Professional Documents
Culture Documents
CLOUD COMPUTING:
CHALLENGES AND
SOLUTION
SALAU DAMILOLA S.
ABSTRACT
Cloud computing is an emerging computing method whereby computing is been delivered
as a service rather than the delivery of computing as a product. “Cloud” always being
used as a metaphor for the ‘Internet’’ and the internet is the largest network we can think
of. The main motive behind networking is to share resources so as to cut cost and reduce
stress, the “cloud” in conjunction with “computing” offers shared resources such as
applications software, information, hardware etc to computers and computing devices as
a utility over the internet. This seminar reviews cloud computing and potential security
threats which are constantly affecting available cloud services. This will be done by
studying cloud architectures, their vulnerabilities and feasible solutions to these threats.
Introduction
What is cloud computing
Components of cloud computing
Characteristics of Cloud computing
Cloud computing architectures
Areas of applications for Cloud computing today
Security Issues in cloud computing
Solutions to cloud security threats
Conclusion
Recommendation
References
INTRODUCTION
Data storage has always been a place for useful information shortage. Even with
large scale data storage devices, the space will not be adequate to store the existing
huge amount of information. Cloud computing is basically considered as an internet-
centric open standard model. This model is full of different types of services which
include both hardware and software. The service providers do not require any high
management efforts for provision and maintenance of these services. The term
“cloud computing” aims to enhance the capabilities of high-power computing
systems. It also aims to reduce the price by hiking its efficiency as well as
performance. Though the benefits and facilities provided are very much effective,
the available technical barriers might stop cloud computing from being a ubiquitous
service. One of the main constituents of the cloud computing is security and it also
remains as the most significant concern of the system It usually suffers from various
types of security concerns and attacks like malicious codes. In addition, various new
concerns like storage and moving of data through the cloud is a big problem for the
user. The possibility of locating in a different place with different regulations adds a
lot to this problem It is also very much important for a cloud service provider to
confirm the usability and availability of their services. There are various reasons that
could affect the availability and the accessibility of the computing resources like
service denial or natural/unnatural disasters. Data privacy is one of the prime
concerns associated with the security of cloud computing as the data must be
protected from any third party, which is frequently reported by the users. Since,
cloud computing is used for sharing data, data theft is remaining as very common
and big risk, which is available for both users and service providers. (Manoj &
Venkateswarlu, 2021). Cloud computing has gained huge attention over the past
decades because of continuously increasing demands. There are several advantages
to organizations moving toward cloud-based data storage solutions. These include
simplified IT infrastructure and management, remote access from effectively
anywhere in the world with a stable Internet connection and the cost efficiencies that
cloud computing can bring(Hamed & Marjan, 2020). Cloud computing is an
archetype that enables access to a shared pool of computing resources for cloud users
in an on-demand or pay-per-use, fashion. Cloud computing offers several benefits
to users and organizations, in terms of capital expenditure and savings in operational
expenditure Cloud computing creates a network-based environment vision to the
users, which paves way for the sharing of calculations and resources regardless of
location. The National Institute of Standards and Technology's (NIST) defines cloud
computing (Dimitros, 2012) as, “A template for providing the suitable and when
needed access to the internet, to a collective pool of programmable grids, storage,
servers, software, and amenities that can be rapidly emancipated, with little
communication and supervision from the provider”. Cloud computing has four
deployment models namely Hybrid, Community, Private and Public clouds. There
are three service models, which are, PAAS (Platform as a Service), IAAS
(Infrastructure as a Service), and SAAS (Software as a Service). NIST's cloud
computing definition provides the needed framework and common characteristics
depicted such as Virtualization, Homogeneity, Geographic Distribution and Service
Orientation among others. (Nalini & Andrews, 2018)
The concept of Cloud Computing was introduced back in 1960s by John McCarthy.
According to him “computation may someday be organized as a public utility”. The
characteristics of cloud computing were explored first time in 1966 by Douglas
Parkhill in his book, “The challenge of the Computer Utility” history of term
“Cloud” is originated from telecommunications world, where telecom companies
started offering Virtual Private Network (VPN) services along with comparable
quality of service at a much lower cost. Before invention of VPN, they provided
dedicated point-to-point data circuits which are nothing but wastage of bandwidth.
