Computer Science Homework Help

San Jose State University SQL Injection and Cloud Computing Security Discussion

 

I don’t know how to handle this Computer Science question and need guidance.

The literature review is an integral component in the research realm since it aids the researchers to develop a wide-ranging comprehension of a given problem toward seeking an amicable solution. In particular, it enumerates, summarizes, describes, and objectively evaluates, and clarifies previous research thus giving a broad view of a given topic. This chapter undertakes a comprehensive systemic literature review of published research concerned with the issue of cloud computing security policies (Sutradhar et al., 2021). This process of literature review employs the fundamental guidelines used for undertaking a comprehensive multidimensional literature review as outlined . The literature review is done confined within specific boundaries as suggested that conducting an effective literature review needs a researcher to develop contextual and temporal boundaries to enable addressing of specific issues (Snyder, 2019). In this context, the literature review has two contextual boundaries which include cloud computing “security issues” and “security policies” since to be able to understand the policy framework, it is essential to have a broader view on the underlying security issues in cloud computing. The temporal boundary of this literature review is encompassed within all published literature on the two contextual issues which are published within the last five years .With the popularity and advancement of cloud computing increasing rapidly, various security issues and concerns are arising which present a big barrier to its adoption by organizations. The new concepts and ideas which are brought about by cloud computing such as outsourcing of computations, sharing or resources between different quarters, ability to directly access the infrastructure of cloud computing, and the concept of external data and information warehousing bring about an increase in security concerns of the system and also raise various privacy issues. Furthermore, Cloud vulnerabilities and threats are amplified through the broad-scale nature of clouds and the spread of mobile access devices. Thus, with the popularity of Clouds increasingly increasing, security issues are raised and make cloud computing more attractive as attack targets owing to its possession of large-scale digital access . In particular, security relates to significant aspects of confidentiality, integrity, and accessibility of cloud computing. The three main categories that apply to this important aspect of cloud computing include the following: data, software, and hardware resources.

Cloud computing security

To be able to understand and analyze the security issues within cloud computing, a clarification of the meaning of cloud computing security must be made. “Cloud computing security refers to the set of procedures, processes, and standards designed to provide information security assurance in a cloud computing environment” ((“What is Cloud Computing Security? – Definition from Techopedia”, 2021). It covers all the various software, platform, and infrastructure service models (Public, Private, or Hybrid Delivery Model), addressing physical and logical security problems in the delivery of such services. Security problems are divided into two different categories, by different stakeholders: cloud provider issues and customer issues (companies or organizations who host applications or store data on the Cloud). Each has its requirements and capabilities from one party to the next. To be able to comprehensively analyze the security issues of the three models of deployment, an overview of the three models needs to be made. The hybrid cloud computing model consists of a mixed computing environment and services whereby more than one private cloud and more than one public cloud are integrated. This deployment model is known for its cost-efficiency, scalability, and effectiveness. An example of this deployment is when a company chooses to keep its sensitive data on-site while at the same time the company is outsourcing workloads that are not sensitive or critical to a public provider. The benefit of this model is that it can support and facilitate a digital-oriented business transformation.