FUTURE INTERNET
TECHNOLOGIES:
SECURITY IN CLOUD
COMPUTING
Albert Savill 3505901
31st October 2019
, Contents
Abstract.............................................................................................................................................1
1.1 Introduction.................................................................................................................................1
1.2 Cloud Computing.....................................................................................................................1
1.3 Cloud Networking....................................................................................................................2
1.3.1 Networking in Iaas................................................................................................................2
2.1 Security........................................................................................................................................4
2.2 Privacy......................................................................................................................................4
2.3 Security Issues..........................................................................................................................4
2.4 Security Solutions.....................................................................................................................6
3 Conclusion......................................................................................................................................7
References.........................................................................................................................................7
Abstract
This review paper will go over what exactly is cloud computing and the security behind it. Of
course, if security is needed in this modern world of computing it means there are risk factors
involved. This paper will explore the risks that are involved in cloud computing and how it is
handled. This review paper is researched through multiple academic journals found online
found via Google Scholar. It is crucial to explore security issues and ideas in the hope there is
more knowledge on how to protect cloud computing, especially if it becomes the new normal
rather than using a hub or a router in the future for businesses and personal use.
Keywords: Cloud computing, cloud networking, security, Iaas, Trust, Integrity, Availability,
Authentication, Authorisation, Confidentiality, PKI, LDAP, SSO.
1.1 Introduction
Through the growth of internet technologies networking has also evolved over the decades. It
is common everyone relies on a router in order to have access to the internet through network
protocols. However, through this evolution of technology cloud computing has grown over
the years. Through the growth of this new technology, there may be a lack of security as there
is possibly a lack of understanding of this technology as it is still a new concept to the
majority of the modern world.
1.2 Cloud Computing
So what exactly is cloud computing? According to the NIST (National Institute of Standard
and Technology) definition of cloud computing [1], defines that cloud computing is a “model
for applying ubiquitous, convenient, on-demand network access to a shared pool of
configurable computing resources (e.g. networks, servers, storage, applications and services)
releases in fast and minimal management effort or service provider interaction”.
What this means exactly is that cloud computing is made with the intention of a more
convenient network, a series of sub-networks connected together that runs on the same
computing resources as mentioned above in the quote [1]. Through the shared resources,
these networks will perform at a reliable speed with good availability.
1
TECHNOLOGIES:
SECURITY IN CLOUD
COMPUTING
Albert Savill 3505901
31st October 2019
, Contents
Abstract.............................................................................................................................................1
1.1 Introduction.................................................................................................................................1
1.2 Cloud Computing.....................................................................................................................1
1.3 Cloud Networking....................................................................................................................2
1.3.1 Networking in Iaas................................................................................................................2
2.1 Security........................................................................................................................................4
2.2 Privacy......................................................................................................................................4
2.3 Security Issues..........................................................................................................................4
2.4 Security Solutions.....................................................................................................................6
3 Conclusion......................................................................................................................................7
References.........................................................................................................................................7
Abstract
This review paper will go over what exactly is cloud computing and the security behind it. Of
course, if security is needed in this modern world of computing it means there are risk factors
involved. This paper will explore the risks that are involved in cloud computing and how it is
handled. This review paper is researched through multiple academic journals found online
found via Google Scholar. It is crucial to explore security issues and ideas in the hope there is
more knowledge on how to protect cloud computing, especially if it becomes the new normal
rather than using a hub or a router in the future for businesses and personal use.
Keywords: Cloud computing, cloud networking, security, Iaas, Trust, Integrity, Availability,
Authentication, Authorisation, Confidentiality, PKI, LDAP, SSO.
1.1 Introduction
Through the growth of internet technologies networking has also evolved over the decades. It
is common everyone relies on a router in order to have access to the internet through network
protocols. However, through this evolution of technology cloud computing has grown over
the years. Through the growth of this new technology, there may be a lack of security as there
is possibly a lack of understanding of this technology as it is still a new concept to the
majority of the modern world.
1.2 Cloud Computing
So what exactly is cloud computing? According to the NIST (National Institute of Standard
and Technology) definition of cloud computing [1], defines that cloud computing is a “model
for applying ubiquitous, convenient, on-demand network access to a shared pool of
configurable computing resources (e.g. networks, servers, storage, applications and services)
releases in fast and minimal management effort or service provider interaction”.
What this means exactly is that cloud computing is made with the intention of a more
convenient network, a series of sub-networks connected together that runs on the same
computing resources as mentioned above in the quote [1]. Through the shared resources,
these networks will perform at a reliable speed with good availability.
1