International Technical Telecommunication Network Security Presentation

User Generated

xhznequbaqv2123

Computer Science

International Technical College

Description

Hi,

We need Research Paper for below topic, format of the paper is attached with this question.

"Security and Privacy challenges in Cloud Computing Environment"

PPT with 10 pages is also required

Unformatted Attachment Preview

The Task Your task is to write a report summarizing your research (about 10 pages). The writing should be original. Before you begin writing your report, you need to read as many references related to the subject as you can. Basically, you would feel a bit insecure writing about a topic until you have digested and completely understood several references. You will have a table of contents for the paper with sections as shown in the suggestions below:: • Abstract section summarizing your research • Introduction section: this section provides an overview or background of the topic and its purpose, including o Define the subject area and why is this subject important? • Body of work sections: o What are the key issues (pros/cons, if appropriate)? o Identify benefits, obstacles, innovations as appropriate o Methodology: key ideas, summaries, measures, analytical discussions, etc. • Conclusion section: analyze and summarize your findings, state your opinions, conclusions, recommendations. It is common for such a paper to suggest new ideas, critique some of the existing ideas, and propose some new directions. • References section: Sources and references need to be cited properly using APA format. Around 10 or more references is appropriate, some of which must be scholarly peer-reviewed articles
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello! Here is your work. Looking forward to help in the future. Thanks.

Running head: CLOUD COMPUTING ENVIRONMENTS

Security and Privacy Challenges in a Cloud Computing Environment

Name:
University Affiliation:
Professor:
Date:

1

CLOUD COMPUTING ENVIRONMENTS

2

Abstract
Cloud computing is extremely beneficial to the human race. However, it comes with
manifold risks that threaten the innovation unless well mitigated. This work addresses some of
the key issues in cloud computing. The issues addressed are heterogeneity, identity and authentication
management, access and accounting, and transparency. Benefits of cloud computing include
reducing the strain on the natural environment, leading to a greener future. Several obstacles to
success in cloud computing are identified. The research concludes that cloud computing has
come with manifold blessings to the computing world but it has not been easy to contain the
wayward data security and privacy issues. The research recommends that concerted efforts by
both the customer and the cloud service provider should be embraced so as to solve the problem
in a long-lasting manner.

CLOUD COMPUTING ENVIRONMENTS

3

Table of Contents
Abstract ........................................................................................................................................... 2
Introduction ..................................................................................................................................... 4
Body Of work ................................................................................................................................. 5
Key Issues in Cloud computing .................................................................................................. 5
Benefits of Security and Privacy a Cloud Computing Environment .......................................... 9
Obstacles to Security and Privacy in a Cloud Computing Environment .................................... 9
Conclusion .................................................................................................................................... 11

CLOUD COMPUTING ENVIRONMENTS

4

Introduction
Although the efforts of many researchers to come up with a standardized definition of
cloud computing have not gone unnoticed, there is scarcely a standard definition of the same that
is widely acceptable to all. Cloud computing can be considered as a reference that is used for
computer system resources’ availability. This is the on-demand availability ("What Cloud
Computing Has to Offer," 2010). Cloud computing doesn’t have to depend on a direct
management that emanates from the user. This term has been widely used as a reference to data
centers that can be accessed by many users over the internet. Cloud computing is vulnerable to
misuse by an unauthorized user. There are many privacy concerns related to cloud computing
since the data is readily available in the cloud at any given time. Cloud computing poses privacy
concerns because the service provider can access the data that is in the cloud at any time
(Haghighat, Zonouz, & Abdel-Mottaleb, 2015).

