Topic: Cloud computing securityIt should consisirt of Introduction, Main Report Body and Conclusion.MaIN REPORT– Application: Detailed description of the chosen computing and application area,...

1 answer below »
Topic: Cloud computing securityIt should consisirt of Introduction, Main Report Body and Conclusion.MaIN REPORT– Application: Detailed description of the chosen computing and application area, especially its unique features in its architectures and/or applications. – Security Issues:
Security issues due to the unique features of the computing and application area should then be described in some details. Some of these security problems also exist in other computing areas, while other security problems exist due to the nature of the new computing area. Students should try to identify those security problems which are of particular concerns in the chosen computing and application area. Security issues can be related to network security and/or system system as such those related to hacking. –
Security Solutions: Security solutions to the above security problems should be described in some details.
Answered 2 days AfterMay 20, 2021

Answer To: Topic: Cloud computing securityIt should consisirt of Introduction, Main Report Body and...

Neha answered on May 23 2021
152 Votes
Introduction
The cloud computing is known for providing the virtualize resources to the different customers. It can be used through different technologies like the web services, multi tenancy and the virtualization. The different cloud services are provided to the customers with the help of Internet. The web applications are generally used for accessing and managing the cloud resources and
it makes the web application of most important component of the cloud computing. The processes are executed in a virtual list environment and hence they can utilise the resources. Different virtual processors are performed by the different users and they are allocated to the physical machines and these machines are segregated at the logical level.
It can also result in the multi-tenant environment over the cloud. There are many advantages of having the cloud computing, but it also has different type of the risk for the security. Security is the major obstacle which can create a limit for the widespread adoption of this technology. There are many organizations and the business which are not able to trust the cloud computing completely and they are not okay to shift their digital assets to any 3rd party provider.
The conventional IT infrastructure is able to keep the digital assets in the administrative domain after company. All the movement for management and the processing of the data is present within the organization. But the organization is not able to enjoy the administrative control of the infrastructure and the cloud services. Different security measures need to be taken by the cloud service providers which are transparent for the organization.
There can be multiple users who are not related to the organization and they have the major concern. The user can be trusted by the cloud service provider birthday may not be trusted by each other.
Cloud security challenges
The basic cloud services are generally available for all the customers over the Internet death is new protocols which are followed to provide the connection with the cloud. The standard Internet Protocol is followed to provide communication between the customers and the cloud. This whole communication process can result in the transmission of the data or applications without a customer. There also exists communication within the clouds between virtual machines. We can divide the whole communication of the cloud into make 2 major categories which are communication external to the cloud which is between the cloud and customer and they communicate which is between the cloud infrastructure.
The shared communication infrastructure has high risk of the security. The resource cooling is the result for sharing the storage resources and the computational resources, but it is also the sharing of overall network infrastructure components. If we are sharing the components of the network, then it creates a new path for the attackers to perform cross tenant attack. The vulnerability is released from the resource pooling characteristic which belongs to the cloud computing and it has major impact over the infrastructure as a service model of the cloud computing. It is very hard to find out differences between the attacker activity and the legal vulnerability scan of the whole network.
These types of scans are not allowed by the service providers. The IP based segregation of the network portions are also not applied because the resources are provisioned on the dynamic level and they are released so cannot be associated with any particular user or the group of users. The users who are using the cloud are granting their super user access for managing the virtual machine.
If the user is accepting the capability, then it can empower them with the acquiring system, or the Mac addresses and the attackers can use it in malicious manner for the network interfaces. The malicious user who has super user access for the real...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here