0% found this document useful (0 votes)
26 views12 pages

Cyber Security

NA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views12 pages

Cyber Security

NA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Cyber Security

Abstract:
The security of cloud computing is major problematic. Due to the information in clod has
transferred over the internet, security of the information among the main concern. A key
mechanism for protecting the information such as authorization, authentication, assessment
control, privacy, accountability, and integrity should be handled. The technology of the
blockchain creates cloud computing. Cloud computing reflects the distributed system of the
virtual machine which could be dynamically given to meet varying the resources needs of the
consumer & present base of the cloud computing. The main aim is to compare and analyze the
different challenges and issues in cloud security and environment challenges using the
blockchain. Cloud computing security is very essential to protect the information, infrastructure,
and application of cloud computing. The security is given by policies & various technology.
Cloud computing is a very essential domain in information and network security. Management
makes use of the cloud environment along with the various service model for the cloud and the
model of the deployment. The cloud security challenges are the two categories namely
challenges faced by the provider of the cloud and challenges faced by cloud consumers. The
approaches of cloud computing give efficient resources for the end consumers. The cloud
computing characteristics involve availability, scalability, and manageability. Cloud computing
benefits the economy, stability, flexibility, multi-tenancy, universality, and convenience. Cloud
computing gives the 3-service model & 4 development patterns IaaS, PaaS, SaaS, hybrid cloud,
private cloud, community cloud, and public cloud.Management makes use of the cloud
environment along with the various service model for the cloud and the model of the
deployment. The cloud security challenges are the two categories namely challenges faced by the
provider of the cloud and challenges faced by cloud consumers. The provider is responsible for
both infrastructure and the consumer information and also protects the application, while the
consumer uses strong authentication and passwords measures. The security is given by
authenticating the hash value, encryption, and peers. Cloud computing depends on the service
outcomes in describing the layer of the abstraction among the server or physical storage and
consumer whose services or information are processed in cloud computing. It connects the cloud
computing resources, software resources, and storage resources to a huge share of the virtual
pool resource, from that the consumer could purchase the corresponding services, like
hydropower.

Introduction:
Cloud computing use many managementsto store a wide amount of information on the cloud.
Hence, there are required to secure the information that might be in form of the video, audio,
text, etc. There are many algorithms designed by an employee to secure the information on cloud
computing. This report elaborates on a few essential algorithms for data security. Cloud
computing about the security challenges same as the countermeasures of highly debated in this
field. Over, the different survey about cloud security has already been prevalent, a certain gap
among the actual mapping these challenges to the corresponding solution. The requirement for
cloud computing is growing gradually day by day. The security of cloud computing is major
problematic. Due to the information in clod has transferred over the internet, security of the
information among the main concern. A key mechanism for protecting the information such as
authorization, authentication, assessment control, privacy, accountability, and integrity should be
handled. The technology of the blockchain creates cloud computing. The blockchain overcome
security challenges. The main aim is to compare and analyze the different challenges and issues
in cloud security and environment challenges using the blockchain. Cloud computing security is
very essential to protect the information, infrastructure, and application of cloud computing. The
security is given by policies & various technology. Cloud computing is a very essential domain
in information and network security. Management makes use of the cloud environment along
with the various service model for the cloud and the model of the deployment.

The cloud security challenges are the two categories namely challenges faced by the provider of
the cloud and challenges faced by cloud consumers. The provider is responsible for both
infrastructure and the consumer information and also protects the application, while the
consumer uses strong authentication and passwords measures. Therefore, effective cloud security
is required that give control to protect the application by reducing all the attacks. New
technology is the blockchain in the data area along with good security. The security is givenby
authenticating the hash value, encryption, and peers. The use of cloud computing in all the
information technology environments as of availability and efficiency.At present time, many
managements are hosting their cloud application. Therefore, many datacenters are managed and
created, thereby savinga wide amount of the price. Accessibility is improved because it could be
accessed. There is no requirementfor consumers to own infrastructure & handle them. A few
cloud vendors involve IBM, Microsoft, and Amazon. Cloud computing has several
characteristics availability of increased the number of resources, services, and flexibility from
any network that could be easily accessed. Cloud computing is the key technique to deliver the
infrastructure & information service needs at decreased cost & along with the minimum efforts
& also increased the scalability level and hence implemented highly in the different aspects of
the information technology industry. A rapid increase in adopting cloud computing has been seen
although, still the data security concern has not been countered fully. Data security concerns are
hindering increased cloud computing to a few extents & required to resolve. Blockchain has
emerged because is the key technique to give security in the aspect of confidentially,
authenticity, and integrity. There are different aspects of blockchain security & cloud computing
& more analyze blockchain applications in cloud computing.

