Cloud Computing Security, Reliability And Availability Essay Example
Cloud Computing Security, Reliability And Availability Essay Example

Cloud Computing Security, Reliability And Availability Essay Example

Available Only on StudyHippo
  • Pages: 4 (999 words)
  • Published: August 15, 2018
  • Type: Research Paper
View Entire Sample
Text preview

Concerns about Security, Reliability, and Availability in Cloud Computing

In cloud computing, users can access computing facilities from a single multi-provider who charges a fee for the necessary infrastructure and software. This technology combines various technologies to offer services like Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Individuals, academics, and businesses have the flexibility to choose services that meet their needs and purchase them when needed, making cloud computing an attractive option. However, similar to any other internet-based provider, there are concerns about security, reliability, and availability.

With the rising adoption of cloud computing in enterprise operations, the significance of these concerns has amplified.

Introduction

Cloud computing is an innovative technology that strives to simplify human existence through diverse data storage services. It has gained favor among small businesses, individuals,

...

academics, schools, and other institutions desiring enhanced services. The expansion of cloud computing is a consequence of the progression and advancement of multiple technologies such as open APIs, infrastructure, and novel approaches to processing and storing substantial data volumes.

Cloud computing services are highly advantageous for small businesses that lack the funds to purchase necessary hardware or software but still require high system performance. Furthermore, cloud computing offers a cost-effective solution since businesses can acquire server hours as needed rather than being limited to a fixed supply. However, traditional scenarios where businesses utilize their own servers often result in inefficient practices in two ways. Firstly, establishing server infrastructure based on off-peak requirements leads to under-provisioning, resulting in congestion and potential delays during peak periods. Secondly, setting server hours according to peak time requirements leads to over-provisioning and surplus server hours durin

View entire sample
Join StudyHippo to see entire essay

off-peak periods, causing resource waste. To ensure that cloud computing is suitable for businesses with consistent product/service supply needs and optimal operational efficiency, three critical issues must be addressed.

To be considered the optimal choice for data and information storage, cloud computing must address crucial aspects like security, availability, and reliability. If these factors are not taken into account, cloud computing will not fulfill its intended purpose.

Security

The growing threat of internet attackers such as worms, viruses, hackers, and financially motivated cyber-terrorists poses a challenge to cloud computing users. As more individuals adopt this technology, malicious individuals exploit vulnerabilities for personal gain. To safeguard client data effectively, cloud computing providers need to enhance their security systems. However, implementing improved protection measures may lead to higher prices for cloud computing services.

The main types of applications available are classified according to the service they provide. The different services have distinct security concerns as a result of the structures implemented for multiple user accessibility.

SaaS, IaaS, and PaaS

Providers of Software as a Service (SaaS) offer network-hosted applications, enabling customers to utilize necessary software without buying it. This cost-effective approach benefits users who only require software on an as-needed basis.

The software can be utilized without incurring license fees or additional equipment costs by paying the provider for restricted access. The primary concern regarding security for Software as a Service (SaaS) users revolves around denial of service attacks, which can either directly target users or impact them when their provider is under attack. Denial of service attacks involve injecting malware into servers and generating pointless traffic that hampers legitimate user access. Hackers can also send multiple commands to servers, resulting in slowdowns and

impeding other users' ability to enjoy the service.

For users seeking more advanced applications than what they currently possess, they can approach cloud computing providers that offer Platform as a Service (PaaS). They are able to remotely access applications either independently or through the use of the provider's machines, eliminating the need for self-installation of the applications themselves.

Additionally, PaaS is suitable for short-term or intermittent use cases where purchasing would lead to underutilization. It is also beneficial when users require more capable applications than what they currently possess, and these applications demand greater capacity. It is important to consider that PaaS introduces security concerns primarily due to the actions of the provider, such as their relationships with third-party providers. The combination of various elements from different sources creates mash-ups, which raises suspicions about their security and brings up concerns for the overall platform's security. Another security challenge with PaaS involves frequent upgrades to platform features. Providers strive to keep up with these upgrade requirements; however, this may result in applications being developed too quickly without sufficient time to address all vulnerabilities and bugs. Consequently, once integrated into the platform, these applications expose the entire system to potential bugs.

