Download - SECURITY STRATEGIES IN CLOUD COMPUTING
7/23/2019 SECURITY STRATEGIES IN CLOUD COMPUTING
http://slidepdf.com/reader/full/security-strategies-in-cloud-computing 1/4
Findings:
84 percent of the large companies admitted to security threats in their midst in Europe.
80% of large companies in Latin America were vulnerable to security threats (Cloud Security
Alliance, 2009). Consequently, large companies were at the highest risk pertaining security of
cloud computing. Security measures are the only guarantee that the users and service providers
can obtain continuous benefits.
The research revealed that a majority of the companies that were exposed to the
impending threat were the larger companies (Che, Duan, Zhang and Fan, 2011). They are at a
greater risk because of the number of users and value of the information exchanged within the
cloud. Smaller companies have fewer workers, and the value of information shared within the
cloud is relatively low compared to larger companies. As a result, in case lossof information,
larger companies could lose more than smaller companies. Additionally, the number of users
affected by the breach will be lower in the small companies.
The research also reported that a majority of the companies informed of the possible
security threats. Similarly, most of them have responded by implementing various security
measures to protect their cloud. However, only 20% of the current security measures were
capable of handling security threats. Also, out of the 20% only half of them were regularly
maintained. The research also postulated the importance of maintenance of the integrity of the
security measures that the sample companies had implemented. As a result, 90% of the security
measures put in place was unable to sustain any form of cyber-crime (Cloud Security Alliance,
2009).
SECURITY STRATEGIES IN CLOUD COMPUTING3
7/23/2019 SECURITY STRATEGIES IN CLOUD COMPUTING
http://slidepdf.com/reader/full/security-strategies-in-cloud-computing 2/4
Regarding security measures, the Platform as a Service (PaaS), was considered an
efficient model regarding protecting the data of the large companies and users (Che, Duan,
Zhang and Fan, 2011). Data from the research highlight that PaaS is the ideal system in
combating the prevailing challenges.
Summary and conclusion
Success is viable, as far as cloud computing is concerned. The research provides a series
of security strategies capable of enhancing security in a cloud computing network. From the
research a majority of the users utilize Software as a Service (SaaS) and Infrastructure as a
Service (IaaS) based on their ease of installation and low operational cost. Des
pite their
preference, PaaS seems the most effective regarding security and resultant costof operation.
Users or companies might go for cheaper models that would result in loss of data or money
through the loopholes of the system (Che, Duan, Zhang and Fan, 2011). Also, thesuggested
model is difficult to install compared to the other models. In PaaS, users or the large companies
are supposed to obtain a server that should be under their control. A single-user server provides
monitoring and regulation services to warrant efficany.
? Restatement of the problem:
Currently, cloud computing receives implementation by large companies in the
telecommunication industry and others. Its application is vast, and the number of users is on the
rise. Moreover, the number of resources shared within the cloud is also on the rise.
Consequently, the cloud is overpopulated regarding users and resources. Subsequently, the risk
of data loss and resources malfunction also rises. However, the current security measures are not
100% operational because there is a report of losses and unauthorized access amo
7/23/2019 SECURITY STRATEGIES IN CLOUD COMPUTING
http://slidepdf.com/reader/full/security-strategies-in-cloud-computing 3/4
ng the large
SECURITY STRATEGIES IN CLOUD COMPUTING4
companies and the users respectively (Cloud Security Alliance, 2009). Thus alternative security
measures should be explored. Alternatively, the prevailing security measures should be
overhauled to create space for a newer security model that has excelled elsewhere.
? Limitations of the study:
Studies are meant to ensure stakeholders obtain the value for their money. Cost
effectiveness and improvisation are some of the ever present objectives in eachresearch.
Therefore, a research should be able to suggest a cheaper model or modify the current model,
especially when financial stability is an issue (Cloud Security Alliance, 2009). The research
proposes the implementation of PaaS model in cloud computing. The model costs the users
more, and it is least preferable. Therefore, it means that a majority of the users have not installed
the system (Che, Duan, Zhang and Fan, 2011). Moreover, the users will have to neglect their
current application methods. Consequently, the cost for adapting newer applicati
ons will be high.
The research would have provided an alternative model that will involve utilization of the
resources from their preferable model.
The research only considers one solution to the existing software issue. Provision of a
single alternative will affect the performance of the companies or users that will be unable to
implement the system due to its cost (Cloud Security Alliance, 2009). Additionally, users will
refrain from services that provide anything else apart from the recommended model.
? Recommendations:
The Security of cloud computing unveils an opportunity for further research on the data
7/23/2019 SECURITY STRATEGIES IN CLOUD COMPUTING
http://slidepdf.com/reader/full/security-strategies-in-cloud-computing 4/4
and user management. Also, the research only provides a single alternative to amending the
SECURITY STRATEGIES IN CLOUD COMPUTING5
security threat posed by the SaaS and IaaS. Therefore, the research should be continued to
discover other models that can be implemented to address the security issue.
Moreover, the purpose of research, is to avail better ways of handling issues. The
research will ensure that the small companies are also ideal. In fact, reducingthe number of users
of cloud computing in large companies will neutralize the threat posed by many users.