{"id":51927,"date":"2022-02-07T09:17:43","date_gmt":"2022-02-07T09:17:43","guid":{"rendered":"https:\/\/essays.homeworkacetutors.com\/2022\/02\/31-introductionone-of-the-key-technologies-in-cloud-computing-is-essay\/"},"modified":"2022-02-07T09:17:43","modified_gmt":"2022-02-07T09:17:43","slug":"31-introductionone-of-the-key-technologies-in-cloud-computing-is-essay","status":"publish","type":"post","link":"https:\/\/www.colapapers.com\/us\/31-introductionone-of-the-key-technologies-in-cloud-computing-is-essay\/","title":{"rendered":"31 IntroductionOne of the key technologies in cloud computing is Essay"},"content":{"rendered":"<article class=\"essay-content\">\n<p>3.1 Introduction<\/p>\n<p>One of the key technologies in cloud computing is data. Cloud Service<\/p>\n<p>Provider (CSP) such as Microsoft Azure, Google, Dropbox and Amazon deal<\/p>\n<p>with a lot of data. It is not like the data in computers drives which con<\/p>\n<p>tains mostly 2 terabytes but these CSP can handle up to petabytes of data<\/p>\n<p>especially when Big Data becomes a trend in this era. So, of course, one of<\/p>\n<p>the cloud computing services is to store data. Based on Data Security Basis,<\/p>\n<p>there are 2 important things which are life cycle of data and Con?dentiality,<\/p>\n<p>Integrity and Availability (CIA).<\/p>\n<div class=\"in-text-block-1\"><\/div>\n<p> However, there are security issues happen<\/p>\n<p>when handling the data. (Kumar, Raj, &amp; Jelciana, 2017)<\/p>\n<p>3.2 Data security basics<\/p>\n<p>3.2.1 Data life cycle<\/p>\n<p>In data life cycle, there are six stages; Create, Store, Use, Share, Archive and<\/p>\n<p>Destroy. Firstly, when the user enter a data, it is automatically created. In<\/p>\n<p>this stage, the data can move freely between any stages based on what the<\/p>\n<p>user wants. Next, once it is created, the data will be stored outside the users<\/p>\n<p>place, which means in CSPs side.<\/p>\n<div class=\"in-text-block-2\"><\/div>\n<p> The data is called as data-at-rest since<\/p>\n<p>there is no activity happens to the data. When the data is being used or in<\/p>\n<p>use stage, the stage is called as data-in-use. (Kumar et al., 2017)<\/p>\n<p>10<\/p>\n<p>Data sharing stage is called as data-in-transit as it will be moved from<\/p>\n<p>one location to another. The archive stage is also called as data-at-rest.<\/p>\n<p>The destroy stage is called as data-after-deleted. All of these stages are<\/p>\n<p>self-explanatory. To protect the data while it is in share stage, encryption<\/p>\n<p>methods is used. When a data is deleted, there may be some digital data<\/p>\n<p>that remains that allowing data to be reconstructed. It is called as data<\/p>\n<h3>remanence. (Kumar et al., 2017)<\/h3>\n<p>3.2.2 CIA triad<\/p>\n<p>CIA triad is the three important properties of the data while three impor<\/p>\n<p>tant properties associated to people who access the data are authentication,<\/p>\n<p>authorization and nonrepudiation. Con?dentiality is data privacy; data that<\/p>\n<p>is belong to CSC is not revealed to any unauthorized parties in any occasion.<\/p>\n<p>Integrity of data is refers as the con?dence of data that stored in the cloud<\/p>\n<p>is not ?ddled by any unauthorized parties. It is happens in data-in-transit.<\/p>\n<p>Availability of data refers to whenever CSC needs or wants the data, the data<\/p>\n<p>should be available to them without any occasion. (Kumar et al., 2017)<\/p>\n<p>3.3 Data security issues<\/p>\n<p>3.3.1 CIA Triad related<\/p>\n<p>There are three main data security issues discussed in this research paper.<\/p>\n<p>Firstly, CIA related security issues. It is happens when one of the triad is<\/p>\n<p>not secured. For con?dentiality, there are a few examples of attacks such as<\/p>\n<p>11<\/p>\n<p>sensitive data are given to unauthorized parties by employees via a SD cards<\/p>\n<p>or hard disks. Installing a spyware on a data server in order to send private<\/p>\n<p>information to the attackers also one of the attacks on con?dentiality. Lastly,<\/p>\n<p>doxxing, which is leaking private information such as social security numbers<\/p>\n<p>or phone numbers about someone or an organization to do harm. (Kumar<\/p>\n<h2>et al., 2017)<\/h2>\n<p>Next is integrity. Threats on integrity are including penetrating a web<\/p>\n<p>server in order to embed malware into webpages and web server-side script<\/p>\n<p>ing. Next, is accessing a ?nancial server in order to falsify ?nancial records<\/p>\n<p>maliciously. Lastly, turning a machine into a zombie computer in order to<\/p>\n<p>control it through botnet. (Kumar et al., 2017)<\/p>\n<p>The A in CIA triad is availability. Attacks on availability such as De<\/p>\n<p>nial of Service (DoS) and Distributed Denial of Service (DDoS) attacks on<\/p>\n<p>servers. Next is ransomware attacks. It happens when data is encrypted<\/p>\n<p>on targeted device to make sure the authorized parties cannot use it until a<\/p>\n<p>ransom is paid. Lastly is when an employee disrupting a server rooms power<\/p>\n<p>supply in order to make the server o?ine. (Kumar et al., 2017)<\/p>\n<p>There are a few ways to improve data security related to CIA triad.