This paper concentrates on the primary theme of Emerging issues in Security Technologies for Cloud Computing in which you have to explain and evaluate its intricate aspects in detail. In addition to this, this paper has been reviewed and purchased by most of the students hence; it has been rated 4.8 points on the scale of 5 points. Besides, the price of this paper starts from £ 40. For more details and full access to the paper, please refer to the site.
Emerging issues in Security Technologies for Cloud Computing
In an article by Rachana & Guruprasad (2014), the authors present three prongs regarding the security concerns faced by the clouds. The first prong groups the security concerns in different categories such as data access, segregation, accountability, privacy, recovery, bug exploitation, multi tenacity issues, account control, management console security and malicious outsiders. This categorization is important as it seeks to offer a better view of the threats prior to identifying these threats and their impacts. The second prong identifies these threats and the impacts they cause to the clouds to be in the form of data leakage or loss, denial of service attacks, service disruptions, multitenacity, malicious insiders, and outside attacks; this grouping is an important aspect in the study as it makes it easier to connect to categories of security concerns. The article then suggests solutions to minimizing security concerns to be in the form of incident counter measures, access control, trusted computing platform, and trust_token. The major advantage of setting these measures is to offer a response to minimize instances of these threats.
Other researches such as those presented by Kuyoro, Ibikunle, & Awodele (2011) note the existence of these concerns that affect the clouds tagging them the name Gartner seven cloud security issues. In their research, the three make recommendations noting some suggestions that individuals need to adopt prior to the adoption of clouds into their systems. Some of the suggestions they present are to understand the infrastructure and the roles played by the clouds in different contexts.
Despite having made recommendations on some of the security concerns that Clouds face, their research should have ventured further to explain how their suggested solutions should be adopted in the context of clouds. The research should also have explained how different companies adopt clouds and further why these measures would be the most invaluable to handling such security concerns.