Security Concerns

Security Concerns

Secure Cloud Computing

Ever since the cloud, and by extension cloud computing, became available to the public, there have been security issues that users and CSPs have had to deal with. These security issues are the result of there being individuals who take advantage of, and exploit, the vulnerabilities of cloud computing to illegally access, or damage, the resources and information of CSPs and cloud users. Unfortunately, these security threats come in multiple forms. One issue cloud users can experience is that shared network infrastructures within the cloud are unable to use standard intrusion detection and prevention mechanisms (Tang, 2016). Another type of abuse and fraud threats are what happen when cloud users, typically those who IaaS and PaaS, are on the receiving end of attacks such as cryptojacking, distributed denial of service, and distributed password cracking attacks. These forms of attacks are often orchestrated by spammers, malicious coders, and other fraud developers who abuse the anonymity cloud services provide. Another potential problem is data leakage and/or loss, which consists of a compromise of the integrity and/or confidentiality of the data of a cloud user, which is deleted, stolen, or altered (Anand, 2017). The most feared form of security threat for cloud computing for a cloud user is when their confidential information has been accessed by a hacker, who is able to eavesdrop on the activities of their victims and misuse the information they obtained. In spite of all of these threats, CSPs do their best in improving the security of their cloud computing and normally try to do their best assisting customers who are victims of a security compromise.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

  • Important Information