Background:
Cloud computing isa service that is based on the internet & that providesthe facility to share the
resources of the computing with other devices on the user demand. The mechanism that enables
on-demand to share resources. The storage application, networks, data center, and server could
be stored information. It could be generatedalong with minimum efforts. Cloud computing gives
the facility to management and the consumer to keep the information private or the storage
location & these information centers might be located. Cloud computing explains NIST and
rising the technology in daily life for each give on demand the web services such as servers,
storage, network and application along with the cost efficiency and flexibility of the consumer.
The cloud computing techniques which are reduced or increased the capacity of the storage
because it does not invest in the new infrastructure. The cloud storage process containsa layer
that store information on the cloud information center, an organization layer that ensures security
and privacy of the application of the cloud storage, and the layer interface which give the
platform of the application service, & lastly layer of the cloud access that gives the accessibility
to the user of the cloud.

The models of the cloud are classified along with the various service such as the IaaS
(infrastructure as a service) is developing the segment of the market of the cloud which delivers
the customized infrastructure. The PaaS gives the environment and platform to develop which
build application and services of the cloud on web & services are store in cloud computing &
accessed the cloud consumer web browser. The SaaS gives its own application running on the
cloud infrastructure. Cloud computing consumersare required not to manage to control the
infrastructure of the cloud, involving application, network, services, operating system, and
storage. It reduces the required computers, to run, handle, store, and server all the applications.
Cloud computing security is very essential to protect the information, infrastructure, and
application of cloud computing. The security is given by policies & various technology. Cloud
computing is a very essential domain in information and network security. Management makes
use of the cloud environment along with the various service model for the cloud and the model
of the deployment. The cloud security challenges are the two categories namely challenges faced
by the provider of the cloud and challenges faced by cloud consumers. Cloud computing
information is increased exponentially although the security of the information is questionable.
During the transfer of the information to cloud computing, secure difficulties occur &the
information owner decreased control on the information. Privacy and security for cloud
information are the main aspects of cloud computing thatare not solved. The cloud security
issues involve sensitive data leakage and unauthorized access. Cloud computing gives on to the
demand for web services. If an organization giving the internet service is required to invest to
increased money for difficulties and infrastructure such as software bugs, disk failure, and
machine failure. The security of cloud computing is major problematic. Due to the information in
clod has transferred over the internet, security of the information among the main concern. A key
mechanism for protecting the information such as authorization, authentication, assessment
control, privacy, accountability, and integrity should be handled. The technology of the
blockchain creates cloud computing.

Cloud computing reflects the distributed system of the virtual machine which could be
dynamically given to meet varying the resources needs of the consumer & present base of the
cloud computing. The cloud relievesthe consumer of maintenance and installation of the system,
reduced automatically the cost & enhances the efficiency system. Cloud computing depends on
the service outcomes in describing the layer of the abstraction among the server or physical
storage and consumer whose services or information are processed in cloud computing. It
connects the cloud computing resources, software resources, and storage resources to a huge
share of the virtual pool resource, from that the consumer could purchase the corresponding
services, like hydropower. Along with the rapid popularization of the application of cloud
computing, cloud computing penetrated different fields, like entertainment, consumption,
education, production, and scientific research. The security is given by policies & various
technology. Cloud computing is a very essential domain in information and network security.
Management makes use of the cloud environment along with the various service model for the
cloud and the model of the deployment. The cloud security challenges are the two categories
namely challenges faced by the provider of the cloud and challenges faced by cloud consumers.
The provider is responsible for both infrastructure and the consumer information and also
protects the application, while the consumer uses strong authentication and passwords measures.
The security is given by authenticating the hash value, encryption, and peers. The use of cloud
computing in all the information technology environments as of availability and efficiency. At
present time, many managements are hosting their cloud application. Therefore, many
datacenters are managed and created, thereby savinga wide amount of the price. Accessibility is
improved because it could be accessed.

Virtualization play the essential role in the cloud computing due to allow the appropriate dgree
for the manageability, isolation, security, and customization which are delivering fundamental of
the information technology services. The infrastructure as a service is depend on concept of the
hardware virtualization as the programming level contribute the PaaS offer. The GA (genetic
algorithm) is search approach which is utilized to discover exact or approaximate solution to
search and optimize difficulties. Genetic algorithm convert domain difficulties to the model by
used the chromosome & algorithm starts along with the random selection. Cloud security handle
the availablity, integrity, availability, and confidentiality of the information store in the cloud.
The needs of the cloud security involve the governance, monitoring, assurance, trust, and robust
security. Information and computation in the cloud associated along with the security risk like
failure in the insolation, loss o the governance, legal risk, compliance, authorization,
authentication, and service availablity. Cloud computing reflects the distributed system of the
virtual machine which could be dynamically given to meet varying the resources needs of the
consumer & present base of the cloud computing. The main aim is to compare and analyze the
different challenges and issues in cloud security and environment challenges using the
blockchain.
Aims & Objectives:
The aim of this research is to find out security issues to adopt cloud computing for businesses
and work. This report will also provides effective security measures that can be taken to protect
cloud structure and cloud storage and resolve different issues that are faced in the cloud
computing. It is very necessary to have proper mitigation methods that can be usable to find out
effective solutions. There are several objectives of this research and these objectives are
effectively provided below:

