Analysis of Cloud Computing Security in Information Systems
VerifiedAdded on 2023/03/21
|7
|1432
|40
Report
AI Summary
This report delves into the multifaceted aspects of cloud computing security within organizations, examining various security challenges and vulnerabilities inherent in different software system environments, including standalone, client-server, distributed, and cloud computing models. The report explores the security issues arising from the software system lifecycle, from concept to maintenance. It also evaluates the impact of different development environments, such as agile and waterfall models, on security considerations. The core of the report compares various security technologies and techniques, including encryption and access controls, assessing their efficiency and effectiveness in securing data within the cloud. The analysis includes cloud provider assurances and provides a conclusion on the most robust security techniques. The report also discusses methods for protecting data confidentiality in the cloud, such as secure access credentials, encryption, and firewalls.

Running head: COMPUTER INFORMATION SYSTEM
COMPUTER INFORMATION SYSTEM
Name of student
Name of university
Author’s note:
COMPUTER INFORMATION SYSTEM
Name of student
Name of university
Author’s note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
COMPUTER INFORMATION SYSTEM
Table of Contents
Introduction....................................................................................................................2
Discussion......................................................................................................................2
Conclusion......................................................................................................................4
References......................................................................................................................5
COMPUTER INFORMATION SYSTEM
Table of Contents
Introduction....................................................................................................................2
Discussion......................................................................................................................2
Conclusion......................................................................................................................4
References......................................................................................................................5

2
COMPUTER INFORMATION SYSTEM
Introduction
This report aims to discuss the various aspects of the cloud computing in the
organisations and the security issues connected to the cloud computing. The comparison of
the security issues in the various software system environments has been done in this report
along with the use of the various development environments and their security issues has
been discussed. The discussion of the various cloud computing providers and the security
issues has been briefly discusses then the comparison among the various technologies and the
techniques has been done that includes the encryption, access control and the other
techniques. Lastly this report concludes with the appropriate conclusion for the report.
Discussion
When the cloud computing is considered, it is commonly observed that the computing
is data centric. There are several security issues in the software system environments where
the data could be lost or the integrity of the data could be breached. In the standalone
computing there is the major threat of the malwares that are released in the system and could
damage the network as well as the data of the organisation (Almorsy, Grundy & Müller,
2016). The malwares are designed for causing the significant damage to the standalone
computing or any networked computing. In the standalone computing as soon as the malware
are released in the system, the data could be lost from the system (Krasnyanskaya & Tylets,
2015). In the client server model of computing, there is the major threat of the unauthorised
access in the network of the organisation (Aljawarneh, Alawneh & Jaradat, 2017). without
the implementation of the proper authorisation protocols, the malicious users could gain
access in the systems and steal all the data of the organisations (Rittinghouse & Ransome,
2016). In the distributed computing model, there is the major issue of the confidentiality,
which denotes that during the transmission of the data there might be some security issues
COMPUTER INFORMATION SYSTEM
Introduction
This report aims to discuss the various aspects of the cloud computing in the
organisations and the security issues connected to the cloud computing. The comparison of
the security issues in the various software system environments has been done in this report
along with the use of the various development environments and their security issues has
been discussed. The discussion of the various cloud computing providers and the security
issues has been briefly discusses then the comparison among the various technologies and the
techniques has been done that includes the encryption, access control and the other
techniques. Lastly this report concludes with the appropriate conclusion for the report.
Discussion
When the cloud computing is considered, it is commonly observed that the computing
is data centric. There are several security issues in the software system environments where
the data could be lost or the integrity of the data could be breached. In the standalone
computing there is the major threat of the malwares that are released in the system and could
damage the network as well as the data of the organisation (Almorsy, Grundy & Müller,
2016). The malwares are designed for causing the significant damage to the standalone
computing or any networked computing. In the standalone computing as soon as the malware
are released in the system, the data could be lost from the system (Krasnyanskaya & Tylets,
2015). In the client server model of computing, there is the major threat of the unauthorised
access in the network of the organisation (Aljawarneh, Alawneh & Jaradat, 2017). without
the implementation of the proper authorisation protocols, the malicious users could gain
access in the systems and steal all the data of the organisations (Rittinghouse & Ransome,
2016). In the distributed computing model, there is the major issue of the confidentiality,
which denotes that during the transmission of the data there might be some security issues
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
COMPUTER INFORMATION SYSTEM
that could damage the data. In the cloud computing model, the main issue that has been
observed is that the authentication (Zhao, Li & Liu, 2014). The malicious users gain the
access into the cloud with the impersonation of any other individual. The most appropriate
development environment that could be utilised for the development is the agile model that
provides the extensive security to the data and it offers the mitigation of the risks of the
system development using the proper methods and the procedures (Singh & Chatterjee,
2017).
