country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Security & Privacy In Cloud Computing

tag 0 Download7 Pages / 1,532 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the Security & Privacy In Cloud Computing.
 
 

Answer:

Introduction

The concept of cloud computing is based on the overall applications that are provided as services given on internet along with hardware and systems software in the datacenters that helps in providing different set of services. The recent trend shows that there is a hype which is developing around cloud computing and it is also clear there is an important movement towards the model of cloud computing which is crucial for the development (Sen, 2013). But, since the overall shape of the system is also emerging and growing on very fast pace in conceptual as well as actual manner, there is emergence of legal, economic, interoperability, privacy as well as security issues that are posing important challenges.

Challenge

There are number of benefits that the concept of cloud computing bring with many concerns and challenges. These challenges need to be addressed before there is ubiquitous level of adoption in the paradigm of computing.  The first steps is that, in cloud computing the user cannot have the control over the data or the overall performance associated with the application that can be required in sometime. They may not have control on the capacity to change the procedure or policies under which they function as well. Maintenance and monitoring is not a simple process when compared to what it can be for the PCs sitting in the present Intranet (Chen & Zhao, 2012). The second issue is the customers in cloud computing may put things on risk of losing data and lock them into a format based on proprietary and they may also lose control on the data for monitoring. Third, it is not an easy job to customize the tailor based service agreement for the particular requirements of the business.

Important technologies

Following are delivery models followed in cloud computing: -

  1. Private cloud is based on the concept where cloud services are actually provided individually for a company and are also managed by company or third party.
  2. Public cloud is based on services that are present for the public as well as owned by the company that is selling the services like Amazon cloud services (Jansen, 2011).
  3. Then there is community cloud where the cloud services are shared by many companies to support particular community that has similar issues.
 

Implementation of technologies

From the point of view based on service delivery, there are three kinds of cloud services offerings:

  1. SaaS also called as software as a service. It provides rent based application from service provider.
  2. PaaS also called as platform as a service. It helps in providing a platform in the cloud that helps the application in developing and execution.
  3. IaaS also called as Infrastructure as a service where vendors provide computing based power along with storage space.

Discussed aspects of cloud computing are the illusion which comes from infinite resources in computing based on demand and also eliminate the need for the concept of cloud computing. The decline or elimination is also based on commitment by cloud based users which helps the organization to initiate small resources in hardware.

Research questions

  1. What are the privacy concerns on cloud computing?
  2. What are challenges or issues in cloud computing in terms of application of security?
  3. What are the solutions to deal with security and privacy issues?

Summary of the issue discussed in research paper

Following is the detailed discussion of three research papers:

  1. Security and privacy issues in cloud computing by Hairder Abbas, Olaf Maennel and Said Assar: the report discusses the unique kind of issue that arranges a venue for the sake of cloud researcher all across the world in order to share the state of art research along with development that can help in gaining advantages for the cloud community. This further helped in collecting good quality research that help in understanding the recent development related to security and privacy based challenges in cloud computing covering many discussions (Abbas et al, 2017).
  2. Security and privacy issues in cloud computing by Lakshmi Narayan Tatwani: - the concept of cloud based service which is also known as CSP usually take advantage of the virtualization based technologies which is combined with many self service abilities. This is done to reach the computing based resources with the help of Internet (Tatwani & Tyagi, 2015). But the security and integrity of the computer and associated resources is actually creating a lot of hesitation, especially when it comes to moving the workload in business in public cloud.
  3. Security and privacy issues in cloud computing: the concept of cloud computing based on technology has gain advantages with extensive popularity worldwide and this can be justified based on fact that many organizations related applications with extensive data as well as services that are migrating based on cloud platforms. Business in the current time is moving the information and applications based on the cloud and there is rise in issues related to cloud security as well as privacy challenges (Awodele, et al).