Infrastructure as a Service (IaaS)

Organizations can delegate their complete computing infrastructure, encompassing storage, hardware, servers, and networking components, to obtain operational support. This enables them to prioritize other business procedures while alleviating concerns about their infrastructure. IaaS providers extend virtualized systems granting access to storage facilities, servers, networks, and additional computing resources. The security challenges for IaaS primarily arise from the virtualization feature, specifically the hypervisor overseeing all virtual machines' performance. Safeguarding the hypervisor is vital since its

compromise can impact the entire system. Other vulnerabilities involve public availability of Virtual Machine image repositories.

According to Bisong and Rahman (2011), potential threats to cloud computing applications include the following:

  1. Exploitation of information stored in the clouds through cloud computing abuse by third parties.
  2. Catastrophic attacks resulting from insecure programming interfaces being used.
  3. Malicious insiders utilizing cloud computing for illicit purposes.
  4. Vulnerabilities arising from the sharing of technologies among individuals with different needs and locations.
  5. Data loss or leakage during transit or transfer within the cloud, such as from the provider to user's computers.
  6. Hackers hijacking service provisions to gain unauthorized access to others' data for personal gain.
  7. The unknown risk factor that refers to unpredictable events beyond entrepreneurs' control that can impact business decisions.<

To effectively manage these risks, businesses should address issues that could compromise confidentiality, integrity, and uninterrupted availability of their information systems (Bisong and Rahman, 2011). It is crucial for day-to-day operations that intellectual property and trade secrets stored in the cloud are safeguarded.

The selection of a cloud computing provider is critical for businesses because they are unable to verify the integrity of the devices utilized for storing their information. It is crucial that the provider ensures secure and accessible storage on their servers. According to Bisong and Rahman (2011), users should ensure that their data is segregated online from other users to prevent mix-ups and security issues such as virus infections. The provider must also demonstrate effective encryption methods to safeguard user data from theft or attacks by other users. In case of a breach, the provider should possess forensic examination capabilities to identify system faults and rectify them in order to prevent future incidents. Businesses

need to assess both their own systems and potential cloud computing providers' systems as part of their risk assessment process. Vulnerabilities, which refer to weaknesses in the system that can be exploited to harm the business, are defined by Bisong and Rahman (2011).

The most harmful vulnerabilities in a system are those that allow a third party to eavesdrop, gain unauthorized access to databases through hacking or cracking, or carry out harmful attacks with the intention of causing damage or disrupting service.

Users and businesses who utilize cloud computing services bear the ultimate responsibility for their own security because losing information stored in the cloud would have the greatest impact on them.

According to Bisong and Rahman (2011), it is crucial for businesses to recognize that the decentralized structure of the cloud also impacts the data transmitted to its servers for storage.

To avoid detrimental risks for the business, it is advisable to have a comprehensive understanding of your provider's infrastructure.

Service Availability in Cloud Computing

Cloud computing services have become widely preferred for data storage due to the ubiquity of the internet. Providers ensure access to users' data from any location by hosting it on the World Wide Web. The virtual space with encryption codes and authorization limits enables convenient access to data regardless of the user's whereabouts. Public clouds, a cost-effective and easily accessible type of cloud, have gained popularity due to the high demand for cloud applications. These clouds allow individual users to adjust their storage allocations based on their requirements.

Users can access their data remotely and have backups available on-demand. Some social websites operate as a type of cloud, granting access to

a specific amount of data from any location, while ensuring backup and security support. According to Ricky ; Magalhaes, 2014, public cloud storage offers advantages in data access and storage agility. Remote data access allows users to retrieve their data regardless of the physical device it is stored on; they simply use their login credentials with their provider. Automatic backups provided by many clouds are crucial for recovering lost information and data. Additionally, users can store less frequently accessed information for later use when needed.

Public clouds are less expensive than private clouds as the costs of managing data in the cloud are shared among a larger user base. However, there is a concern about loss of control over data stored in public clouds. Providers must manage the data load on their systems, resulting in limitations on the quality of online storage. Users frequently have to lower the data quality to meet provider storage requirements, affecting the overall value of the data.

The user is worried because they feel like they are just a number in a big multi-tenancy infrastructure and can't easily access specialized services. The accessibility may be unreliable due to potential denial of service issues when many people try to access databases at the same time. Also, if users switch vendors, they might lose access to important information in established data and information sharing networks. In summary, users have little control over which cloud service vendor they can choose.

