country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Cloud Computing Security Issues And Solutions

tag 0 Download12 Pages / 2,864 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the Cloud Computing Security issues and solutions.
 
 

Answer:

Introduction

Cloud Computing is defined as an on-demand service model, which is used for IT provisioning, that is mainly dependent on virtualization as well as on distributed technologies of the computer (Arora et al. 2013). The architecture of cloud computing includes high abstracted resources, programmatic management, shared resources and near instant flexibility as well as scalability. Cloud computing is utilized by the various business organization for maintaining focus on the business, for achieving agility, for reducing total capital expenditures as well as for getting proper staffing efficiency.

Problem Statement

 The business organization faces many challenges due to the use of cloud computing. The problem that the business organizations are facing due to the use of cloud computing is the security issue which mainly occurs due to improper data protection, malicious insider, insecure or incomplete data deletion, improper interface management and due to loss of governance. It is quite important for the business organization to resolve the issues for achieving success.

Motivation of the work

The main aim of this assignment is to introduce the various risk of cloud computing in context with a business organization. The risks are highlighted in order to resolve the issues which are associated with the cloud computing. The analysis helps in identifying different types of security issues, which needs to be resolved effectively for achieving the objectives as well as goals of the organization.

Importance of work

Cloud computing is adopted by most of the organization nowadays due to its numerous advantages. The most significant advantage that the business organization achieves by using cloud computing is cost saving (Whaiduzzaman et al. 2014).  Cloud computing also helps in enhancing the flexibility as well as scalability of the organization.  It also assists in bringing proper collaboration in the business environment for communicating as well as sharing data and information.

 

Related Work: Summary of existing solutions

 There are a number of solutions that are illustrated in order to resolve the issues, which are associated with the organization. It is quite important to identify various data as well as processing operations, which will be passed to Cloud. For each type of processing, the customer should establish the type of data by differentiating them based on personal data, sensitive data, strategic data as well as data, which is utilized for various business applications (Garg,  Versteeg and Buyya 2013). The organization must define all their legal as well as technical requirements. The requirements should contain various legal constraints, practical constraints as well as technical constraints. It is very much important to have proper risk analysis for identifying different measures, which are important for the organization (Wei et al. 2014). It is also important to identify the various type of cloud for achieving planned processing.

Drawbacks of the solutions

The illustrated solution does not help in resolving all the issues effectively. The solutions have some drawbacks, which include:

Security and Privacy: The solutions provided are not enough for resolving the issues effectively. Security, as well as a privacy issue, remains in the business organization that works with cloud computing (Hashem et al. 2015). This is mainly due to the fact a remote cloud infrastructure helps in outsourcing everything it has.

Vulnerability to attack: In cloud computing, each of the elements can be accessed from the internet and as a result, nothing that is connected with the internet is safe (Rittinghouse and Ransome 2016). The solutions provided are also not effective in resolving the vulnerable attacks, which are associated with the business organization in context with, cloud computing.

Limited control and flexibility: It is identified that there is limited control over the different functions as well as the execution of hosting infrastructures inside cloud infrastructures. Cloud provider, as well as various management policies, might be helpful in imposing deployments of the customers (Whaiduzzaman et al. 2014). The solutions are not proper for resolving the issue, which is related to the flexibility of the business organization.

New Solution

As discussed in the literature review, security, control, and vulnerability are the main concerns of cloud computing and also there is no proper solution for it. So according to my opinion following are some steps that should be followed to solve these issues:

Security models:(Al-Anzi, Yadav & Soni (2014)).Because of the dynamic nature of Cloud computing, its Security requirement varies continuously from its traditional environment and ownership by the customer.

Security Policies: It includes risk management, security governance as well as compliance. The initial responsibility of any organization is to identify its control structure so that needed security steps can be taken.

People and identity management: It includes right of access to data only by authorized member i.e. no access to data should be granted to any unauthorized user or member.

Application security: It includes XML encryption as it is very necessary to protect the data from XML attacks.

Information Security: I.S is one of the major concerns of cloud computing, therefore proper detection and security systems must be developed so as to secure the information from any external source.

Physical infrastructure: It includes biometric security and computer access control system which is also known as CAS.

 

Auditing

Auditing means to ensure the integrity of outsourced data and also to save customer’s time and burden of online processing. In 2014, Rewadkar and Hatage develop a third party application for auditing known as TPA. This application will automatically check the correctness and integrity of the outsourced data whenever it receives a verification request from the customer.

