Sunday, December 8, 2019

Security Issues in Cloud Computing-Samples-Myassignmenthelp.com

Question: Discuss about the Security and privacy issues in Cloud Computing. Answer: Introduction The cloud computing is considered as an important model which focus on the demand network with the access to the shared pool and handling the configuration of the different computing resources. It includes the provisioning with the minimal management effort or the cloud provider interaction (Mathew, 2012). The cloud computing is mainly to handle the emerging information with the privacy concerns that are related to enhancement of the security measures. The zero investments in the IT infrastructure and then working over the security concerns is the major source that is formidable. Security and privacy issues in Cloud computing Challenges The challenges are related to the loss of control over data with the dependence on the cloud computing factors which include the privacy and the loss of the control over the data. The dependency is on the cloud computing provider where the issues are related to how the customers are aware of the danger of letting the data control out of their hands and then storing the data with the cloud computing provider (Abbas et al., 2017). The challenge is also for performing the data mining techniques with the analysis of the user data that is for the sensitive functions, storing and processing the sensitive data through the services of cloud computing. The mobile devices are set with the limited storage and handling the computing capabilities that can drive the services with the transferring from one to the other mobile device. The cloud computing could be accessed in the remote forms which includes the eaves dropping, DNS spoofing and the Denial of the service attacks. Problems The issues are related to the data deletion and the major concern is about handling the detection of the copies as it becomes difficult to handle the different data collections. The data protection and the privacy is also based on the reliability with secured communication (Sen, 2013). The cloud computing is based on the concerns elated to the provider availability and the approach where the services and the utilities are based on the difficulty to change and handle with respect to the functionality change, pricing and the liability. Relevant technologies The technologies related are the grid computing, virtualisation, VMWare and the utility computing that are important for handling the procurement and setting the easy storage of the charges, data transfer depending upon the access for the different requests (Ullah et al., 2014). The use of the network is defined with the behaviour of the operating systems for the users where the users can easily access the servers or the storage without any specific details the virtualisations layer tends to execute and work with the computing resources by easily accessing the appropriate resources. Applications of the technologies The applications are related right middleware with the computing systems that could easily lead to the execution of the different programs with processing software to handle the customisation of the computer systems. The cloud computing systems leads to the reduction of the advanced software on the client side with the processing that includes the monitoring and handling the enough power to process and handle the remote computer information (Wei et al., 2014). Through this, the corporations also rely on the computers to make sure of the different rights of the software to achieve the goals. The cloud computing systems for the corporations is mainly to work on the processing power for the different computer on the back ends with the speeding of the calculations. Clarification on vague areas The cloud computing is mainly to work on the IT resources, storage and handling the data centre space, with services and compliance. The organisation need to work on the safety measures and the polices that are by the provider and aligned depending upon the privacy and the security standards. Research questions Q1: What are some of the security factors which needs to be taken care of for the confidential issues? Q2: How the network security with the public cloud services include the denial of service attacks? Summarise the issues The issues are related to the lack of control over the data, issues with the network security, and the public cloud services over the internet. The cloud provider has the incidents like the sabotage of information, theft of any confidential information and the incidents that are sent across through the sensitive data to the wrong recipient (Hashizume et al., 2013). The EC2 cloud service and the security breach is the major issue for the cloud computing model where the customers lack the control over the data. Mathew, A. (2012). Security And Privacy Issues Of Cloud Computing; Solutions And Secure Framework.International Journal of Multidisciplinary Research,2(4). The issues are related to the cloud assisted systems with the leakage of information and the user classified data and the privacy issues as the data is stored and then transmitted over the cloud and the borders. There are patterns where the art research and the development also includes the service resizing for the DDoS mitigation in the cloud computing environment with the focus on evaluating the performance based on the affinity based victim service resizing technique. The issues are also related to the secured wireless networks with the security and the attacks on the cloud based environments. Abbas, H., Maennel, O., Assar, S. (2017). Security