SECURITY STRATEGIES IN CLOUD COMPUTING

Download SECURITY STRATEGIES IN CLOUD COMPUTING

Post on 18-Feb-2018

215 views

Category:

Documents

0 download

Embed Size (px)

TRANSCRIPT

  • 7/23/2019 SECURITY STRATEGIES IN CLOUD COMPUTING

    1/4

    Findings:

    84 percent of the large companies admitted to security threats in their midst inEurope.

    80% of large companies in Latin America were vulnerable to security threats (Cloud Security

    Alliance, 2009). Consequently, large companies were at the highest risk pertaining security of

    cloud computing. Security measures are the only guarantee that the users and service providers

    can obtain continuous benefits.

    The research revealed that a majority of the companies that were exposed to the

    impending threat were the larger companies (Che, Duan, Zhang and Fan, 2011). They are at a

    greater risk because of the number of users and value of the information exchanged within the

    cloud. Smaller companies have fewer workers, and the value of information sharedwithin the

    cloud is relatively low compared to larger companies. As a result, in case lossof information,

    larger companies could lose more than smaller companies. Additionally, the number of users

    affected by the breach will be lower in the small companies.

    The research also reported that a majority of the companies informed of the possible

    security threats. Similarly, most of them have responded by implementing varioussecurity

    measures to protect their cloud. However, only 20% of the current security measures were

    capable of handling security threats. Also, out of the 20% only half of them were regularly

    maintained. The research also postulated the importance of maintenance of the integrity of the

    security measures that the sample companies had implemented. As a result, 90% ofthe security

    measures put in place was unable to sustain any form of cyber-crime (Cloud Security Alliance,

    2009).

    SECURITY STRATEGIES IN CLOUD COMPUTING3

  • 7/23/2019 SECURITY STRATEGIES IN CLOUD COMPUTING

    2/4

    Regarding security measures, the Platform as a Service (PaaS), was considered an

    efficient model regarding protecting the data of the large companies and users (Che, Duan,

    Zhang and Fan, 2011). Data from the research highlight that PaaS is the ideal system in

    combating the prevailing challenges.

    Summary and conclusion

    Success is viable, as far as cloud computing is concerned. The research providesa series

    of security strategies capable of enhancing security in a cloud computing network. From the

    research a majority of the users utilize Software as a Service (SaaS) and Infrastructure as a

    Service (IaaS) based on their ease of installation and low operational cost. Des

    pite their

    preference, PaaS seems the most effective regarding security and resultant costof operation.

    Users or companies might go for cheaper models that would result in loss of dataor money

    through the loopholes of the system (Che, Duan, Zhang and Fan, 2011). Also, thesuggested

    model is difficult to install compared to the other models. In PaaS, users or the large companies

    are supposed to obtain a server that should be under their control. A single-user server provides

    monitoring and regulation services to warrant efficany.

    ? Restatement of the problem:

    Currently, cloud computing receives implementation by large companies in the

    telecommunication industry and others. Its application is vast, and the number of users is on the

    rise. Moreover, the number of resources shared within the cloud is also on the rise.

    Consequently, the cloud is overpopulated regarding users and resources. Subsequently, the risk

    of data loss and resources malfunction also rises. However, the current securitymeasures are not

    100% operational because there is a report of losses and unauthorized access amo

  • 7/23/2019 SECURITY STRATEGIES IN CLOUD COMPUTING

    3/4

    ng the large

    SECURITY STRATEGIES IN CLOUD COMPUTING4

    companies and the users respectively (Cloud Security Alliance, 2009). Thus alternative security

    measures should be explored. Alternatively, the prevailing security measures should be

    overhauled to create space for a newer security model that has excelled elsewhere.

    ? Limitations of the study:

    Studies are meant to ensure stakeholders obtain the value for their money. Cost

    effectiveness and improvisation are some of the ever present objectives in eachresearch.

    Therefore, a research should be able to suggest a cheaper model or modify the current model,

    especially when financial stability is an issue (Cloud Security Alliance, 2009).The research

    proposes the implementation of PaaS model in cloud computing. The model costs the users

    more, and it is least preferable. Therefore, it means that a majority of the users have not installed

    the system (Che, Duan, Zhang and Fan, 2011). Moreover, the users will have to neglect their

    current application methods. Consequently, the cost for adapting newer applicati

    ons will be high.

    The research would have provided an alternative model that will involve utilization of the

    resources from their preferable model.

    The research only considers one solution to the existing software issue. Provision of a

    single alternative will affect the performance of the companies or users that will be unable to

    implement the system due to its cost (Cloud Security Alliance, 2009). Additionally, users will

    refrain from services that provide anything else apart from the recommended model.

    ? Recommendations:

    The Security of cloud computing unveils an opportunity for further research on the data

  • 7/23/2019 SECURITY STRATEGIES IN CLOUD COMPUTING

    4/4

    and user management. Also, the research only provides a single alternative to amending the

    SECURITY STRATEGIES IN CLOUD COMPUTING5

    security threat posed by the SaaS and IaaS. Therefore, the research should be continued to

    discover other models that can be implemented to address the security issue.

    Moreover, the purpose of research, is to avail better ways of handling issues. The

    research will ensure that the small companies are also ideal. In fact, reducingthe number of users

    of cloud computing in large companies will neutralize the threat posed by many users.

Recommended

View more >