Security And Cloud Computing Research Paper

PAGES
8
WORDS
2417
Cite

Cloud Computing: Security Threats & Countermeasures, Auditing and Strategies Regarding the Cloud Abstract

The cloud is the latest development in the world of the Information Age. It provides a way for data to be stored, shared, managed, and protected in an efficient and effective manner. This paper looks at some of the security threats and countermeasures that can be conducted to help make the cloud safer. It examines why auditing is essential and what strategies can be developed to protect the cloud.

Keywords: cloud computing, cloud security, IS security, IT security risks

Introduction

As the Digital Era progresses and the needed to store data becomes more pervasive, cloud computing has risen as the solution to system needs. However, as with any solution there come myriad risks that must be addressed. As Pfleeger and Pfleeger (2012) show, the cloud has five distinct characteristics: 1) it offers on-demand self-service, 2) it provides broad network access, 3) it offers resource pooling, 4) it has rapid elasticity, and 5) it gives measured service. The models of cloud computing are software as a service, platform as a service, and infrastructure as a service. The cloud types can be public, private, community-based, or hybrid (two or more types of cloud). And while cloud computing is generally regarded as secure technology, there are still security risks that have to be understood (Ahmed, 2014). This paper will examine these risks, the trends in cloud computing, companies that offer cloud computing services and regulatory issues surrounding it.

Technology Involved

Ahmed (2014) defines cloud computing as “merely a model for enabling convenient, on-demand network access to shared data pools) of configurable computing resources (e.g.,, Networks, servers, storage, application, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction” (p. 207). It is a way for computing services to be pooled together in one place—like a public swimming pool that everyone with a pass has access to. The pool, of course, can be private—and members have to belong to the community of condos with access to the pool; or it can be private—and those who use it share a compound. But in every case the idea is the same. All computing, networking, server, storage, software, application and service needs are handled in the cloud, which is designed and developed for that specific purpose: to extend the metaphor, the cloud has its own pool boys, lifeguards, cleaners, and so on—those using it do not have to worry about any of the maintenance. They pay their fees and the work is done for them. That is the essence of cloud computing. To put it simply, cloud computing is conducted by a group of remote servers that host files that can be accessed by a computer linked to the Internet. Of course, whenever the Internet or networks are involved, risks of security breach are going to be present. Like anyone who is hot, the pool is the most inviting place to be—and people will try to get in whether they are invited or not. The same goes with cloud computing.

There are three risks to be assessed when utilizing cloud computing services: information security risks, physical security risks and risks to compliance. Just because the security solutions may be developed does not mean all clouds will have them. This is why auditing is so important. Before expanding on that thought, a review of the risks is needed. Gibson (2015) shows that in order to manage risk effectively, one has to be aware of the “threats and vulnerabilities” to one’s system (p. 2). So what are the threats and vulnerabilities of cloud computing?

...

Hacks can occur at any time in any place, and there is no lack of evidence in recent years to show how virtually any corporation, company, entity or organization can be attacked. Protecting the confidentiality of information, therefore, is one of the main risks of cloud computing (Ahmed, 2014). In a traditional network, data is safeguarded by virtue of cryptography and the physical isolation of the network for the rest of the global community. The user of the network bears the responsibility of securing it. In the cloud, the responsibility is taken out of the user’s hands and placed in the hands of those operating the cloud.
Johnson (2015) identifies the risks to information security categorically: a) unauthorized access risks, b) confidentiality risks, c) integrity risks, d) authentication risks, and e) availability risks. Only those users authorized to enter the cloud should have access. All information should be kept confidential to those without permission to see it. Information should not be “improperly changed” (Johnson, 2015, p. 10) or altered in a way that corrupts it. Devices that access the cloud should be authenticated before entry is permitted. Information in the cloud also has to be available upon request. There are also bound to be “loop holes in the security architecture of the cloud, which can be exploited by malicious users to gain access to the cloud network and the resource infrastructure” (Kashyap & Sharma, 2015, p. 33), and these need to be addressed as no matter what company is operating the cloud there will always be vulnerabilities.

Risks Relating to Physical Security

There are also physical security risks to be understood in cloud computing. Though the cloud offers a remote service where data can be stored and accessed, the actual physical servers hosting the data exist somewhere—i.e., they have a physical location. A power outage in the area where the servers are located could cause the cloud to go offline and leave users without access to their data. This happens on occasion for companies like Amazon Web Services.

