$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Cloud Computing Security Issues And Solutions

tag 0 Download12 Pages 2,864 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


Discuss about the Cloud Computing Security issues and solutions.



Cloud Computing is defined as an on-demand service model, which is used for IT provisioning, that is mainly dependent on virtualization as well as on distributed technologies of the computer (Arora et al. 2013). The architecture of cloud computing includes high abstracted resources, programmatic management, shared resources and near instant flexibility as well as scalability. Cloud computing is utilized by the various business organization for maintaining focus on the business, for achieving agility, for reducing total capital expenditures as well as for getting proper staffing efficiency.

Problem Statement

 The business organization faces many challenges due to the use of cloud computing. The problem that the business organizations are facing due to the use of cloud computing is the security issue which mainly occurs due to improper data protection, malicious insider, insecure or incomplete data deletion, improper interface management and due to loss of governance. It is quite important for the business organization to resolve the issues for achieving success.

Motivation of the work

The main aim of this assignment is to introduce the various risk of cloud computing in context with a business organization. The risks are highlighted in order to resolve the issues which are associated with the cloud computing. The analysis helps in identifying different types of security issues, which needs to be resolved effectively for achieving the objectives as well as goals of the organization.

Importance of work

Cloud computing is adopted by most of the organization nowadays due to its numerous advantages. The most significant advantage that the business organization achieves by using cloud computing is cost saving (Whaiduzzaman et al. 2014).  Cloud computing also helps in enhancing the flexibility as well as scalability of the organization.  It also assists in bringing proper collaboration in the business environment for communicating as well as sharing data and information.


Related Work: Summary of existing solutions

 There are a number of solutions that are illustrated in order to resolve the issues, which are associated with the organization. It is quite important to identify various data as well as processing operations, which will be passed to Cloud. For each type of processing, the customer should establish the type of data by differentiating them based on personal data, sensitive data, strategic data as well as data, which is utilized for various business applications (Garg,  Versteeg and Buyya 2013). The organization must define all their legal as well as technical requirements. The requirements should contain various legal constraints, practical constraints as well as technical constraints. It is very much important to have proper risk analysis for identifying different measures, which are important for the organization (Wei et al. 2014). It is also important to identify the various type of cloud for achieving planned processing.

Drawbacks of the solutions

The illustrated solution does not help in resolving all the issues effectively. The solutions have some drawbacks, which include:

Security and Privacy: The solutions provided are not enough for resolving the issues effectively. Security, as well as a privacy issue, remains in the business organization that works with cloud computing (Hashem et al. 2015). This is mainly due to the fact a remote cloud infrastructure helps in outsourcing everything it has.

Vulnerability to attack: In cloud computing, each of the elements can be accessed from the internet and as a result, nothing that is connected with the internet is safe (Rittinghouse and Ransome 2016). The solutions provided are also not effective in resolving the vulnerable attacks, which are associated with the business organization in context with, cloud computing.

Limited control and flexibility: It is identified that there is limited control over the different functions as well as the execution of hosting infrastructures inside cloud infrastructures. Cloud provider, as well as various management policies, might be helpful in imposing deployments of the customers (Whaiduzzaman et al. 2014). The solutions are not proper for resolving the issue, which is related to the flexibility of the business organization.

New Solution

As discussed in the literature review, security, control, and vulnerability are the main concerns of cloud computing and also there is no proper solution for it. So according to my opinion following are some steps that should be followed to solve these issues:

Security models:(Al-Anzi, Yadav & Soni (2014)).Because of the dynamic nature of Cloud computing, its Security requirement varies continuously from its traditional environment and ownership by the customer.

Security Policies: It includes risk management, security governance as well as compliance. The initial responsibility of any organization is to identify its control structure so that needed security steps can be taken.

People and identity management: It includes right of access to data only by authorized member i.e. no access to data should be granted to any unauthorized user or member.

Application security: It includes XML encryption as it is very necessary to protect the data from XML attacks.

Information Security: I.S is one of the major concerns of cloud computing, therefore proper detection and security systems must be developed so as to secure the information from any external source.

