StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security in Cloud Computing - Essay Example

Cite this document
Summary
The focus of this paper "Information Security in Cloud Computing" is on the concept of cloud computing that is based on software as a service (SaaS), for example, Web 2.0 and various technological advancements, all of which are dependent on the Internet so as to satisfy the needs of the user…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful

Extract of sample "Information Security in Cloud Computing"

INFORMATION SECURITY PROJECT REPORT by Student’s name Code+ course name Professor’s name University name City, State Date Information Security in cloud computing  The term cloud computing refers to a situation where a company outsources it computer serivices. In cloud computing, our organization will be allowed to use storage, computing power, or specifically constructed development environments. Our company will do not have to be worried on how the process of cloud computing works internally. The process of Cloud computing is based on Internet-computing (Ertaul et al. 2010). The concept of cloud computing is generally based on software as a service (SaaS), for example Web 2.0 and various technology advancements, all of which re dependent on the Internet so as to satisfy the needs of the user. For instance, Google Apps are used to provide various commercial applications online that are easily accessed through the web browsers, whereas the software and data have their storage on the Internet servers (Faheem 2014). Since the whole concept of cloud computing is based on internet and servers, there are various risks that are associated with it. Information security issues related to cloud computing 1. Loss of trust It is sometime s hard task for the cloud service users to evaluate how trustworthy their service provider are since there is the black-box feature in the cloud services. There lacks the measurements on how to access and analyze the security level of the service provider in a formal manner. In addition, a cloud service user is not capable of evaluating security implementation level attained by the service provider. This lack of sharing of security level by the context of cloud computing service providers is a serious security threat during the usage of cloud services to a cloud service users (Li et al. 2012, Faheem 2014). 2. Loss of governance Whenever an organization intends to migrate some part of its IT system to the cloud infrastructure, there is an implication that the organization will be partially giving control to the cloud service provider. The abovementioned loss of governance is dependent on the type of cloud service model. For example, IaaS only gives hardware and network management to the cloud computing service providers, whereas SaaS also gives the OS, application, and the service integration so as to give turnkey services to the service users (Shah and Anandan 2013). 3. Service Provider Lock-in As a result of the loss of governance, there arises the possibility of lack of freedom in regard to the way in which a service provider could be replaced by another. This might be a case when a cloud service provider is dependent on non-standard hypervisors or virtual machine image formats and doesn’t provide the tools required during the conversion process of virtual machines into standardized formats. 4. Unsecure Cloud Service User Access Since majority of the resource deliveries are based on remote connections, non-protected APIs, (majority of the management APIs and PaaS services are the easiest attack vectors). There are various forms of attacks such as phishing, frauds, and exploitation of application. Usually, credentials and passwords are re-used, which accelerates the effects of these attacks. Cloud computing solutions augment some threats to the landscape. Whenever the attackers gain access to the users’ credentials, the attackers are likely to eavesdrop on the users’ events and transactions, alter data, return forged information, and redirect the customers to illegitimate sites. The users’ accounts or service instances might turn out to be a new base for the attackers. From here, the attackers might affect the power of the users’ reputation so as to launch successive attacks (Shin and Ahn 2005). 5. Data loss and leakage In case the encryption keys or privileged access codes are lost, there would be some fatal complications to a cloud service user. For that reason, lack of the cryptographic management information, for example, encryption key, authentication code and access privileges would significantly result to a sensitive damage on data losses and unexpected leakages to outside environment. For instance, inadequate authentication, authorization, and the audit (AAA) controls; erratic usage of an encryption and/or authentication key; operational failure; a disposal problem; jurisdiction and political matters; data centers trustworthiness; and disaster recoveries are likely to be the main problems associated with data loss and leakage (Li et al. 2012, Shin and Ahn 2005). 6. Absence of Information/Asset Management Whenever in the process of applying to use the Cloud Services, the users face various points of concern regarding the absence of information/assets management by a cloud service provider, for example, location for the delicate assets/information, absence of tangible control for the data storage, dependability of data backup (that is, data retention concerns), counter-measures for the BCP and Disaster Recovery. Additionally, a cloud service user also has some important points of concern in regard to the data being exposed to the foreign governments and on agreement with privacy laws such as the EU data protection directives (Shah and Anandan 2013). Threats resulting from cloud computing in our organization Broad network access Any staff member of the organization will be capable of accessing business management solutions through a smartphone, tablet, laptop and office computer. These devices can be used at any place they are located given that there is an online access. This mobility is advantageous in the sense that during the working hours or off-times, the staff stay at the top of their tasks, contracts and the clients whether they are in the office or on their journey (Armbrust et al. 2009). However, in case one of the smartphones or tablets is accessed by a hacker, the database of the company might be at risk. The hacker might, maliciously, alter figures in the database for personal interests. There would be also some blame game between the managers and the