Cloud computing is defined as the environment of computing where data is transferred r transmitted from one source to another by utilizing several computing resources like emails, databases or any other means. The only criterion is this type of transfer is that the resource should be accessed by Interne connectivity (Jadeja & Modi, 2012). Cloud computing is utilized for shifting or moving data or information through utmost security and so that there exists no loophole in the security structure of the data that is to be transmitted. It is the technique that is utilized by almost all organizations in modern world. The major benefit of this technique the clients of cloud computing do not have to pay for the installation and infrastructure. The cloud computing architecture is designed in such a way that the client is provided with the installation and infrastructure completely free of charge. However, in spite of having such huge advantages, cloud computing do have some of the major disadvantages. The major disadvantage or issue in cloud computing is the risks related to security of cloud (Mishra et al., 2013). The two types of technologies that provide security to the cloud computing are the virtualization and multi tenancy.
The following review covers a brief discussion about the security of cloud computing. The review discusses about the various security threats and the technologies of dealing with those security threats. The review also contains the several cloud deployment models and the research methodology of cloud security. Relevant recommendations are also provided for the betterment in the security structure of cloud computing.
According to Hashizume et al., (2013), cloud computing security issues cannot be resolved easily, however there are few techniques that can provide and secure the system of the cloud computing architecture easily. Cloud computing although helps in secured transfer of data or information, there is still a chance of security risk or threat. This threat is extremely vulnerable when the data is transmitted to a third party. The privacy and the security of the data is at stake whenever the cloud computing services are outsourced by that third party. Moreover, the availability in the data and the services and the demonstration in compliances are also in danger. The best technologies that help in incrementing the security are the Virtualization and SOA. There are various vulnerabilities and threats in cloud computing and the technologies help to reduce them.
According to Jadeja & Modi (2013), Cloud computing is defined as the environment of computing where data is transferred r transmitted from one source to another by utilizing several computing resources like emails, databases or any other means. The only criteria is this type of transfer is that the resource should be accessed by Interne connectivity. Cloud computing is utilized for shifting or moving data or information through utmost security and so that there exists no loophole in the security structure of the data that is to be transmitted. It is the technique that is utilized by almost all organizations in modern world. The major benefit of this technique the clients of cloud computing do not have to pay for the installation and infrastructure. The cloud computing architecture is designed in such a way that the client is provided with the installation and infrastructure completely free of charge.
According to Zissis & Lekkas, (2012), cloud computing has different aspects in the architecture of the cloud infrastructures, the cloud development models and the delivery in the software services. This has occurred due to the constant change in the technology. Cloud computing has various and several computing elements like computing in grid, autonomic and utility. These elements have changed into a brand new architecture of cloud deployment. These changes however have created problems or issues in the security system and the information systems. The risks and the threats have taken the information systems and the efficiency of the cloud is reduced.
Shelke et al. (2012) state that IDS or Intrusion Detection System is the best solution for detecting any type of Distributed Denial of Service or DDoS attacks. This particular system detects any type of violation in policies or any type of malicious activities specially in the network. The anti virus software is also considered as a part of intrusion detection system. Cloud computing has several issues in their security system. This particular detection system helps to detect the probable security threats and risks in cloud computing. Moreover, a new and innovative multi threaded distributed intrusion detection system model has been introduced. It can easily handle huge amount of data and analyze them for security purposes.
Mishra et al. (2012), state that there are two main technologies of detecting security issues in cloud computing. They are the virtualization and multi tenancy. Both of them help to in constructing a well organized model of cloud computing. Multi-tenancy helps in allowing various tenants to be present in one specific machine. They all can share their resources at the same time. The resources are nothing but the processor, network and the memory. Virtualization on the other hand is the way of obtaining multi tenancy. The procedure of virtualization allows several and different operating systems for operating simultaneously in that particular machine. This particular feature allows all the clients of cloud computing in executing their applications on the same physical device however, all of them are isolated from each other.
According to Kumar & Kumar (2017), there are various security threats in cloud computing that make it vulnerable for any type of data or information. The most significant threat in cloud computing is the breaching of data. The breaching of data is how much risky, is evaluated depending upon how much the data is sensitive in nature. The second most significant threat is the breakage in authentication. The systems of authentication that have multiple factors like the OTP or one time passwords, smartcards or many more are responsible for the protection of the services of the cloud as the intruders are unable to track them down. Authentication often creates major problem in cloud computing security.
Chen & Zhao, 2012 state that the security problems in the confidential information and data often creates major problem for the cloud. For the reason of location transparency, dynamic scalability, and service abstraction aspects of cloud computing models, the several types of data and applications that are present on the platform of the cloud have no security boundaries and infrastructure.
There are various technologies that serve the best in case of security of cloud computing. Two types such technologies are given below.
According to Dores, Reis & Lopes (2013), with the advancement in the technology of communication technology, the internet provides various help and opportunities in developingvarious innovative system for making the transfer of data easier and with security. Innovate and new services are provided that can easily integrate with the cloud platform, services and infrastructure. The diversification of IoT or Internet of Things helps in this type of integration. This is one of the best technologies that can help cloud computing in securing its services.
