Literature Review On Security Issues in Cloud Computing

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Title: Expertly Crafted Literature Reviews on Security Issues in Cloud Computing

Embarking on a literature review on security issues in cloud computing can be a daunting task. With
the rapidly evolving nature of technology and the vast amount of scholarly articles, journals, and
research papers available, it's easy to feel overwhelmed. However, it's a crucial step in understanding
the current landscape of security concerns within this dynamic field.

The process of conducting a literature review involves extensive research, critical analysis, and
synthesis of existing literature to identify gaps, trends, and areas for further investigation. It requires
a deep understanding of the subject matter, familiarity with academic databases, and the ability to
discern credible sources from unreliable ones.

Moreover, crafting a comprehensive literature review demands time, dedication, and attention to
detail. From formulating research questions to organizing and synthesizing information, each step
requires precision to ensure the review is thorough and cohesive.

At ⇒ StudyHub.vip ⇔, we understand the challenges that researchers face when tasked with writing
literature reviews. That's why we offer expert assistance to streamline the process and deliver high-
quality reviews tailored to your specific requirements.

Our team of experienced writers specializes in various fields, including cloud computing security.
They possess the expertise and knowledge needed to conduct thorough literature reviews, analyze
complex data, and present findings in a clear and concise manner.

By entrusting your literature review needs to ⇒ StudyHub.vip ⇔, you can save time, reduce stress,
and ensure that your review meets the highest academic standards. Whether you're a student,
researcher, or industry professional, our services are designed to help you succeed.

Don't let the complexity of writing a literature review hinder your progress. Order from ⇒
StudyHub.vip ⇔ today and let our experts guide you through the process with ease.
Moreover, the manuscript presents a comprehensive solution in literature to cater for all security
risks. However, virtualization also bears a number of (new) security risks. The underlying technology
underpinning cloud resource sharing is virtualization. In response, some tasks should be automated,
such as: Configuration management Cloud security administration Other manual processes
Prediction: Enterprises must carefully realize and follow the shared cloud security responsibility
model: vendors are accountable for operating a protected IT infrastructure. This article contains a
review of technical literatures relating security challenges and security issues of Cloud Computing.
Security and privacy are the key issues for Cloud Computing and still face some huge challenges. A
comprehensive IAM strategy involves three key steps: role design, privileged access management,
and implementation. In light of the on-demand, adaptable and versatile administration it can give, a
considerable measure of companies that beforehand deployed locally has moved their organizations
to the cloud. Therefore, enterprises adopting cloud based infrastructure must rely on the security
measures provided by their cloud service provider (CSP) to establish and secure their cloud
installations. From this cloud computing environment, both resources and applications are provided
through the Internet as a service on demand. The biggest challenge in cloud computing is the security
and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure,
sensitive data and critical applications. Cloud model of computing as a resource has changed the
landscape of computing as it promises of increased greater reliability, massive scalability, and
decreased costs have attracted businesses and individuals alike. Data security and privacy protection
issues are relevant to both hardware and software in the cloud architecture. Cloud services are
delivered from data centers located throughout the world. Cloud computing has become integral to
modern computing, enabling numerous applications and services to function reliably and efficiently
in our interconnected world. This implies that malicious code can be introduced into cloud services
and be perceived as a component of the program or service operating on the cloud servers
themselves. Inadequate planning often results from misinterpreting the shared responsibility model,
which delineates the security responsibilities of both the cloud provider and the user. However, this
security flaw arises when a company has a clear strategy for its objectives, resources, and cloud
security framework solutions. In this paper, we survey the top security concerns related to cloud
computing. Encryption can be asymmetric, which needs a public key and a private key, or
symmetric, which utilizes just one private key for encryption and decryption. For the sharing
resources that contains software, applications, infrastructures and business processes, cloud
computing is the main key. Mobile computing threats: Information stealing mobile malware. In
addition, countermeasures to potential security threats are also presented for each cloud model.