 To find out existing issues of cloud computing protection & security & its potential
solutions from effective study.
 To find out the issues that do not have any mitigation technique.
 Gather practices/guidelines/solutions from companies, for an issue with more higher
references but no mitigation or protection techniques proposed.
 Find out effective guidelines/practices/solutions to the issues of cloud computing that
cannot be resolved yet.

Security Issues & Challenges in Cloud Computing:


Cloud computing is a fast developing technology that provide various services to the different
organisations to manage their data on a single platform. It is very necessary to have effective
security services for the cloud computing. As a delivery model for information technology
services cloud computing as effective capacity to stimulate the growth of organisation by giving
effective environment for different type of development. The nature of cloud computing
generally make it vulnerable to different security threats that can affect the consumer and
provider of the the cloud computing services. Generally these issues are are relevant to the the
protection and safety of the data that is stored and flow in the clouds. Generally these issues
include data privacy, data access, and data availability. Organisations developed several effective
processes such as service authentication and data encryption to resolve different issues. This
research is capable to examine and explore different type of of security problems with its
effective solutions that can be utilised in the organisation to reduce security problems. It is very
necessary to understand the concept of cloud computing so that we can effectively find out
potential solution for security issues that are faced by organisations in their clouds. Cloud
computing provide on demand self services that can be utilised in organisations to manage their
data at a single platform with efficiency. There are several issues of security in the cloud
computing as it encompass several technologies such as operating systems, databases, networks,
memory management, concurrency control, load balancing, transaction management, and
resource scheduling. So that security problems for various of these technology and systems are
applicable in the cloud computing. Security of data in walls data encryption also ensure that
proper security measures are enforce to sharing of data. Generally it is analysed that to secure the
data of the organisation encryption techniques can be utilised that provide a high level security
services to the cloud.

In several ways, the threats of security are faced by data centers that are traditional in the
environment of cloud computing. On the both side, attackers targets to take benefits of security
threats that are find out in the software. As cloud services are majorly utilized by several
organizations it becomes very important to provide effective security to cloud service providers
so that security can be managed in the environment of cloud computing. The threats to data
factors available in the cloud platform can be vary according to the models of cloud delivery that
are utilized in the organizations. There are many kinds of security issues by which cloud
computing is very vulnerable. Cloud computing is cost effective and flexible and allow uses to
access the data from anywhere in the world full stop there are several benefits of cloud
computing as users can store their all the data on the single platform so that data redundancy risk
can be reduced. Unfortunately it is analysed that there are several security challenges and issues
in the cloud computing that should have to be resolved so that effective services can be manage.
This is study is capable to provide effective cloud computing security issues that are analysed
from the past some years. Also this study will provide effective security services that can be
adopted by the cloud computing service providers. Different types of security risk that are
available in the environment of cloud computing effectively provided below in this section.
There are several benefits of cloud computing services along with the security issues that are
effective discussed here.

