Answered You can hire a professional tutor to get the answer.

QUESTION

Compose a 2500 words assignment on an investigation into threats to cloud computing security. Needs to be plagiarism free!

Compose a 2500 words assignment on an investigation into threats to cloud computing security. Needs to be plagiarism free! The study also finds out any existing gaps in each of the studies undertaken by the researchers. The competitiveness in the field of actively developing cloud security solutions is often confusing to a layman since he cannot differentiate the nature of one solution and its applicability from the other. However, for a student of computing, the applications, solutions, and suggestions all fall in one frame, which is led by the common and challengingly new threats to security over the cloud. Data fed into the cloud is secure only as long as the correct solutions are used. And to define the word ‘correct’ in this context, it is highly important to recognize which new threat is the most imposing, be it IaaS, SaaS or PaaS, and which type of threat the solution is addressing. Needless to say, there are quite many threats to cloud security that has triggered such a heavy amount of research work. With data access and service hijacking on top concerns, there is a frenzy of activity in these areas. Other than that, there is abuse and nefarious use of cloud computing, use of insecure interfaces and APIs, presence of undocumented malicious insiders, shared technology issues especially in inter-cloud scenarios, and entry of unknown risk profiles.

Ontology is often neglected as a source of security solutions in ACPs (access control policies). According to Hu et al’s presentation at the first International Conference of Cloud Computing, using a SACPL (Semantic Access Control Policy Language) that is derived on ontology, to describe ACPs in the cloud environment would be a workable solution. According to their study, the ideal way to approach this would be to use XACML syntax elements in two sets, one set has ACOOS semantic information annotated while the other set has other elements like confidentiality and priority. The approach easily solves all issues involving mutual understanding and semantic.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question