Policies

Policies refer to the set of rules that are to be followed across the organization to ensure its security targets. The main thing that should be taken care while creating a policy is that the service provider must be aware of the policy. Organization’s managing team can also take the help of cloud service provider in deciding the security policies as CSP already known the policies of various other customers so he can guide the managers or policy makers to make the effective decisions. But it will be wiser if the management or customers make their own policies by themselves only as per their needs.

See Cloud

It is an identity-based security protocol. This protocol works according to the following steps:

 First of all, SIO (System initialization Operator) generate some system parameters. After the parameters are generated successful, SIO chooses two random parameters, one for the master key and other for the public key. The user connected to the cloud needs to register himself as authorized user by providing unique identification details.

  • After the user has registered successfully, he needs to send a request to the service provider to get the necessary storage for storing the data and then the CSP allocates the storage. It also ensure the auditing process as user needs to sign every storage or transmission block in order to be an authorized user.
  • After the completion of these steps, CSP verifies the results so as to confirm the

successful transmission of data.

See cloud also offered a feature to allow an organization be set as “trusted”. Once the organization is set as trusted the data transmission process will be processed automatically.

RAID

Raid is the process of encryption that divides the data into different small blocks. These small blocks are then given to various service providers. Raid stands for Redundant Array of Independent Disks. Its main advantage is that it increases the availability, redundancy and fault tolerance of the data. An example of Raid system is if data ‘B’ has to be stored on the cloud then, first of all, it will be encrypted and splits onto small block named ‘B1’, ‘B2’, ‘B3’, and so on. After this division, these blocks are given to service providers for storage.

 

Biometrics

It is one of the biggest reasons for the success on the client side. If in case a client’s server is hacked, the whole data is in very critical situation. So Biometrics is the must applied technology for the data security as it will provide access to only the authorized users by using electric system behavior.

Self-destruction

The main motive of applying the concept of self-destruction of data is to give control of the data to the user even if the user is not controlling the server where the data is stored. It will also help in controlling the loss of highly sensitive data. This solution is very helpful in case of temporary sensitive data (Xiong et al., 2014).

Evaluation and Comparison

It is clear that we have discussed a lot about the CC’s security concerns and also their solutions. But the question that arises is “whether the new solution is better than the current ones?” In order to answer this evaluation of the solution among the current solution is required. This part includes the evaluation of the new solution and also it’s comparison with the current solution. As we have discussed the steps of the new solution that must be followed to resolve the concerns regarding cloud computing. Following are the advantages or benefits of the new solution.

Advantages of new solution:

  • Better security: As in the literature review part, we have studied that the access control, privacy and security are the three major concerns of the cloud computing. In view of this, the new solution has been generated, which resolve all these mentioned issue.
  • Improved methods: It contains new improved algorithms and techniques as compared to the old solution.
  • Better control: As the new solution provides features of auditing and self-destruction of data, it gives most of the control of the data to the user. User can easily self-destruct the sensitive information which results in better security.
  • Practical solutions: Current solutions only contains theoretical solutions while the new solution deals with all the practical solutions which include auditing applications, Biometric securities etc.
  • Easy to implement: The new solution is very easy to implement. Nowadays most of the organizations are using the Biometric security for their staff attendance. So it will be easy for them to use the same for the cloud security.
  • Flexibility: The new solution is very flexible in nature. It provides the flexibility for avoiding the server crashes in case of high traffic because of large no. of users by scaling up the cloud solution. But in case of high scalability, cost factor increases so for this, it provides the feature of scaling back down when the traffic is lowered so as to reduce the cost.
  • High availability: The applications that are used in the new solution comes with built-in redundancies so as to ensure that they are available for the users all the time. Moreover the solution includes live monitoring which leads to the better support by the service providers.
  • Reliable: As the new solution involves the use of trusted third party applications, so the users can easily rely on these applications for the security of their data. It means that the users can use the cloud computing promptly and in a very efficient manner.
  • Easy backup and recovery: It contains various steps for the easy backup of the user’s data.
  • Real time security: As the data before stored into the cloud is encrypted first, it will lead to better security of data which results in minimizing the risk to the important data or assets.
  • Manageability: As the users have control over their data so they can easily manage and change their data as per their requirements.
  • Universally applicable: It means that the new solution can be applied to any of the cloud models. There is no need to adopt different security solutions for different deployment models.
 


