Sunday, December 8, 2019

Cloud Computing Security Threats

Question: Discuss about the Cloud Computing Security Threats. Answer: Introduction This paper is a summary report of a secondary research carried on the topic of security threats on cloud computing and preventive methods. The research bases on three different journals, Silver Lining in Cloud Computing: Security Issues their Preventive Measures.International Journal of Computer Trends and Technology, Cloud Computing: Network/Security Threats and Counter measures.IJARCCE, and Security Threats with Associated Mitigation Techniques in Cloud Computing.International Journal of Applied Information Systems. This paper has strived to bring out issues on the cloud computing threats and how to prevent them as brought out in the three journals, issues that were left out to the perspective of the paper and how the findings impacts the real life situations. The aim of this paper is to build a better understanding on the theoretical outlook of the issues on security threats on cloud computing as well as increase analytical skills used in drawing the summary. Background Cloud computing is agreed to have various definitions which however coins to the aspect of using the configured computing resources for having network access from anywhere in a convenient and most reliable manner, the computing resources are such as (servers, networks, and storage devices among other cloud architectures), (Jain, 2015). Cloud computing has various advantages both to users and providers as the users get quicker reliable services while providers paid in turn. With the important aspects which outweigh the available threats as stated in section one above, it is important for the providers to find ways of curbing the threats such as issues to do with privacy for much more better services (Ahmad, Zahra, 2016). Scope of Engagement In the research that led to the compilation of this paper, the main ideology was to come up with the results from different articles on the issue of cloud computing security and how the issue can be dealt with quite effectively. This paper aims at creating more understanding through the comparison of the three articles on security threats on cloud computing by identifying how the different authors came up with the end results on security threats through confirmation of what they considered while carrying out the research. From such, the issues that were left out or rather neglected by the journals used in the compilation of this report are brought out. Therefore, from the above consideration of the basic aim of the paper and how the paper is compiled, a scope of engagement can possibly be derived. The author learns more on literature review skills as well as a comparison of works of different authors. There is also additional knowledge on skills of summarizing as well as analyzing the findings from a research. The paper creates additional knowledge to the readers on the basis of understanding more on issues to do with security threats of cloud computing and how to prevent such. Tools used This paper, as stated in the introduction part, is more of a literature review of the three journals articles that information are derived from for it compilation. There is a consideration of the five characteristics of the cloud model which are on-demand self-service, broad network access, resource pooling (location independence), rapid elasticity and measured service (Ahmad et al., 2016), from which threats are derived and techniques for overcoming such brought forth. Jain, (2015), takes the approach of bringing out the three models of cloud computing services, SAAS, PAAS, and IAAS, there is the consideration of network issues in cloud computing which leads to the determination of the security issues and preventive measures. Nazir, Shuja, (2013), brings out the deployment models which are public cloud, private cloud, community cloud, and hybrid cloud. There is a consideration of the parameters affecting cloud security which are cloud network, database, operating system, virtualiza tion, resource allocation, transaction management, load balancing, concurrency control, and memory management, (Nazir, et al., 2013). From the above-stated parameters, the security threats are drawn and possible preventive measures brought out. Summary of Findings From a consideration of the three articles used in this paper, there are findings drawn with what are brought out as the security threats of cloud computing. Through the compilation of the three articles threats, general threats which appear on all the three articles are seen. This part of the paper brings out the general threats found in the research and measures of controlling them. There is also a consideration on the aspects that are left out in the three journals and their importance. XML signature element wrapping is the first threat available in all the three articles, is an attack for web services used by third parties to put what they like on the web page of the host. The use of digital certificate like the X.509 authorized by the third party helps in mitigating the threat. Browser security which is mostly through hackers who can access credentials of users and manipulate as owners. The vendor should use WS-security which ensures continuous SOAP (Simple Object Access Protocol). Cloud Malware injection attack damages spiteful services and application or virtual machine. The preventive method for the threat is to have authentication of checks for received messages which detect the affected and rejects. Data loss and leakages which are an adverse effect on business on instances which important data is loosed in the cloud or private data seen through leakages. Mitigation of such is through encrypting and protecting the integrity of data in transit, analyzing data protection at both design and runtime, implementing strong key generation, storage, and management, (Nazir, et al., 2013). Lock-in which denies customers to migrate from one cloud service provider to another resulting from the loss of the probability services and data of customers. Prevented through the use of standardized cloud Application Programming Interface (API). Abuse and nefarious use of cloud computing arising due to weak registration systems. The threat is prevented through implementation of registration processes that are much stricter and monitoring of credit card fraud. The research also established the aspects left out by the three articles in the compilation of the security threats in cloud computing. Most of the threats, if not all were brought out generally without the consideration of the private cloud computing and the public cloud computing. Most probably, the private and public clouds face different challenges and also most probably have different ways of dealing with the challenges that are outlined. The generalization of the threats was not very essential as maybe the individuals mostly with the private cloud computing will lack a solution to the threats they face as most of the methods of dealing with the threats outlined base more on the public cloud computing or rather fits best the large scale. Impacts of the Findings on Real Life The findings as outlined in section five above, are the security threats that cloud computing faces as well as the methods in which the threats can be mitigated. The last finding is also on the aspect which the three journals used in the compilation of this paper did not consider. The findings of this paper have various impacts on the real life situation, especially in cases where cloud computing is applicable. As brought out by the paper before, cloud computing has gained a lot of relevance and is used in various parts of the world more so with vendors for different purposes. The vendors are advantaged with using cloud computing and therefore, the threats faced is an issue that should be dealt with, just as stated earlier in this paper. The findings have outlined the most common cloud computing threats faced by most of the cloud computing. Therefore, in the real life world, this paper helps individuals to easily identify the methods of dealing with the cloud computing threats faced by almost all the institutions. The findings of the paper also shed to light that the different forms of cloud computing as the private and public might be affected differently by the outlined threats or rather might need different methods of solving. Therefore, in the real life world, it helps individuals to be critical in identifying the best methods of mitigating the threats they face in cloud computing. The paper helps one to know that they do not have to fully rely on only one set of information but learn to scrutinize more for better and valid information. Conclusion In conclusion, this paper manages to critically analyze three articles on cloud computing security threats and bring out the common threats plus methods of preventing such. The paper is divided into various parts as a report which helps in a more understanding of the whole process of research that led to the outlined findings in section five. It is clear from the paper that cloud computing is an essential aspect to the users and also the providers since it acts also as a mode of earning. To increase its relevance, it is, therefore, important for the threats faced to be identified and be mitigated or strategies for prevention identified. The users are supposed to continue enjoying cloud computing as well as be safe in using without fear of maybe losing data or even exposing confidential issues. References Ahmad, S., Zahra, S. (2016). Silver Lining in Cloud Computing: Security Issues their Preventive Measures.International Journal of Computer Trends and Technology,35(2), 107-113. https://dx.doi.org/10.14445/22312803/ijctt-v35p119 Jain, M. (2015). Cloud Computing: Network/Security Threats and Counter measures.IJARCCE,4(8), 401-403. https://dx.doi.org/10.17148/ijarcce.2015.4887 Nazir, M., Shuja Rashid, M. (2013). Security Threats with Associated Mitigation Techniques in Cloud Computing.International Journal of Applied Information Systems,5(7), 16-27. https://dx.doi.org/10.5120/ijais13-450935

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.