and privacy issues in cloud computing. Important issues not addressed in the paper Issue 1: Mathew, (2012), can focus on the risk mitigation measures which could be through COBIT 5 and handling the risk management through the contracts between the cloud computing between the customer and the provider. It will also enable the transparency with regards to the processing and storing the data. The services provided need to be handled with the regulation depending upon the needs of the customer with allowing the customers to be compliance with the regulation and the legislation (Xiao et al., 2013). The control is mainly over the risks to ensure the confidentiality, integrity and the authentication control. It is mainly to handle the obligatory standards with the services that are depending upon the organisational aspects like management, contracting and the legal enforcement. Issue 2: Abbas et al., (2017)., need to focus on the service oriented architecture with the focus on the in-house managed enterprise. The internal and external threats are set with the risks mitigation and risk acceptance. The threats are mainly against the information assets that reside in the cloud computing environment. The capability is to handle the security risks which are associated with the cloud and the major focus is on the emerging with the cloud security risks. The external tracker threats need to be handled with the attempt for the hardware attack, social engineering and the supply chain attacks by the dedicated attackers. The data leakage needs to be handled with the widespread of the data leakage among the potential competitor organisations. Impact of the above issues not discussed and application in real world Issue 1: The COBIT 5 needs to be handed at the different effective levels. This is important for handling the IT governance and risk mitigation is based on the deployment models (Kshetri, 2013). With this, the computation is based on the access controls with the incorporation into the framework and test on the SaaS hosted applications to make sure of the features that are functional and working. Issue 2: The security enhancement for the cloud computing is mainly to improve the security challenges with the employing and maintaining the secured infrastructure on the client side. The secured VPN, with the change in the default vendor providing passwords and the host side firewalls with the patch management. The security policies work on setting and planning the security factors, with the check of the employees, accessing the restrictions and setting to staff. The obligatory functions are set with the password change with the stipulated time. The data backup and the recovery is set and important for the patch updates and logs which can easily be carried out at different regular intervals (Hashem et al., 2015). The providers are completely equipped with he services that are removed from the cloud. Lesson learnt The cloud computing includes the scalability and the efficiency with the management of the IT resources in organisations (Suo et al., 2013). It works on the flexibility with the cloud that brings the change in the privacy and the security. The providers and the consumers tend to follow the IT resources, processing power, storage, data centre with service and compliance. The organisations are working on the cloud computing with the consideration based on data sensitivity to plan beyond the firewall. The organisation focus on the safety measures and the policies that is followed by the provider with the alignment to the privacy and the security requirements. Conclusion The cloud computing encompasses the client and the server where the security of the data management business strengthens the client side. The physical and the logical safety is based on maintaining the secured client, where the clients need to consider the secured VPN to connect to the providers. The cloud providers tend to work with the API with the controlled, monitoring and setting the cloud services. It is important to focus on the API with the protection against any of the accidental and the malicious attempts (Almorsy et al., 2016). There are different plugins and the applications related t the automatic updates which tend to append the security concerns. The standards are set with the data use,maipulationand the modification of the data which has been stored in the cloud for the customers. References Abbas, H., Maennel, O., Assar, S. (2017). Security and privacy issues in cloud computing. Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud computing: Review and open research issues.Information Systems,47, 98-115. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution.Telecommunications Policy,37(4), 372-386. Mathew, A. (2012). Security And Privacy Issues Of Cloud Computing; Solutions And Secure Framework.International Journal of Multidisciplinary Research,2(4). Sen, J. (2013). Security and privacy issues in cloud computing.Architectures and Protocols for Secure Information Technology Infrastructures, 1-45. Suo, H., Liu, Z., Wan, J., Zhou, K. (2013, July). Security and privacy in mobile cloud computing. InWireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International(pp. 655-659). IEEE. Ullah, K., Khan, M. N. A. (2014). Security and Privacy Issues in Cloud Computing Environment: A Survey Paper.International Journal of Grid and Distributed Computing,7(2), 89-98. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Xiao, Z., Xiao, Y. (2013). Security and privacy in cloud computing.IEEE Communications Surveys Tutorials,15(2), 843-859

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.