Security Issues in Cloud Computing
Research problem/ statement of the problem 4 1. Research questions/hypotheses 4 1. Delimitations of the study 5 1. Definition of terms 5 SECTION 2: Literature review 6 SECTION 3: Conclusions and suggestions 10 References 12 SECTION 5: Appendix 14 SECTION 1: Research topic, the problem and its setting 1. Introduction One of the reasons in the past that many people were against public was security. Background/importance of the study Over the recent years, so many companies have been able to adopt cloud computing as a cheaper way to data storage. This is due to the fact that it offers cheap costs to the software and hardware of the organization with an easy access to the data wherever the person is located. The provider of the cloud service is tasked with ensuring that the data stored is kept private and secured against any access by unauthorized individuals.
In return this provider can easily complicate the data privacy since the client does not understand the security measures in place (Zhang, Cheng & Boutaba, 2010). There are some organizations that have successfully implemented cloud computing to its clients. This study aims at establishing what causes the data breach in cloud computing before those involve can escalate their skills. It critically analyses the issues that some firms have faced in the recent past. Research questions/hypotheses To gather the accurate and sufficient data, we need questions that will guide on the collection of the data. That’s why the following questions have been designed to help during the entire process. How often do security and privacy data breach occur in cloud computing? Who are involved in the data breach in the recent cases? What are the security features in place for data securities in the cloud servers? How has encryption helped in protecting data in cloud servers? What are the upcoming data protection techniques in cloud computing? What extend is the damage of the company reputation due to cloud computing cyber-attack? What economic loss has the organization undergone due to cloud computing security lapse? 1.
They are similar in one way to the file folders Client – this is the person to whom the cloud computing services are being offered to SQL – Structured query language SECTION 2: Literature review It is believed that cloud computing is an application service provision (ASP) that rents the services of storage, networking and infrastructure. Cloud computing has reshaped the way enterprises operate. A research conducted recently shows that 77% of large enterprises have adopted the cloud while 73% of the small and medium enterprises have also adopted it (Mell & Grance, 2011). This show the value that this organization have put in it as a way of achieving much in the daily running of the activities. In cloud computing we have the cloud service provider (CSP) who offers services like: Software as a service that take into consideration the ability of the clients to use the applications that are available on the infrastructure.
Public cloud has an infrastructure that is opened to every client that is in need of using it. This might be owned and operated by an individual, government organization or a business. It is usually cloud provider’s choice to decide where to locate it and not on the business premise of any client. The hybrid cloud is the existence of any combination of two or three of the above types. Currently, 61% of the enterprises are using the public cloud while 31% are using the private cloud with 8% using the hybrid one (Sainadh, Kumar & Reddy, 2017). A case of Accenture, a firm that deals with corporate and consulting in 2017 was a victim in the cloud computing data breach. This company configured four AWS S3 buckets as public.
This enable the public to access the bucket’s content so long as they had the bucket’s URLs. Despite this being accidentally, it is a major concern in cloud computing since it affects how secure the data is at any given moment (Li et al. In this scenario, a research showed that the data was not accessed by anyone who had malicious intent. If no measures are put in place this will compromise with the whole network. The high dependency on the providers of the cloud network brings much problem (Goel & Goel, 2012). So many firms take it upon the firm to offer optimal security without looking on their side and the effects it can cause. There have been so many open-source software that have come into existence increasing the implementing cloud computing.
Some of the well-known examples include the Hadoop framework cloud foundry by VMware. With this it has created a loophole where data is shared with the third party that is not concerned with the law. SECTION 3: Conclusions and suggestions In summary, we have so many areas which have been affected by the insecurity or data breach in cloud computing. This cases have always been intentional or unintentional. Some of them have shown misconfiguration by the professionals who are entrusted to secure the systems of the companies that were involved. Despite the fact that this cases of data breach have not been so devastating to the organizations involved like the ones encountered by other related issues which are usually malicious, there is a need to safeguard the integrity of the cloud computing systems.
For those who operate on AWS they should only grant public to what they view it should be public. Data security can be enhanced on SQL databases by setting up permissions on the database within the SQL server other than on the buckets. In provision of the cloud services, security should be enhanced by improving virtual machine and legal support. There should be a real time monitoring of the activities that are going on throughout the cloud. Despite this being a very expensive thing to the providers, it necessary so that it can build on the reputation of the firm. A view of cloud computing. Communications of the ACM, 53(4), 50-58. Buyya, R. Yeo, C. S. IGI Global. Dinh, H. T. Lee, C.
Niyato, D. Thuraisingham, B. Security issues for cloud computing. International Journal of Information Security and Privacy (IJISP), 4(2), 36-48. Li, Y. Gai, K. V. Kumar, U. S. Reddy, S. H. G. Gupta, B. Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964-975. Subashini, S. Grance, T. The NIST definition of cloud computing. Dinh, H. T. Lee, C. When searching for some books by the use of natural language I was able to find others which were related and having very important information. Simple searching was also used. I typed the keywords that I needed to know more about. It gave me a lot of options. Some had important information of which I used while others had information that was not important which made me discard them.
From $10 to earn access
Only on Studyloop