IV. IMPORTANCE / BENEFITS OF THE STUDY Despite the growth in cloud computing, many enterprises adopted the model, several security issues raise severe concerns about the performance which requires us to cast a wider net to find practical solutions to cloud security that work with technology that is available today. Various techniques need to be used making cloud computing secure and it will improve service delivery. The major concern is how to protect data from illegal access by hackers. The goal of this research is to help in educating organizations and individuals on how to protect themselves from hackers. Developing counter-measures can help in ensuring the safety of data in cloud computing. This will mean more organizations will trust cloud computing companies. Key areas for security concerns are (1) Data in server/rest, (2) data in transit, (3) authentication, (4) separation between customers, (5) cloud legal and regulatory issues and (6) incident response. Keeping data secure is vital in cloud computing and companies to ensure that their clients are protected. V. RESEARCH DESIGN The research will adopt a descriptive survey design approach. This approach entails utilizing the research questions as a guide to fulfilling the research objectives. The choice is informed by the lack of control or influence of the variables by the researcher. In essence, the study method entails fact finding enquires that can be implemented in different forms. In addition, the choice
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
What kind of result was found by the research design? Compare the effectiveness of the survey research to the other subordinate data, experimentation or observation in the perspective of gathering information for this project.
We would like to provide the benefits of cloud computing without any troubles to propel in the direction it is designed for. This is to be achieved by preventing the owner's data from all risks associated and providing a cloud model that is more secure and efficient. The proposed model shall overcome the security risks defined by the security functions over cloud computing, as follows in (Passent M. et al., 2015):
Data needs to be protected in every form that it holds: stored data, in use data, and mobilized data. Each of these forms have their own distinctive security challenges.
According to (Whitman and Mattord, 2012), information Security is the protection of the lifeblood of the organization — its information. Specifically it is the protection of the confidentiality, integrity and availability of that information and the systems that store, process and transmit it, (Whitman and Mattord, 2012). Information Security is at the forefront of organizational concern with cloud computing. A major organizational concern is will the cloud service provider be able to secure and protect its data. Although this concern is imminent, many organizations have made the decision to move data storage and services to the cloud. The concern is primarily due to cost benefits such as overhead costs of maintaining software and hardware on-site.
This section of paper includes why we need cloud computing as a security control tool against the cyber criminal activities and in how many ways it can be implemented. As we are living in a technical era, many aspects of our lives rely on the Internet and computers, including transportation, communications, government, medicine, finance and education. Consider how much of our personal information is stored either on our own computer or on someone else’s system.
Cloud computing is vast and so are the security threats. When a company opts for cloud computing, it will consider the advantages, but some of the companies fail to consider the vulnerabilities that might lead to data lost and misuse.
Cloud computing is a shared resource that holds valuable data from masses of people and organisations and is therefore an easy target for hackers. Security within cloud computing involves a set of control-based technologies, polices, processes and standards to protect information, data applications and infrastructures related to cloud computing usage. Security within this area addresses the physical and logical security issues across the different service models as well as how these services are delivered ie.via the public, private or hybrid model. There are many points of entry for an attacker in the cloud environment and people are more exposed to data breaches than they think e.g. using an insecure website on your mobile phone or if a database administrator shares a password, personal details can be accessed.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Cloud computing is regarded as one of the most rapidly developing technologies in the present world and giving superb solutions to the small and medium sized enterprises with remarkably low cost. The data of the entrepreneurs is stored in the cloud servers and accessed by the users of the company. But there is reasonable doubts are instigating the users of the cloud computing data availability, confidentiality and the security. Cloud Computing has become famous because of the low cost and customizable business needs to be provided with its three basic services IaaS, PaaS and SaaS. Many research works have been done to incorporate a strong security to prevent the possible threats in cloud computing. The securities incorporated in cloud computing for data security, Application security and transactional security. In developing the security the relative analysis has to be done, a suitable frame work has to be instigated and a novel approach has to be followed for the management of security in cloud computing. In establishing the security the architecture of cloud computing has to be taken care in relation with SAAS, PAAS and IAAS implementation
Cloud computing has numerous advantages to businesses today. It enables scalability of services that are delivered over the internet when needed. User data is stored in remote servers that the users do not operate. This brings unprecedented convenience. Although it brings so many advantages and efficiencies, cloud computing results to fears arising from loss of data control. This becomes a hindrance to the wide adoption of the emerging technology. As a way of solving these problems, techniques have been developed to ensure that data held in the remote servers is secure and that it cannot be used to achieve malicious activities targeted against the owner of the data.
Cloud computing has become so famous; there is much widespread news about the cloud these days. This is mainly because of the exponential shift of the business applications from traditional models of software towards the Internet, and now through mobile devices. Cloud computing is a model that uses the network of remote servers that has been hosted on the internet rather than on a specific hardware. This would enable a better shared pool for storing, accessing and processing of data. With the huge information being available in the internet, the security for cloud computing has been challenging and this paper would elucidates the security threats of cloud computing also stating the possible countermeasures for them.
Considering the above facts, the present study adopts the Descriptive Simple Survey Design. A simple survey was initially conducted to collect basic demographic information as well as to understand certain specific socio-cultural indicators.
A diffuse group of people often called “hackers” has been characterised as unethical, irresponsible, and a serious danger to society for actions related to breaking into computer systems. In this essay I try to construct a picture of what is and includes a computer crime as well as a portray of hackers, their concerns, and the way in which hacking takes place. What I intend to argue is that, in their majority, hackers are learners and explorers who want to help rather than cause damage. Furthermore, my research also suggests that the general practice of hacking is a part of larger conflicts that we are experiencing at every level of society and business in an information age in which many people are not
This part will presents the details of the research design and methodology that use to conduct the study and it will includes: research design, population and sampling techniques, data source and data collection methods and finally research procedures and data analysis methods will be presented.