Research Report: Security Threats in Cloud Computing & Methods

Verified

Added on  2023/06/13

|3
|553
|330
Report
AI Summary
This report examines the security threats prevalent in cloud computing, a technology that has gained significant traction in recent years. It highlights the various security issues that have emerged due to the extensive use of cloud computing, including data breaches, account hijacking, insider threats, malware injection, abuse of cloud services, insecure APIs, denial-of-service attacks, shared vulnerabilities, and data loss. The report emphasizes the importance of understanding these threats to mitigate risks effectively. It references research articles that delve into the opportunities and challenges of security in cloud computing, cloud adoption frameworks, and the rise of big data on cloud platforms. The selection of this research area is motivated by the potential benefits of cloud computing for businesses, such as cost reduction, automation, and enhanced mobility.
Document Page
Running head: INFORMATION SECURITY
SECURITY THREATS IN CLOUD COMPUTING AND PREVENTIVE METHODS
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SECURITY
Abstract
Cloud Computing is new kind of technology which has gathered more attention in last few years.
Due to extensive use of cloud computing various security issues in cloud has come into picture.
Cloud computing is a new kind of method for delivery of information and services by making
use of existing technology (Rittinghouse & Ransome, 2016). It makes use of internet for
establishment of communication between client and server side application. Cloud service
provider (CSP) generally provides a platform which can be used for customer for creating and
using of web services. It can be compared much similar like internet service provider for
accessing internet. CSPs and ISP both offer various kinds of services related to internet. Cloud
provides a proper layer of abstraction between resources and level of architecture (Ali, Khan &
Vasilakos, 2015). IaaS generally offer their customer some of the unlimited services like
computing, network and capacity of storage.
There are many kind of security issues in cloud computing like data breach, hijacking of
accounts, threats from inside, injection of malware, abuse use of cloud services, insecure kind of
API, Denial of Service of Attacks, shared vulnerabilities and lastly loss of data (Hashem et al.
2015). There are large number of ways for compromising of data like deletion or alternation of
various kinds of records without backup of original content. Threat to malicious insider is
considered to be a well-known to large number of organization. This threat is generally amplified
for consumers of cloud service by convergence of IT services and customers under the single
domain. Hijacking of account or service is not a new thing (Chang, Kuo & Ramachandran,
2016). If an attackers gain access to credentials of an individual, then it can easily manipulate
data, keep track of various transaction. This area has been selected for research because cloud
Document Page
2INFORMATION SECURITY
computing can bring a lot of advantages to business like reduction of cost, automation and
provides mobility.
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and
challenges. Information sciences, 305, 357-383.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management,
and security. CRC press.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]