Transcript
Page 1: SECURITY STRATEGIES IN CLOUD COMPUTING

7/23/2019 SECURITY STRATEGIES IN CLOUD COMPUTING

http://slidepdf.com/reader/full/security-strategies-in-cloud-computing 1/4

Findings:

84 percent of the large companies admitted to security threats in their midst in Europe.

80% of large companies in Latin America were vulnerable to security threats (Cloud Security

Alliance, 2009). Consequently, large companies were at the highest risk pertaining security of

cloud computing. Security measures are the only guarantee that the users and service providers

can obtain continuous benefits.

The research revealed that a majority of the companies that were exposed to the

impending threat were the larger companies (Che, Duan, Zhang and Fan, 2011). They are at a

greater risk because of the number of users and value of the information exchanged within the

cloud. Smaller companies have fewer workers, and the value of information shared within the

cloud is relatively low compared to larger companies. As a result, in case lossof information,

larger companies could lose more than smaller companies. Additionally, the number of users

affected by the breach will be lower in the small companies.

The research also reported that a majority of the companies informed of the possible

security threats. Similarly, most of them have responded by implementing various security

measures to protect their cloud. However, only 20% of the current security measures were

capable of handling security threats. Also, out of the 20% only half of them were regularly

maintained. The research also postulated the importance of maintenance of the integrity of the

security measures that the sample companies had implemented. As a result, 90% of the security

measures put in place was unable to sustain any form of cyber-crime (Cloud Security Alliance,

2009).

SECURITY STRATEGIES IN CLOUD COMPUTING3

Page 2: SECURITY STRATEGIES IN CLOUD COMPUTING

7/23/2019 SECURITY STRATEGIES IN CLOUD COMPUTING

http://slidepdf.com/reader/full/security-strategies-in-cloud-computing 2/4

Regarding security measures, the Platform as a Service (PaaS), was considered an 

efficient model regarding protecting the data of the large companies and users (Che, Duan,

Zhang and Fan, 2011). Data from the research highlight that PaaS is the ideal system in

combating the prevailing challenges.

Summary and conclusion

Success is viable, as far as cloud computing is concerned. The research provides a series

of security strategies capable of enhancing security in a cloud computing network. From the

research a majority of the users utilize Software as a Service (SaaS) and Infrastructure as a

Service (IaaS) based on their ease of installation and low operational cost. Des

pite their

preference, PaaS seems the most effective regarding security and resultant costof operation.

Users or companies might go for cheaper models that would result in loss of data or money

through the loopholes of the system (Che, Duan, Zhang and Fan, 2011). Also, thesuggested

model is difficult to install compared to the other models. In PaaS, users or the large companies

are supposed to obtain a server that should be under their control. A single-user server provides

monitoring and regulation services to warrant efficany.

? Restatement of the problem:

Currently, cloud computing receives implementation by large companies in the

telecommunication industry and others. Its application is vast, and the number of users is on the

rise. Moreover, the number of resources shared within the cloud is also on the rise.

Consequently, the cloud is overpopulated regarding users and resources. Subsequently, the risk

of data loss and resources malfunction also rises. However, the current security measures are not

100% operational because there is a report of losses and unauthorized access amo

Page 3: SECURITY STRATEGIES IN CLOUD COMPUTING

7/23/2019 SECURITY STRATEGIES IN CLOUD COMPUTING

http://slidepdf.com/reader/full/security-strategies-in-cloud-computing 3/4

ng the large

SECURITY STRATEGIES IN CLOUD COMPUTING4

companies and the users respectively (Cloud Security Alliance, 2009). Thus alternative security

measures should be explored. Alternatively, the prevailing security measures should be

overhauled to create space for a newer security model that has excelled elsewhere.

? Limitations of the study:

Studies are meant to ensure stakeholders obtain the value for their money. Cost

effectiveness and improvisation are some of the ever present objectives in eachresearch.

Therefore, a research should be able to suggest a cheaper model or modify the current model,

especially when financial stability is an issue (Cloud Security Alliance, 2009). The research

proposes the implementation of PaaS model in cloud computing. The model costs the users

more, and it is least preferable. Therefore, it means that a majority of the users have not installed

the system (Che, Duan, Zhang and Fan, 2011). Moreover, the users will have to neglect their

current application methods. Consequently, the cost for adapting newer applicati

ons will be high.

The research would have provided an alternative model that will involve utilization of the

resources from their preferable model.

The research only considers one solution to the existing software issue. Provision of a

single alternative will affect the performance of the companies or users that will be unable to

implement the system due to its cost (Cloud Security Alliance, 2009). Additionally, users will

refrain from services that provide anything else apart from the recommended model.

? Recommendations:

The Security of cloud computing unveils an opportunity for further research on the data

Page 4: SECURITY STRATEGIES IN CLOUD COMPUTING

7/23/2019 SECURITY STRATEGIES IN CLOUD COMPUTING

http://slidepdf.com/reader/full/security-strategies-in-cloud-computing 4/4

and user management. Also, the research only provides a single alternative to amending the

SECURITY STRATEGIES IN CLOUD COMPUTING5

security threat posed by the SaaS and IaaS. Therefore, the research should be continued to

discover other models that can be implemented to address the security issue.

Moreover, the purpose of research, is to avail better ways of handling issues. The

research will ensure that the small companies are also ideal. In fact, reducingthe number of users

of cloud computing in large companies will neutralize the threat posed by many users.


Top Related