You are on page 1of 4

Findings:

84 percent of the large companies admitted to security threats in their midst in


Europe.
80% of large companies in Latin America were vulnerable to security threats (Clo
ud Security
Alliance, 2009). Consequently, large companies were at the highest risk pertaini
ng security of
cloud computing. Security measures are the only guarantee that the users and ser
vice providers
can obtain continuous benefits.
The research revealed that a majority of the companies that were exposed to the
impending threat were the larger companies (Che, Duan, Zhang and Fan, 2011). The
y are at a
greater risk because of the number of users and value of the information exchang
ed within the
cloud. Smaller companies have fewer workers, and the value of information shared
within the
cloud is relatively low compared to larger companies. As a result, in case loss
of information,
larger companies could lose more than smaller companies. Additionally, the numbe
r of users
affected by the breach will be lower in the small companies.
The research also reported that a majority of the companies informed of the poss
ible
security threats. Similarly, most of them have responded by implementing various
security
measures to protect their cloud. However, only 20% of the current security measu
res were
capable of handling security threats. Also, out of the 20% only half of them wer
e regularly
maintained. The research also postulated the importance of maintenance of the in
tegrity of the
security measures that the sample companies had implemented. As a result, 90% of
the security
measures put in place was unable to sustain any form of cyber-crime (Cloud Secur
ity Alliance,
2009).
SECURITY STRATEGIES IN CLOUD COMPUTING
3

Regarding security measures, the Platform as a Service (PaaS), was considered an


efficient model regarding protecting the data of the large companies and users (
Che, Duan,
Zhang and Fan, 2011). Data from the research highlight that PaaS is the ideal sy
stem in
combating the prevailing challenges.
Summary and conclusion
Success is viable, as far as cloud computing is concerned. The research provides
a series
of security strategies capable of enhancing security in a cloud computing networ
k. From the
research a majority of the users utilize Software as a Service (SaaS) and Infras
tructure as a
Service (IaaS) based on their ease of installation and low operational cost. Des
pite their
preference, PaaS seems the most effective regarding security and resultant cost
of operation.
Users or companies might go for cheaper models that would result in loss of data
or money
through the loopholes of the system (Che, Duan, Zhang and Fan, 2011). Also, the
suggested
model is difficult to install compared to the other models. In PaaS, users or th
e large companies
are supposed to obtain a server that should be under their control. A single-use
r server provides
monitoring and regulation services to warrant efficany.
? Restatement of the problem:
Currently, cloud computing receives implementation by large companies in the
telecommunication industry and others. Its application is vast, and the number o
f users is on the
rise. Moreover, the number of resources shared within the cloud is also on the r
ise.
Consequently, the cloud is overpopulated regarding users and resources. Subseque
ntly, the risk
of data loss and resources malfunction also rises. However, the current security
measures are not
100% operational because there is a report of losses and unauthorized access amo

ng the large
SECURITY STRATEGIES IN CLOUD COMPUTING
4
companies and the users respectively (Cloud Security Alliance, 2009). Thus alter
native security
measures should be explored. Alternatively, the prevailing security measures sho
uld be
overhauled to create space for a newer security model that has excelled elsewher
e.
? Limitations of the study:
Studies are meant to ensure stakeholders obtain the value for their money. Cost
effectiveness and improvisation are some of the ever present objectives in each
research.
Therefore, a research should be able to suggest a cheaper model or modify the cu
rrent model,
especially when financial stability is an issue (Cloud Security Alliance, 2009).
The research
proposes the implementation of PaaS model in cloud computing. The model costs th
e users
more, and it is least preferable. Therefore, it means that a majority of the use
rs have not installed
the system (Che, Duan, Zhang and Fan, 2011). Moreover, the users will have to ne
glect their
current application methods. Consequently, the cost for adapting newer applicati
ons will be high.
The research would have provided an alternative model that will involve utilizat
ion of the
resources from their preferable model.
The research only considers one solution to the existing software issue. Provisi
on of a
single alternative will affect the performance of the companies or users that wi
ll be unable to
implement the system due to its cost (Cloud Security Alliance, 2009). Additional
ly, users will
refrain from services that provide anything else apart from the recommended mode
l.
? Recommendations:
The Security of cloud computing unveils an opportunity for further research on t
he data

and user management. Also, the research only provides a single alternative to am
ending the
SECURITY STRATEGIES IN CLOUD COMPUTING
5
security threat posed by the SaaS and IaaS. Therefore, the research should be co
ntinued to
discover other models that can be implemented to address the security issue.
Moreover, the purpose of research, is to avail better ways of handling issues. T
he
research will ensure that the small companies are also ideal. In fact, reducing
the number of users
of cloud computing in large companies will neutralize the threat posed by many u
sers.

You might also like