staff in case the system of the organization is hacked. The managers would start accusing the various staff, who have the login details, even if they are not responsible for the matter (Li et al. 2012). Resource pooling Through cloud computing, the workers are able to enter and use data through the business management software at the same time, at any time and from any location. This is possible since the management software is hosted in the cloud. This feature is suitable for the various business offices of the organization since some are usually found outside the workplace (Ertaul et al. 2010). However, in case the system is being by various employees and customers, there might be increased traffic ant that would make the system to be down. Also, there might be a possibility of the system crashing and that would result to a great loss of the organization data if the cloud service provider provided an unstable system to the organization (Upadhyay et al. 2014). Rapid elasticity The cloud is advantageous in the sense that it has a considerable level of flexibility and scalability that is suited to the immediate use of the organization. The staff will be capable of easily adding or removing users, software features and various resources (Nurmi et al. 2008). However, a staff can erroneously or deliberately remove some software features leading to chaos within the system. This could take a lot of time before the problem is identified. In case the staff, who is responsible of the act, keeps quite, fearing to be summoned, the company could end up in huge loses before the problem is identified (Armbrust et al. 2009, Nurmi et al. 2008). Mitigation of threats associated with cloud computing 1. Firewall This approach decreases the attack surface of the virtualized servers within a cloud computing environment. Bi-directional firewalls, are deployed on individual virtual machines so as to offer centralized management to the server firewall policies. 2. Intrusion Detection and Prevention (IDS/IPS) They help in shielding vulnerabilities within the operating systems and enterprise applications till when they can be patched, to attain well-timed protection from the known and zero-day invasions. The virtual equipment and cloud servers usually use the same operating system, enterprises and web applications as their physical server. Installing intrusion detectives and prevention as software on a virtual machine, acts as a shield of the newly discovered susceptibilities in these applications and the Operating systems, to protect them against exploits attempts aimed at compromising virtual machines (Upadhyay et al. 2014, Takabi 2010). 3. Integrity Monitoring The process of integrity monitoring on the critical operating systems and application files is essential for the detection of malicious and unforeseen alterations that could be signaling the risk posed to the cloud computing facilities. Integrity monitoring software are usually applied within the virtual machine levels (Upadhyay et al. 2014). 4. Log Inspection This approach is meant to collect and analyze operating systems and application logs for any security event. The log inspection rule optimizes the identification of crucial security events hidden in several log entries. These security events are then to stand- alone security systems, though amount to maximum visibility whenever forwarded to security Information as well as event management (SIEM) systems or the centralized logging servers for correlation, reports and archives. As it is the case for the integrity monitoring, log inspection abilities have to be applied within virtual machine levels (Takabi 2010, Teo and Ahn 2007). The four mitigation activities are effective in enhancing security in the cloud computing environment. However, there are minor issues of insecurity in cloud computing but with the current technology, efficient mechanisms are being devised so as to mitigate this matter. Reference List Armbrust, M; Fox, A; Griffith, R; Joseph, A; Katz, R; Konwinski, A; Lee, G; Patterson, D; Rabkin, A; Stoica, I; and Zaharia, M 2009, Above the Clouds: A Berkeley View of Cloud Computing, Electrical Engineering and Computer Sciences University of California at Berkeley: University press Ertaul, L; Singhal, S; and Saldamli, G 2010, Security Challenges in Cloud Computing, available at http://www.mcs.csueastbay.edu/~lertaul/Cloud%20Security%20CamREADY.pdf Faheem, M 2014, Security Issues of Cloud Computing, available at http://www.samanmjournals.org/wp-content/uploads/Security-Issues-of-Cloud-Computing.pdf Li, J; Li, B; Wo, T; Hu, C and Huai, J 2012, Cyberguarder: a virtualization security assurance architecture for green cloud computing, Future Generation Computer Systems, 28 (2) pp. 379–390 Nurmi, D., Wolski, r., Grzegorczyk, C., Obertelli, G., Soman, S., Youseff, l., and Zagorodnov, D. Eucalyptus, 2008, A Technical Report on an Elastic Utility Computing Archietcture Linking Your Programs to Useful Systems . Tech. Rep. 2008-10, University of California, Santa Barbara Shah, H and Anandan, S 2013, Security Issues on Cloud Computing, Available at http://arxiv.org/ftp/arxiv/papers/1308/1308.5996.pdf Shin, D and Ahn, G 2005, Role-Based Privilege and Trust Management, Computer Systems Science & Eng. J., vol. 20, no. 6 Takabi, H 2010, Security and Privacy Challenges in Cloud Computing Environments, available at http://sefcom.asu.edu/publications/security-privacy-challenges-privacy2010.pdf Teo, L; and Ahn, G 2007, Managing Heterogeneous Network Environments Using an Extensible Policy Framework, Proc. Asian ACM Symp. Information, Com­puter and Communications Security, ACM Press Upadhyay, N; Bhansali, A and Upadhyay, M 2014, Security issues in cloud computing, global journal of engineering science and research management, available at http://www.academia.edu/8780966/SECURITY_ISSUES_IN_CLOUD_COMPUTING Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Security in Cloud Computing Essay Example | Topics and Well Written Essays - 1500 words, n.d.)
Information Security in Cloud Computing Essay Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/2065149-information-security-project-report
(Information Security in Cloud Computing Essay Example | Topics and Well Written Essays - 1500 Words)
Information Security in Cloud Computing Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/2065149-information-security-project-report.
“Information Security in Cloud Computing Essay Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/2065149-information-security-project-report.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security in Cloud Computing

