Detailed Examination of Security and Privacy Issues in Cloud Computing

Verified

Added on  2020/04/01

|10
|1820
|74
Report
AI Summary
This report provides a detailed analysis of security and privacy issues in cloud computing. It begins with an introduction to cloud computing and its benefits, while highlighting the challenges that need to be addressed for widespread adoption. The report discusses the lack of user control over data and application performance, data loss risks, and difficulties in customizing service agreements. It covers different cloud service models (SaaS, PaaS, IaaS) and deployment models (private, public, community), along with the illusion of infinite resources. The report then summarizes research papers focusing on security and privacy challenges, including internal and external attackers. It also discusses the real-world impact of these issues, categorizing attackers based on their skills and resources (random, weak, strong, substantial). Finally, the report concludes by emphasizing the importance of addressing these issues to ensure the continued growth and trustworthiness of cloud computing.
Document Page
RUNNING HEAD: SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING 1
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING
Student Name
Institute Name
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING 2
Contents
Introduction......................................................................................................................................3
Challenge.........................................................................................................................................3
Important technologies....................................................................................................................4
Implementation of technologies......................................................................................................4
Research questions...........................................................................................................................5
Summary of the issue discussed in research paper..........................................................................5
Issues that were not addresses in research paper.............................................................................6
Impact of discussed issue and its implementation in real world.....................................................6
Conclusion.......................................................................................................................................7
Reference.........................................................................................................................................9
Document Page
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING 3
Introduction
The concept of cloud computing is based on the overall applications that are provided as services
given on internet along with hardware and systems software in the datacenters that helps in
providing different set of services. The recent trend shows that there is a hype which is
developing around cloud computing and it is also clear there is an important movement towards
the model of cloud computing which is crucial for the development (Sen, 2013). But, since the
overall shape of the system is also emerging and growing on very fast pace in conceptual as well
as actual manner, there is emergence of legal, economic, interoperability, privacy as well as
security issues that are posing important challenges.
Challenge
There are number of benefits that the concept of cloud computing bring with many concerns and
challenges. These challenges need to be addressed before there is ubiquitous level of adoption in
the paradigm of computing. The first steps is that, in cloud computing the user cannot have the
control over the data or the overall performance associated with the application that can be
required in sometime. They may not have control on the capacity to change the procedure or
policies under which they function as well. Maintenance and monitoring is not a simple process
when compared to what it can be for the PCs sitting in the present Intranet (Chen & Zhao, 2012).
The second issue is the customers in cloud computing may put things on risk of losing data and
lock them into a format based on proprietary and they may also lose control on the data for
monitoring. Third, it is not an easy job to customize the tailor based service agreement for the
particular requirements of the business.
Document Page
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING 4
Important technologies
Following are delivery models followed in cloud computing: -
1. Private cloud is based on the concept where cloud services are actually provided
individually for a company and are also managed by company or third party.
2. Public cloud is based on services that are present for the public as well as owned by the
company that is selling the services like Amazon cloud services (Jansen, 2011).
3. Then there is community cloud where the cloud services are shared by many companies
to support particular community that has similar issues.
Implementation of technologies
From the point of view based on service delivery, there are three kinds of cloud services
offerings:
1. SaaS also called as software as a service. It provides rent based application from service
provider.
2. PaaS also called as platform as a service. It helps in providing a platform in the cloud that
helps the application in developing and execution.
3. IaaS also called as Infrastructure as a service where vendors provide computing based
power along with storage space.
Discussed aspects of cloud computing are the illusion which comes from infinite resources in
computing based on demand and also eliminate the need for the concept of cloud computing. The
decline or elimination is also based on commitment by cloud based users which helps the
organization to initiate small resources in hardware.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING 5
Research questions
1. What are the privacy concerns on cloud computing?
2. What are challenges or issues in cloud computing in terms of application of security?
3. What are the solutions to deal with security and privacy issues?
Summary of the issue discussed in research paper
Following is the detailed discussion of three research papers:
1. Security and privacy issues in cloud computing by Hairder Abbas, Olaf Maennel and
Said Assar: the report discusses the unique kind of issue that arranges a venue for the
sake of cloud researcher all across the world in order to share the state of art research
along with development that can help in gaining advantages for the cloud community.
This further helped in collecting good quality research that help in understanding the
recent development related to security and privacy based challenges in cloud computing
covering many discussions (Abbas et al, 2017).
2. Security and privacy issues in cloud computing by Lakshmi Narayan Tatwani: - the
concept of cloud based service which is also known as CSP usually take advantage of the
virtualization based technologies which is combined with many self service abilities. This
is done to reach the computing based resources with the help of Internet (Tatwani &
Tyagi, 2015). But the security and integrity of the computer and associated resources is
actually creating a lot of hesitation, especially when it comes to moving the workload in
business in public cloud.
3. Security and privacy issues in cloud computing: the concept of cloud computing based on
technology has gain advantages with extensive popularity worldwide and this can be
Document Page
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING 6
justified based on fact that many organizations related applications with extensive data as
well as services that are migrating based on cloud platforms. Business in the current time
is moving the information and applications based on the cloud and there is rise in issues
related to cloud security as well as privacy challenges (Awodele, et al).
Issues that were not addresses in research paper
There are number of security challenges and issues in cloud computing that can be familiar for
the companies through properly managing the current infrastructure and consist of traditional
models. Following is the detailed discussion: -
1. Internal attackers: these kinds of attacker are employed by cloud based service providers
or other third party or customers. This may have present authority based access for
number of cloud services along with customer data and it further depends on the
organizational part (Takabi et al, 2010).
2. External attackers: these attackers are not recruited by service providers, customers that
support the operations of cloud providers. These people have no control or authority or
access to cloud based services with varied applications.
Impact of discussed issue and its implementation in real world
Every part is based on capacity to investigate an attack rather than on the kind of threat which is
present via criminals or terrorism. Following is the detailed discussion:
1. Random: the common kind of attackers utilizes simple kind of techniques and tools. The
attackers should randomly check the Internet that is trying to find sensitive elements. For
Document Page
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING 7
this they will have to deploy all the popular tools that should be detected (Takabi et al,
2010).
2. Weak- there are number of semi skilled attackers that aim on particular servers with
cloud providers by tailoring the present publicity with current tools and target audiences.
Such methods are highly advanced as there is an effort to change the attacks by using
current tools.
3. Strong: there are many organized as well as properly financed skilled attackers with an
internal based hierarchy that are specializing in target applications with users of the
cloud.
4. Substantial: there are strong and highly motivated attackers that cannot be detected
easily by the companies they attack or even by the crucial enforcement of law and
evaluate organization specializing in cyber security (Walia, S). To minimize the threats
needs greater level of intelligence along with specialist resources.
Conclusion
The concept of cloud computing can be defined in the ICT industry that are based on different or
diverse contexts and with different concept associated with it. The foundation is based on the
concept of cloud computing which actually means presence of a server companies that can help
in hosting the services for the users that is associated by the network (Subashini & Kavitha,
2011). The technology is slowly moving in the direction since there is advancement in the
concept of computing with communication and network based technologies. There is also
presence of fast and trusted level of connection which is crucial for the presence of the cloud
computing. The concept of cloud computing is one of the popular and crucial technology areas
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING 8
since it is a part of the cost effectiveness and flexibility. But despite the surge in interest major
and persistent issues about cloud computing (Krutz & Vines, 2010).
Document Page
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING 9
Reference
Abbas, H., Maennel, O., & Assar, S. (2017). Security and privacy issues in cloud computing.
Awodele, O., Adebayo, A. O., & Tayo, O. O. Security and Privacy Issues in Cloud
Computing. Communications, 7, 14-17.
Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud
computing. In Computer Science and Electronics Engineering (ICCSEE), 2012
International Conference on (Vol. 1, pp. 647-651). IEEE.
Jansen, W. A. (2011, January). Cloud hooks: Security and privacy issues in cloud computing.
In System Sciences (HICSS), 2011 44th Hawaii International Conference on (pp. 1-10).
IEEE.
Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud
computing. Wiley Publishing.
Sen, J. (2013). Security and privacy issues in cloud computing. Architectures and Protocols for
Secure Information Technology Infrastructures, 1-45.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of
cloud computing. Journal of network and computer applications, 34(1), 1-11.
Takabi, H., Joshi, J.B. and Ahn, G.J. (2010). Security and privacy challenges in cloud computing
environments. IEEE Security & Privacy, 8(6), pp.24-31.
Document Page
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING 10
Tatwani, L. N., & Tyagi, K. R. (2015). Security and Privacy issues in Cloud
Computing. International Research Journal of Computer and Electronics Engineering
(IRJCEE, USA), ISSN.
Walia, S. Security and Privacy issues in Cloud Computing.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]