloud services providers
Security is the very big problem for cloud computing and it is estimated that lack of
security increase various cyber- attacks and threats. CSP is a part of cloud computing
that provides services too many organizations and consumers and in this modern
technology, users use this advanced technology to store personal data or information as
a backup plan (Ali, Khan, and Vasilakos, 2015). According to structure of taxonomies,
there are main two security challenges faced by CSP which are following
The absence of knowledge, fear of change and skills shortage
The absence of automation in cloud billing
The absence of knowledge, fear of change and skills shortage
Cloud computing is an advanced technology which is very complex to understand so
that many consumers are not able to adopt this type of services. Due to lack of
knowledge CSP cannot provide this service to all customers and it is a very limited
process by which many business industries struggle from skill shortage (Alizadeh, et al.,
2016). It is identified that large communities require maintaining their run rate without
stopping selling their old products and if they do not have any knowledge of cloud
service then they can reduce their value in the market. Some of them also suffer from
automation problem and they do not understand the fundamental concept of cloud-
based services and how manual procedure reduces their productivity.
The absence of automation in cloud billing
Cloud computing is the very latest innovation which provides the faculty of flexibility to
their consumers and there are multiple methods to purchase cloud services (Alizadeh,
et al., 2016). The price of cloud service is very complex and it uses different billing
process rather than other. It uses the main three pricing models, for example, SaaS,
Paas, and LaaS which are very wide and complex. All these systems require an
automatic invoice process which is the very big problem faced by cloud service
providers. Moreover, the third-party organization provides a solution to this problem
but it is very complicated to select the right one.
Document Page
CLOUD-BASED SERVICES
2
Mitigation to reduce security problem in cloud technology
There are many organizations and online communities which are using cloud-based
services, for example, Amazon, Google, Facebook, and other (Hashem, et al., 2017). It is a
very complex technology because it required various kinds of methods and process to
secure user private data. CSA and NIST organizations developed many strategies and
policies to reduce security issues in cloud system which are decried below
CSP can develop a proper program and plan to control security threats of cloud
technology. There are many users that use unauthentic servers by which hackers
can detect their private accounts (Sajid, Abbas, and Saleem, 2016). Encryption is
a very best process to resolve these types of a problem because it converts
information into the form of code which cannot be cracked.
Cloud security alliance provides various security process like biometric
recognition, robust technology, and cryptography by which CSP can reduce the
problem of a data breach (Sajid, Abbas, and Saleem, 2016). If any person adopts
these types of steps then they can avid cyber- attacks and security threats.
Robust is a process which blocks unwanted traffic signals and spam emails by
which any organization can improve their privacy.
Document Page
CLOUD-BASED SERVICES
3
References
Ali, M., Khan, S.U. and Vasilakos, A.V., (2015) Security in cloud computing: Opportunities
and challenges. Information sciences, 305(11), pp.357-383.
Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S. and Sakurai, K., (2016) Authentication
in mobile cloud computing: A survey. Journal of Network and Computer
Applications, 61(6), pp.59-80.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., (2015) the
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47(8), pp.98-115.
Sajid, A., Abbas, H., and Saleem, K., (2016) Cloud-assisted IoT-based SCADA systems
security: A review of the state of the art and future challenges. IEEE Access, 4(1),
pp.1375-1384.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]