Following are the comparisons between the new and the old solutions.

New Solution

Old solutions

·         This can be applied to all cloud deployment models.

·         It contains the different solution for different deployment models.

·         Greater security

·         Less security

·         The only limitation is high cost.

·         Cheaper as compared to the new solution.

·         Very less drawbacks

·         Security, privacy and vulnerability issues are still not resolved.

·         The user has total control over the data.

·         Very less control.

·         Easy implement.

·         Hard to implement

·         More reliable

·         Less reliable

·         Practical solutions

·         Theoretical solutions.

·         Highly flexible

·         Less flexible

It is clear that if we compare new solution with the old solutions, the new solution is far better than the current ones. But as we know nothing comes with full perfection. So there are some drawbacks for the new solution that are as follows:

Drawbacks of New Solution:

Cost: Cost is a major drawback of the new solution as it is not possible for every user to invest in expensive security systems..

Hardware and software integrity issues: If we analyze the solution properly, it seems that the solution focuses only on the security and privacy concern. But if we talk about integrity, it only deals with data integrity whereas there are various other sub areas of integrity which do not exist in the solution. These sub-areas are Software integrity and hardware integrity. These issues should be deeply searched.

Vendor Lock-in: It is very difficult for the organizations to migrate their services from one vendor to other. Although the new solution provide flexibility and integrity of the data but the feature of switching cloud servers is still not evolved.

Limited control over infrastructure: Customers can only have control over the applications and the services given by the server, but the entire infrastructure is only under the control of the service provider. So the users are unable to perform key administrative tasks.

Virtualization: There is no relevant research for the problem of virtualization in the new solution. It includes cyber-attacks, data isolation and leakage of data.

Short term Solution: As we know that cloud computing is changing very rapidly. So the new purposed solution is not efficient to use for a long term. Further new solutions must be adopted as per the change in Cloud computing.

Conclusion

This report includes the deep research of the cloud computing. Its motive is to find the biggest security concerns and the relevant solutions to resolve these concerns. I have gone through 52 cloud computing articles and selected 26 which were seemed relevant to search the major issues and their required solutions. But as cloud computing is a very vast concept so there are still various issued to be resolved

 

References

Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), pp.1922-1926.

Garg, S.K., Versteeg, S. and Buyya, R., 2013. A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), pp.1012-1023.

Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, pp.98-115

Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC pres

Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-386.

Whaiduzzaman, M., Sookhak, M., Gani, A. and Buyya, R., 2014. A survey on vehicular cloud computing. Journal of Network and Computer Applications, 40 (pp.325-344).

Behl, A., & Behl, K. (2012). An analysis of cloud computing security issues. In 2012 World Congress on Information and Communication Technologies (WICT) (pp. 109–114).

Al-Anzi, F. S., Salman, A. A., Jacob, N. K., & Soni, J. (2014). Towards robust, scalable and secure network storage in Cloud Computing. In 2014 Fourth International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP) (pp. 51–55).

Al-Anzi, F. S., Yadav, S. K., & Soni, J. (2014). Cloud computing: Security model comprising governance, risk management and compliance. In 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC) (pp. 1–6).

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Cloud Computing Security Issues And Solutions. Retrieved from https://myassignmenthelp.com/free-samples/cloud-computing-security-issues-and-solutions.

"Cloud Computing Security Issues And Solutions." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/cloud-computing-security-issues-and-solutions.

My Assignment Help (2018) Cloud Computing Security Issues And Solutions [Online]. Available from: https://myassignmenthelp.com/free-samples/cloud-computing-security-issues-and-solutions
[Accessed 05 July 2020].

My Assignment Help. 'Cloud Computing Security Issues And Solutions' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/cloud-computing-security-issues-and-solutions> accessed 05 July 2020.

My Assignment Help. Cloud Computing Security Issues And Solutions [Internet]. My Assignment Help. 2018 [cited 05 July 2020]. Available from: https://myassignmenthelp.com/free-samples/cloud-computing-security-issues-and-solutions.


MyAssignmenthelp.com has appointed best assignment experts who are wizards of words. Our writers know every trick of crafting high quality write-ups within a short period. With years of experiences, we have become one of the most prolific assignment help services in the USA. We deliver custom-made help to students with writing different types of assignments. We guarantee total need-based and timely service, and this is why increasing numbers of students prefer to buy assignment online.