Data or information that is readily available in the cloud can easily be deleted or even
altered, either accidentally or deliberately. Additionally, there have been cases where many third
parties have been accused of sharing information in regard to the law without a warrant
(Michelle, 2012). Unfortunately, these are issues that are agreed upon when accepting to use
cloud services. Cloud computing is not static but it is a paradigm that is continually evolving at a
high speed. There are many unique aspects that make cloud computing. Consequently, the
unique attributes of cloud computing make it vulnerable to privacy and security challenges
(Takabi & Joshi, n.d.).
The relevance of cloud computing cannot be fully understood without first understanding
the principal characteristics that are involved, the delivery and the deployment models of the

CLOUD COMPUTING ENVIRONMENTS

5

same. There is also a need to understand the way customers make use of the services and the
ways that are appropriate for safeguarding the customers (Bertino, Martino, Paci, & Squicciarini,
2010). There are several key components in cloud computing. These incorporate locationindependent resource, on-demand self-service, measured service, ubiquitous network access,
rapid elasticity and pooling. These are meant to achieve a transparent and seamless use of clouds.

Body Of work
Key Issues in Cloud computing

The environments for cloud computing allow each of the domains to use diverse privacy,
trust and security requirements by use of various interfaces, mechanisms as well as semantics.
These domains may also be representatives of services that are individually enabled. Such
service orchestration calls for naturally relevant technology so as to facilitate the formation of
multi-domains.

Heterogeneity. There are various forms in which heterogeneity is achieved in the clouds.
For instance, this can comes in the form of software and hardware resources for building cloud
environments. High-level system homogeneity comes as a result of resource virtualization but
there are other cases where difficulties can emerge from the use of the infrastructure that is being
used as it interfaces with the divers system protection requirements. Vertical heterogeneity is
also another potential problem. There are instances where a client may decide to subscribe to a
PaaS from a particular provider and then incorporate it with an IaaS from a different service
provider. Additionally, the same client can also consider it a wise decision to have several pieces
of SaaS. In this decision, they may subscribe to a third cloud computing service provider. The

CLOUD COMPUTING ENVIRONMENTS

6

service providers may be faced with a challenge via the assumptions that they make while
providing the services in this environment. As a result, the trust between the provider and the
consumer is greatly affected. Additionally, heterogeneity depends on the level of security
treatment that is provided by each component. Integration challenges ensue since heterogeneity
and the level of security provided by each component make the habitat for heterogeneity.
Protection requirements for the various tenants differ, potentially making the multi-tenant
environment a point of compromise. There is also the challenge that each tenant may have
diverse levels of trust with the service provider. Instances of the tenants being attackers or
malicious have also been reported. All these issues generate complexities in trust.

Identity and authentication management. Personal information is easily accessible to
users when they use cloud computing. this information can be accessed through many services
over the internet. Authentication of users can be established by the use of Identify Management
Mechanism (IDM). This is made possible via the use of credentials as well as characteristics.
When IDM is mentioned, interoperability drawbacks pop up as a very critical issue. These
emerge from the use of diverse tokens of identity negotiation procedures. Although the widely
used password authentication has been around for many decades, it does not want in matters
inheriting limitations. As a result, it has been rightly associated with multiple risks. It is required
that an IDM protects sensitive and private user information and processes. There is a paucity of
the knowledge of the extent to which multi-cloud environments affect privacy and security of
authentication information. As users interact with front-end services, there is still a risk of being
vulnerable to other third parties who interact with the service provider. If precautionary measures
are not used, third parties can acquire the identity of these users.

CLOUD COMPUTING ENVIRONMENTS

7

Access and accounting. In cloud computing environments, the diverse access
requirements demand access control policies. There should be a flexibility of control services so
as to allow access requirements that are control based. This would be useful in enforcing the
least privilege principle. The access control services may sometimes require integration with
privacy protection. These are requirements that are often expressed in very complex rules. The
need for an easily manageable control system is great.

Cloud computing effectively ensures that users lose control of their data in significant
ways. Once a customer moves their data from their local servers to remote servers, their
information is at stake. This is in essence, giving up absolute control of data (Pearson, S., &
Benameur, 2017). The top threats in cloud computing are data breaches and data loss. According
to Burlakov (2019), the world has witnessed an escalation of data breaches in the recent past.
Customers are continuously worried that their data is no longer safe with an outage on many
reputable CSPs like Google Drive, Drop box and Amazon being attacked. In addition to this,
cloud computing stores data in other jurisdictions that may be subject to violations of the law in
such jurisdictions.

Transparency. Transparency in cloud computing refers t...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4