Physical infrastructure: It includes biometric security and computer access control system which is also known as CAS.



Auditing means to ensure the integrity of outsourced data and also to save customer’s time and burden of online processing. In 2014, Rewadkar and Hatage develop a third party application for auditing known as TPA. This application will automatically check the correctness and integrity of the outsourced data whenever it receives a verification request from the customer.


Policies refer to the set of rules that are to be followed across the organization to ensure its security targets. The main thing that should be taken care while creating a policy is that the service provider must be aware of the policy. Organization’s managing team can also take the help of cloud service provider in deciding the security policies as CSP already known the policies of various other customers so he can guide the managers or policy makers to make the effective decisions. But it will be wiser if the management or customers make their own policies by themselves only as per their needs.

See Cloud

It is an identity-based security protocol. This protocol works according to the following steps:

 First of all, SIO (System initialization Operator) generate some system parameters. After the parameters are generated successful, SIO chooses two random parameters, one for the master key and other for the public key. The user connected to the cloud needs to register himself as authorized user by providing unique identification details.

  • After the user has registered successfully, he needs to send a request to the service provider to get the necessary storage for storing the data and then the CSP allocates the storage. It also ensure the auditing process as user needs to sign every storage or transmission block in order to be an authorized user.
  • After the completion of these steps, CSP verifies the results so as to confirm the

successful transmission of data.

See cloud also offered a feature to allow an organization be set as “trusted”. Once the organization is set as trusted the data transmission process will be processed automatically.


Raid is the process of encryption that divides the data into different small blocks. These small blocks are then given to various service providers. Raid stands for Redundant Array of Independent Disks. Its main advantage is that it increases the availability, redundancy and fault tolerance of the data. An example of Raid system is if data ‘B’ has to be stored on the cloud then, first of all, it will be encrypted and splits onto small block named ‘B1’, ‘B2’, ‘B3’, and so on. After this division, these blocks are given to service providers for storage.



It is one of the biggest reasons for the success on the client side. If in case a client’s server is hacked, the whole data is in very critical situation. So Biometrics is the must applied technology for the data security as it will provide access to only the authorized users by using electric system behavior.


The main motive of applying the concept of self-destruction of data is to give control of the data to the user even if the user is not controlling the server where the data is stored. It will also help in controlling the loss of highly sensitive data. This solution is very helpful in case of temporary sensitive data (Xiong et al., 2014).

Evaluation and Comparison

It is clear that we have discussed a lot about the CC’s security concerns and also their solutions. But the question that arises is “whether the new solution is better than the current ones?” In order to answer this evaluation of the solution among the current solution is required. This part includes the evaluation of the new solution and also it’s comparison with the current solution. As we have discussed the steps of the new solution that must be followed to resolve the concerns regarding cloud computing. Following are the advantages or benefits of the new solution.

Advantages of new solution:

  • Better security: As in the literature review part, we have studied that the access control, privacy and security are the three major concerns of the cloud computing. In view of this, the new solution has been generated, which resolve all these mentioned issue.
  • Improved methods: It contains new improved algorithms and techniques as compared to the old solution.
  • Better control: As the new solution provides features of auditing and self-destruction of data, it gives most of the control of the data to the user. User can easily self-destruct the sensitive information which results in better security.
  • Practical solutions: Current solutions only contains theoretical solutions while the new solution deals with all the practical solutions which include auditing applications, Biometric securities etc.
  • Easy to implement: The new solution is very easy to implement. Nowadays most of the organizations are using the Biometric security for their staff attendance. So it will be easy for them to use the same for the cloud security.
  • Flexibility: The new solution is very flexible in nature. It provides the flexibility for avoiding the server crashes in case of high traffic because of large no. of users by scaling up the cloud solution. But in case of high scalability, cost factor increases so for this, it provides the feature of scaling back down when the traffic is lowered so as to reduce the cost.
  • High availability: The applications that are used in the new solution comes with built-in redundancies so as to ensure that they are available for the users all the time. Moreover the solution includes live monitoring which leads to the better support by the service providers.
  • Reliable: As the new solution involves the use of trusted third party applications, so the users can easily rely on these applications for the security of their data. It means that the users can use the cloud computing promptly and in a very efficient manner.
  • Easy backup and recovery: It contains various steps for the easy backup of the user’s data.
  • Real time security: As the data before stored into the cloud is encrypted first, it will lead to better security of data which results in minimizing the risk to the important data or assets.
  • Manageability: As the users have control over their data so they can easily manage and change their data as per their requirements.
  • Universally applicable: It means that the new solution can be applied to any of the cloud models. There is no need to adopt different security solutions for different deployment models.

