Premium Essay

Cloud Security Issues

In: Computers and Technology

Submitted By Garner887
Words 4240
Pages 17
See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/259072387

Cloud Computing Security Issues and Challenges
ARTICLE · JANUARY 2011

CITATIONS

READS

13

20,419

1 AUTHOR:
Ibikunle Ayoleke
Botswana International University of Science…
29 PUBLICATIONS 30 CITATIONS
SEE PROFILE

All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.

Available from: Ibikunle Ayoleke
Retrieved on: 13 February 2016

Kuyoro S. O., Ibikunle F. & Awodele O.

Cloud Computing Security Issues and Challenges
Kuyoro S. O.

afolashadeng@gmail.com

Department of Computer Science
Babcock University
Ilishan-Remo, 240001, Nigeria

Ibikunle F.

faibikunle2@yahoo.co.uk

Department of Computer Science
Covenant University
Otta, 240001, Nigeria

Awodele O.

delealways@yahoo.com

Department of Computer Science
Babcock University
Ilishan-Remo, 240001, Nigeria

Abstract
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers…...

Similar Documents

Premium Essay

Security Issues

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |CMGT/582 | | |Security & Ethics | Copyright © 2010, 2009 by University of Phoenix. All rights reserved. Course Description The ethical issues examined in the course include information privacy, accessibility, and ownership from an organizational perspective. Information laws, regulations, and compliance requirements are examined in this course as well as the considerations for creating a safe digital environment within the organization. Policies Faculty and students or learners will be held responsible for understanding and adhering to all policies contained within this syllabus and the following two additional documents: University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class.......

Words: 2637 - Pages: 11

Premium Essay

Cloud Security Planning

...Cloud Security Planning Abstract Cloud systems as new online storage and computing systems provide great potentials to all businesses and organizations of creating new approach of storage and computing; cloud system guarantee that all your files and valuable data can be accessed and recovered from anywhere in the world, providing a new meaning of technology. Unfortunately and as to what happen with all emerging technologies there are new threats, risks, breaches, and problems arise with such technologies. They are considered challenges that vary from configuration problems to security breaches to harmful attacks; which may cost the company large losses and in some time financial disasters. In this case study we will try to identify the major threats that may affect the cloud security negatively which can be divided into three major categories: 1. Attackers and threats: where the attacks are no longer limited by breaching the data on someone’s personal computer. It became larger wider and involves more organized crimes. 2. Developed Structure technologies: the amount of data and information used today provides great challenges to system engineers and security designers to visualize and utilize their system to isolate and protect the data on them. 3. Regularity environment challenges: Most companies and IT departments are facing great challenges to meet the laws, legal requirements and consistency acquiescence especially with growth of demand on cloud systems. ...

Words: 2955 - Pages: 12

Premium Essay

Cloud Security

...threat landscape is fundamentally different with the proliferation of mobile, web and cloud based applications supported by third parties. The need for third party software security is so essential that a group of security leaders from the highly competitive financial services sector established a working group through the Financial Services Information Sharing and Analysis Center (FS-ISAC) to provide guidance for the rest of the industry on additive controls to address software security. Though the goal of this working group is to help improve security at financial organizations, enterprises of all kinds can and should adopt this new guidance to address the increasing danger posed by third party applications. Every industry uses third party software to increase employee productivity, deliver the latest technology to their customers and maintain relevancy in evolving markets. In the financial services industry, this has manifested with mobile payments, hip web interfaces, and banks going social, just to name a few. Financial services has long worked to apply effective controls and protect the sensitive data flowing through these slick applications through the Financial Services Roundtable (BITS) or FS-ISAC. Though there are established controls for protecting information from software vulnerabilities of third party service and software providers, what is not established is how to ensure secure software development practices are applied by those third parties that develop......