Latest It Write Up Samples

ITECH7401 Leadership In IT Project Management

Download : 0 | Pages : 3
  • Course Code: ITECH7401
  • University: Federation University
  • Country: Australia

Answer: Budget Estimate and Financial Analysis The Return on Investment (ROI) is 125.10%, which is higher than the required ROI of twenty-five per cent. Thus, the report concludes that this project will be beneficial Port Fairy Caravan and Camping Park Pty Ltd. Year 0 1 2 3 Total Inflows (Income) 0 90000 130000 150000 370000 Outflows (Expenses) -90000 -2000...

Read More arrow Tags: Australia Riverwood 7 Leadership in IT Project Management Federation University 

MAN6910 Business Process Management

Download : 0 | Pages : 5
  • Course Code: MAN6910
  • University: Edith Cowan University
  • Country: Australia

Answer: Issue register Name of issue Patient waiting too long to register Priority 2 Description When the patients visits the hospital, the new patients are required to be registered first for gaining the treatment in the hospital. Data and assumption Over 20% of the patients who are visiting the hospital are raising the issue of extensive waiting time and longer duration for which treatmen...

Read More arrow Tags: Australia Ashgrove 7 business process management Edith Cowan University 

ITC563 IT Management Issues

Download : 0 | Pages : 10
  • Course Code: ITC563
  • University: Charles Sturt University
  • Country: Australia

Answer: Introduction: In the current aspect the Globex Corporation is a big organization in Australia which has been formed due to the merging of two large regional business which are B T & Sons Farming Equipment and Riverina Precision Farming. Currently, the Globex Corporation is located in three different locations, which are the Albury, Wagga Wagga and Griffith. The Globex Corporation currently handles two types of businesses which are...

Read More arrow Tags: Australia 7 it management issues Charles Sturt University 

ENS2108 Mechanical Science

Download : 0 | Pages : 2
  • Course Code: ENS2108
  • University: Edith Cowan University
  • Country: Australia

Answer: Internet Invention to be commercialized for bringing to the Market Internet is considered as one of the biggest boons of technology and it provides knowledge of technological advancements to its users.  Internet is responsible for providing the most advanced and updated technological products and services to their users. This invention can be commercialized for bringing it to the market by inclusion of different products. One ...

Read More arrow Tags: Australia 7 Mechanical Science Edith Cowan University 

C000105 Bachelor Of Information Technology

Download : 0 | Pages : 12
  • Course Code: C000105
  • University: Macquarie University
  • Country: Australia

Answer: Dark Net The term Dark Net refers to the computing network that uses a unique customized interaction protocol in order to manage the confidentiality of sensitive data. The key concept of Dark Net is to deliver a secure communication network to the companies so that the communication gaps and security problems can be managed. In this era, the rate of cyber-crime is growing quickly and most of the communities worldwide are suffering fro...

Read More arrow Tags: Australia Sydney 7 Bachelor of Information Technology Macquarie University 
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,355,831

Orders

4.9/5

Overall Rating

5,080

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

752 Order Completed

100% Response Time

Hugh Cleave

Masters in Human Resource Management (MMgt, HRM)

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

203 Order Completed

97% Response Time

Richard Alpert

PhD in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

2594 Order Completed

95% Response Time

Michael Johnson

Masters of MSc in Economics

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1758 Order Completed

99% Response Time

William Martinez

MS in Biology

Washington, United States

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Quick turn-around. Easy to understand. All requirements covered. I will be using MAH again!

flag

User Id: 383727 - 04 Jul 2020

Australia

student rating student rating student rating student rating student rating

Fast rectification and minor grammar editing needed. Thank you for the help again I knew I could count on you guys. The report was delivered wayyyy before deadline and I\'m so pleased with the work. I only have to submit it on the 29 so I have more t...

flag

User Id: 310628 - 04 Jul 2020

Australia

student rating student rating student rating student rating student rating

I received a high quality summary of a long document containing many interviews I conducted. The expert has succeeded in capturing the ideas in the interviews in a concise summary.

flag

User Id: 400556 - 04 Jul 2020

Australia

student rating student rating student rating student rating student rating

The essay is well-written and it answered the question fully. Not much editing has to be done after receiving the solution.

flag

User Id: 228634 - 04 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?