The many physical security risks are associated with “hardware, virtualization, network, data and service providers” (Kazim & Zhu, 2015, p. 109). Attacks on any of these structures can lead to the compromising of the cloud. Denial of Service attacks can overwhelm a system and lead to inefficiencies for companies that have websites up for public use. In the cloud, the interconnectedness of parts creates a complex environment where vulnerabilities are not always seen until an intruder with malicious code finds them and exploits them.

Risks Relating to Compliance

Compliance is a major factor that has to be addressed, as non-compliance will essentially open the door to risks, hacks, unwanted exposure and so on. To manage compliance risks, policy principles have to be documented and a policy issued that defines how the cloud computing company intends to operate—this is the nuts and bolts of the operation—the blueprint of who does what where, when, how and why (Johnson, 2015).

Procedures have to be written to ensure the policy is executable and guidelines must be provided that establish the parameters and boundaries of the policy. To help with auditing the system, a policy definitions document should be provided as well, so that no information is lost in translation when an external auditor examines the system expecting to find something that is not where they assume it will be. The policy definitions document serves as the map of the functions in the cloud…

Sources Used in Documents:

References

Ahmed, H. (2014, July). Cloud Computing Security threats and Countermeasures. Retrieved October 2, 2018, from https://pdfs.semanticscholar.org/8ee8/7566633ae84d3289ffdee687b3df08940b27.pdf 

Blaisdell, R. (2012). Laws and regulations governing the cloud computing environment. Retrieved from https://rickscloud.com/laws-and-regulations-governing-the-cloud-computing-environment/

Countermeasures. (n.d.). Retrieved from http://www.infosectoday.com/Articles/Countermeasures/Countermeasures.pdf

Gibson, D. (2015). Managing risk in information systems. Burlington, MA: Jones & Bartlett Learning. 

Johnson, R. (2015). Security policies and implementation issues (2nd Ed.). MA: Jones & Bartlett Learning.

Kashyap, R. & Sharma, S. (2015). Security challenges and issues in cloud computing— the way ahead. International Journal of Innovative Research in Advanced Engineering, 9(2), 32-35.

Kazim, M. & Zhu, S. (2015). A survey on top security threats in cloud computing. International Journal of Advanced Computer Science and Applications, 6(3), 109-113

Pfleeger, C. P., & Pfleeger, S. L. (2012). Analyzing computer security: A threat/vulnerability/countermeasure approach. NY: Prentice Hall.


Cite this Document:

"Security And Cloud Computing" (2018, October 20) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/security-cloud-computing-research-paper-2172482

"Security And Cloud Computing" 20 October 2018. Web.19 April. 2024. <
https://www.paperdue.com/essay/security-cloud-computing-research-paper-2172482>

"Security And Cloud Computing", 20 October 2018, Accessed.19 April. 2024,
https://www.paperdue.com/essay/security-cloud-computing-research-paper-2172482

Related Documents

It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to

Cloud Computing and Organizational Cost Management The contemporary market trends have put a lot of pressure on many businesses to cut down on their spending and unnecessary costs using any reasonable measure. The globalization and the emerging trends in business demand that for any business to stand a chance to grow and expand across borders, it has to both adopt the current technology and do so at a reasonable cost that

Cloud Computing Assessing the Risks of Cloud Computing Despite the many economic advantages of cloud computing, there are just as many risks, both at the information technologies (IT) and strategic level for any enterprise looking to integrate them into their operations. The intent of this analysis is to evaluate three of the top risks of cloud computing and provide prescriptive analysis and insight into how best to manage each. Despite widespread skepticism

Cloud Computing as an Enterprise Application Service Reordering the economics of software, cloud computing is alleviating many of the capital expenses (CAPEX), inflexibility of previous-generation software platforms, and inability of on-premise applications to be customized on an ongoing basis to evolving customer needs. These are the three top factors of many that are driving the adoption of cloud computing technologies in enterprises today. Implicit in the entire series of critical success

Cloud Computing Strategy Cloud computing is becoming big now, because it is easy to see how this kind of computing can be beneficial to all different types of businesses. Because of the value of cloud computing, the federal government is considering moving much of their information technology workload to the "cloud." In other words, much of the information would be stored in a way that would make access to it -

Cloud Computing Many businesses are experimenting and slowly embracing the concept of cloud computing and Web2.0 .organizations choosing projects which can reap full benefits from cloud computing and Web2.0.this evolution has began as organizations are now taking a crawl, walk run approach which is building towards an eventual implementation of cloud and Web2.0 implementation. Organizations are now following the pragmatic path towards cloud computing and Web2.0 through the adoption of new