While maintaining the proper authentication system for the clients, it is important to
consider the secured credentials to all the users of the cloud storage and the two step
verification protocol that prevents the malicious user from entering the storage and damage
the data. The allocation of the various sectors in the cloud storage and the proper accessing
system would be helpful in the maintaining the confidentiality of the cloud storage. The
clients commonly expect the proper maintenance of the data on the cloud and the proper
protocol implementation for accessing the data on the cloud and the proper risk assessment
policies for the data on cloud. The methods by which the Medical Imaging company could
keep the other cloud subscribers from accessing the data of the company is by the use of the
proper accessing credentials in the system for the individuals of the company that would only
be used by the employees of the Medical Imaging. The encryption of the images that are
provided to the various third party ISPs could help in the management of the images. The
suggestions that are provided from the NIST Special Series 800 and 1800 guidance are that
the organization are required to be able to monitor, apply, track and then enforce the policies
for the security and the privacy on the cloud workloads on the basis of the business
requirements in the constant, automated and the repeatable manner. The proper knowledge
about the working of the security policy while using any application would helpful in
maintaining and the ensuring the policy.
COMPUTER INFORMATION SYSTEM
that could damage the data. In the cloud computing model, the main issue that has been
observed is that the authentication (Zhao, Li & Liu, 2014). The malicious users gain the
access into the cloud with the impersonation of any other individual. The most appropriate
development environment that could be utilised for the development is the agile model that
provides the extensive security to the data and it offers the mitigation of the risks of the
system development using the proper methods and the procedures (Singh & Chatterjee,
2017).
While maintaining the proper authentication system for the clients, it is important to
consider the secured credentials to all the users of the cloud storage and the two step
verification protocol that prevents the malicious user from entering the storage and damage
the data. The allocation of the various sectors in the cloud storage and the proper accessing
system would be helpful in the maintaining the confidentiality of the cloud storage. The
clients commonly expect the proper maintenance of the data on the cloud and the proper
protocol implementation for accessing the data on the cloud and the proper risk assessment
policies for the data on cloud. The methods by which the Medical Imaging company could
keep the other cloud subscribers from accessing the data of the company is by the use of the
proper accessing credentials in the system for the individuals of the company that would only
be used by the employees of the Medical Imaging. The encryption of the images that are
provided to the various third party ISPs could help in the management of the images. The
suggestions that are provided from the NIST Special Series 800 and 1800 guidance are that
the organization are required to be able to monitor, apply, track and then enforce the policies
for the security and the privacy on the cloud workloads on the basis of the business
requirements in the constant, automated and the repeatable manner. The proper knowledge
about the working of the security policy while using any application would helpful in
maintaining and the ensuring the policy.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
COMPUTER INFORMATION SYSTEM
The Hadoop cloud based system is significantly secured than the normal computer
system as it provides the extensive policies and the protocols for ensuring the confidentiality
and the integrity of the data on the cloud. The security of the distributed and the cloud based
systems could be enhanced by the use of the integrity auditing mechanism, by the proper use
of the holomorphic token and the distributed erasurecoded data.
The efficiency of the security mechanisms of the cloud computing could be observed
to have increased when the encryption of the data is used in the cloud based models. The
encryption helps in the preventing the data from being stolen as the only persons who could
decrypt the data is the individual who has the key (Singh & Pandey, 2014). The access
controls are also utilised for securing the access in the cloud storage. Several companies are
provided with the secure access protocols and the key by the service providers that are
utilised for gaining access inside the cloud storage and access the data. Without the accessing
credentials, the unauthorised user face significant difficulty in gaining the access (Aljawarneh
& Yassein, 2016). The other technology that is commonly used by the cloud service
providers is the deploying the strict firewall inside the storage of the cloud that protects the
data from being stolen and it also checks the credentials of the users who are wishing to
access the data inside the cloud.