Following are the comparisons between the new and the old solutions.

New Solution

Old solutions

·         This can be applied to all cloud deployment models.

·         It contains the different solution for different deployment models.

·         Greater security

·         Less security

·         The only limitation is high cost.

·         Cheaper as compared to the new solution.

·         Very less drawbacks

·         Security, privacy and vulnerability issues are still not resolved.

·         The user has total control over the data.

·         Very less control.

·         Easy implement.

·         Hard to implement

·         More reliable

·         Less reliable

·         Practical solutions

·         Theoretical solutions.

·         Highly flexible

·         Less flexible

It is clear that if we compare new solution with the old solutions, the new solution is far better than the current ones. But as we know nothing comes with full perfection. So there are some drawbacks for the new solution that are as follows:

Drawbacks of New Solution:

Cost: Cost is a major drawback of the new solution as it is not possible for every user to invest in expensive security systems..

Hardware and software integrity issues: If we analyze the solution properly, it seems that the solution focuses only on the security and privacy concern. But if we talk about integrity, it only deals with data integrity whereas there are various other sub areas of integrity which do not exist in the solution. These sub-areas are Software integrity and hardware integrity. These issues should be deeply searched.

Vendor Lock-in: It is very difficult for the organizations to migrate their services from one vendor to other. Although the new solution provide flexibility and integrity of the data but the feature of switching cloud servers is still not evolved.

Limited control over infrastructure: Customers can only have control over the applications and the services given by the server, but the entire infrastructure is only under the control of the service provider. So the users are unable to perform key administrative tasks.

Virtualization: There is no relevant research for the problem of virtualization in the new solution. It includes cyber-attacks, data isolation and leakage of data.

Short term Solution: As we know that cloud computing is changing very rapidly. So the new purposed solution is not efficient to use for a long term. Further new solutions must be adopted as per the change in Cloud computing.


This report includes the deep research of the cloud computing. Its motive is to find the biggest security concerns and the relevant solutions to resolve these concerns. I have gone through 52 cloud computing articles and selected 26 which were seemed relevant to search the major issues and their required solutions. But as cloud computing is a very vast concept so there are still various issued to be resolved



Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), pp.1922-1926.

Garg, S.K., Versteeg, S. and Buyya, R., 2013. A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), pp.1012-1023.

Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, pp.98-115

Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC pres

Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-386.

Whaiduzzaman, M., Sookhak, M., Gani, A. and Buyya, R., 2014. A survey on vehicular cloud computing. Journal of Network and Computer Applications, 40 (pp.325-344).

Behl, A., & Behl, K. (2012). An analysis of cloud computing security issues. In 2012 World Congress on Information and Communication Technologies (WICT) (pp. 109–114).

Al-Anzi, F. S., Salman, A. A., Jacob, N. K., & Soni, J. (2014). Towards robust, scalable and secure network storage in Cloud Computing. In 2014 Fourth International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP) (pp. 51–55).

Al-Anzi, F. S., Yadav, S. K., & Soni, J. (2014). Cloud computing: Security model comprising governance, risk management and compliance. In 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC) (pp. 1–6).


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Cloud Computing Security Issues And Solutions. Retrieved from

"Cloud Computing Security Issues And Solutions." My Assignment Help, 2018,

My Assignment Help (2018) Cloud Computing Security Issues And Solutions [Online]. Available from:
[Accessed 01 April 2020].

My Assignment Help. 'Cloud Computing Security Issues And Solutions' (My Assignment Help, 2018) <> accessed 01 April 2020.

