Abstract
The development of the cloud computing services is growing up quite speedily in which most of the organizations currently moving toward this service which is economical, resilient, and confirmed platform for offering businesses an information technology services over the web. Despite the fact that migration to the cloud computing service remains as an attractive trend from an economic perspective. There are a few different angles that must be considered by organisations before they choose to do so. A standout aspect which have to be taken seriously is the security. Cloud computing service offers an extra risk dimension since the crucial services are periodically reallocated to a third-party, making it complex for maintaining privacy and data security, demonstrate compliance, service availability, and supporting data. This paper will discuss many technologies in the cloud such as virtualization, SOA, and Web 2.0, identifying the threats and vulnerabilities in this type of systems and its environment with potential solutions.
Introduction
In the early of the 60s, PCs required huge halls expanding a lot of power, contain high-priced electronic parts and created limited processing output. Nevertheless, small workstations supplanted those room-size PCs. At the end of the 20th century, the infrastructure and computing size was for forming a distributed system, resulting in a rise in effectiveness. There is vast increase of the demand of online users data in the recent years, the current classical computing infrastructure has become too expensive and hard to handle and not appropriate for accessing data anyplace and anytime. However, in or order to have all of these advantages, data have to be saved on an exterior system of storage. Moreover, because of the growth of the connected users on the social network, video conferencing, and web surfing etc., it became very hard for the conventional computing to deal with [1]. This fast growth of the use of global internet needs leading approaches for handling the volume, availability and variety of data, for that reason, there is a move towards cloud computing.
Aim:
To evaluate the vulnerabilities and threats concerning to the security of the cloud computing and also to identify and analyse the current important security issues for Cloud Computing. In the cloud, data is stored with a third-party provider and accessed over the web. Hence, the control and visibility over the data is restricted.
Objectives:
The main objective of the study include -
Identifying the recent security concerns in cloud computing that consists of threats and vulnerabilities.
To study in depth about the vulnerabilities and threats in the intention of handling it properly to be secure online.
Possible solutions for the issues of security for cloud computing.
Literature review
A systematic review have been implemented regarding the current security in cloud computing. Furthermore, the aim not just for summarizing the existing threats and vulnerabilities, However, analysis and identification the present situation and most significant security worries for cloud computing.
Security issues in cloud computing
A systematically analysis will be shown about the present security threats and vulnerabilities in Cloud Computing. Table 1 displays an analysis of cloud vulnerabilities. This investigation provides vulnerabilities description, nevertheless, there are other common vulnerabilities to any organization that they must to be in taught as they can have a negative influence on cloud security and its own statute.
Lack of education in security: individuals are considered as a feeble point in any organization as they do not have security awareness, however it has a countless positive consequence in the cloud as there are more individuals that deal with the cloud: providers of cloud service, organizational customers, end-users, and third party providers [13].
lack of staff examination and weak recruitment practices: some providers of cloud do not conduct background checking of their workers. Typically, special users for instance, the administrator of the cloud that have boundless data access.
No-verification of customer background: some providers of cloud service do not conduct background checking of their customers, and nearly anybody can have the ability for opening an account with a legal credit card and an email. Fictitious accounts can give assailants a chance to implement any vindictive action without being identified [14].
Cloud computing takes advantage of many extant technologies such as virtualization and web services, contributing to the development of cloud environments. Hence, any vulnerability linked to these technologies can influences the cloud computing and even can have a critical effect [15].
Conclusion
Cloud Computing is a moderately fresh technology that offers to its operators a myriad of gains, nevertheless, it brings several security matters that may hinder its utilization. Comprehension the existing vulnerabilities in cloud computing will push organizations moving towards the cloud. In view that cloud computing profits from numerous technologies. Also, it receives their security problems. Virtualization, conventional web apps, and data hosting have been reviewed. The security matters for cloud models: IaaS, PaaS, and SaaS have been obtainable. Also, as illustrated in this research, networks, storage, and virtualization are the greatest security worries in Cloud Computing. Furthermore, Virtualization is consider as one the significant worries for cloud users because of allowing multiple users sharing a physical server.
It is believed that multi-clouds method has more secure models which can make clouds increasingly secure. In a market where everybody uses technology to surpass their rivals, the need for innovation and rapid deployment can be the distinction between survival and continuity. A multi cloud infrastructure empowers organizations to stay a power to be reckoned with, offering significant flexibly for quick innovation.