Before transitioning to cloud computing, it is crucial to ensure that the chosen provider has robust disaster recovery protocols in place to avoid data loss. Additionally, one must consider the long-term viability of the provider and

how cloud data will be handled in case of bankruptcy or acquisition. Users should have assurance that their data will remain accessible even if they decide to switch providers. Businesses should thoroughly assess the pros and cons of adopting cloud computing and develop sustainable usage plans through pilot programs and governance systems.

Before transitioning to cloud computing, it is important for businesses to address security concerns and have backup plans in place.

Ensuring Reliability in Cloud Computing

To ensure reliability in cloud computing, it is recommended that users ask their chosen provider for transparency regarding their security infrastructure. This will help determine if the provider can meet specific needs for cloud services. Users should also verify that regular audits on the cloud's security are conducted by an independent third party or federal agency to prevent corruption or manipulation. Additionally, businesses need to understand the legal implications and how data storage in the cloud relates to applicable laws.

While the cloud is often perceived as a secure and private storage space, it is crucial to acknowledge that legal authority still applies. Legal repercussions may arise if illegal information is stored in the cloud, potentially affecting businesses or individuals. To guarantee data safety, it is advisable to stay informed about technological advancements and keep track of industry changes. The internet undergoes constant evolution, with expectations for both security and convenience of cloud storage to improve over time. Service providers must undergo confidence tests to ensure users of their capability to provide dependable and uninterrupted services. Sabahi F. (2012) examines operational procedures and systems that instill confidence in cloud users regarding the services they utilize.

The text discusses

the importance of addressing issues that affect the effectiveness of a cloud system. These issues, such as virtualization and hypervisor installation, must be properly monitored to ensure that clouds meet the highest standards of service. Virtualization is a system implemented by IT companies to optimize the performance of virtual machines. These virtual machines are created by providers to fulfill the computer needs of clients without requiring the purchase of numerous physical machines. The performance of these virtual machines is monitored by a hypervisor, which operates at a superior level. Through the creation of virtual hardware, the features of physical hardware are replicated to meet customer requirements.

Providers must adhere to information security policies when creating their products to ensure that users have privileged user access and their data is protected from unauthorized access. This is especially crucial when handling sensitive data. Providers are also responsible for complying with regulations set by legislative bodies and may receive protection against certain types of client-caused losses. Thus, both the client and the provider are equally responsible for the security of the data. Despite the requirement to create virtual machines for segregating user data, virtualization machines can still be vulnerable to attacks, including those targeting the hypervisors directly. The hypervisor hardware may be at risk of attacks from within the providers' ranks or on its location or OS.

The virtualization software may be prone to vulnerability in expanded network surfaces, which are located outside the hypervisors' firewall. Cloud providers have had to deal with the intrusion of clouds, where clients' data is at risk of malicious attacks, in order to maintain customer confidence. Intrusion Detection (ID) software is utilized as the

primary solution for detecting and preventing malicious activities in networks. This software is also applicable for protecting SaaS, PaaS, and IaaS providers.

These are the measures put in place by the industry and the providers of cloud computing applications to enhance server performance and assure users of trustworthy cloud services. Reliability ensures that users can trust the security and availability of their data in the cloud without personal risk. However, users must recognize that securing their own data remains their ultimate responsibility. While application providers take steps to safeguard data integrity, it is up to users to select a competent service provider. Choosing an experienced cloud provider is a safer option as they are more likely to effectively resolve issues that may arise and maintain uninterrupted service provision.

Cloud Computing Applications

Before deciding to use cloud computing applications, individuals should have a clear understanding of what it entails.

Information is crucial in cloud computing applications, as it helps determine the suitability of the application based on the purchaser's requirements. While convenience is important, the key issues in cloud computing applications are availability, reliability, and security. Security is particularly significant in customer-facing cloud computing applications. Users primarily opt for cloud computing services to protect their data from storage risks on their servers. The sensitivity of information necessitates that security concerns are a top priority for both providers and users. This is especially critical due to the presence of malicious entities on the internet solely focused on causing harm to others for personal financial gain.