But by using VPN services they able to switch traffic to balance utilization of overall
network. Cloud computing now extends this to cover servers and network
infrastructure. Many players in industries have jumped into cloud computing and
implemented it. For example, Amazon has played an important role and launched
the Amazon Web Service (AWS) in 2006. Along with this Google and IBM also
started research projects in Cloud Computing. Eucalyptus became the first open-
source platform for deploying the private clouds. (Ankur, 2015)
In Cloud computing architecture there are two main modules are Front end and
Back End. Front End comprises customer part of the framework which speaks to
the clients who are getting to the Cloud Components through an interface or through
the application, for example, internet browser or versatile application over the
Internet. Back End speaks to the cloud itself. It comprises of the assets required to
convey the cloud computing administrations, for example, virtual machines,
stockpiling account, organize, security instrument, administrations and so on. Back
End part is under the supplier's control and it's the essential duty of back-end segment
to deal with the traffic control, give worked in security system, and convention. Both
of part of distributed computing is associated by means of system, normally Internet.
In a cloud computing design, all applications are controlled, overseen, and served by
a cloud server. Its information is imitated and protected remotely as a major aspect
of the cloud design. There are sure administrations and arrangement models working
in the background making cloud computing achievable and open to the end clients.
(Mohamed, 2020)
The cloud carries the basic infrastructure characteristics that are helpful to deploy
the cloud service in a fast and cost-effective way. The characteristics discussed in
the following subsections set apart the cloud from other computing techniques.
Broad Network Access: Thick or thin clients (ranging from tablets, laptops,
workstations to mobile phones) enjoy access to the cloud by using standard
mechanisms.
Rapid Elasticity: This characteristic makes the provisioning rapid and elastic. This
provisioning can be automatic and can flex-up and flex-down on the basis of spikes
of utilization. The consumer can view the infinite capacity available as a service,
which can be bought at any point of time. (Harjit, 2020)
According to NIST, five major actors have been identified in cloud computing. The
NIST Conceptual Reference Model diagram in shows the actors which are discussed
below.
Cloud computing has found its way into so many fields in which it has proven to be
efficient and easy to manage for all kinds of solution. Cloud technology offers
several applications in various fields like business, data storage, entertainment,
management, social networking, education, art, GPS, to name a few. The major types
of cloud computing service models available are Platform as a Service (PaaS),
Infrastructure as a Service (IaaS), and Software as a Service (SaaS). Plus, there are
platforms like Public Cloud, Private Cloud, Hybrid Cloud, and Community
Cloud. Below are some areas of application of cloud computing:
1. Online Data Storage: Cloud Computing allows storage and access to data like
files, images, audio, and videos on the cloud storage. In this age of big data, storing
huge volumes of business data locally requires more and more space and escalating
costs. This is where cloud storage comes into play, where businesses can store and
access data using multiple devices.
The interface provided is easy to use, convenient, and has the benefits of high speed,
scalability, and integrated security.
2. Backup and Recovery: Cloud service providers offer safe storage and backup
facility for data and resources on the cloud. In a traditional computing system, data
backup is a complex problem, and often, in case of a disaster, data can be
permanently lost. But with cloud computing, data can be easily recovered with
minimal damage in case of a disaster.
3. Big Data Analysis: One of the most important applications of cloud computing
is its role in extensive data analysis. The extremely large volume of big data makes
it impossible to store using traditional data management systems. Due to the
unlimited storage capacity of the cloud, businesses can now store and analyze big
data to gain valuable business insights.
In the Cloud Security Report conducted in 2020, organizations were asked about
their major security concerns regarding cloud environments. Despite the fact that
many organizations have decided to move sensitive data and important applications
to the cloud, concerns about how they can protect it there abound. Here are some of
the major cloud security threats as of 2021:
Data Loss/Leakage
Cloud-based environments make it easy to share the data stored within them. These
environments are accessible directly from the public Internet and include the ability
to share data easily with other parties via direct email invitations or by sharing a
public link to the data. The ease of data sharing in the cloud – while a major asset
and key to collaboration in the cloud – creates serious concerns regarding data loss
or leakage. In fact, 69% of organizations point to this as their greatest cloud security
concern. Data sharing using public links or setting a cloud-based repository to public
makes it accessible to anyone with knowledge of the link, and tools exist specifically
for searching the Internet for these unsecured cloud deployments.
