cloud computing security issues PDF

Title cloud computing security issues
Author Bipin Poudel
Course Special Topics/Programming
Institution Sam Houston State University
Pages 3
File Size 70.3 KB
File Type PDF
Total Downloads 86
Total Views 176

Summary

Security issues in cloud computing...


Description

Poudel1 Bipin Poudel COSC 4340 Dr. Hacer Varol Date: 02/02/2020 Security Challenges and Possible Threats in Cloud Computing To deal with the challenges of Cloud Computing it is necessary to know in detail about cloud computing. To make it simple, Cloud computing refers to storing of data’s over the internet instead of devices like hard drive, pen drive etc. This service allows user to share information without the use of expensive hardware’s. User can access all their information stored in cloud with the help of internet which lowers overall cost of storing and accessing information. Some of the cloud computing services we use in our daily life are Google Drive, ICloud, Dropbox. Since the data are shared through internet, it is most likely that information can be stolen without the owner being aware of it. This is the most difficult challenges for cloud computing. In this paper, I will discuss about some of the security challenges and its possible threat to Cloud Computing. One of the major challenge is Privacy. Privacy is the condition of individual or a group to share their data to other individual or group. There are lot of information an individual would like to keep secret or would like only few people to know about. There’s a chance those information can be leaked. That is why government has rules set for those who breaches the privacy. Confidentiality of data is another major thing. With the help of strong secure verification system, we can control the access of a data by illegal users. Information uploaded in cloud computing should be protected from unauthorized deletion and modification.

Poudel2 With increasing use of internet devices and increasing use of applications, number of threats to cloud computing is increasing too. Web based threats, Physical threats, application based threats, web based threats and network based threats are some of the common threats cloud computing service providers come across every day. A great example of a physical threat would be we losing our mobile phone. All the important data like address, phone numbers, credit card information, vehicle info are somehow stored in our smartphone. If you lose our phone, there is a chance all our information can be stolen. Spam folder of our email account is another example of web based threats. They look appealing to some innocent users so they open the link provided and put all their information. Some of application and network based security threats are Malware, Viruses, Spyware, Adware, Trojan Horses, Worms and Phishing. To conclude, cloud computing has reached to every corner of the world and has benefited everyone in terms of cost and efficiency. Minimizing the threat is solely depend on the how an individual uploads and access to their data. Taking the password authentication seriously, always having a data backup plan and using encryption algorithms for the most sensitive data will surely help in lowering the threats of cloud computing.

Poudel3 Work Cited Khan, Hiba and Samad, Abdus and Ahamad Mohd,Vasim. “Security challenges and Threats in Cloud Computing”. International Journal of Advance Research in Computer Science. 2017. www.ijares.info...


Similar Free PDFs