Words: 322 - Pages: 2

Premium Essay

Cloud and Security

...The Reality about Clouds and the Security Challenges They Pose Clouds are an extremely practical and obvious solution to data storage management. However, there is a critical need to securely store, manage, and share (structured and unstructured) amounts of data. “The major security challenge with clouds is that the owner of the data may not have control of where the data is placed. Therefore, we need to safeguard the data in the midst of untrusted processes. There are numerous security issues for cloud computing. For example, the networks that connects the system in a cloud has to be secure. Mapping the virtual machines to the physical machines has to be carried at securely. Since data in the cloud will be placed anywhere, it is important that the data is encrypted. As a result, it is critical that this data be protected and only given to authorized individuals. Access control is a key concern, because insider attacks are a huge risk. A cloud can be private or public. A public cloud sells services to anyone on the Internet. (Currently, Amazon Web Services is the largest public cloud provider.) A private cloud is a proprietary network or a data center that supplies hosted services to a limited number of people. When a service provider uses public cloud resources to create their private cloud, the result is called a virtual private cloud. Private or public, the goal of cloud computing is to provide easy, scalable access to computing resources and IT services (Rouse, M.......

Words: 638 - Pages: 3

Premium Essay

Security Issues

...Front office and guest safety and security Security Issues ---------------------- Security encompasses areas such as security of the property itself, company assets, employees' and customers' personal belongings and valuables, life security, personal security etc.    In all workplaces management stipulates that it is not responsible for valuables and employees personal belongings (their handbags, items kept in the personal lockers, etc.).  Yet management must take all possible measures to prevent theft among employees and of employee belongings through its hiring practices and through the implementation of effective management, human resources and operational policies, such as:   • Background checks of selected applicants • Policies related to employees' entry to, and exit from, the workplace • Spot checks of locker rooms and lockers • Effective supervision and control during the work cycle • Policies related to the discovery of criminal records and wrongdoing among, and by,  employees • Control of people entering and exiting the workplace With regard to guest valuables, management informs guests that the hotel is not responsible for valuables left in the room, advising them to secure these in safety deposit boxes provided by the hotel.  Besides taking care of security issues related to the people they employ (as outlined above), management must undertake some necessary measures, among which: • Providing "secure" (safety) deposit......

Words: 4569 - Pages: 19

Free Essay

Cloud Computing and Erp Security

...|RESEARCH PROPOSAL | |On | |CLOUD COMPUTING AND SECUTITY | |Submitted | |for Ph.D. Approval | | | | | |By Mr. MBANZABUGABO Jean Baptiste(BE,MSSE,MCA) | TABLE OF CONTENTS ABSTRACT..................................................................................................3 1. INTRODUCTION........................................................................................4 1. GENERAL OBJECTIVE OF THE STUDY.................................................................................................. 5 2. SPECIFIC OBJECTIVES .......................................................................5 2. LITERATURE REVIEW ...........................................................................6 3.......

Words: 6240 - Pages: 25

Premium Essay

Security Issues

...Onboard Systems Security Issues Embry-Riddle Aeronautical University On-board Systems There are many benefits and there are also some security concerns that need to be addressed when talking about common networks that are used on board an airplane or in this case a passenger plane. These systems can be affected in many different ways which could really cause some problems for the airline and even for the passengers themselves. However, if all of the necessary safeguards are put into place, then nobody should have to worry about whether their network is safe or if it is at risk. The benefits for using a common network are pretty straightforward when you look at it. All of the passengers are able to connect to one solitary network therefore reducing the need for more networks and having connectivity issues while in the air. However, if you have the air traffic controllers and the pilots using the same network as the passengers to maintain the aircraft, then you potentially have a lot of issues if not handled the correct way. According to Kim Zetter, there was an incident that Boeing was involved in and they had a special condition given to them by the FAA that allowed a Boeing 787 to “connect a passenger internet network with networks that control the plane's navigation and maintenance systems (Zetter 2008).” I cannot even begin to describe how dangerous that is regardless of whether you have the correct safeguards in place that do not allow passengers to have......

Words: 516 - Pages: 3

Premium Essay

Handling Security and Ethical Issues

...Handling Security and Ethical Issues at TBWI Course: IT560-01 Handling Security and Ethical Issues at TBWI A growing concern, especially with the recent information leak at Target, is the issue of security. Outlined are security concerns for TBWI and how best to handle them. In addition to handling security issues, there may be complicated ethical issues that may occur. To best handle these situations, those ethical issues are addressed, with recommendations for how best to handle them. Security Concerns In 2013, B2B International and Kaspersky Lab conducted a Global Corporate IT Security Risks survey and the results were quite startling. In a conservative estimate, “The average damage suffered by large companies from a single serious incident was $649,000. For small and medium-sized companies, the average damage was $50,000” ("Global corporate it," 2013). These damages can be the result of fines, lawsuits, as well as lost revenue from customers, who no longer have faith in the security of the company. It takes many years for a business, such as TBWI, to build a reputation, but it can all be lost in a matter of seconds. Because of this, the following security concerns need to be recognized, with a plan in place for prevention. External threats External threats are those that occur from people not involved with TBWI. These could be competitors or random hackers or thieves. These types of threats can occur at the software and......

