SlideShare a Scribd company logo
1 of 2
Security Issues in Cloud Computing


Cloud Computing has recently become a promising method of delivering computing resources.
But some still do not consider it a new technology. Cloud Computing has been there since a
long time but the usage was very subtle. Ranging from data storage services to developing
applications, Cloud has also made email handling commitment free and on-demand. Apart from
this, it also provides great flexibility with its pay per use concept, compelling many SMBs to
migrate. The only factor where Cloud Computing today lacks in providing assurance is the level
of security practiced by the vendor.

Cloud Computing

Data Protection is first of the many threats in Cloud Computing as there is immense risk in
allowing someone else to handle your data if not done in a lawful way with proper compliances
and data security certifications.Losing governance rights over a Cloud infrastructure while
selecting a Public Cloud Vendor leaves a gap in security thereby ceding control to the
vendor.Cloud Vendor Lock-in makes it difficult for users to migrate from vendor to another and
introduces huge switching costs and complexity.

Cloud Services

Data availability in terms of 99.9% uptime guaranteed in SLAs is sometime not met due to
inadvertent situations such as outages leading to huge data loss and business process
discontinuity.Isolation failure, multi-tenancy and shared resources are significant characteristics
of cloud computing. This risk category covers the failure of mechanisms separating storage,
memory, routing and even reputation between different tenants.Leniency or poor encryption
techniques used during data transactions in the Cloud may prove fatal if there are hackers
sitting on another end waiting to find a way in to the firewall.

Cloud Computing Company

Certain Cloud Providers do not allow customer audits, creating a risk in migration to such a
provider by not providing evidence of the relevant compliances.Web browsing vulnerabilities
pose serious threat to customer management interfaces of Public Cloud providers where the
data is accessible via the internet.Data backup and loss of data is another reason which makes
Cloud migration decisions a tough nut to crack.Finally human threat, which is usually unlikely,
can also be a reason of data leak and privacy risks.

Cloud Computing For
With the inadvertent growth of Cloud Computing in recent times, security has really become a
major concern for users/businesses looking to incorporate the Cloud into their
processes/strategy- moving their business data online, building LOB applications on a PaaS or
utilizing the infrastructure services of an IaaS provider. Listed above are a few of the examples
of security issues in Cloud Computing. To sum it up, Security in the Cloud broadly refers to a set of
policies, technologies, and controls devised to protect data, applications, and the associated
infrastructure of Cloud Computing consumers.

More Related Content

Viewers also liked

Viewers also liked (14)

Presentacion 100 años pal mag reducido
Presentacion 100 años pal mag reducidoPresentacion 100 años pal mag reducido
Presentacion 100 años pal mag reducido
 
Entrevista Douglas
Entrevista DouglasEntrevista Douglas
Entrevista Douglas
 
Financial flexibility
Financial flexibilityFinancial flexibility
Financial flexibility
 
Cuenca
CuencaCuenca
Cuenca
 
Lembaran lesson study
Lembaran lesson studyLembaran lesson study
Lembaran lesson study
 
Potentiale des Ne(x)t Generation Learning
Potentiale des Ne(x)t Generation LearningPotentiale des Ne(x)t Generation Learning
Potentiale des Ne(x)t Generation Learning
 
Final leasing results
Final leasing resultsFinal leasing results
Final leasing results
 
Unmatrimoniofeliz 111130111417-phpapp01
Unmatrimoniofeliz 111130111417-phpapp01Unmatrimoniofeliz 111130111417-phpapp01
Unmatrimoniofeliz 111130111417-phpapp01
 
Grafico mensual del ibex 35 para el 01 12 2011
Grafico mensual del ibex 35 para el 01 12 2011Grafico mensual del ibex 35 para el 01 12 2011
Grafico mensual del ibex 35 para el 01 12 2011
 
El miedo esta en tu mente
El miedo esta en tu menteEl miedo esta en tu mente
El miedo esta en tu mente
 
Estadísticas del curso
Estadísticas del cursoEstadísticas del curso
Estadísticas del curso
 
2 trabago humberto
2 trabago humberto2 trabago humberto
2 trabago humberto
 
Lab301111 prcho
Lab301111 prchoLab301111 prcho
Lab301111 prcho
 
Trabajos realizados durante la clase
Trabajos realizados durante la claseTrabajos realizados durante la clase
Trabajos realizados durante la clase
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Security Issues in Cloud Computing

  • 1. Security Issues in Cloud Computing Cloud Computing has recently become a promising method of delivering computing resources. But some still do not consider it a new technology. Cloud Computing has been there since a long time but the usage was very subtle. Ranging from data storage services to developing applications, Cloud has also made email handling commitment free and on-demand. Apart from this, it also provides great flexibility with its pay per use concept, compelling many SMBs to migrate. The only factor where Cloud Computing today lacks in providing assurance is the level of security practiced by the vendor. Cloud Computing Data Protection is first of the many threats in Cloud Computing as there is immense risk in allowing someone else to handle your data if not done in a lawful way with proper compliances and data security certifications.Losing governance rights over a Cloud infrastructure while selecting a Public Cloud Vendor leaves a gap in security thereby ceding control to the vendor.Cloud Vendor Lock-in makes it difficult for users to migrate from vendor to another and introduces huge switching costs and complexity. Cloud Services Data availability in terms of 99.9% uptime guaranteed in SLAs is sometime not met due to inadvertent situations such as outages leading to huge data loss and business process discontinuity.Isolation failure, multi-tenancy and shared resources are significant characteristics of cloud computing. This risk category covers the failure of mechanisms separating storage, memory, routing and even reputation between different tenants.Leniency or poor encryption techniques used during data transactions in the Cloud may prove fatal if there are hackers sitting on another end waiting to find a way in to the firewall. Cloud Computing Company Certain Cloud Providers do not allow customer audits, creating a risk in migration to such a provider by not providing evidence of the relevant compliances.Web browsing vulnerabilities pose serious threat to customer management interfaces of Public Cloud providers where the data is accessible via the internet.Data backup and loss of data is another reason which makes Cloud migration decisions a tough nut to crack.Finally human threat, which is usually unlikely, can also be a reason of data leak and privacy risks. Cloud Computing For
  • 2. With the inadvertent growth of Cloud Computing in recent times, security has really become a major concern for users/businesses looking to incorporate the Cloud into their processes/strategy- moving their business data online, building LOB applications on a PaaS or utilizing the infrastructure services of an IaaS provider. Listed above are a few of the examples of security issues in Cloud Computing. To sum it up, Security in the Cloud broadly refers to a set of policies, technologies, and controls devised to protect data, applications, and the associated infrastructure of Cloud Computing consumers.