Cloud computing is often misinterpreted as a specific technology. However, in true aspect, cloud computing can be considered as a specific computing concept that is based on the philosophy of distributed computing, parallel computing and grid computing. Depending on the service level, clouds can be categorised into three specific categories including Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS). Contemporary research studies have found that regardless of the nature of clouds, security remains a common concern. Therefore, it is becoming increasingly crucial for modern day organisations to assess the cloud computing security measures to ensure business information security.
Access control remains a primary security parameter for could computing that could restrict the system accessibility only to the authorised personnel. Access control sets the degree to which a system can be accessible by the eligible candidates. Access controls analyses the needs of the parties who interact with the system, aiming to authenticate the personnel. Successful authentication process enables the parties to use the system to the allowed extent, restricting other domains. However, cloud often accounts anomalies that lead to authentication problems. The attach harm detection in cloud deals with the detection, notification and recording when an external influence turn out to be a potential threat for the system. Subashini & Kavitha proposed four groups of could solutions to tackle system threats that are cloud firewalls, security measuring framework, cloud community watch services and multi technology based approaches like NIPS.
When it comes to cloud computing security ensuring system integrity is assumed to be pivotal. Whether it is hardware integrity, software integrity, personal integrity or data integrity, the system is supposed to make sure the components are well protected from unauthorised or intentional corruption. However, Subashini & Kavitha are not totally convinced with the concept of independent cloud security and proposed the application of a cloud security auditing through which the security personnel can evaluate the security status of the system following a range of security events.
Cloud computing is often considered as the future of business organisations. Although the benefits of cloud computing have been proven over the last five years or so, there is plenty of scope for improvements as far as the cloud security is concerned. In order to make sure a safe and secure cloud computing environment, continuous R&D activities are necessary that need to be coupled with rigorous security auditing.
Copyright © 2014-2019
Justforwriting.com: Essay writing made easy with our guides.