Cloud computing has received tremendous positive feedback from internet users across the world. Numerous companies have developed cloud computing systems with a large market share across the globe. While the associated companies maintain the view that their systems are secure, it has become apparent that ultimate security in the online platform can never be attained. This research proposal looks to highlight some of the potential risks that are associated with cloud computing.
The project will inform cloud computing users about the risks they incur when they use the systems for data backup. Two of the most common security threats in cloud computing are service and account traffic hijacking and data breaches.
Data breaches involve hackers accessing databases in poorly designed cloud systems, and it can be solved by eliminating all security flaws in the system (Zissis & Lekkas, 2012). Service and account traffic hijacking involve hackers retrieving user credentials and using the information to target other users of the cloud system. This threat can also be eliminated by constantly enhancing security in the system, but hackers are always a step ahead.
Audience and Background
The target audience for this project is the cloud computing users who use the system as their primary storage to back up private information. Most cloud systems in the market offer storage space to store their data and information. It is more secure than saving data on secondary storage devices, but the internet poses serious threats in the form of experienced hackers.
It is possible for hackers to find security flaws in cloud systems, and they can access important private information from the database, which can be used to victimize users of the cloud systems. It is arguable that cloud users should not use the system as a backup storage for personal information (Choubey, Dubey & Bhattacharjee, 2011).
It is apparent that the majority of people who use cloud computing systems on a regular basis have worries about the security threats that might be associated with the practice (Lee, 2012). Most of the users of cloud systems prefer them as data storage sources because they expect them to be safer than other storage options.
Everyone hopes that cloud computing companies can secure their data better than other storage options, but the associated companies have failed to highlight the potential threats that their systems face (Armbrust et al., 2010). It is important to educate internet users about security issues that render cloud computing unreliable as a data storage option.
Proposed research and discussion
The project proposes developing a study to highlight the unreliability of cloud computing with reference to security threats. Cloud computing has gained popularity in the world, but there are many uncertainties involving security of data and information (Hamlen, Kantarcioglu, Khan & Thuraisingham, 2010). The researchers proposed that studies should be conducted to highlight the most common security threats in cloud computing.
Kumar and Kumar (2013) also concur with the sentiment that cloud computing attracts many security threats for end users (Kumar & Kumar, 2013). Services provided by cloud computing systems influence the storage of large amounts of data by end users, and it can be disastrous if personal data lands in the hands of the wrong people. Most cloud system users have a false feeling of security, which must be eliminated with the relevant information about the security issues that cloud computing systems face.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
Choubey, R., Dubey, R., & Bhattacharjee, J. (2011). A survey on cloud computing security, challenges and threats. International Journal on Computer Science and Engineering (IJCSE), 3(3), 1227-1231.
Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2010). Security issues for cloud computing. Hershey: IGI Global.
Kumar, P., & Kumar, L. (2013). Security Threats to Cloud Computing. International Journal of IT, Engineering and Applied Sciences Research (IJIEASR), 2(1), 25-29.
Lee, K. (2012). Security threats in cloud computing environments. International Journal of Security and Its Applications, 6(4), 25-32.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.