0% found this document useful (0 votes)
43 views

Security Issues in Cloud Computing

Cloud computing delivers computing resources and services over the Internet. It has various models including SaaS, PaaS, and IaaS. Some key security issues in cloud computing include potential loss of intellectual property, reduced visibility and control of cloud environments, and lateral attack spread. These issues can be overcome by limiting cloud vendors, verifying access to cloud environment information, checking security SLAs, and consulting cybersecurity experts.

Uploaded by

Anish Mate
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Security Issues in Cloud Computing

Cloud computing delivers computing resources and services over the Internet. It has various models including SaaS, PaaS, and IaaS. Some key security issues in cloud computing include potential loss of intellectual property, reduced visibility and control of cloud environments, and lateral attack spread. These issues can be overcome by limiting cloud vendors, verifying access to cloud environment information, checking security SLAs, and consulting cybersecurity experts.

Uploaded by

Anish Mate
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

SECURITY ISSUES IN

CLOUD COMPUTING
Pratik Arun Satao
TE Com
Objectives

CLOUD COMPUTING IDENTIFY A FEW SECURITY OVERCOMING CLOUD


ISSUES COMPUTING SECURITY ISSUES
Cloud computing

 Cloud computing is the on-demand delivery of IT resources over the Internet with pay-as-you-go pricing. Instead of buying,
owning, and maintaining physical data centers and servers, you can access technology services, such as computing power, storage,
and databases

 Simply put, cloud computing is the delivery of computing services including servers, storage, databases, networking, software,
analytics, and intelligence over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.

 Cloud computing is a term that covers a wide range of technology resources that are delivered “as a service” via an internet
connection. This includes software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS), among
other services
• Features
Use of internet-based services to support business process
Rent IT-services on a utility-like basis

• Attributes
Rapid deployment
Low startup costs investments
Costs based on subscription
Multi-tenant sharing of services/ resources

• Essential characteristics
On demand self-service
Ubiquitous network access
Location independent resource pooling
Rapid elasticity
Measured service
Cloud Models

 Service Models
 SaaS (software-as-a-service)
Here the end user only interacts with the specific application provided by the third
party—the cloud service provider (CSP) is responsible for everything else.
 PaaS (platform-as-a-service )
the user can develop, test, and run their own applications. In other words, they
provide a platform where the user can create and run cloud-based applications .
 IaaS (infrastructure-as-a-service)
This is the cloud computing service that provides the most freedom (and
responsibility) to the user. Here, the CSP is providing what amounts to a remote data
center with minimal configuration—users have to manage most aspects of the
computing environment, such as operating systems and security.
Few Security Issues in Cloud Computing

1. Potential Loss or Theft of Intellectual Property.


2. Regulatory Compliance Violations.
3. Reduced Visibility of the Cloud Environment.
4. Reduced Control of Cloud Environment Settings.
5. Lateral Attack Spread.
6. Increased Complexity of Security.
7. Notifying Affected Parties after a Breach.
Overcoming Cloud computing Security Issues

1. Limit Your Cloud Computing Vendors


2. Verify Your Access to Information about the Cloud Environment
3. Verify Security SLAs
4. Check for Specific Security Measures
5. Consult with a Cybersecurity Expert

You might also like