Words: 1640 - Pages: 7

Premium Essay

Cloud Computing Issues

...“Current Security Issues in Cloud Computing”. As of today, cloud computing is a flexible, cost-efficient, and established transfer platform for giving business or user IT services on the internet. Yet, cloud computing presents an additional level of risk because crucial services are time and again outsourced to a moderator. This makes it more difficult to uphold data security, privacy, support data, service availability, and validate compliance. It is my goal to discuss some of the current issues involved with the cloud and how important that they are to everyone. What is Cloud? Cloud computing is a capable computing regular where computing resources in big data points are made accessible as services over the internet. It has become a renowned IT by presenting a professional atmosphere for data storage capability. It is a standard for computing and is provides a striking, enormous, significant asset that contains any subscription-based or pay-per-use service over the web. Cloud is on-demand admission to virtualized IT services and products. Places like Amazon and Google are presently giving such services, by charging customers by means of an on-demand strategy. Being that consumers put their sensitive information on the clouds public domains, huge problems for cloud implementation are lack of security and access control. The key obstacle is that the doubtful info drifts as service providers can access numerous computer-generated mechanisms in clouds. The cloud takes......

Words: 2156 - Pages: 9

Premium Essay

Cloud Hooks: Security and Privacy Issues in Cloud Computing

...Proceedings of the 44th Hawaii International Conference on System Sciences - 2011 Cloud Hooks: Security and Privacy Issues in Cloud Computing Wayne A. Jansen, NIST Abstract In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the hook. The cloud hook formation provides a useful analogy for cloud computing, in which the most acute obstacles with outsourced services (i.e., the cloud hook) are security and privacy issues. This paper identifies key issues, which are believed to have long-term significance in cloud computing security and privacy, based on documented problems and exhibited weaknesses. • applications can be developed upon and deployed. It can reduce the cost and complexity of buying, housing, and managing hardware and software components of the platform. Infrastructure-as-a-Service (IaaS) enables a software deployment model in which the basic computing infrastructure of servers, software, and network equipment is provided as an on-demand service upon which a platform to develop and execute applications can be founded. It can be used to avoid buying, housing, and managing the basic hardware and software infrastructure components. 1. Introduction Cloud computing has been defined by NIST as a model for enabling convenient,......

Words: 7808 - Pages: 32

Premium Essay

Cloud Computing Security

...Cloud Computing Security Mohamed Y. Shanab, Yasser Ragab, Hamza nadim Computing & Information Technology AAST Cairo, Egypt {myshanab, yasseritc, hamzanadim }@gmail.com Abstract-- In the past two decades, data has been growing in a huge scale making it almost impossible to store, maintain and keep all data on premises , thus emerged the idea of cloud computing and now it’s becoming one of the most used services used by firms, organizations and even governments. But its security risks are always a concern and a major setback. In this paper we talk about those risks and the most feared ones and what are the latest techniques to overcome them, we also discuss a solution on cloud computing based on a fully homomorphic encryption Key Words -- Cloud computing , Cloud computing security, Challenges, Privacy, Reliability, Fully homomorphic encryption. interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models." [1] II. TOP BENEFITS OF CLOUD COMPUTING  Achieve economies of scale. increase volume output or productivity with fewer people. Your cost per unit, project or product plummets. Reduce spending on technology infrastructure. Maintain easy access to your information with minimal upfront spending. Pay as you go (weekly, quarterly or yearly), based on demand. Globalize your workforce on the cheap.People worldwide can access the cloud, provided they have an Internet connection....

