Research Paper

profilenareshr
C.ResearchPaperDraft.docx

Running Head: CLOUD COMPUTING AND DATA SECURITY 1

Cloud Computing and Data Security

Naresh Rama

Professor Dr.Jerry Alsay

07/14/2019

Cloud Computing and Data Security

Introduction

In today's world, the movement of data is from a store that is severe and it is located centrally to the storage of cloud, services in the cloud offer the flexibility, scalability, and concerns that are proportionate that concerns the issue of security. Safety is an aspect that is important and it associated with the computing of cloud because information can be stored on the cloud by the users with the help of providers that works in the service of the cloud. In the security f data and computing of the cloud, there are some problems that are available. They include backups of data that is improper and inadequate that have caused organizations been among those that are vulnerable to threats that re-associated with security measures.

Data that is found in an organization and is stored in files that are encrypted are interfered by these threats. Problem found under these investigations is significant to this study and these show that the threats that emerge because of backups concerning data that is improper lead to an issue that is significant in the security of data in the computing cloud and also security concerning data.

The study tends to shows that security of data and computing of data leads to the provision of ways that helps in the protection of data that is private and also information that is classified away from such threats. That may include attacks in the cyber sector and losses that occur in case of disasters (Strategic Cyber Security, 2011). This study has limitations that state that assurance of security to the computing of cloud is not available and that there is no protection of data that is vital in an organization to a hundred percent.

Background

Hackers of the computer have tried to expose for a long time and also exploitation of the vulnerabilities found on networks and also in applications that consist of software. Applications of web and development of mass in a subsequent way and also the advancement of internet attacks can be done in a massive range and can lead to greater negative impacts on businesses and on persons. Security of data and computing of cloud is a computing that is of utility and internet based that the end users use that are hosted on the servers that are virtual. Industries that deal with cloud computing and security of data has risen due to the elimination of threats and also risk reduction.

The computing of cloud is a form of increasing capabilities of adds capacity without having to invest in other types of infrastructure like the hardware of the computer. The computing of cloud is termed to be innovative and makes use of resources of power that are advanced by the help of computers in capabilities of storage.

Data security history has been put to history by researching of vulnerabilities, attacks that have high profile and are also numerous in number and the reactions of markets that are subsequent to attacks through innovations and researches that are more industry of application has been able to slow the growth rate of vulnerabilities that are reported through the help of governments and researchers who have invested more security in the sector. These have been possible through the introduction of standards that are in compliance and adoption that are wider concerning the practices of coding that are secure and also have tools for scanning that are in the house.

There was a release of JavaScript that made it easy for developers to have websites that were interactive and then attackers learned about this application and started invading it with their techniques. There was the discovery of a method of injection by researchers as a method of attack that prevented attackers from invading the cloud of computing and also security of data was protected.

There was also the opening of applications that involved the security of open web to raise awareness about security and also the promotion of practices that are best. There was also the releasing of payment card industry by the council of standards that outlined the standards of security that were minimum and these helped businesses and retailers in the processing of credit cards.

In today’s world, some organizations and also businesses have to lead to the integration of the security data and computing of cloud aspect with the aim of protecting data that is classified and personnel from being gotten by users that are unauthorized. It is important because it leads to threat reduction that is associated with no use of technologies involved in computing of data.

Cyber-attacks have increased very much in the recent past. This has been attributed to the growth and development of technology and cyber skills. Most of the attackers are malicious and are willing to damage other people’s files and documents. When this happens, a lot of damages are done to the systems and this result to very great setbacks. In the long last, the systems might not be able to function properly as planned. Some companies and entities have been greatly affected by such issues which have finally made the firms to completely collapse or make very huge losses. There have been countless debates on how to protect systems and a lot of researches have been undertaken to come up with the most ideal methods and strategies to counteract cyber-attacks in the modern digital error. Some of the sectors that have been at the receiving end of cyber threat include the healthcare, security and education. These are very sensitive parts of every economy and if there are no ideal strategies to withstand these threats, eventually the

Most of the attacks that were publicized involved the vandalization of websites or even shutting those down through attacks that were informed of distributed denial of service. In mid-to-late, there were attacks that were sophisticated and their occurrence began to occur and there was an intrusion of systems of prevention and detection and also the illusion of these services by the criminals occurred allowing passwords stealing and information that was personal that leads to challenges in cloud computing and security of data.