Issues that were not addresses in research paper

There are number of security challenges and issues in cloud computing that can be familiar for the companies through properly managing the current infrastructure and consist of traditional models. Following is the detailed discussion: -

  1. Internal attackers: these kinds of attacker are employed by cloud based service providers or other third party or customers. This may have present authority based access for number of cloud services along with customer data and it further depends on the organizational part (Takabi et al, 2010).
  2. External attackers: these attackers are not recruited by service providers, customers that support the operations of cloud providers. These people have no control or authority or access to cloud based services with varied applications.

Impact of discussed issue and its implementation in real world

Every part is based on capacity to investigate an attack rather than on the kind of threat which is present via criminals or terrorism. Following is the detailed discussion:

  1. Random: the common kind of attackers utilizes simple kind of techniques and tools. The attackers should randomly check the Internet that is trying to find sensitive elements. For this they will have to deploy all the popular tools that should be detected (Takabi et al, 2010).
  2. Weak- there are number of semi skilled attackers that aim on particular servers with cloud providers by tailoring the present publicity with current tools and target audiences. Such methods are highly advanced as there is an effort to change the attacks by using current tools.
  3. Strong: there are many organized as well as properly financed skilled attackers with an internal based hierarchy that are specializing in target applications with users of the cloud.
  4. Substantial: there are strong and highly motivated attackers that cannot be detected easily by the companies they attack or even by the crucial enforcement of law and evaluate organization specializing in cyber security (Walia, S). To minimize the threats needs greater level of intelligence along with specialist resources.

Conclusion

The concept of cloud computing can be defined in the ICT industry that are based on different or diverse contexts and with different concept associated with it.  The foundation is based on the concept of cloud computing which actually means presence of a server companies that can help in hosting the services for the users that is associated by the network (Subashini & Kavitha, 2011). The technology is slowly moving in the direction since there is advancement in the concept of computing with communication and network based technologies.  There is also presence of fast and trusted level of connection which is crucial for the presence of the cloud computing. The concept of cloud computing is one of the popular and crucial technology areas since it is a part of the cost effectiveness and flexibility. But despite the surge in interest major and persistent issues about cloud computing (Krutz & Vines, 2010).

 

References

Abbas, H., Maennel, O., & Assar, S. (2017). Security and privacy issues in cloud computing.

Awodele, O., Adebayo, A. O., & Tayo, O. O. Security and Privacy Issues in Cloud Computing. Communications, 7, 14-17.

Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE.

Jansen, W. A. (2011, January). Cloud hooks: Security and privacy issues in cloud computing. In System Sciences (HICSS), 2011 44th Hawaii International Conference on (pp. 1-10). IEEE.

Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing.

Sen, J. (2013). Security and privacy issues in cloud computing. Architectures and Protocols for Secure Information Technology Infrastructures, 1-45.

Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.

Takabi, H., Joshi, J.B. and Ahn, G.J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), pp.24-31.

Tatwani, L. N., & Tyagi, K. R. (2015). Security and Privacy issues in Cloud Computing. International Research Journal of Computer and Electronics Engineering (IRJCEE, USA), ISSN.

Walia, S. Security and Privacy issues in Cloud Computing.

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Security & Privacy In Cloud Computing. Retrieved from https://myassignmenthelp.com/free-samples/security-privacy-in-cloud-computing.

"Security & Privacy In Cloud Computing." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/security-privacy-in-cloud-computing.

My Assignment Help (2019) Security & Privacy In Cloud Computing [Online]. Available from: https://myassignmenthelp.com/free-samples/security-privacy-in-cloud-computing
[Accessed 27 May 2020].

My Assignment Help. 'Security & Privacy In Cloud Computing' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/security-privacy-in-cloud-computing> accessed 27 May 2020.

My Assignment Help. Security & Privacy In Cloud Computing [Internet]. My Assignment Help. 2019 [cited 27 May 2020]. Available from: https://myassignmenthelp.com/free-samples/security-privacy-in-cloud-computing.


