2 Oct 2022

93

The Application of Virtual and Cloud Computing Security

Format: APA

Academic level: College

Paper type: Research Paper

Words: 835

Pages: 3

Downloads: 0

Cloud computing has revolutionized the world of technology over the years; however, it has also brought with it certain shortcomings that are a threat to the security of users data and privacy. If cloud computing is used in a medical clinic to store patient’s data, a series of advantages may be experienced, including, the access of a large data center to store patients records efficiently. Nonetheless, its safety may not be guaranteed. Public cloud service providers are prone to problems such as data leakage; this occurs due to the multi-environment scenario that exists. Malicious hackers could access these records and use them for personality theft or other online illegal activities (Behl, 2011). Besides that, the providers of this service may not handle the data correctly, considering that human is to error, and they may not understand the sensitive nature of the data stored.

Moreover, the hospital will lose total control of the data since it is not within their IT reach. The storage of this data in online facilities takes away their privileges of setting up personal privacy settings. In this case, a weak privacy setting may expose the data to other unauthorized people. In addition, since data is transmitted online, there can occur a breach in security, with hackers trying to snoop the data; however, files can be encrypted before transmission, but this brings about another security issue. The service providers also handle the management of encryption keys; hence if they are hacked, a massive data breach can occur.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Cloud computing employs the use of hypervisor technology in its functionality. Cloud storage, as stated above, is a multi-user environment; hypervisor technology is used to ensure that every user has access to similar resources in terms of processing power, memory and Ram storage (Hill, 2013). The virtualization technique allows several users to access a single system, known as a host, with guest operating systems. The guest operating systems run independently; this is beneficial since a breakdown in one guest operating system does not affect the others. Practically, this technology is considered safe and recommended, but theoretically, if a bug is ever discovered in its programming, it can enable hackers to install malware that can run similarly to hypervisors and hidden below the operating system. The security implications that come as a result of this are the ability of hackers to interfere with processes such as entering passwords. Ultimately, it would remain undetectable by anti-malware as it works under the operating system. Such a breach leaves data susceptible to access by anyone.

There are two options when an enterprise decides to make use of cloud technology for the storage of their data, either public or private. Public clouds have a number of features including the ability to self-manage the server as desired. They usually do not rely on contracts; hence, there is much more flexibility in the use of the server, meaning one can quit the application at any time before the set deadline. However, they provide the same hardware resources to all users, and that may be a weak point for a security breach. Since any hacking into the hypervisor technology could lead to mass leakage of data. Private cloud providers, on the other hand, have taken much consideration into the protection of user's data. Hence it is nearly impossible for a company's data to be accessed by unauthorized users. On top of this, they provide the owners of the cloud with the ability to customize their features in terms of storage, network, and hardware performance.

There are specific measures that could be taken to safeguard user's data in cloud data storages. Data breaches such as illegal access by cracking a company's credentials can be solved by employing the use of multifactor authentication system, using other unique features of the owner for security purposes. Also, to prevent the breach of the network, a more sophisticated encryption method can be used and other software that tracks log of data being sent to detect any malicious attack. The users can also employ the use of a password management system since it may be easy for hackers to access their accounts by only learning their behaviors and personal interests and end up cracking their accounts. There are also acts that should be made aware to users such as ensuring that they know the limitations of law enforcers in accessing their data in case of any legal reason (Zissis & Lekkas, 2012).

A medical clinic in the process of acquiring a cloud storage account for maintaining their patient's records should seek to employ the following strategies in order to preserve their patient's privacy. They should understand the provider's encryption offers; if they only offer in transit encryption, they should be aware that once the data reaches the servers, it will be accessible to anyone with access to the network. If they offer at-rest encryption, encryption of the data will be possible during the transmission of the data and its storage, but if the company is hacked, then all their data will be susceptible to leakage. The best encryption would be the end to end encryption to ensure that the data is encrypted from their own devices first; hence, both have the key to decrypting the data. Another viable solution would be to incorporate the use of the hybrid cloud to enable the clinic to have full access to their patient's records before transferring to 3rd party storage (Krutz & Vines, 2010).

References

Behl, A., (2011, December). Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. In 2011 World Congress on Information and Communication Technologies (pp. 217-222). IEEE.

Hill, D. C., (2013). U.S. Patent No. 8,514,868. Washington, DC: U.S. Patent and Trademark Office.

Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing.

Zissis, D., & Lekkas, D., (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). The Application of Virtual and Cloud Computing Security.
https://studybounty.com/the-application-of-virtual-and-cloud-computing-security-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 88

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration