Wednesday, December 11, 2019
Security & Privacy In Cloud Computing â⬠MyAssignmenthelp.com
Question: Discuss about the Security Privacy In Cloud Computing. Answer: Introduction The concept of cloud computing is based on the overall applications that are provided as services given on internet along with hardware and systems software in the datacenters that helps in providing different set of services. The recent trend shows that there is a hype which is developing around cloud computing and it is also clear there is an important movement towards the model of cloud computing which is crucial for the development (Sen, 2013). But, since the overall shape of the system is also emerging and growing on very fast pace in conceptual as well as actual manner, there is emergence of legal, economic, interoperability, privacy as well as security issues that are posing important challenges. Challenge There are number of benefits that the concept of cloud computing bring with many concerns and challenges. These challenges need to be addressed before there is ubiquitous level of adoption in the paradigm of computing. The first steps is that, in cloud computing the user cannot have the control over the data or the overall performance associated with the application that can be required in sometime. They may not have control on the capacity to change the procedure or policies under which they function as well. Maintenance and monitoring is not a simple process when compared to what it can be for the PCs sitting in the present Intranet (Chen Zhao, 2012). The second issue is the customers in cloud computing may put things on risk of losing data and lock them into a format based on proprietary and they may also lose control on the data for monitoring. Third, it is not an easy job to customize the tailor based service agreement for the particular requirements of the business. Important technologies Following are delivery models followed in cloud computing: - Private cloud is based on the concept where cloud services are actually provided individually for a company and are also managed by company or third party. Public cloud is based on services that are present for the public as well as owned by the company that is selling the services like Amazon cloud services (Jansen, 2011). Then there is community cloud where the cloud services are shared by many companies to support particular community that has similar issues. Implementation of technologies From the point of view based on service delivery, there are three kinds of cloud services offerings: SaaS also called as software as a service. It provides rent based application from service provider. PaaS also called as platform as a service. It helps in providing a platform in the cloud that helps the application in developing and execution. IaaS also called as Infrastructure as a service where vendors provide computing based power along with storage space. Discussed aspects of cloud computing are the illusion which comes from infinite resources in computing based on demand and also eliminate the need for the concept of cloud computing. The decline or elimination is also based on commitment by cloud based users which helps the organization to initiate small resources in hardware. Research questions What are the privacy concerns on cloud computing? What are challenges or issues in cloud computing in terms of application of security? What are the solutions to deal with security and privacy issues? Summary of the issue discussed in research paper Following is the detailed discussion of three research papers: Security and privacy issues in cloud computing by Hairder Abbas, Olaf Maennel and Said Assar: the report discusses the unique kind of issue that arranges a venue for the sake of cloud researcher all across the world in order to share the state of art research along with development that can help in gaining advantages for the cloud community. This further helped in collecting good quality research that help in understanding the recent development related to security and privacy based challenges in cloud computing covering many discussions (Abbas et al, 2017). Security and privacy issues in cloud computing by Lakshmi Narayan Tatwani: - the concept of cloud based service which is also known as CSP usually take advantage of the virtualization based technologies which is combined with many self service abilities. This is done to reach the computing based resources with the help of Internet (Tatwani Tyagi, 2015). But the security and integrity of the computer and associated resources is actually creating a lot of hesitation, especially when it comes to moving the workload in business in public cloud. Security and privacy issues in cloud computing: the concept of cloud computing based on technology has gain advantages with extensive popularity worldwide and this can be justified based on fact that many organizations related applications with extensive data as well as services that are migrating based on cloud platforms. Business in the current time is moving the information and applications based on the cloud and there is rise in issues related to cloud security as well as privacy challenges (Awodele, et al). Issues that were not addresses in research paper There are number of security challenges and issues in cloud computing that can be familiar for the companies through properly managing the current infrastructure and consist of traditional models. Following is the detailed discussion: - Internal attackers: these kinds of attacker are employed by cloud based service providers or other third party or customers. This may have present authority based access for number of cloud services along with customer data and it further depends on the organizational part (Takabi et al, 2010). External attackers: these attackers are not recruited by service providers, customers that support the operations of cloud providers. These people have no control or authority or access to cloud based services with varied applications. Impact of discussed issue and its implementation in real world Every part is based on capacity to investigate an attack rather than on the kind of threat which is present via criminals or terrorism. Following is the detailed discussion: Random: the common kind of attackers utilizes simple kind of techniques and tools. The attackers should randomly check the Internet that is trying to find sensitive elements. For this they will have to deploy all the popular tools that should be detected (Takabi et al, 2010). Weak- there are number of semi skilled attackers that aim on particular servers with cloud providers by tailoring the present publicity with current tools and target audiences. Such methods are highly advanced as there is an effort to change the attacks by using current tools. Strong: there are many organized as well as properly financed skilled attackers with an internal based hierarchy that are specializing in target applications with users of the cloud. Substantial: there are strong and highly motivated attackers that cannot be detected easily by the companies they attack or even by the crucial enforcement of law and evaluate organization specializing in cyber security (Walia, S). To minimize the threats needs greater level of intelligence along with specialist resources. Conclusion The concept of cloud computing can be defined in the ICT industry that are based on different or diverse contexts and with different concept associated with it. The foundation is based on the concept of cloud computing which actually means presence of a server companies that can help in hosting the services for the users that is associated by the network (Subashini Kavitha, 2011). The technology is slowly moving in the direction since there is advancement in the concept of computing with communication and network based technologies. There is also presence of fast and trusted level of connection which is crucial for the presence of the cloud computing. The concept of cloud computing is one of the popular and crucial technology areas since it is a part of the cost effectiveness and flexibility. But despite the surge in interest major and persistent issues about cloud computing (Krutz Vines, 2010). References Abbas, H., Maennel, O., Assar, S. (2017). Security and privacy issues in cloud computing. Awodele, O., Adebayo, A. O., Tayo, O. O. Security and Privacy Issues in Cloud Computing.Communications,7, 14-17. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Jansen, W. A. (2011, January). Cloud hooks: Security and privacy issues in cloud computing. InSystem Sciences (HICSS), 2011 44th Hawaii International Conference on(pp. 1-10). IEEE. Krutz, R. L., Vines, R. D. (2010).Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Sen, J. (2013). Security and privacy issues in cloud computing.Architectures and Protocols for Secure Information Technology Infrastructures, 1-45. Subashini, S., Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing.Journal of network and computer applications,34(1), 1-11. Takabi, H., Joshi, J.B. and Ahn, G.J. (2010). Security and privacy challenges in cloud computing environments.IEEE Security Privacy,8(6), pp.24-31. Tatwani, L. N., Tyagi, K. R. (2015). Security and Privacy issues in Cloud Computing.International Research Journal of Computer and Electronics Engineering (IRJCEE, USA), ISSN. Walia, S. Security and Privacy issues in Cloud Computing.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment