Abstract—The field of cloud computing has grown in popularity over the years with big software giants like Amazon, Microsoft and Google providing their own offerings. Some of features which make the cloud so attractive is the fact that it provides rapid elastically and easy scalability. Even though cloud adoption has been quite rapid, many of the business are reluctant to move to the cloud owing to the security and privacy concerns associated with the cloud. In this survey paper, we explore some of the security issues in cloud computing and the current efforts of the research community to tackle these issues. Keywords—cloud computing; security; technical survey; SaaS; PaaS; IaaS; I. Introduction In the past decade, cloud computing is increasingly enabling small to medium business to scale out easily and considerably improve their infrastructure resources with minimal upfront cost. Due to the numerous benefits offered by the cloud like rapid elasticity, scalability, pay-per-use, broad network access, low-cost disaster recovery, high availability, more companies have been tempted by the idea of moving their businesses to the cloud. Even with the plethora of advantages, many company executives cite security as the main reason for their reluctance to move their business to the cloud. To facilitate the widespread adoption of the cloud and fully reap the benefits of this technology, it is increasingly important to understand and analyze the various security issues associated
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
We would like to provide the benefits of cloud computing without any troubles to propel in the direction it is designed for. This is to be achieved by preventing the owner's data from all risks associated and providing a cloud model that is more secure and efficient. The proposed model shall overcome the security risks defined by the security functions over cloud computing, as follows in (Passent M. et al., 2015):
The first scenario that will be examined is looking at Cloud Computing from the perspective of security. Many small and medium sized businesses utilize the internet and Cloud Computing to conduct business and transfer money from system to system as well as report on financial accounting data. With that being the case, it is crucial that whatever system the business is working with pays very close attention to security needs to ensure that this data is protected from unauthorized sources viewing or manipulating it.
The economic case for cloud computing is compelling and at the same time there are striking challenges in its security. The concepts of cloud computing security issues are fundamentally new and intractable. What appears new is only relative to traditional computing that has been practiced since several years. Many such security problems have been giving attention since the time-sharing era. Cloud computing providers have and can build datacenters as large due to their expertise in organizing and provisioning computational resources at as low cost as possible.
The high regard to cloud computing is on the rise due to its ability to improve flexibility, expand access to data, and lower costs. Cloud computing release organizations from being required to have their hardware and software infrastructure from being acquired and maintained (Holt, Niebuhr, Aichberger, & Rosiello, 2011). On the other hand, while there is much noise being made about the benefits of cloud computing, questions have been brought up with respect to whether cloud computing is safe especially when it comes to its privacy, security, and reliability. The purpose of this paper is to discuss the different general controls and audit approaches for software and architecture, cloud computing, service-oriented architecture, and virtualization. This paper gives a summary analysis of the recent research that is available. Additionally, risks and vulnerabilities associated with public clouds, private clouds, and hybrids have also been researched. Within the research conducted, there are important examples provided. Recommendations are shown on how organizations could implement and mitigate these risks and vulnerabilities. This paper even outlines a list of IT audit tasks that focuses on a cloud computing environment due to the results of the analysis, the risks and vulnerabilities, and the mitigation controls.
According to Prasad, Gyani and Murti (2012), “Cloud computing can be defined as a new style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet” (p.7). This statement is from five years ago, and although cloud computing is no longer considered new, this definition still describes what cloud computing means today. Cloud computing being private or public is becoming more primordial in the IT sector due to the numerous advantages it gives to its end users (Basmadjian et al. 2012). Since the interest in cloud computing keeps on increasing, efforts need to continue to evaluate current trends in security and privacy. Cloud computing
The main issue that slows down the growth of cloud computing is security. No matter how many security management tools are released or assurances of reliability are made, complications with data privacy and data protection continue to plague the market. Covering all potential security issues in this article is simply impossible. This is because of the fact that we 're still discovering many of the security issues which challenges cloud computing as it is still a work-in-progress. Cloud Computing is rapidly evolving and hence what we see today may quickly become irrelevant.
DATA SECURITY IN CLOUD COMPUTING Introduction: Cloud computing has prompted a movement in how individuals consider IT frameworks structural engineering. Numerous associations today are either executing cloud-based services, or assessing which cloud-based measures they will be portraying later on. As indicated by Gartner Inc. distributed computing is "no less compelling than e-business". This sprocess in building design from an undertaking normal server-based framework to a cloud-based framework will have related expenses of passage and dangers, yet it can bring about inconceivable advantages in reserve funds and in IT and business deftness.
One of the major issues slowing cloud computing growth is security. No matter how many security management tools are released or assurances of reliability are made, complications with data privacy and data protection continue to plague the market.
Most organizations have constrained and inefficient resources to lay down good IT systems and infrastructure. They do not respond promptly to customer needs that keep changing radically and make data sharing difficult. This problem can be solved through adoption of cloud computing; The cloud service providers should ensure that they consider the security issues (software,
The reason for the author selecting to look at literature regarding cloud security within this review is because of how it ties in with a Computing Science degree currently being worked towards at Staffordshire University. One of the modules being studied involves the creation of a database system, with the client formally requesting a cloud-based data centre as part of their system. Therefore, it would interesting to take an in-depth look at the security concerns surrounding what is a technology that is still within its infancy stage.
Cloud computing is steadily increasing as a viable enterprise technology solution. Information technology literature reports an expected boost in enterprise adoption of cloud computing in the next few years. Business plans to transition operations to cloud computing are also commonly reported. Despite these trends, there are many businesses that remain skeptical of the benefits of cloud computing and continue to support information systems in an on-site location. Careful planning and due diligence is essential to ensure that the most beneficial cloud computing model is utilized to meet business needs. This use case explores cloud computing methods, reviews security concerns regarding virtualization, and considers mechanisms to better
Over the past several years the term cloud computing has become common in homes and organizations alike. Cloud computing can be defined as a pooled set of computing resources that are furnished via the internet. There are three types of cloud services typically available, these services are Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Software as a Service (SaaS). Organizations can benefit greatly from cloud services because they eliminate the need to buy and manage physical resources. Although such an action cuts cost it leaves organization victim to the vulnerabilities and threats that exist in cloud computing. Throughout this paper I will discuss the vulnerabilities and threats that come
The cloud era has evolved to become the engine of enterprise technology innovation but, this advancement has also made us vulnerable to security issues related to cloud. Although moving to cloud has provided us with benefits like reduced IT costs, Scalability, access to automatic updates, collaboration efficiency and many more, yet it also requires business level security policies. And in the absence of these policies, companies become susceptible to security or data breaches.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)