IBM’s findings reveal that misconfiguration is responsible for a significant 69% of cloud security
breaches, while Pingsafe’s research suggests that human error is a culprit in 82% of cases. Necessary
cookies are absolutely essential for the website to function properly. The meaning of data storage
security is to secure data on storage media. Although cloud computing brings a whole lot of
advantages, many security challenges have been brought up to both cloud providers and clients.
Cloud computing is a paradigm in which both the users and the service providers are benefited.
Healthcare organizations and consumers lose control when they outsource their sensitive data and
computing resources to a third party Cloud Service Provider (CSP), which may raise security and
privacy concerns related to data loss and misuse appealing threats. These solutions include the
security techniques from existing literature as well as the best security practices that must be
followed by cloud administrators.
Ensuring the security of Cloud Computing is major factor in the Cloud Computing environment. Pmt
engineers Pmt engineers Mr. Mahendra Panchal. Download Free PDF View PDF Security aspects of
virtualisation Francesco Zavatarelli, Marco Anisetti Experience has shown that virtualization can
provide a dramatic increase in the efficiency and effectiveness of complex organizations and
communities, and is expected to constitute an important technological pillar of a thriving data-driven
economy and the European single digital market. We designed a Healthcare Trusted Cloud
Computing (HTCC) framework that maintains security, privacy and considers HIPAA regulations.
Few of these threats have been addressed, but many more threats still unsolved. As we implement
cloud technology, several security issues in cloud computing need to be considered, as well as
mitigation strategies. Here are some other threats that come under the Cloud computing. This
technology provides access to many different applications. Insiders such as employees and business
partners have access to sensitive data. Cloud computing has quickly become one of the most
significant field in the IT world due to its. Hawaii International Conference on system science,
available at. So through the virtual network there is possibility to perform attack. Download Free
PDF View PDF Service delivery models of cloud computing: security issues and open challenges
desire musikavanhu Cloud computing represents the most recent enterprise trend in information
technology and refers to the virtualization of computing resources that are available on demand. The
research on cloud computing is still at an early stage. Cloud storage provides user to access remotely
store their data so it becomes necessary to protect data from unauthorized access, hackers or any
type of modification and malicious behavior. For each of these security threats we describe, i) how it
can be used to exploit cloud components and its effect on cloud entities such as providers and users,
and ii) the security solutions that must be taken to prevent these threats. A critical evaluation of the
solution by comparing it with other solutions that exist in literature is provided. Inadequate planning
often results from misinterpreting the shared responsibility model, which delineates the security
responsibilities of both the cloud provider and the user. Most concerns are related to the data that
consumers upload to the cloud. The paper highlights issues related to cloud computing. Cloud
computing has grown due to its advantages like storage capacity, resources pooling and multi-
tenancy. We aim that our proposed framework will assist in optimizing trust on cloud computing to
be adopted in healthcare sector. But cloud computing is crowded with many security related issues.
It expands different registering systems like framework figuring, dispersed processing. Whether the
service is infrastructure-as-a-service (IaaS) like Amazon Web Services (AWS) or software-as-a-
service (SaaS) such as Microsoft Office 365. Veritis, a proud recipient of accolades like the Stevie
and Globee Business Awards, offers top-notch cloud consulting services. Organizations using cloud-
based infrastructure also need complete visibility and control over their infrastructure. It is an
appealing innovation for long-haul benefits through cost diminishment and change in business
results. We contributed in customizing a cloud Service Level Agreement (SLA) by considering
healthcare requirements. Regardless, the contemporary advancement has new troubles, for instance,
data security, information inborn, and trans-code data storing.