 Data Loss: Data loss is generally considered as the biggest issue in the cloud computing.
It is also known as data leakage problem. Every customer or user of the cloud I wants that
the data remains secured and safe. But due to compact architecture of the cloud some data
loss issues are find out from the past some years. Uses do not want that their sensitive
information can be accessed by other persons. A very significant key & factor to
collaborate in the cloud computing is easy sharing of data in the cloud. However this easy
sharing of data also generate several serious security issues related to data leakage, data
loss, or data breaches. A cloud provide very easy services to share information and data
that is stored in it. However when the data or information is accessible online then this
data or information is always vulnerable to different security issues or there is always a
data breach risk. The systems of cloud permit information to be e transfer for share easily
through public links, invitations of direct email with other people. People don't want to
lost their data. If any e person that can breach the cloud service security then he can
access all the information that is available in the cloud so it becomes very necessary to
have a strong security measurements on the cloud services.
 Insecure API’s & Interference of Hackers: When there is a conversation on cloud and
their services then we talked about Internet services. Generally it is analysed at use of
API in the cloud can provide effective and easy communication services to all the users.
So that it becomes very essential to safeguard the API's and interfaces data utilised by the
the external users. Unsecured interfaces and APIs can lead to security challenges and
issues of cloud computing. APIs are very important for customerisation of cloud
experience all the these are vulnerable to different security threats. APIs permits
organisations to customised the solutions features of the cloud according to users
requirements. Also API offers data recognition, data access, and data encryption. The
poor design of the interface can lead to the the data breach in the cloud services. The
effective and proper tracking of several activities with effective access management can
help to detect unsecured interfaces and APIs. Interfaces can be easily accessed by the
third-party services so that it is very possible that hackers can utilise the services to grab
the data and easily access the system.
 User Account Hijacking: Generally it is considered as the most important security issue
in the cloud computing as the security of the user account is very essential. Hijacking of
the account is considered as the most serious issue of security in the cloud computing.
Somehow the users account or account of the organisations can be hijacked by the
hackers. Then the hackers get full authority of the account and perform several
unauthorised activities. This issue generally arise when the criminals get the personal
banking information or users account information from the cloud. It is very important to
have effective security techniques to resolve this issue.
 Change of Service Provider: Vendor locking is considered as a very essential issue of
security in the cloud computing. Several organisations can face different issues while
shifting from their services from one vendor to another vendor. This issue is occur
because different cloud services have different functions and techniques so that
organisations can face problems related to it.
 Denial of Service(DoS) Attack: This kind of attack generally occurs when there is heavy
traffic on the system. Most of the Daniel of service attack occur in the biggest
organisations such as government sector, banking sector, etc. The data and information is
lost when the DoS attack occurs. To gain the data back or recover the data use amount of
money is required. It is the most common attack in the software systems around all over
the world. It is required to have proper security solutions to control the Daniel of service
attack in the cloud.
 Unauthorized Access: The capacity two provisional features with the help of self
services offers in hens efficiency for implementation of SaaS and PaaS products.
Generally eat also increase the risk of an authorised access. Several organisations and
companies are exposed when features and services provisioned or utilised without any
knowledge of information technology. Hackers are generally utilised weak point of the
cloud services and get access of the complete system. In this issue the complete data of
the organisation or users can be easily accessed by unauthorised person. He becomes
capable to delete or change the data available in the cloud.
 System Vulnerbilities: Due to internal issues and problems cloud systems have several
vulnerabilities by which hackers can easily get the access of the data. The networks of
cloud infrastructure are very complex and support third party services so that they are
very vulnerable to the different security issues. Exploitable bugs or vulnerabilities
generally make system vulnerable towards different loopholes so that hackers can easily
access the important information. The vulnerabilities of systems present many challenges
and issues of cloud computing security like shared resources and memory, unprotected
operating systems. These issues can become a gateway to several data thefts.
Cloud Computing Security:
The security of cloud platform generally involves identification of different challenges and traits
that should be addressed with the implementation of effective security services. In the above
section different cloud security issues are effectively discussed and now it is very important to
find out effective security solutions for all those issues. This research is capable to examine and
explore different type of of security problems with its effective solutions that can be utilised in
the organisation to reduce security problems. It is very necessary to understand the concept of
cloud computing so that we can effectively find out potential solution for security issues that are
faced by organisations in their clouds. Cloud computing is cost effective and flexible and allow
uses to access the data from anywhere in the world full stop there are several benefits of cloud
computing as users can store their all the data on the single platform so that data redundancy risk
can be reduced. The security risk of having harmful and malicious person in the organisation can
be effectively resolved by putting different strict legal actions in the contract. There are several
security services available that can be apply on the cloud platform to maintain security and these
services are effectively discussed in this section.

 Deployment of Multifactor Authentication System: Generally it is analysed at the


traditional passwords and username combination is is insufficient to safeguard the the
accounts of users from the hackers are different data breaches. The stolen reading cells
are the major source to get into the system. To protect the cloud system it is very
important to deploy multi factor authentication system. Take general in short that only
authorised persons or people can access the cloud services and system. By the use of
MFA the sensitive information of the organisation and users can be effectively protected.
Multi factor authentication is the the cheapest and very effective security solution to keep
data protected from the hackers. The strong security services can provide better
protection for data available in the cloud.
 Manage user access to enhance the security of cloud: most of the employees of the
organizations does not required to access each information, file, or application that is
available in the cloud infrastructure. The setting of effective authorization with proper
security plans ensure that every employee can manipulate and view only data and
applications that are important for them. The affective access control plans on the cloud
platform can provide effective security in the cloud services.
 Creation of mitigation plan: Before migrated into cloud it is very essential to
understand the concepts of identity management in the cloud service you have selected.
The development of effective mitigation plan for different types of security risks can
provide higher level of understanding and security to the cloud.
 Increased complexity of the security: Organizations that work with several cloud
service providers generally complaint for different security issues. So that it is very
important to have effective security services. It will increase the complexity of the
processes & make it very difficult for different users to leaverage several solutions of
cloud in their working.

You might also like