Fernandes, D., Soares, L., Gomes, J., Freire, M., & Inacio, P. (2014). Security Issues in Cloud Environments: A Survey.
In this paper, the authors survey many sources and literature on cloud security issues, namely vulnerabilities, threats, and attacks. A total of 504 articles were look at to gather the data used in this paper. While the authors use this number to say that the research trend is up on mitigating security risks, they also suggest that security is the main priority of most research to the detriment of other areas. They offer no concrete numbers to back up this claim..
Section 2 deals with related works to this survey, and give generalizations of those works as they pertain to this paper. The third section details the parts of the cloud IaaS, SaaS, and PaaS, and how they are deployed using public, private, hybrid, and community clouds. It also speaks of the data centers and the need to understand setting them up, location, humidity, political, governmental, and energy-saving aspects to ensure high cloud high uptime. The authors’ talk of certain threats such as physically breaking into data centers, malicious employees, and exploits by those in the community who search for vulnerabilities.
Not all security is perpetrated by individuals or groups, it is more common to see state-sponsored attacks, but very little information is publicly disclosed. This lack of disclosure can cause a mistrust on the part of customers. The intense growth of cloud environments
Overall, I found that this article provided some great insight as to the proper security measures to ensure safe cloud computing. However, I also found the descriptions to be very vague. With an important topic such as cloud security, I found myself asking many questions as to how the aforementioned factors should be achieved, and thought that the article fell very short in addressing them.
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
Cloud computing has set a trend in the information technology arena that has sparked the interest of all who utilize the internet on purpose and unsuspectingly. Initially, the primary purpose of cloud computing was to provide a centralized data bank that organizations could use for quick data access. Its use has been quickly adapted, however, beyond business use to become the first option for personal use. The advantages and disadvantages of implementing such a shift from business to personal are varied, yet, statistically, according to the CISCO Global Cloud Index: Forecast and Methodology, 2014-2019 White Paper, its public use is on the rise. The report notes that “by 2019, 56 percent of the cloud workloads will be in public cloud data centers, up from 30 percent in 2014 and by 2019, 44 percent of the cloud workloads will be in private cloud data centers, down from 70 percent in 2014”. Though disadvantages with regard to data security is prominent, users have deemed that its implementation will still promote greater benefits than loss.
The majority of us have been found out about the most cloud security disappointments in which all the cloud innovation organizations are kept on developing, despite everything they endure a similar kind of issues in-house infrastructure's. Distributed computing has turned into a greatest market in the present innovation. In a report of 2016, experts at Gartner anticipated that exchanging to cloud will influence $1 Trillion in Information innovation in the following five years. Cloud administrations showcase has developed to a degree level that it was not a striking level of aggregate it is spending, which was creating new innovations and new businesses which are conceived in the cloud. At the point when cloud administrations are going
The economic case for cloud computing is compelling and at the same time there are striking challenges in its security. The concepts of cloud computing security issues are fundamentally new and intractable. What appears new is only relative to traditional computing that has been practiced since several years. Many such security problems have been giving attention since the time-sharing era. Cloud computing providers have and can build datacenters as large due to their expertise in organizing and provisioning computational resources at
The economic case for cloud computing is compelling and at the same time there are striking challenges in its security. The concepts of cloud computing security issues are fundamentally new and intractable. What appears new is only relative to traditional computing that has been practiced since several years. Many such security problems have been giving attention since the time-sharing era. Cloud computing providers have and can build datacenters as large due to their expertise in organizing and provisioning computational resources at as low cost as possible.
The scope of this memorandum is to develop a research project on the subject of cloud computing security and specifically the innovative ways developers are trying to secure data in the cloud. I will briefly describe the current cloud computing security structure and discuss measurement protocols that have been developed recently in order to test and measure the effectiveness of cloud security (Yesilyurt, et al.,
According to Prasad, Gyani and Murti (2012), “Cloud computing can be defined as a new style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet” (p.7). This statement is from five years ago, and although cloud computing is no longer considered new, this definition still describes what cloud computing means today. Cloud computing being private or public is becoming more primordial in the IT sector due to the numerous advantages it gives to its end users (Basmadjian et al. 2012). Since the interest in cloud computing keeps on increasing, efforts need to continue to evaluate current trends in security and privacy. Cloud computing
The National Institute of Standards and Technology (NIST) define cloud computing this way. “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics (On-demand self-service, Broad network access, Resource pooling, Rapid elasticity, Measured Service); three service models (Cloud Software as a Service (SaaS),
to note here is the fact that these services are provided over a network. Hence, typical
Over the past several years the term cloud computing has become common in homes and organizations alike. Cloud computing can be defined as a pooled set of computing resources that are furnished via the internet. There are three types of cloud services typically available, these services are Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Software as a Service (SaaS). Organizations can benefit greatly from cloud services because they eliminate the need to buy and manage physical resources. Although such an action cuts cost it leaves organization victim to the vulnerabilities and threats that exist in cloud computing. Throughout this paper I will discuss the vulnerabilities and threats that come
This work is a study more particular to the diverse security issues and the related difficulties that has exuded in the distributed computing framework. The accompanying area highlights a concise survey of writing on security issues in cloud computing and the remaining areas are composed as takes after.
The main purpose of this paper is to research requirements for a Cloud Computing Security Policy and to develop a draft policy for the non-profit organization, SNPO-MC which will provide guidance to managers, executives, and cloud computing service providers.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
The greater part of us have been caught wind of the most cloud security disappointments in which all the cloud innovation organizations are kept on developing, despite everything they endure a similar kind of issues in-house infrastructure's. Distributed computing has turned into a greatest market in the present innovation. In a report of 2016, investigators at Gartner anticipated that exchanging to cloud will influence $1 Trillion in Information innovation in the