You also have the option to opt-out of these cookies. Knowing which data needs protection will help
you set priorities and apply multiple security controls based on classification outcomes. The meaning
of data storage security is to secure data on storage media. So through the virtual network there is
possibility to perform attack. Cloud administrations are conveyed from server farms, for example,
Amazon, Google, Microsoft et cetera, all through the world. You can download the paper by clicking
the button above. The same year, an attacker used a zero-day vulnerability to steal credentials from a
cloud-based identity provider, affecting millions of users. A Review on Data Protection of Cloud
Computing Security, Benefits, Risks and. And concludes that “malware injection assault has become
a key security concern in cloud computing systems.”. We emphasize on using strong multi-factor
authentication access control mechanisms and strict security controls, as well as encryption for data
at storage, in-transit and while process. The aim of this research is to comprehensively present the
security threats with respect to their cloud service deliver models. Often it’s a kind of standard
application software functionality offered. Cloud encourages its clients by giving virtual assets by
means of web. The underlying technology underpinning cloud resource sharing is virtualization. The
idea of handing over important data to another company is worrisome; such that the consumers need
to be vigilant in understanding the risks of data breaches in this new environment. This increases the
possibilities of human error and the need for automation further. 6.People Shortage A shortage of
proficient, available, and affordable SecOps workforce is becoming an increasingly urgent issue for
almost every security enterprise that’s working in the cloud. Download Free PDF View PDF A New
Approach for providing security mechanism in cloud with possible solutions and results Sarvesh
Kumar Download Free PDF View PDF See Full PDF Download PDF Loading Preview Sorry,
preview is currently unavailable. Nevertheless, cloud computing is an important paradigm with the
potential to offer lot of benefits such as on-demand services, flexibility, highly automated processes
etc. Additionally, the types of cloud and service models have also been pointed out. Cloud providers
go to great lengths to assure security. Download Free PDF View PDF International Journal of
Software Engineering and Computer Systems Data Security Issues in Cloud Computing: Review
Mohamad Fadli Zolkipli Download Free PDF View PDF Security Issues and Challenges in Cloud
Computing: A Conceptual Analysis and Review Blessing Mambo Cloud computing is a set of
Information Technology services offered to the users over the web on a rented base. Download Free
PDF View PDF We thank the following reviewers who rendered extraordinary service to Qualitative
Inquiry, Volume 5 Susan Finley Download Free PDF View PDF See Full PDF Download PDF
Loading Preview Sorry, preview is currently unavailable. Necessary cookies are absolutely essential
for the website to function properly. Since there is no infrastructure investment requires, shrink or
expand the resources based on on-demand and the payment based on usage, it becomes popular
among different technology aspects. Categorize your sensitive data Implement the least privilege
model Audit activity across your environment Use data masking techniques that include encryption
Make sure your cloud provider provides an SLA that meets your availability needs These best
practices enable you to achieve data integrity, confidentiality, availability, and data security in the
cloud. Data can be hidden in real-time or its original location when requested by an application or a
user. Various security issues and challenges are discussed in this research, and possible opportunities
are stated. Cloud computing utilize the networks of a huge group of servers naturally brings a low
Download Free PDF View PDF A Systematic Review Paper on Cloud Security International Journal
of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT
Cloud computing is a rising method for processing in software engineering. Security and privacy are
presently considered critical factors in the adaptation of any cloud-service delivery model. Various
people have different perspectives on cloud computing.
As we proposed the concept of cloud data storage security strategy capable to overcome the
shortcomings of traditional data protection algorithms and improving security using steganography,
encryption decryption techniques, compression and splitting technique adoptable to better security
for the cloud. Cloud storage does not require any hardware and software management. To browse
Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade
your browser. Security Issues and countermeasures on Cloud Computing. It is an appealing
innovation for long-haul benefits through cost diminishment and change in business results.