My Assignment Help. Cloud Computing Security Issues And Solutions [Internet]. My Assignment Help. 2018 [cited 01 April 2020]. Available from: has appointed best assignment experts who are wizards of words. Our writers know every trick of crafting high quality write-ups within a short period. With years of experiences, we have become one of the most prolific assignment help services in the USA. We deliver custom-made help to students with writing different types of assignments. We guarantee total need-based and timely service, and this is why increasing numbers of students prefer to buy assignment online.

Latest It Write Up Samples

SIT763 Cyber Security Management

Download : 0 | Pages : 5

Answer: Security Risk Assessment Security Risks, Threats and Vulnerabilities The assessment of security risks would be based on the identification, assessment and implementation of the key controls of security within the various applications used by the industry. With the carrying out of the risk assessment within the organisation, it would be beneficial for performing a risk assessment [1]. This form of risk assessment would be able to supp...

Read More arrow

HI5019 Strategic Information System And Business Report

Download : 0 | Pages : 18

Answer: Introduction: Australian Plastic Fabricators is one of the dynamic plastic fabrication company which is located in Sydney’s city fringe and is one of the Greater West supplying acrylic shop fittings to Sydney retail and shop fitting businesses. The organization is also considered to be the one stop shop for meeting all the needs related to Acrylic. Without any kind of doubt this organization can be considered to be the market le...

Read More arrow

SIT182 Real World Practices For Cybersecurity Assignment

Download : 0 | Pages : 7

Answer: Introduction The main aim of this project to develop the crack some passwords on different levels of a website. The implementing the project we can used for the ten levels that are includes are cryptography, directory traversal, sql injection, malicious redirects, Burp suites, Nmap, session management, information gathering, reporting.Postings are refreshed day by day and are utilized to spread and encourage further web hacking. Pract...

Read More arrow

ISY3001 E-Business Fundamentals And Systems Management

Download : 0 | Pages : 14
  • Course Code: ISY3001
  • University: Australian Institute Of Higher Education
  • Country: Australia

Answer: Task A: The Concept of Business-To-Business (B2B) Model In this assignment, the Business-to-Business (B2B) model of e-commerce have been chosen. The B2B model of e-commerce business can be defined as the collaboration of more than two different business organisations based on performing several forms of business transactions. This scenario also depicts the involvement of businesses based within wholesalers, retailers or different manu...

Read More arrow

COIT20249 Professional Skills In Information Communication Technology 3

Download : 0 | Pages : 10
  • Course Code: COIT20249
  • University: Central Queensland University
  • Country: Australia

Answer: Introduction Augmented Reality (AR) has emerged different technologies and it uses artificial intelligence and machine learning algorithms for providing a superimposed images and videos of real things for better understanding. In this report, AR technology will discuss with their uses in different fields as well as how it is beneficial for education system. AR is a latest technology, which is highly used for understanding of different t...

Read More arrow

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

234 Order Completed

100% Response Time

Samantha Ji

PhD in Chemistry with Specialization in Organic

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

1309 Order Completed

100% Response Time

Gemmie Chen

MSc in Nursing

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2109 Order Completed

99% Response Time

Emma Zhong

Ph.D in Project Management with Specialization in Project Communications Management

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2830 Order Completed

97% Response Time

Leroy Bicknell

MBA in Marketing

London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

Hi there, I am satisfied with the writing but the writer need to include with national and international contemporary literature according to the question which he hasn’t mentioned. And my due date is tomorrow so i need the writer to correct this ...


User Id: 392348 - 01 Apr 2020


student rating student rating student rating student rating student rating

I had to escalate the assignment a couple of times to get it right. However, I am happy with the grade I have received.


User Id: 311473 - 01 Apr 2020


student rating student rating student rating student rating student rating

There were lots of mistakes in the APA format and the references. There were lots of grammatical errors. I got 10/15.


User Id: 383859 - 01 Apr 2020


student rating student rating student rating student rating student rating

good will recommend to others passed the unit . thanks a lot great writing and done on time


User Id: 141957 - 01 Apr 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?