MANAGEMENT of SECURITY in CLOUD COMPUTING

MANAGEMENT of SECURITY in CLOUD COMPUTING Submitted By: Word count: 1023 Abstract This paper presents a discussion on various advantages offered by the cloud technology…

MANAGEMENT
of SECURITY in CLOUD COMPUTING

Submitted
By:

Word
count: 1023

Abstract

This
paper presents a discussion on various advantages offered by the
cloud technology and the way it has alleviated the risk of data loss
from businesses. The cloud service providers offer operational
flexibility, scalability, and have backup measures in place that
protect consumers in case of failures. The paper discusses the state
of security offered by cloud computing as many businesses are not
using it due to security concerns. The paper also discusses measures
to minimize security risks associated with cloud computing.
Encryption protects data by not disclosing information without the
decryption key. Also, Two-Factor Authentication (2FA) and Cloud
security gateways (CSG) complement encryption and provide maximum
security to the data.

INTRODUCTION 4

I. MATERIALS
AND METHODS: STATE OF SECURITY IN CLOUD COMPUTING 4

II. DISCUSSION:
MEASURES TO MITIGATE THE SECURITY RISKS OF CLOUD COMPUTING 5

III. RESULTS 6

IV. CONCLUSION 6

REFERENCES 7

Businesses
today are embracing cloud technology more than ever because of the
advantages that come with the cloud approach. Cloud computing has
offered business and government institutions alike a cheaper
alternative of managing and storing their data. The cloud approach
has given the same institutions flexibility of operating in
different locations. Additionally, cloud computing delivers on the
promise of scalability as companies can focus on their growth
without too much focus on their supporting infrastructure [3]. Cloud
technology has also alleviated the risk of data loss from businesses
as cloud providers have backup measures in place in case of failures
on their end.

MATERIALS AND METHODS: STATE OF SECURITY IN CLOUD COMPUTING

Despite
the numerous advantages the cloud offers, there still exists a
segment of businesses that are still skeptical of the cloud approach
mainly because of the security concerns. Cloud computing in itself
is broad considering the three main service models; Infrastructure
as a Service, Platform as a Service and Software as a Service. This
fact alone implies that the cloud has a large footprint and the
risks of

attackers
targeting any of the services are high. This has been the main cause
of inaction from these corporations and institutions.

One
major security concern when it comes to cloud is unauthorized access
to accounts. This is among the major reasons behind data breaches
and intrusions into organizations’ systems [4]. Another worrying
risk associated with cloud technology is an insider threat. An
attack from within an organization is usually very hard to detect
let alone prevent. App vulnerability is another cause of the alarm
when it comes to cloud technology. Most of the application deployed
and used on the cloud does not come with an out of the box security
solutions. An unmonitored open port could be the gateway an attacker
uses to exploit the entire system. In addition, cloud environments
can encounter system vulnerabilities at times. Therefore, businesses
require a proper understanding of the cloud environment to be able
to mitigate risks of any of the components supporting their
infrastructure breaking or failing.

DISCUSSION: MEASURES TO MITIGATE THE SECURITY RISKS OF CLOUD
COMPUTING

As
mentioned earlier in this paper, data breaches are the common
security challenge of cloud environments. To counter and ensure this
does not happen, data encryption at rest is employed to mitigate the
risk of authorized access to the business IT system deployed on the
cloud. This measure protects an organization’s data is not being
transmitted and is just stored for access upon request. In mostly is
data stored in a database and contains a confidential company or
their client information. Encryption at rest implies that this data
is encrypted such that in the case where there is a breach and
attackers have gained access, they cannot tell what the data is
about unless they have the decryption key. This, therefore, adds add
a layer of security for data stored in cloud environments.
Additionally, this methodology helps the managed service providers
to be compliant with the regulations set by the authority.

Two-Factor
Authentication (2FA) is also another measure put by cloud providers
to complement encryption at rest methodology. 2FA simply implies
that username and passwords are combined with a second
authentication like a one-time generated password [1]. This,
therefore, sets another layer of security to assist in protecting
systems deployed on the cloud environment. Cloud providers have
noticed that shared accounts are recipes for cloud disaster. It
might seem cheaper for businesses to get a single cloud platform and
share it among coworkers but in a real sense, it comes with security
risks. Cloud providers are employing measures to eliminate shared
accounts. Cloud environment providers more defining shared
responsibility model between them and their clients. They are doing
this to clear put it out where their responsibility starts and
stops. This in return will allow businesses and organizations to
exactly know the security measures they need to take in order to
avoid the back and forth blame that happens when the client’s data
or the business system has been compromised.

Cloud
providers also focus more on the physical security of their
infrastructure and always their clients that their infrastructure is
in a controlled environment. Without proper access control to their
infrastructure premise then organizations’ data is at risk of being
breached and exposed. This is also true especially with the network
connecting their infrastructure. Cloud providers ensure the networks
are monitored to detect any malicious traffic to their client
environments. This normally happens in conjunction with the
organization to determine which traffic is okay and which one is
malicious in order for it to be blocked.

RESULTS

In
the spirit of protecting the cloud platforms, cloud providers
partner with Cloud security gateways (CSG) to optimize the security
of their platform. According to Wittkop CSG’s offer a number of
services which include: Forward Proxy, Reverse Proxy and some are
API driven [2]. In the case of forwarding proxy, traffic is first
forwarded to the CSG where it is inspected and logged before being
sent to their destination which is the organization’s cloud
environment. Reverse Proxy, on the other hand, is the opposite of
forwarding proxy in that traffic coming to a business’s
environment is first received by the cloud provider then they
forward it to the CSG. Lastly, the API driven approach is more or
less the same as the reverse proxy approach but with a slight
difference because of the use of administrator accounts.

CONCLUSION

After
analyzing various aspects associated with safety and security
offered by cloud technology service providers, it can be said that
with the changing dynamics of security and cloud technology, there
can never be 100% security but with the appropriate measures put in
place by cloud providers to secure their platform, more businesses
are inclined to adopt cloud technology at scale and hence a more
conducted world. Service providers are taking several measures such
as encryption, Two-Factor Authentication (2FA), and Cloud security
gateways (CSG) to secure the data and information of the customers.
These methods are effective in providing security. Reserve proxy and
forward proxy technologies are also working to increase the security
of the cloud system.

[1]
Lee, S., Ong, I., Lim, H. T., & Lee, H. J., “Two factor
authentication for cloud computing,” Journal
of information and communication convergence engineering,
8(4),
pp. 427-432, 2010.

[2]
Wittkop, J. (2019) Understanding
Cloud Security and Its Importance.

[online]

Intelisecure.com. Available at:
Understanding Cloud Security and Its Importance

[3]
Jadeja, Y., & Modi, K., “Cloud computing-concepts,
architecture and challenges,” In 2012
International Conference on Computing, Electronics and Electrical
Technologies (ICCEET), pp.
877-880, IEEE, March 2012.

[4]
Khalil, I. M., Khreishah, A., Bouktif, S., & Ahmad, A.,
“Security concerns in cloud computing,” In 2013
10th International Conference on Information Technology: New
Generations,
pp. 411-416, IEEE, April, 2013.
Let’s block ads! (Why?)

Do you need any assistance with this question?
Send us your paper details now
We’ll find the best professional writer for you!

 



error: Content is protected !!