<\/p>\n<p>Firstly, apply data encryption when data is not in motion (store, archive<\/p>\n<p>and share stage). Generally, encryption method can provide con?dentiality<\/p>\n<p>against attacks from cloud provider. Next, Third Party Auditing (TPA) can<\/p>\n<p>be employed to check for the data integrity. Lastly, encryption keys should<\/p>\n<p>not be stored along with encrypted data. (Kumar et al., 2017)<\/p>\n<p>12<\/p>\n<p>3.3.2 Authentication and Access Control (AAC) related<\/p>\n<p>The second data security issues is in Authentication and Access Control<\/p>\n<p>(AAC). When a user want to access a data, an authentication is needed.<\/p>\n<p>There are many types of authentications but mostly people use passwords.<\/p>\n<p>Password-based authentication are more subject to vulnerability especially in<\/p>\n<p>a public cloud. It can be cracked by using brute force attacks, dictionary at<\/p>\n<p>tack and phishing. A brute force attack is a repetition of successful attempts<\/p>\n<p>of trying passwords combinations to break a website. It is a trial-and-error<\/p>\n<h3>method. (Kumar et al., 2017)<\/h3>\n<p>Next is dictionary attack. Di?er to brute force attack, a dictionary at<\/p>\n<p>tack is an attempt to gain illicit access to a computer system by using a<\/p>\n<p>very large set of words to generate potential passwords. The attacker use<\/p>\n<p>a list of known or commonly used passwords. A dictionary of passwords is<\/p>\n<p>tried to break a website. Lastly, phishing is also another way to crack a<\/p>\n<p>password-based authentication. Phishing is a fraudulent attempt to obtain<\/p>\n<p>sensitive information such as usernames, passwords and credit card details<\/p>\n<p>by disguising oneself as a trustworthy entity in an electronic communication.<\/p>\n<p>Some people would call it as scamming. (Kumar et al., 2017)<\/p>\n<p>There are some important methods that can overcome AAC security chal<\/p>\n<p>lenges. For example, multi-factor authentication can avoid attackers from<\/p>\n<p>breaching a website. Next, Intrusion Detection System (IDS) or ?rewalls<\/p>\n<p>can be implemented on di?erent network and cloud layers to enable access<\/p>\n<p>control in cloud computing. Lastly, employing third-party identity manage<\/p>\n<p>ment solutions also can prevent data security challenges in AAC. Examples<\/p>\n<p>of third-party solutions are Microsoft Azure Active Directory, Okta identity<\/p>\n<p>13<\/p>\n<p>management and McAfee cloud identity manager. (Kumar et al., 2017)<\/p>\n<p>3.3.3 Data Loss<\/p>\n<p>The next data security issues is data loss. Data loss is a process or event<\/p>\n<p>when that data being corrupted, deleted and\/or made unreadable by a user,<\/p>\n<p>software or application. It is also called as data leakage and occurs when one<\/p>\n<p>or more data can no longer be utilized by the authorized parties. Data loss<\/p>\n<p>can happen during data-at-rest and also when in motion. (Kumar et al.,<\/p>\n<p>2017)<\/p>\n<p>Data loss can occur for a lot of reasons such as data corruption. It is<\/p>\n<p>occur the data become inaccessible to a user or an application. When a data<\/p>\n<p>element loses its base integrity, it transform into a form that is unreadable or<\/p>\n<p>not understandable by a user or application. Thus, it is inaccessible. Data<\/p>\n<p>corruption usually happens when the data in sharing stage. (Kumar et al.,<\/p>\n<p>2017)<\/p>\n<p>The next reason for data loss to occur is when data being intentionally<\/p>\n<p>or accidentally deleted or overwritten by a user or an attacker. Lastly, data<\/p>\n<p>loss also occur when data is stolen over the network by network penetration<\/p>\n<p>or any network intervention attack. (Kumar et al., 2017)<\/p>\n<p>Data loss can be avoided by implementing backup and recovery for data.<\/p>\n<p>(Kumar et al., 2017)<\/p>\n<\/article>\n","protected":false},"excerpt":{"rendered":"<p>3.1 Introduction One of the key technologies in cloud computing is data. Cloud Service Provider (CSP) such as Microsoft Azure, Google, Dropbox and Amazon deal with a lot of data. It is not like the data in computers drives which con tains mostly 2 terabytes but these CSP can handle up to petabytes of data [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6495,8577,5964,8396],"tags":[6964,6963,5853,6862,6965],"class_list":["post-51927","post","type-post","status-publish","format-standard","hentry","category-do-my-assignment","category-essay-writing-help","category-free-essay","category-paper-writing-service","tag-affordable-assignment-assistance","tag-custom-essay-writing","tag-free-essay-samples","tag-online-homework-help","tag-professional-homework-tutors"],"_links":{"self":[{"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/posts\/51927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/comments?post=51927"}],"version-history":[{"count":0,"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/posts\/51927\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/media?parent=51927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/categories?post=51927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.colapapers.com\/us\/wp-json\/wp\/v2\/tags?post=51927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}