For years, MyAssignmenthelp.com has been operating as one of the cheap assignment help providers in the USA. We are one of the best college paper writing services that keep service price minimal. We do not let the affordability of our service to hamper the standard of our work. We have separate teams of experts to provide report writing help . At MyAssigenmnthelp.com, we believe in earning credibility, so students can pay for assignments only after getting satisfied solutions. Tough assignments bother you? Trust us with your project. You will not regret paying us to write assignments for you.

Latest It Write Up Samples

CO4512 Information Security Management

Download : 0 | Pages : 12
  • Course Code: CO4512
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction There are different ISO standards that are used as a baseline for the security of the information in an organization. The ISO standards is used for avoiding breaches in the network, reassuring the customers, gaining an edge and access new market opportunities. It is internationally recognized and applied for management of the safety practices and used as a systematic approach for increasing reliability and enforcement of th...

Read More arrow

COIS13013 Business Intelligence

Download : 0 | Pages : 10

Answer: Part A The company, which has been chosen in this case, is “Cloud-Pty Limited”. It is actually a cloud-based software development company that is based in Brisbane, Australia. The organisation is deciding to start newer and better responsive cloud-based software applications in the required market. Not very long ago, the dynamic and competitive advantage has formulated some very wrong decisions of investment. At present the ...

Read More arrow

ITECH1001 Communications And Technology

Download : 0 | Pages : 5
  • Course Code: ITECH1001
  • University: Federation University
  • Country: Australia

Answer: [1] Journal Title of article:  A Forecast of the Adoption of Wearable Technology Author: Page, Tom URL (if available): http://irep.ntu.ac.uk/id/eprint/32219/1/9768_Page.pdf  Date accessed:  18 Apr, 2018 Journal Title: International Journal of Technology Diffusion  Year of publication:  2015 Page Numbers: 12-29 Volume no: 6 Issue no: 2 Summary of article This article describes about the en...

Read More arrow

COIT20248 Information Systems Analysis And Design 2

Download : 0 | Pages : 10

Answer: Introduction  The report mainly focusses on the information system development for the “UNICEF Child Care” organization so that the problems that the organization is facing due to the utilization of manual system can be mitigated easily. The new system will provide the facility of depositing fees online and after the payment, a thanking email for the payment will be generated automatically. The data as well as informa...

Read More arrow

BUS5BIM Business Information Systems Management

Download : 0 | Pages : 2
  • Course Code: BUS5BIM
  • University: La Trobe University
  • Country: Australia

Answer: Business identification and IT goals This particular report is focused on the development of a coffee vending machine and its internal processes to be followed for its successful implementation. The aim of the system is to increase the efficiency of the process whenever a user will request for coffee by inserting coin into it..  In order to reduce the errors in the coffee vending machine advanced level of set up are acquired to b...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,320,224

Orders

4.9/5

Overall Rating

5,075

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

93 Order Completed

100% Response Time

Jackson Mitchell

MiM (Masters in Management) in Supply Chain Management

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

265 Order Completed

97% Response Time

Ken Campbell

MSc in Electrical Engineering

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

610 Order Completed

100% Response Time

Cheryl Zhao

PhD in Statistics

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

647 Order Completed

98% Response Time

Adlina Han

Masters in Marketing with Specialization in Branding

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

very good writings, good references and really good pronunciation. would do here again the other time. very recommended!!!

flag

User Id: 409717 - 27 May 2020

Australia

student rating student rating student rating student rating student rating

must be a stupid expert who finished my assignment, don\'t trust it when they say, how good they are. They are all lies!!! i paid 148 dollars for 1000 words, and got less than 50%.!

flag

User Id: 422981 - 27 May 2020

Australia

student rating student rating student rating student rating student rating

It was good and was satisfied with this. This is completed and was passed right away after the presentation. Thank you!

flag

User Id: 238261 - 27 May 2020

Australia

student rating student rating student rating student rating student rating

They did a good job but this time i was no happy that much because i feel i need to let them again and again then even they did't done proper what i need but anyway once happend otherwise other all are mine good and i clear too

flag

User Id: 247567 - 27 May 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?