Data Privacy/Confidentiality
Data privacy and confidentiality is a major concern for many organizations. Data
protection regulations like the EU’s General Data Protection Regulation (GDPR),
the Health Insurance Portability and Accessibility Act (HIPAA), the Payment Card
Industry Data Security Standard (PCI DSS) and many more mandate the protection
of customer data and impose strict penalties for security failures. Additionally,
organizations have a large amount of internal data that is essential to maintaining
competitive advantage. Placing this data on the cloud has its advantages but also has
created major security concerns for 66% of organizations. Many organizations have
adopted cloud computing but lack the knowledge to ensure that they and their
employees are using it securely. As a result, sensitive data is at risk of exposure – as
demonstrated by a massive number of cloud data breaches.
Incident Response
Data protection regulations like PCI DSS and HIPAA require organizations to
demonstrate that they limit access to the protected information (credit card data,
healthcare patient records, etc.). This could require creating a physically or logically
isolated part of the organization’s network that is only accessible to employees with
a legitimate need to access this data. When moving data protected by these and
similar regulations to the cloud, achieving and demonstrating regulatory compliance
can be more difficult. With a cloud deployment, organizations only have visibility
and control into some of the layers of their infrastructure. As a result, legal and
regulatory compliance is considered a major cloud security issue by 42% of
organizations and requires specialized cloud compliance solutions.
Data Sovereignty/Residence/Control
Most cloud providers have a number of geographically distributed data centres. This
helps to improve the accessibility and performance of cloud-based resources and
makes it easier for CSPs to ensure that they are capable of maintaining service level
agreements in the face of business-disrupting events such as natural disasters, power
outages, etc. Organizations storing their data in the cloud often have no idea where
their data is actually stored within a CSP’s array of data centres. This creates major
concerns around data sovereignty, residence, and control for 37% of organizations.
With data protection regulations such as the GDPR limiting where EU citizens data
can be sent, the use of a cloud platform with data centres outside of the approved
areas could place an organization in a state of regulatory non-compliance.
Additionally, different jurisdictions have different laws regarding access to data for
law enforcement and national security, which can impact the data privacy and
security of an organization’s customers. (checkpoint, 2023)
There's no question that the public cloud service providers that you're familiar with,
such as Amazon, Google and Microsoft, offer a more secure environment than you
could ever hope to with your on-premises servers. Security breaches are rarely
caused by poor cloud data security - they’re caused by humans. Stolen log-in
credentials, disgruntled employees, accidental deletions, insecure wi-fi connections,
and other employee mishaps are the reason that your cloud data is at risk. In a bid to
avert these rare but dangerous data breaches, the following precautions are
suggested:
Real-time monitoring and analysis of end user activities can help you spot
irregularities that deviate from normal usage patterns, e.g., log in from a previously
unknown IP or devices. These abnormal activities could indicate a breach in your
system so catching them early on can stop hackers in their tracks, and allow you to
fix security issues before they cause mayhem.
When employees leave your company, make sure they can no longer access your
cloud storage, systems, data, customer information, and intellectual properties. This
is a crucial security responsibility that often gets pushed back days or weeks after
someone has left. Since each employee would likely have access to many different
cloud applications and platforms, you need a systemized deprovisioning process to
ensure that all the access rights for each departing employee are revoked.
As mentioned, the odds of you losing data because of your cloud provider's mistake
is very low - but losing that data due to human error is high. Let's use Microsoft
Office 365 as an example. If an employee should accidentally delete data, a hacker
obtains an account password and corrupts the data, or a rogue employee cleans out
his inbox and folders - there is nothing Microsoft can do past a certain time period.
Note that most cloud providers, including Microsoft, do store deleted data in their
data centres for a short period of time, including your Microsoft Office 365 data.
(Frank, 2022)
CONCLUSION
M, M. M. (n.d.).
Nalini, S., & Andrews, J. (2018, October). Recent security challenges in cloud
computing. Computer and Electrical Engineering,ScienceDirect, pp. 28-42.