Innovative Pilot Teaching Project in the Pre-school and Primary School Pompeu Fabra, Vallirana,
Barcelona. Even though that the security measures implemented over cloud computing are
developing every passing year, Security still a challenge. Thus far, security issues in cloud computing
have rarely been addressed at the service delivery level. Yet, handling off the responsibility for
managing the up-to-date software, platform, or computing resource can result in less visibility and
control over that asset. 2.Managing the effect of the Shared Responsibility Security Model The
Cloud Service Provider (CSP) is responsible for protecting its network and infrastructure. Alongside
with these security issues the cloud paradigm comes with a new set of unique features which open
the path towards novel security approaches, techniques and architectures. It requires many
overlapping and redundant systems for various cloud instances. Furthermore, some of the
countermeasures to these threats will be discussed and synthesized. Lack of consumers’ knowledge
about their data storage location may lead to violating rules and regulations of Health Insurance
Portability and Accountability Act (HIPAA) that cancost them huge penalty. Customers are
responsible for managing encryption, access, and disaster recovery protocols. To browse
Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade
your browser. But opting out of some of these cookies may have an effect on your browsing
experience. The research on cloud computing is still at an early stage. This implies that there is
limited visibility and control over the data. Security is one of the main challenges that hinder the
growth of cloud computing. This framework is based on Xen which offers two configuration modes.
Cloud Computing provides shared resources and services via internet. Cloud computing depends on
the internet as a medium for users to access the required services at any time on pay-per-use pattern.
In this paper, we make a comparative research analysis of the existing research work regarding the
data security and privacy protection techniques used in the cloud computing. Cloud technology
allows companies to offload their data and computing needs to remote, highly secure data centers,
eliminating the need for maintaining an in-house server room. It additionally tackles numerous issues
of stereotyped processing, including taking care of more volume of burdens, introducing
programming updates, and, utilizing overabundance figuring cycles. Data can be hidden in real-time
or its original location when requested by an application or a user. The East Carolina University
Report on security threats on cloud computing security risks vulnerabilities examines the risks of
malware installations on cloud security security issues. Many of the choices that build cloud
computing partaking, haven't challenged the prevailing security system merely, but have created
serious security issues. And pose as “legitimate instances” while running as SaaS from cloud servers.
HTCC framework deploys Trusted Computing Group (TCG) technologies such as Trusted Platform
Module (TPM), Trusted Software Stack (TSS), virtual Trusted Platform Module (vTPM), Trusted
Network Connect (TNC) and Self Encrypting Drives (SEDs).
In this paper, we make a comparative research analysis of the existing research work regarding the
data security and privacy protection techniques used in the cloud computing. To browse
Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade
your browser. Cloud computing has become integral to modern computing, enabling numerous
applications and services to function reliably and efficiently in our interconnected world. Finally,
possible solutions for each type of threats will be introduced before we end with conclusions and
future work. A Review on Data Protection of Cloud Computing Security, Benefits, Risks and. This
implies that there is limited visibility and control over the data. But opting out of some of these
cookies may have an effect on your browsing experience. You can download the paper by clicking
the button above. Cloud administrators must acquire fresh strategies and skill sets tailored to the
unique demands of data security in cloud computing. Download Free PDF View PDF We thank the
following reviewers who rendered extraordinary service to Qualitative Inquiry, Volume 5 Susan
Finley Download Free PDF View PDF See Full PDF Download PDF Loading Preview Sorry,
preview is currently unavailable. By using cloud-computing services, companies can avoid the
various costs and complexities associated with owning and maintaining their own IT infrastructure
as everything is taken care of by the service providers. The main contributors to data loss included
violations of security policy, the implications of employees using their own devices, and the lack of
adequate access controls. In this model, the infrastructure is owned by a third party vendor and the
cloud computing services are delivered to the requested customers. Whenever, a task is distributed
over web, there encounters a series of potential threats that challenges the security of data such as
buffer overflow, session hijacking and black hole attacks. This paper discusses about an overview of
cloud computing and security issues of cloud computing. This requires IT and security teams to
collaborate and develop solutions that align with the pace and demands of cloud-based DevOps
practices. The numerous cloud enterprise system looks for these advantages to be used in various
applications. However this technology is still in its initial stages of development, as it suffers from
threats and vulnerabilities that prevent the users from trusting it. A unified solution must be devised
to provide security teams with the necessary insights without disrupting the velocity of DevOps.
