NIT5140 - Information Security: Cloud Network Security Challenges

Verified

Added on  2024/06/03

|8
|1274
|265
Report
AI Summary
This report provides an overview of cloud network security, highlighting the benefits and challenges associated with cloud computing. It begins with an introduction to cloud networks, emphasizing their role in providing ubiquitous access to shared resources. A case study involving Pretty Good Privacy (PGP) illustrates the importance of data encryption and authentication. The report then delves into issues such as downtime, security and privacy concerns, vulnerability to attacks, and limited flexibility. Solutions to mitigate these issues are proposed, including service level agreements (SLAs), context-based data access restrictions, and proactive threat identification. The report concludes by emphasizing the need for robust security measures to ensure the reliable and secure utilization of cloud networks.
Document Page
NIT5140 - Information Security
Cloud Network
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction.................................................................................................................................................3
Case Study...................................................................................................................................................4
Solutions to the issue of the cloud computing.............................................................................................6
Conclusion...................................................................................................................................................7
References...................................................................................................................................................8
2
Document Page
Introduction
Cloud network is the technology of information paradigm which enables the access of ubiquitous
to the pools which is shared of configurable system resources and the services of the higher level
which can be provisioned rapidly with the minimal effort of the management mostly on the
internet. The network of cloud computing depends on the sharing of the resources for achieving
the economies of the scale and coherence which is same to the utility of the public. The main
goal of the cloud computing is to provide the benefit to its use without any needed of deep
knowledge about the thing. The aim of the cloud industry is to low down the cost and helps the
users for focusing on their business instead of the impeded by the obstacles of the IT.
3
Document Page
Case Study
Pretty good privacy which is known as PGP, it is an encryption program which provides the
privacy of cryptographic and authentication of the communication of data. This program is used
for encryption, signing and decrypting the text, files, e-mails, partitions of the whole disk,
directories and is used for increasing the security of the communication of the e-mails (Agrawal,
and Mehrotra, 2016). The program PGP was developed by Phil Zimmermann in the year 1991.
This program uses the combination of serial of the data compression, and lastly the combination
of public-key cryptography; each step uses the at least one algorithms. Every public key is
bounded with unique id and address, the first version of this system is known as the web of trust
for contrasting with the system of X.509, these use the approach of hierarchy which is based on
the certificate authority and it is added to the implementation later.
Cloud network third party makes a focus on the business instead of for expending the resources
on the maintenance and infrastructure of the computer. Cloud providers basically use the model
of "Pay-as-you-go" which helps to operate the expenses which are unexpected when the
administrators are not the familiar with the models of the cloud pricing. The main technology for
the cloud computing is the virtualization; the software separates the physical computing devices
in one or more devices of virtual (Botta, et. al., 2016). The autonomic networks of the computing
process from by which the user can provision the resources on the demand. Cloud network
provides the resources for the service which makes the use of the standards which is established
to access easily and globally the cloud services in the way of standardization. The cloud network
is the kind of grid computing which involves the address the best quality of services and the
reliable problem, the technology provides the technology and tools for building the data parallel
application which can be afforded by the people and can be compared the traditional parallel
techniques of the computing.
Cloud computing has benefited many businesses by lower downing the cost and by allowing the
business person make concentrate on the business rather than the infrastructure of the issues.
There are some issues with the cloud networking, the first is downtime, this is the worst
disadvantage of this as no provider of the cloud will claim the immunity to the outage services.
The system of the cloud is the internet based that means it works only when there is the service
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
of the internet, the cloud system can be failed itself with many of the reasons (Khan, 2016). The
next is security and privacy, the cloud network can be hacked and the data on it can be deleted
by itself which force the company to shut down the business. The service provider of the cloud
must safeguard and manage the infrastructure of the hardware of the deployment (Rao, and
Selvamani, 2015). The next issue is vulnerability to the attack, in the network of the cloud each
component is accessible from the internet. The fact is anything which is connected to the internet
is not perfectly secure and the best group on the internet faces the severe attacks.
The next issue with the cloud computing is limited flexibility and control, the user of the cloud
has the limited control over the execution and on the functions when they host the infrastructure.
The provider of the cloud and the policies of the management imposes the limitations on what
the customers can do with their deployment.
5
Document Page
Solutions to the issue of the cloud computing
There are different types of the issue with the cloud computing but there are solutions also for
solving the issue. There is the best solution for minimizing the downtime of the cloud network is
to demand the SLA (service level agreement) from the network provider must guarantee for
excessing of 99.55 percent. To reduce the risk with the privacy and the security is one must limit
the access of data which is based on the context of the user, the company must increase the
security for the devices (Sen, 2015). The company must take up the approach which is risk-based
for securing the assets which are used in the clouds. The last is to reduce the cloud attacks the
provider must identify the threats with relating the real-time alerts with the security of the global
intelligence, one must prevent the data exfiltration and must protect the proactive information.
6
Document Page
Conclusion
The network of the cloud means the network of the computer which exists the part of the
infrastructure of the cloud computing. The cloud network is the computer network which
provides the network of interconnection between the application of cloud and the services. The
assignment is about the cloud network which elaborates the benefits of the cloud network, the
issues which the cloud network faces and the users' faces due to the cloud network. The solution
of the issues is given so that the user can easily use the cloud network.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Agrawal, A.K. and Mehrotra, S., 2016, April. Application of elliptic curve
cryptography in pretty good privacy (PGP). In Computing, Communication, and
Automation (ICCCA), 2016 International Conference on (pp. 924-929). IEEE.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2016. Integration of cloud
computing and internet of things: a survey. Future Generation Computer Systems, 56,
pp.684-700.
Khan, M.A., 2016. A survey of security issues for cloud computing. Journal of
network and computer applications, 71, pp.11-29.
Rao, R.V., and Selvamani, K., 2015. Data security challenges and its solutions in
cloud computing. Procedia Computer Science, 48, pp.204-209.
Sen, J., 2015. Security and privacy issues in cloud computing. In Cloud Technology:
Concepts, Methodologies, Tools, and Applications (pp. 1585-1630). IGI Global.
8
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]