Intro:
Cloud computing has been around for over two decades, yet keeps evolving and growing in the scope of services available to businesses. With the allure of pay on demand and instantly scalable resources, cloud computing offers more services online than ever before and that kind of demand drives the need for data security.
The scope of this memorandum is to develop a research project on the subject of cloud computing security and specifically the innovative ways developers are trying to secure data in the cloud. I will briefly describe the current cloud computing security structure and discuss measurement protocols that have been developed recently in order to test and measure the effectiveness of cloud security (Yesilyurt, et al.,
…show more content…
I will use this information to describe the structure of cloud computing and the difficulty of protecting data in physical and virtual environments.
2.
This journal examines the various types of threats that a cloud-based company has to defend against. The authors recognize that the cloud has the potential to be a disruptive force in technology, and it examines the concerns that a business has for migrating to the cloud through the use of surveys. The benefits and risks are examined and the article provides statics and charts to illustrate the findings. The most interesting point of this article is it highlights the concerns customers have listing security as the number one reason preventing a business from migrating to the cloud. I plan to use this article to explain the challenges developers face in securing data on the cloud, not only with application development but also with educating businesses to alleviate misconceptions on cloud computing.
3.
This journal reviews state-of-the-art services such as Security as a Service (SecaaS) that are emerging in the cloud community. The authors explore different methods using a systematic literature review to measure cost, security, and trust to ensure the most reliable metrics for both users and providers. Analyzing the results the article presents the benefits and agility that the software service can provide in a cloud computing environment, as well as the future growth potential in the industry. Using
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
Cloud computing has set a trend in the information technology arena that has sparked the interest of all who utilize the internet on purpose and unsuspectingly. Initially, the primary purpose of cloud computing was to provide a centralized data bank that organizations could use for quick data access. Its use has been quickly adapted, however, beyond business use to become the first option for personal use. The advantages and disadvantages of implementing such a shift from business to personal are varied, yet, statistically, according to the CISCO Global Cloud Index: Forecast and Methodology, 2014-2019 White Paper, its public use is on the rise. The report notes that “by 2019, 56 percent of the cloud workloads will be in public cloud data centers, up from 30 percent in 2014 and by 2019, 44 percent of the cloud workloads will be in private cloud data centers, down from 70 percent in 2014”. Though disadvantages with regard to data security is prominent, users have deemed that its implementation will still promote greater benefits than loss.
This research paper tackles the issues that faces Cloud Computing today and gives the experts and industry’s point of view on the matter. The aspects explored are the significant industry questions that have risen about the use of Cloud Computing, business value, organization impact, adaptability, limitations, initial cost of implementation, and the severe business security risks
The majority of us have been found out about the most cloud security disappointments in which all the cloud innovation organizations are kept on developing, despite everything they endure a similar kind of issues in-house infrastructure's. Distributed computing has turned into a greatest market in the present innovation. In a report of 2016, experts at Gartner anticipated that exchanging to cloud will influence $1 Trillion in Information innovation in the following five years. Cloud administrations showcase has developed to a degree level that it was not a striking level of aggregate it is spending, which was creating new innovations and new businesses which are conceived in the cloud. At the point when cloud administrations are going
The economic case for cloud computing is compelling and at the same time there are striking challenges in its security. The concepts of cloud computing security issues are fundamentally new and intractable. What appears new is only relative to traditional computing that has been practiced since several years. Many such security problems have been giving attention since the time-sharing era. Cloud computing providers have and can build datacenters as large due to their expertise in organizing and provisioning computational resources at
A lot has being said concerning issues surrounding the law and cloud computing. Some of these issues include privacy and data security concerns and laws and regulations. Regardless of what cloud computing models an organization uses, both the cloud provider and the consumer ha to operate under this laws. Therefore both parties need to have a broad knowledge of the these laws such as data breaches, information ownership and control and how close customers can manage risk both at the federal and state levels.
The economic case for cloud computing is compelling and at the same time there are striking challenges in its security. The concepts of cloud computing security issues are fundamentally new and intractable. What appears new is only relative to traditional computing that has been practiced since several years. Many such security problems have been giving attention since the time-sharing era. Cloud computing providers have and can build datacenters as large due to their expertise in organizing and provisioning computational resources at as low cost as possible.
The high regard to cloud computing is on the rise due to its ability to improve flexibility, expand access to data, and lower costs. Cloud computing release organizations from being required to have their hardware and software infrastructure from being acquired and maintained (Holt, Niebuhr, Aichberger, & Rosiello, 2011). On the other hand, while there is much noise being made about the benefits of cloud computing, questions have been brought up with respect to whether cloud computing is safe especially when it comes to its privacy, security, and reliability. The purpose of this paper is to discuss the different general controls and audit approaches for software and architecture, cloud computing, service-oriented architecture, and virtualization. This paper gives a summary analysis of the recent research that is available. Additionally, risks and vulnerabilities associated with public clouds, private clouds, and hybrids have also been researched. Within the research conducted, there are important examples provided. Recommendations are shown on how organizations could implement and mitigate these risks and vulnerabilities. This paper even outlines a list of IT audit tasks that focuses on a cloud computing environment due to the results of the analysis, the risks and vulnerabilities, and the mitigation controls.
Where from these hypothesis security and privacy as well as reliability has become the major concern to adopt to cloud computing. In order to address these issues a further research need be to be made using a quantitative method.
Reaching the point where computing functions as a utility has great potential, promising innovations we cannot yet imagine. Customers are both excited and nervous at the prospects of Cloud Computing. They are excited by the opportunities to reduce capital costs. They are excited for a chance to divest themselves of infrastructure management, and focus on core competencies. Most of all, they are excited by the agility offered by the on-demand provisioning of computing and the ability to align information technology with business strategies and needs more readily. However, customers are also very concerned about the risks of Cloud Computing if not properly secured, and the loss of direct control over systems for which they are nonetheless accountable. To aid both cloud customers and cloud providers, CSA developed “Security Guidance for Critical Areas in Cloud Computing”, initially released in April 2009, and revised in December 2009. This guidance has quickly become the industry standard catalogue of best
One of the main reasons to deliver security and privacy for the data in cloud computing is, as it utilizes distributed resources in an unsecured location or environment to allocate their services among people that belong to different organizations [1]. Enlargement in cloud adoption rates will result in increased computing security problems [2]. The greatest terror of cloud clients is that, most of the companies are not relaxed or comfortable accumulating their data and applications on systems that exists outside of their own assumed data centers [3]. Increased security of potential unwarranted approach and discovery to customer’s personal information is caused by relocating workloads to a distributed infrastructure. Data security and privacy protection issues are relevant to both hardware and software in the cloud architecture. This study is to review different security challenges and solutions for protecting data in the cloud and also aims at enhancing the data security and privacy protection for the trustworthy cloud environment. In this paper, we made a research analysis of an overview of security and privacy levels in secure provisioning and composition, about the interfaces which are been provided to user throughout the data storage and recovery and backup techniques which have been developed in the cloud p province where the data of the clients can be backed up[4]
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
People have always concerned about the security of their important documents as well as information. The Roman Empire military delivered sensitive and secure messages on parchments that could be dissolved in water after getting the information. But nowadays, what most of us use to store our documents in the cloud. Cloud computing is one of the common words in this modern world, the 21st century, the practice of using the network to control the servers that hosted on the internet to store, manage, and process data rather than a local server or a personal computer. The security in information technology is considered as the biggest challenge
Most of us have been heard about the most cloud security failures in which all the cloud technology companies are continued to mature, they still suffer the same type of issues in-house infrastructure’s. Cloud computing has become a biggest market in today’s technology. In a report of 2016, analysts at Gartner predicted that transferring to cloud is going to affect $1 Trillion in Information technology in the next five years. Cloud services market has grown to an extent level that it was not a notable percentage of total it is spending, which was helping to generate new technologies and start-ups which are born in the cloud. When cloud services are going offline or software and websites will fail it can always results in huge business
Cloud computing has many of the resources that having they own services in that services computing has infrastructure as a service