Cloud storage provides user to access remotely store their data so it becomes necessary to protect
data from unauthorized access, hackers or any type of modification and malicious behavior. The
biggest challenge in cloud computing is the security and privacy problems caused by its multi-
tenancy nature and the outsourcing of infrastructure, sensitive data and critical applications.
Enterprises invest heavily in the cloud security workforce, i.e., towards skills, competencies, and
governance tools. Substantial amounts of critical data are not secured enough. These statistics
underscore the requirement for strong cloud security framework measures to secure sensitive data
and prevent unauthorized access. Looking at the potential impact on it's varied business applications
additionally as in our life-style, it'll be same that this troubled technology is here to stay. The analysis
proves the thoroughness and outperformance of the comprehensive solution compared to the other
solutions that exist in literature. Moving to the cloud changes a company’s attack profile; the surface
area increases. Security, being the major issues which hinder the growth of cloud computing service
model due to the provision of handling confidential data by the third party is risky such that the
consumers need to be more attentive in understanding the risks of data breaches in this new
environment. Cloud administrations are conveyed from server farms, for example, Amazon, Google,
Microsoft et cetera, all through the world. Employees with authorized access to a company’s cloud-
based services may misuse or gain access to sensitive data such as client accounts, financial forms,
and other information.
With disregard to the possible benefits of cloud computing services, the organizations are reluctant to
invest in cloud computing mainly due to security concerns. Security and privacy are the key issues
for Cloud Computing and still face some huge challenges. You also have the option to opt-out of
these cookies. The occurrence of these threats may result into damaging or illegal access of critical
and confidential data of users. Actual encryption key management is involved; in general, you must
create policies that guarantee only trusted people can access them. HTCC was evaluated by
comparing with previous researchers’ work and conducting survey from experts. Moreover, the
manuscript presents a comprehensive solution in literature to cater for all security risks. Today cloud
computing is utilized as a part of both mechanical field and scholarly field. Whether you’re
transitioning to the cloud or already there, trust Veritis for advanced security solutions and adaptable
cloud computing services. Cloud Computing and Security Issues”, ISSN 2224-5758(paper) ISSN
2224-896X(online) Vol.3, No.1, 2013. In this section I provide a brief description about the possible
solutions to prevent or reduce threats which. To ensure the sensitive data is stored only in protected
locations and accessible only by authorized users. The thesis is also extended to present both the
theoretical and empirical results of the proposed improved elliptic curve based public key
cryptography to prove that the model is better than the traditional RSA based schemes in terms of
encryption, decryption time and key sizes. It also gives teams the information and resources they
need to work together. Cloud computing has quickly become one of the most significant field in the
IT world due to its. This paper discusses about an overview of cloud computing and security issues
of cloud computing. Download Free PDF View PDF We thank the following reviewers who
rendered extraordinary service to Qualitative Inquiry, Volume 5 Susan Finley Download Free PDF
View PDF See Full PDF Download PDF Loading Preview Sorry, preview is currently unavailable.