Attackers, however, continue reviewing their tactics and disclosures of vulnerabilities continue to rise up. Applications of mobile onslaught have enabled attackers to have a target that was high. Vulnerabilities that are known can be addressed easily by using practices of codes that are secure and having tests that are validated. Compasses of security have helped organizations to have practices that are best to enable the development of applications that are secure. Removal of vulnerabilities at an early stage in the cycle of development of software has led to time-saving and also saving of money.

Compass of security is an application of security that is leading and it specializes in solving applications that are the root cause of the problems that occur in the security of data and cloud computing for many companies. The building of security of the software's is their main goal and also the unification of security that concerns applications through requirements of security-learning and also verification. Viruses in the internet ware first unleashed in the year 1988 .this virus leads to the breakdown of many computers that were connected to the internet.

Problem statement

Statistics security and administrations of computing that is allocated problems of security that are exceptional are administered to by the help of inclusion of customers who are quit cloud and organizations that have experts of the cloud. In computing of cloud issues that are most crucial are addressed and also those issues that concern the privacy of data are addressed and those associated with services of cloud.

The computing of cloud has also lead to the provision of storage of data service because of the demand for data that is digital increasing, devices whose storage is large and computation of data that is extensive. Security of data and computing of cloud should have the aim of securing storage of data and also access. In the security of computing of data, the users who are at the end and are users of data are shared in the storage of cloud and also in the computation carrying process. It has led to the reduction of trust and integrity in data that is private and is of users associated with the environment of clouding. In the security of data information that is private is protected from threats that are potential of the hackers and other personnel's that are positional of providing harm. This information includes records of the health of the patient and details' of credit cards. Solving these problems is very important and it will help in the improvement of the security of data.

Solving the problems evolving around the computing of cloud is important because it enhances the process of recovering data and also its security. In the case in a business, there is the occurrence of a disaster the system of cloud computing that is improved will assist in the data recovery that is lost and these ensures continuity of business.

Control of cost-benefit is seen when the problem is solved by the establishment of computing of cloud that is efficient. Reduction in expenditures is seen when computing of cloud is seen. The capital of the company or organization is reduced hence there will be cost control.

Literature review

Technologies involving computing of cloud have gained attention that is increasing in both the private and academic sectors. The computing of cloud offers can be many and regard to different specifications like platforms of the infrastructure. The computing of cloud allows services of IT that are available easily and are stable. Distribution of storage to servers who are termed to be external is one of the ideas that are basic of cloud computing. Most customers have doubts in the application of regulations that are legal and protection of data. Most states have established regulations to enhance the stability of data and also provide customers with security from risks that are potential.

Our objective in this paper is to provide a literature review concerning the protection of data and its privacy together with technologies in clouds with the aim of establishing an understanding that is better of the status of the law that is existing in this environment.

Overview of data security

In the protection of the privacy of data that is enterprise and its security, the first step is the identification of information types that are supposed to be protected and the area the information is exposed in your company or organization. The next step is the assessment of the applications' that you have an understanding the areas of the portfolio in the application that exposes you to attacks that ate external. The model for threat is different for the devices that are in the form of mobiles. In the mobiles, more data is leaked or stolen and these are known as exfiltration of data found in mobiles. The risk that is additional is caused but the nature of portable devices, application types, and the models of usage.

