Preview

Security Issues in Cloud Computing

Best Essays
Open Document
Open Document
2039 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Issues in Cloud Computing
Analysing Various Security Aspects of Web and Mobile Cloud Computing

Abstract

In this paper, we have discussed security issues for web and mobile cloud computing. Cloud computing provides Internet-based services, computing, and storage for users in all markets including financial, healthcare, and government. This new approach to computing allows users to avoid upfront hardware and software investments, gain flexibility, collaborate with others, and take advantage of the sophisticated services that cloud providers offer. However, security is a huge concern for cloud users. Mobile cloud computing could be defined as – the availability of cloud computing services in a mobile ecosystem. This includes many elements like consumer, enterprise, transcending, end to end security, home gateways and mobile broadband enabled services. Also since the terms ‘mobile’ and ‘wireless’ are used interchangeably, now consider here Mobile – ‘anywhere anytime’ and wireless is ‘without wires’. Thus mobile is ‘wireless’. Hence, we are talking of ‘anywhere anytime secure data accesses to analyze the security risks confronted by mobile computing and present the existing security mechanisms. Cloud computing is the next generation of networking, since it can deliver both software and hardware as on demand resources and services over the Internet. Clearly, Security is major issue in cloud computing.

Keywords— Mobile cloud computing, Security Concern, Services.

1. INTRODUCTION

Many people enjoy the various services catch by mobile computing; it is adopted as a global trend in today’s world. At the same time, securing mobile computing has been paid increasing attention. In this article, we discuss the Security issues in different cloud computing environment. [1] We analyze the security risks confronted by mobile computing and present the existing security mechanisms. The cloud model has motivated industry and academia to adopt cloud computing to host a

You May Also Find These Documents Helpful

  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    The ability for organizations to control and customize security features in cloud-based productivity services, such as email, calendars, content management, collaboration, and unified communications, is becoming an essential requirement for virtually every company. Today, IT teams are being required to deliver access to productivity services and associated documents and data from more devices, platforms, and places than ever before. While user benefits are undeniable, broader access makes security management more challenging. Each endpoint represents a potential attack surface and another point of…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Term Paper Intro to I.T.

    • 1605 Words
    • 7 Pages

    Cloud computing is one of the leading buzz terms in the world of IT today. Seemingly every possible solution has been enhanced with the mere addition of the word “cloud”. Cloud computing refers to applications and services offered over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the "cloud." This metaphor represents the intangible, yet universal nature of the Internet. The idea of the "cloud" simplifies the many network connections and computer systems involved in online services. In fact, many network diagrams use the image of a cloud to represent the Internet. This symbolizes the Internet 's broad reach, while simplifying its complexity. Any user with an Internet connection can access the cloud and the services it provides. Since these services are often connected, users can share information between multiple systems and with other users. Examples of this technology include online backup services, social networking services, and personal data services such as Apple 's MobileMe. Cloud computing also includes online applications, such as those offered through Microsoft Online Services. Hardware services, such as redundant servers, mirrored websites, and Internet-based clusters are also examples of cloud computing. ("Technology terms," 2009)…

    • 1605 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Powerful Essays

    Cloud Computing

    • 1763 Words
    • 7 Pages

    IT departments and infrastructure providers are under increasing pressure to provide computing infrastructure at the lowest possible cost. In order to do this, the concepts of resource pooling, virtualization, dynamic provisioning, utility and commodity computing must be leveraged to create a public or private cloud that meets these needs. Cloud computing is a general term for anything that involves delivering hosted services over the Internet. This provides the smaller companies or individuals who couldn’t able to buy costly software or any other resources. This becomes easy because of cloud computing. Cloud promises real costs savings and agility to customers. It’s a ‘Pay for Usage’ plan. We pay the money based on our usage only. Through cloud computing, a company can rapidly deploy applications where the underlying technology components. Access to applications and data anywhere, any Time, from any device is the potential outcome of cloud computing. This is suitable technology for limited budgets and a highly dynamic market with minimal resources.…

    • 1763 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Business Trend Memo

    • 1299 Words
    • 6 Pages

    The term “cloud” implies an idea that users are able to access applications from any location in the world. Cloud computing is defined as a collection of disembodied services accessible from anywhere using any mobile device that has access to the Internet (Mondal 2009). In other words, cloud computing is an application service that is like e-mail and uses ubiquitous resources that can be shared by many…

    • 1299 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    The Gojira portrayed in Honda's film was the personification of the mass devastation brought about by nuclear testing and not merely just a monster. However, this narrative was heavily downplayed in the American remake by Morse. GKotM was edited in such a way that portrayed Godzilla as nothing more than a remorseless and unforgiving monster, out to cause massive destruction. Dr.Yamane's final remarks after having defeated Gojira, "but if we keep on conducting nuclear tests, it's possible that another Gojira might appear somewhere in the world again," was an obvious caution towards the consequences of continuous nuclear testing. Honda was clearly conveying that Gojira was unleashed as a product of human's selfish desire to dominate over nature.…

    • 181 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Case Study Nabisco

    • 1356 Words
    • 6 Pages

    This paper explores a Leveraged Buy-Out and a case study, the RJR Nabisco LBO. The article particularly examines the background of the RJR Nabisco LBO prior to the buyout as well as post LBO in terms of corporate structure. Gaughan (2011) suggesed “RJR Nabisco had not been performing well prior to the buyout” but post LBO analysis suggested that shareholder of RJR Nabisco benefited over Kohlberg Kravis & Roberts’ (KKR) bid winning contest (pg.298). The paper discusses financial qualities of the RJR Nabisco pre and post LBO, including what made RJR Nabisco successful. RJR Nabisco accelerated decline after LBO and due to the poor management of KKR. One option would have been to be bought out by another tobacco business and/or undergo another leveraged buyout.…

    • 1356 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Recently, several mobile services are changing to cloud-based mobile services with richer communications and higher flexibility. We present a new mobile cloud infrastructure that combines mobile devices and cloud services. This new infrastructure provides virtual mobile instances through cloud computing. To commercialize new services with this infrastructure, service providers should be aware of security issues. Here, we first define new mobile cloud services through mobile cloud infrastructure and discuss possible security threats through the use of several service scenarios. Then, we propose a methodology and architecture for detecting abnormal behavior through the monitoring of both host and network data. To validate our methodology, we injected malicious programs into our mobile cloud test bed and used a machine learning algorithm to detect the abnormal behavior that arose from these programs.…

    • 992 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cisco Meraki Case Study

    • 789 Words
    • 4 Pages

    Cisco Meraki products are leader in cloud-managed and cloud-based solutions in the last decade. They provide a high level of security with the two-factor authentication method as well as out-of-band architecture (with HIPAA/PCI compliant). Besides, Cisco Meraki devices are trustworthy in terms of the reliability (99.99% on SLA) and the implemented Available Redundant Architecture. The various security tools to prevent from unusual outsider activities and security assurance regarding backup and storage, data mobility’s make Cisco Meraki taking the top place when we talk about cloud-based technologies. [55][83][84]…

    • 789 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Read an Essay

    • 527 Words
    • 3 Pages

    New technology impacts our daily lives in every field, from the cars we drive, cell phones we use, computers and networks we access and power we consume! In fact humans have always been greatly affected with the developments in new technology. However, nowadays new information technology is a bit more complex with cloud computing, new methods of security and data encryption!…

    • 527 Words
    • 3 Pages
    Good Essays

Related Topics