Since cloud computing share distributed resources via the network in the open environment, security
problems becomes more important to develop the secure cloud computing application. Out of these
cookies, the cookies that are categorized as necessary are stored on your browser as they are
essential for the working of basic functionalities of the website. Inadequate planning often results
from misinterpreting the shared responsibility model, which delineates the security responsibilities of
both the cloud provider and the user. In response, some tasks should be automated, such as:
Configuration management Cloud security administration Other manual processes Prediction:
Enterprises must carefully realize and follow the shared cloud security responsibility model: vendors
are accountable for operating a protected IT infrastructure. SaaS users have less control over security
among the three fundamental delivery models in the. Due to this, someone outside your IT
department may oversee protecting some of the most critical data in your company. This framework
is based on Xen which offers two configuration modes. Enterprises invest heavily in the cloud
security workforce, i.e., towards skills, competencies, and governance tools. Employees with
authorized access to a company’s cloud-based services may misuse or gain access to sensitive data
such as client accounts, financial forms, and other information. It additionally tackles numerous
issues of stereotyped processing, including taking care of more volume of burdens, introducing
programming updates, and, utilizing overabundance figuring cycles. Thus the present system needs
an effective mechanism to address the problem encountered in cloud computing.This thesis is
intended to provide an enhanced security service in cloud computing model using an enhanced
Elliptic Curve Cryptography algorithm for securing user data over cloud. It is an Internet-based
computing, where common resources, software and information are delivered to devices and
computers on-demand. Encryption can be asymmetric, which needs a public key and a private key,
or symmetric, which utilizes just one private key for encryption and decryption.
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and. Cloud computing
is characterized as a web-based software service since Information Technology (IT) resources like
network, server, storage, and so on are based on the Web. When relocating operations to these
dynamic environments, a company may fail due to a lack of awareness of cloud risks and cloud
security best practices. Such hybrid cloud architecture builds up tricky security dynamic for SecOps
to track. Cloud Computing and Security Issues”, ISSN 2224-5758(paper) ISSN 2224-896X(online)
Vol.3, No.1, 2013. Cloud computing has grown due to its advantages like storage capacity, resources
pooling and multi-tenancy. Cloud Computing and Security Issues”, ISSN 2224-5758(paper) ISSN
2224-896X(online) Vol.3, No.1, 2013. This expansion in cloud processing condition likewise expands
security challenges for cloud engineers. This paper enhanced advance security goal for cloud data
storage. Infrastructure as a Service” International journal of advanced research in computer science
and software. It is an Internet-based computing, where common resources, software and information
are delivered to devices and computers on-demand. Methodologies for Enhancing Data Integrity and
Security in Distributed Cloud. Regardless, the contemporary advancement has new troubles, for
instance, data security, information inborn, and trans-code data storing. This study looks at a few
important security vulnerabilities with cloud computing, as well as available remedies to those
security issues in the cloud computing sector. Out of these cookies, the cookies that are categorized
as necessary are stored on your browser as they are essential for the working of basic functionalities
of the website. For instance, a third-party supplier keeps data in the cloud and accesses it online. One
single method or technology won’t protect your cloud data, but a cluster of multiple technologies can
surely complement one another. At the core of cloud computing is a datacenter that uses
virtualization to. Cloud storage does not require any hardware and software management. In this
cloud-based approach, the term “serverless technology” often arises because it abstracts the
complexities of server management, permitting users to focus on their applications and data without
dealing with the underlying infrastructure. Many companies have data across public, on-premises,
and private cloud architectures, and others have applications and data that bridge AWS, Azure, and
Google cloud. These services can range from one-off automated IT tasks to services that are made up
of application and infrastructure components and tethered to business processes. For each of these
security threats we describe, i) how it can be used to exploit cloud components and its effect on
cloud entities such as providers and users, and ii) the security solutions that must be taken to prevent
these threats. A comprehensive IAM strategy involves three key steps: role design, privileged access
management, and implementation. In this paper, we have discussed the security issues, the challenges
and the opportunities in the adoption and management of cloud computing services model in an
organization. Download Free PDF View PDF We thank the following reviewers who rendered
extraordinary service to Qualitative Inquiry, Volume 5 Susan Finley Download Free PDF View PDF
See Full PDF Download PDF Loading Preview Sorry, preview is currently unavailable. Mobile
computing threats: Information stealing mobile malware. To browse Academia.edu and the wider
internet faster and more securely, please take a few seconds to upgrade your browser. We also use
third-party cookies that help us analyze and understand how you use this website.

You might also like