Words: 4691 - Pages: 19

Premium Essay

Security Considerations for Cloud Computing

...Security Considerations for Cloud Computing Carlos Chandler Abstract Cloud computing is an emerging Information Technology (IT) model whereby a company utilizes a pay-per-use service for it computing needs rather than maintain a local data center run by its in-house IT department. By treating computing resources as a commodity or operating expense, it allows firms to focus less on IT and more on the core elements of the operations strategy. Because of advantages like this, its popularity has grown exponentially in recent years. However, cloud computing also has certain inherent risks in its present form. This paper seeks to understand the key advantages driving businesses to adopt this computing model in ever increasing numbers, while at the same time understanding what risks they are taking in doing so. To gain insight into these risks, this paper incorporates statistical research into what experts in the field believe to be the greatest down-sides to converting to this increasingly common IT model. Security Considerations for Cloud Computing What is Cloud Computing, Anyway? To begin, let us illustrate what cloud computing is. Imagine you run a cookie baking business that takes orders from around the country via an online store. To handle the orders, would your business buy a fleet of trucks and deliver its own shipments, or would you simply contract with UPS or FedEx to ship the orders on your behalf? Clearly the cost efficiencies in contracting the......

Words: 1965 - Pages: 8

Premium Essay

Cloud Computing and Information Security

...Cloud Computing and Information Security Krystal Hagi Daytona State College Student Khagi1@yahoo.com Abstract In order to discuss the security of information in cloud computing, we must first cover what is Cloud Computing. There are many types of cloud computing services, such as, SaaS, PaaS, IaaS, public clouds, private clouds, and hybrid clouds Examples. They all work similarly but have not only different tools, but varying levels of security for various needs. These differing types of clouds and networks as a service offer off site data storage in a secured location, which in essence frees up space and virtual infrastructure for personal and/or business networks, and devices. There are advantages and disadvantages to cloud computing, just like any other product or service. The advantages being, storage for data, accessibility from virtually anywhere there is a network connection, automated management, security, apps, tools, etc. The disadvantages include monthly costs for space on the offsite network, security, involvement of a third party, no access to the physical structure - which means if the cloud server goes down, your data may not be accessible, etc. There is one instance with cloud computing that is both an advantage and a disadvantage, and that is the security. While a cloud may be more secure than your own network How?, personal or business, using cloud services puts the security out of your hands in both the physical and logical sense. Using a cloud, means......

Words: 4955 - Pages: 20

Premium Essay

Challenges and Security Issues

...Unit 5 IP – Challenges and Security Issues American InterContinental University Abstract In this assignment, review of three different case studies will be discussed. Topics will include when an antivirus software cripples your computer, determining how secure cloud computing is, and electronic medical records systems. After the review of each case study, a set of questions will be answered to provide details on each study as to what was reviewed. Challenges and Security Issues (Case Studies) Introduction In this assignment, review of three different case studies will be discussed. Topics will include when an antivirus software cripples your computer, determining how secure cloud computing is, and electronic medical records systems. Case Study #1 When Antivirus Software Cripples Your Computers On April 21, 2010, McAfee crippled hundreds of thousands of McAfee equipped machines, by mistakenly sending an update to its users reclassifying svchost.exe as being a malicious file which was known as W32/wecorl.a virus (Humphries, 2010, para 1-2). The factors that were responsible for this software problem was that McAfee failed to send users a warning notifying them that svchost.exe was going to be either deleted or quarantined; instead they deleted the file completely. On the other hand, failure to detect this error was at the fault of McAfee’s automated quality assurance. Another reason this spread so quickly is because of the high demand for faster antivirus updates....

Words: 1227 - Pages: 5

Premium Essay

Security in the Cloud

...Problem Statement Discussion and Justification Cloud users face security threats both from outside and inside the cloud. Many of the security issues involved in protecting clouds from outside threats are similar to those already facing large data centers. In the cloud, however, this responsibility is divided among potentially many parties, including the cloud user, the cloud vendor, and any third-party vendors that users rely on for security-sensitive software or configurations. The cloud user is responsible for application-level security. The cloud provider is responsible for physical security, and likely for enforcing external firewall policies. Security for intermediate layers of the software stack is shared between the user and the operator; the lower the level of abstraction exposed to the user, the more responsibility goes with it. While cloud computing may make external-facing security easier, it does pose the new problem of internal-facing security. Cloud providers must guard against theft or denial-of-service attacks by users. Users need to be protected from one another. The primary security mechanism in today's clouds is virtualization. It is a powerful defense, and protects against most attempts by users to attack one another or the underlying cloud infrastructure. However, not all resources are virtualized and not all virtualization environments are bug-free. Virtualization software has been known to contain bugs that allow virtualized code to "break loose" to......

Words: 2433 - Pages: 10