Cloud Computing Security

Professor Name Student ID # Date cloud computing Security cloud computing is an attractive information technology (IT) trend which ensures the implementation of the utility computing model broadly using Virtualization technologies.... Keeping in mind the numerous advantages of cloud computing, an increasing number of business organizations have begun offering and making use of cloud-enabled architectures and services to support their business operations....
6 Pages (1500 words) Dissertation

Information Security and Assurance

In addition, there are a large number of problems and issues that pretense critical and possible challenges for data and Information Security in Cloud Computing, comprising domain-specific restrictions, place limitations, technological or legal limitations, effectiveness of data management, various security metrics supported by cloud security providers, inappropriate implementation of sufficient security mechanisms, service-level security issues and the aggregation of data (Hudic et al....
3 Pages (750 words) Essay

Cloud Computing: Security Issues and Solutions

This paper discusses some of the important security issues in cloud computing.... This paper discusses some of the important security issues in cloud computing.... This article "cloud computing: Security Issues and Solutions" discusses the developments in the area of information technology that have offered wonderful opportunities to business organizations.... In this scenario, organizations believe that there emerge a number of security issues for business organizations due to the cloud computing environment....
13 Pages (3250 words) Article

Cloud Computing for E-Learning

The folio includes a list of websites as well from which data has been gathered… Certain conference papers regarding cloud computing have been mentioned in this folio.... Furthermore, this folio includes the identification of the individuals related to this topic and also the list of products and companies that are utilising cloud In the recent day context, the concept of cloud computing has gained significant amount of interest due to the advantages that the companies are able to acquire by the utilisation of cloud computing....
4 Pages (1000 words) Assignment

Challenges IT Managers face when moving to cloud computing

cloud computing refers to a model that enables convenient, on-demand access to a network of shared, configurable computing resources that can be released and provisioned with less service provider interaction or management effort.... However, there are very many risks associated CHALLENGES IT MANAGERS FACE WHEN MOVING TO cloud computing Challenges IT Managers face when moving to cloud computing cloud computing refers to a model that enables convenient, on-demand access to a network of shared, configurable computing resources that can be released and provisioned with less service provider interaction or management effort....
2 Pages (500 words) Research Paper

Research Agenda in Cloud Computing

This paper aims at giving a comprehensive or all-inclusive academic research review carried out in cloud computing and also highlighting the agenda of research.... This paper is going to begin by giving a generally known definition of cloud computing as understood by many.... hellip; The industry of Information Technology has had a lot of debate as There has been much discussion in industry as to what cloud regards the real meaning of cloud computing....
5 Pages (1250 words) Research Proposal

Is current uk law relevant , when applied to cloud computin

Even though the customary approach in a number of cloud providers' conditions of operation is to UK's Law and cloud computing Department: The UK Data Protection Act of 1998 incorporates intensified commitments to ensurethat information controllers are able to embrace specific stipulations in written agreements with data processors.... Therefore, a number of regulations influencing cloud computing are linked to data security.... Data controllers (customers, in the case of cloud computing vendors) are supposed to be engaged in a formal agreement in place with the cloud merchant necessitating that vendor should solely process individualized information in accordance with the data controller's instructions and to set up apt technical and organizational measures....
2 Pages (500 words) Essay

Cloud Computing in the IT Industry

The paper “cloud computing in the IT Industry” seeks to evaluate cloud computing, which is the new buzzword in the IT industry.... Different experts have given various definitions for cloud computing that is determined to rule the software industry in the coming years.... hellip; The author states that cloud is another word for internet and cloud computing refers to computing services provided on the internet.... Storing data on the internet as documents, photographs, and online videos is a form of cloud computing....
20 Pages (5000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us