Arora & Parashar (2013), state that symmetric key and encoding algorithms help to secure a confidential data or information by means on encryption. The message or the data that is to be transferred to the receiver, is converted into a cipher text or an encoded version so that the data does not lose its integrity. The encrypted data is locked using a key known as the symmetric key and only the receiver is able to open or read that data. These algorithms can even deal with bulk amount of data easily without any type of complexities. This is the best technology for security in cloud computing.
According to Xu, (2012), there are various types of the deployment models of cloud. These cloud models are the public cloud, private cloud, hybrid cloud and community cloud. Public cloud is utilized for sharing the services and infrastructure providing by a provider, who is of third party. Private cloud is utilized for the share of the services and infrastructure that is being provided by a specific organization. Hybrid cloud is the mixture of both private and public clouds. Community cloud is the cloud model that is being shared by various organizations however all of them should have their interests shared with other.
Wang et al., (2012) state that storage services play the most important role in case of security in cloud computing. If the storage of the data or information in the process of cloud computing is not up to the mark and secured, it is evident that cloud computing would lose the integrity of the data. Moreover, weak storage often gets crashed and this also is a major cause of losing data or information. The storage should be secured enough. There are several approaches in securing the data or the storage in cloud networks. The best algorithm is the encryption and decryption algorithms. These algorithms help to convert the entire confidential message into a cipher text so that the integrity is not lost and the intruders or hackers are unable to read them.
According to Ryan, (2013), the cloud security problems can be solved by four distinct approaches. They are the complete homomorphic encryption, the translation of key, the security of the anchored hardware and the technique of CryptDB. The complete homomorphic encryption is the basic way of encryption where the sender of the data sends the data in a complete encrypted version. Only the receiver is able to read that data. The encrypted data is known as the cipher text. In the translation of key technique, the specific data is encoded before it is uploaded in the cloud. The owners of that particular data have to keep the keys for encoding the data. However, if the data is broken into small chunks, the several smaller parts can be encoded by several keys. It may so happen that the clients of the data may translate the key for allowing the data in forwarding to the receivers. In simple words, the key is translated. In the hardware anchored security, the provider of the cloud has specific hardware, allowing storing the keys in such a way that only specific programs can access those keys. In the final approach, a special framework is present, which allows a specific query processing over the encrypted database.
Conclusion
Therefore, from the above literature review, a conclusion can be drawn that, cloud computing is one of the best techniques for delivering any type of data or information through Internet. It can be defined as the environment of computing where data is transferred r transmitted from one source to another by utilizing several computing resources like emails, databases or any other means. The only criterion is this type of transfer is that the resource should be accessed by Interne connectivity. Cloud computing is used for shifting or moving data or information through utmost security and so that there exists no loophole in the security structure of the data that is to be transmitted. It is the technique that is utilized by almost all organizations in modern world. The major benefit of this technique the clients of cloud computing do not have to pay for the installation and infrastructure. The cloud computing architecture is designed in such a way that the client is provided with the installation and infrastructure completely free of charge. Another main advantage of cloud computing is that it is extremely cost effective and can be installed with ease and without any type of complexities. However, sometimes cloud computing deals with several issues and problems with the security system of cloud architecture. The above literature review discusses about the basic concept of cloud security and the main applications and technologies that helps in securing the cloud computing architecture. Proper recommendations are also provided in the above review that would be helpful for increasing the security system.
The recommendations given below would help cloud computing in securing its security system and avoiding loss of data.
References
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.
Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE.
Dores, C., Reis, L. P., & Lopes, N. V. (2014, June). Internet of things and cloud computing. In Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on (pp. 1-4). IEEE.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.
Jadeja, Y., & Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 877-880). IEEE.
Kumar, P., & Kumar, L. (2013). Security Threats to Cloud Computing. International Journal of IT, Engineering and Applied Sciences Research (IJIEASR), 2(1).
Mishra, A., Mathur, R., Jain, S., & Rathore, J. S. (2013). Cloud computing security. International Journal on Recent and Innovation Trends in Computing and Communication, 1(1), 36-39.
Ryan, M. D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software, 86(9), 2263-2268.
Shelke, M. P. K., Sontakke, M. S., & Gawande, A. D. (2012). Intrusion detection system for cloud computing. International Journal of Scientific & Technology Research, 1(4), 67- 71.
Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W. (2012). Toward secure and dependable storage services in cloud computing. IEEE transactions on Services Computing, 5(2), 220-232.
Xu, X. (2012). From cloud computing to cloud manufacturing. Robotics and computer- integrated manufacturing, 28(1), 75-86.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.
The total similarity percentage is 5%. The presence of red color is 1%, blue color is 1%, green color is 1%, pink color is 1% and the rest are remaining 1%.
In the Abstract section, the similarity is of green color and 1%, which interprets there is similarity from one word to 24%.
In the annotation of Chen & Zhao (2013), the similarity index in the last line is of red color. This particular line is focusing on the features of the data and applications of a cloud platform.
In the annotation of Xu (2012), the similarity indices have four colors like the red, pink, blue and brown. Blue interprets no matching text and the rest have 1% similarity each.
In the annotation of Wang et al. (2012), the similarity index is brown color and is below
1%.
In the conclusion section, there is blue color and 1% similarity.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download