The issue of protecting data from worms, viruses, hackers, and cyber-terrorists has prompted governments and industry players to implement regulations and industry norms that assure users of

the security of their data in the cloud. Security also plays a crucial role in maintaining the availability and reliability of cloud services. When security breaches occur in the cloud, data availability is usually affected, making it nearly impossible for users to access their data. The main concern regarding the availability of cloud computing services is security. If security breaches are frequent in an application, users cannot rely on being able to access their data when needed. Additionally, worms, viruses, and hackers on the cloud can cause data loss and make it impossible to access, making it an unreliable storage solution for operational data in businesses.

The unreliability of accessing applications arises when they are available but cannot be accessed due to security concerns. The availability of cloud computing applications is crucial for businesses and individuals who rely on them. Cloud computing technology enables remote access to data from any internet-enabled device, bridging the gap between users and their data. This technology replaces physical storage methods like flash disks, hard disks, and device memory, which are prone to loss, destruction, malware attacks, and other challenges. Therefore, cloud computing addresses the issue of data inaccessibility when stored in physical devices.

Placing the data online and trusting a provider to provide the necessary backup and protection is the best way to ensure data availability and security. It is important to vet the provider and ensure they have measures in place to keep data secure and accessible. However, ultimate responsibility for data accessibility lies with the user. Reliability is also crucial when purchasing cloud computing applications, as users need assurance that their data will always be secure and available.

In summary,

trust in a cloud provider is crucial for users to receive quality and accessible services. It is important for users to ensure that their providers have implemented necessary security measures and data availability guarantees. Reliability is determined by the provider's experience in delivering uninterrupted services. When selecting a cloud service, businesses should consider factors such as storage capacity, scalability, and bandwidth allocation. Bandwidth is essential for accessing data from vast amounts of online information and protecting against denial of service attacks.

It is common for providers to use this remediation method when a client experiences this type of attack. Cloud computing is a widely available and popular application, making it an attractive option for individuals and small businesses looking to save costs while still benefiting from cloud computing. When selecting public clouds, users need to be cautious and thoroughly evaluate providers to ensure they meet their specific needs in order to avoid potential pitfalls. Generally, more expensive software tends to have a higher user base, which could be seen as a guarantee of its performance compared to other assurances given by the distributor.

For individuals seeking cloud computing services, conducting research, risk assessment and suitability and feasibility tests is necessary, as joining a cloud service is a crucial business decision that is not to be taken lightly. Individuals and businesses are also expected to choose the best service to purchase from the cloud out of the SaaS, PaaS and IaaS available. The choice is supposed to be the one most suited to their needs, and for business, the one that will best ensure that profit maximization is possible.

Conclusion

Cloud Computing is often regarded as the future of business

and the future of storage and transmission of data. With the freedom that it gives users also comes risks and shortfalls, most of which are related to the all important factor of information safety while in cloud. Both the users and the providers of clouding services are charged with the safety of the service, with users being guided by their best interests to ensure that prudence is practiced in selecting a provider and the best type of service.

Providers of cloud services are regulated by governments and also engage in self-regulation to ensure the best possible cloud services for their clients. Both the user and the provider contribute to the security, reliability, and availability of cloud computing.

References

  1. Bisong A. and Rahman S. M. (2011) An Overview Of The Security Concerns In Enterprise Cloud Computing. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, https://www.researchgate.net/publication/48197685_An_Overview_Of_The_Security_Concerns_In_Enterprise_Cloud_Computing
  2. Hashizume K., Rosado G. D., Fernandez-Medina E. and Fernandez B. E. (2013) An analysis of security issues for cloud computing Journal of Internet Services and Applications http://jisajournal.springeropen.com/articles/10.1186/1869-0238-4-5
  3. Ricky M.

& Magalhaes L. M. (2014) Stability and Reliability of Public Cloud Storage http://www.cloudcomputingadmin.com/articles-tutorials/public-cloud/stability-and-reliability-public-cloud-storage.html

Sabahi F. (2012) Cloud Computing Reliability, Availability and Serviceability (RAS): Issues and Challenges. International Journal on Advances in ICT for Emerging Regions (ICTer) 4(2) http://icter.sljol.info/articles/abstract/10.4038/icter.v4i2.4673/
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New