Conclusion
Therefore, it can be concluded that even though the cloud storage provide several
benefits to the users and the companies, there are several security issues that are required to
be considered by both the service providers and the clients. Without the proper
implementation of the authentication protocols in the cloud based system, the data that has
been stored in the cloud could face significant threat of loss or damage. The cloud service
COMPUTER INFORMATION SYSTEM
The Hadoop cloud based system is significantly secured than the normal computer
system as it provides the extensive policies and the protocols for ensuring the confidentiality
and the integrity of the data on the cloud. The security of the distributed and the cloud based
systems could be enhanced by the use of the integrity auditing mechanism, by the proper use
of the holomorphic token and the distributed erasurecoded data.
The efficiency of the security mechanisms of the cloud computing could be observed
to have increased when the encryption of the data is used in the cloud based models. The
encryption helps in the preventing the data from being stolen as the only persons who could
decrypt the data is the individual who has the key (Singh & Pandey, 2014). The access
controls are also utilised for securing the access in the cloud storage. Several companies are
provided with the secure access protocols and the key by the service providers that are
utilised for gaining access inside the cloud storage and access the data. Without the accessing
credentials, the unauthorised user face significant difficulty in gaining the access (Aljawarneh
& Yassein, 2016). The other technology that is commonly used by the cloud service
providers is the deploying the strict firewall inside the storage of the cloud that protects the
data from being stolen and it also checks the credentials of the users who are wishing to
access the data inside the cloud.
Conclusion
Therefore, it can be concluded that even though the cloud storage provide several
benefits to the users and the companies, there are several security issues that are required to
be considered by both the service providers and the clients. Without the proper
implementation of the authentication protocols in the cloud based system, the data that has
been stored in the cloud could face significant threat of loss or damage. The cloud service

5
COMPUTER INFORMATION SYSTEM
providers provides the strict accessing credentials to the clients who could utilise these
credentials to access the data that has been stored in the cloud.
COMPUTER INFORMATION SYSTEM
providers provides the strict accessing credentials to the clients who could utilise these
credentials to access the data that has been stored in the cloud.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
COMPUTER INFORMATION SYSTEM
References
Aljawarneh, S. A., & Yassein, M. O. B. (2016). A conceptual security framework for cloud
computing issues. International Journal of Intelligent Information Technologies
(IJIIT), 12(2), 12-24.
Aljawarneh, S. A., Alawneh, A., & Jaradat, R. (2017). Cloud security engineering: Early
stages of SDLC. Future Generation Computer Systems, 74, 385-392.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Krasnyanskaya, T. M., & Tylets, V. G. (2015). Designing the cloud technologies of
psychological security of the person. Вопросы философии и психологии, (3), 192-
199.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal
of Network and Computer Applications, 79, 88-115.
Singh, V., & Pandey, S. K. (2014, October). A comparative study of cloud security
ontologies. In Proceedings of 3rd International Conference on Reliability, Infocom
Technologies and Optimization (pp. 1-6). IEEE.
Zhao, F., Li, C., & Liu, C. F. (2014, February). A cloud computing security solution based on
fully homomorphic encryption. In 16th International Conference on Advanced
Communication Technology (pp. 485-488). IEEE.
COMPUTER INFORMATION SYSTEM
References
Aljawarneh, S. A., & Yassein, M. O. B. (2016). A conceptual security framework for cloud
computing issues. International Journal of Intelligent Information Technologies
(IJIIT), 12(2), 12-24.
Aljawarneh, S. A., Alawneh, A., & Jaradat, R. (2017). Cloud security engineering: Early
stages of SDLC. Future Generation Computer Systems, 74, 385-392.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Krasnyanskaya, T. M., & Tylets, V. G. (2015). Designing the cloud technologies of
psychological security of the person. Вопросы философии и психологии, (3), 192-
199.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal
of Network and Computer Applications, 79, 88-115.
Singh, V., & Pandey, S. K. (2014, October). A comparative study of cloud security
ontologies. In Proceedings of 3rd International Conference on Reliability, Infocom
Technologies and Optimization (pp. 1-6). IEEE.
Zhao, F., Li, C., & Liu, C. F. (2014, February). A cloud computing security solution based on
fully homomorphic encryption. In 16th International Conference on Advanced
Communication Technology (pp. 485-488). IEEE.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.