Devices of mobiles and environment of computing that are traditions lead to protection of data that is traditional and solutions of security data not being an applicable reality to those who use mobiles. The objective of this paper is to highlight the issues that are principal and are related to the security of data that is raised by the environment of the cloud. To accomplish these issues were classified into some categories. First, the category is of issues of security that concern data that is brought about by characteristics of cloud that is single compared to infrastructure that is traditional, the second category includes issues of security data raised by the cycle of data life in computing of cloud. The third category is of issues of security data that is associated with attributes of security data.

Challenges to traditional cloud computing

Cloud computing has been available for a long time and cloud has been a known word. Despite its widespread cloud computing has been faced by challengers like the development of an environment that concerns cloud (Mishra, Das, Dehuri&Jagadev, 2018). Characteristics that providers of cloud provide as part of their package for infrastructure as a service. They include elasticity that is rapid, service that is measured; pooling of resource, access to a network that is broad, self-service that is on demand. This means that the users of the services provided by the cloud can ask for resources that are computing any time without contacting support that is human from various platforms or endpoints.

Modern cloud challenges

Cloud security

Threats concerning cloud security are concerns that are main in today’s world. Actions that are unintended or malicious may cause damage to many levels in an organization due to the increase of sophistication in services and applications the risk of insecurity is growing rapidly. Attack of surfaces in services provided by the cloud is higher when compared to models of services that are traditional compared to components whose endpoints are many and protocols are different to manage in ways that are different. The requirement of approaches in a wide variety is important in addressing and identifying threats that are new and known.

Cloud data management

Management of data is another critical challenge facing the paradigms of cloud that are traditional. Data today is stored in the form of databases of documents, databases of big table and databases of column and graph but in the traditional data, it was stored inform of silos. Data consistency is critical in the management of data these means that the users of the application that is found in the cloud should see data that is the same at the same time.

Resiliency and cloud availability

There is no system without failures. Resiliency refers to the ability required to handle the failures and helps in the recovering of the whole system. In applications and services where resources and services are competed for by components, resiliency is a huge service. In order to simulate failures that are random specific tools must be available. In computing of cloud, there are many levels that are different for the tolerance of fault. The balance that is found in resources, levels that are acceptable of resilience and cost must have results that are best (Tejada, Bustamante & Ellis, 2015). An approach that is more reliable is a replication of cluster in the centre of data that is the same and s used in the separation of replicas in clusters that are different. A scenario that is reliable but complicated is system replication in centre of data that are different.

Discussion

The future of security involving around cloud is mixed depending on the perspective of oneself. Cloud computing is a way that is flexible, effective and its platform of delivery is proven in the provision of services that are concerned with IT to businesses or customers. The computing of cloud also presents risks in a more added level because the services that are essential are given to a third party. The computing of the cloud is demanded, mostly in today’s world because it is more available. Clouds that are large have distributed functions all over locations that are multiple. A cloud to an organization that is single is limited but they are available to organizations that are many or both may be combined.

The computing of the cloud relies on the sharing of the resources with the aim of achieving coherence and scale of economies. Clouds of computing are proven by public advocates that it allows the companies to avoid the cost of the infrastructure of IT upfront. The computing of cloud also allows the enterprises to have the applications in their offices run in a faster way. Manageability is more improved, maintenance is less and there is an adjustment of resources in a more rapid way to meet demands that are unpredictable and fluctuating.

Data security is an important factor in information sectors since it enhances and provides protection of data. Organizations need to have means of storing data and that is efficient to ensure that the customer’s information is safe. As the technology changes a company should ensure that it upgrades its ways of storing data to prevent attackers from invading it.

References

Mishra, B. S., Das, H., Dehuri, S., &Jagadev, A. K. (2018). Cloud Computing for Optimization: Foundations, Applications, and Challenges. Basingstoke, England: Springer.

Strategic Cyber Security.(2011). Kenneth Geers.

Tejada, Z., Bustamante, M. L., & Ellis, I. (2015). Exam Ref 70-532 Developing Microsoft Azure Solutions. Redmond, WA: Microsoft Press.