Tuesday, May 5, 2020

Cloud Security

Question: Discuss about the cloud computing and security issues in the cloud. Answer: Background of the Study Security within the cloud computing is a critical issue because the strategies used to provide services are not fitting to the users themselves. The users are not able to compromise with their services, therefore the service providers of cloud computing must ensure that the personal information of the customers is safe. Some of the organizations are focusing on the security issues (Catlett, 2013). The Cloud Security Alliance is a non-profit organization, which is formed to support the best security practices to give assurance of security to the organization. The Risk Assessment is important to identify the risks associated with the services in the context of business. Cloud Computing consists of applications, platforms and the infrastructure segments. The network, which is interconnected with the system in the cloud, has to be secured, and it maps the virtual machines to the physical machines to carry out securely (Kaur, 2015). The cloud security of data involves encryption the data as well as ensuring that appropriate policies are implemented to share the data. Aims and Objectives Aims of the Study The aim of this study is to emphasize the major security issues in cloud computing that are contentious and delay in adoption. It carries out research to investigate the mechanisms of security that are enforced by the provider of the cloud. It also uses a prospective cloud service to analyze the data security risk before putting the confidential data into the cloud computing. This paper identifies the appropriate security techniques used to overcome with the security issues in cloud computing. Objectives of the Study The objectives are: To categorize the security problems as well as methods used in the existing cloud computing To categorize the security challenges, those are probable in the future of cloud computing To propose countermeasures for the upcoming challenges Review of the Study Cloud Computing Security Issues Cloud computing is a business concept from the last few years as it is growing vastly within the IT industry. Kaur et al., (2015) opined that the data of the customers are more secured when it is managed internally. However, Liu et al., (2015) argued that the providers of cloud have a well-built incentive to control trust as well as employ a superior level of security. Cloud computing makes use of the virtual computing technology, in which the personal data of the user are scattered in the dissimilar virtual data center rather than it stays in the similar physical location. According to Fernandes et al., (2014), the users can leak the hidden information when they are accessing the services of cloud computing. Hackers can examine the significant task based on the task of computing presented by the users. In the future, some proposed guidelines are offered to overcome with future challenges such as physical security, data loss, and malicious insiders in cloud security. Solutions for Security Issues in Cloud Computing The following approaches are used to secure the cloud computing: Network Security: By using the IP Spoofing, the user can deny access to the internet based service. It is solved using the technique of Digital Signature (Kim, 2012). Secure Socket Layer (SSL) is used to control the security over the transmission of a message over the internet. It avoids the hacking of resources and data. Encryption Algorithm: The providers of cloud security should encrypt the information of the user using strong encryption algorithm (Ahmed Hossain, 2014). If there is any failure in encryption, then it makes the data unusable, and it complicates the availability of the data. Backup of data information: Natural disaster damages the physical devices that cause the loss of data (Liu et al., 2015). In order to avoid the security breaches issues in cloud computing, the users should require backup their information, which is the key assurance of the service, which is offered by the vendor. References Ahmed, M., Hossain, M. A. (2014). Cloud computing and security issues in the cloud.International Journal of Network Security Its Applications,6(1), 25. Catlett, C. (2013).Cloud computing and big data. Amsterdam: IOS Press. Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., Incio, P. R. (2014). Security issues in cloud environments: a survey.International Journal of Information Security,13(2), 113-170. Kaur, J., Garg, S., Principal, R. I. M. T., Gobindgarh, M. (2015). SURVEY PAPER ON SECURITY IN CLOUD COMPUTING. Kim, T. (2012).Computer applications for security, control and system engineering. Berlin: Springer. Liu, Y., Sun, Y. L., Ryoo, J., Rizvi, S., Vasilakos, A. V. (2015). A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions.Journal of Computing Science and Engineering,9(3), 119-133.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.