cybersecurity final

4
The need for robust Cyber Security in the Cloud Computing Environment

Upload: st57143

Post on 17-Jan-2016

4 views

Category:

Documents


0 download

DESCRIPTION

cloud security analysis

TRANSCRIPT

Page 1: CyberSecurity Final

The need for robust Cyber Security in the Cloud Computing Environment

Page 2: CyberSecurity Final

Name: XXXXXXX

XXXXX

Articles Analysis # X

Date…..XXXX

Wang, D. (2014). Towards Robust and Effective Trust Management for Security: A

Survey.Trust, Security and Privacy in Computing and Communications (TrustCom), 13(2), 3-

7.

Based on research of Wang (2014), role of effective and robust trust management is crucial over

cyber security against key cloud applications. In general there are many security challenges over

cloud computing and most of them are addressed based on mutual trust among the organizations,

customers and third party cloud service providers. Author identified a research gap and discussed

in this article with respective to role of trust management over existing cyber-attacks in cloud

computing, as most of the issues are yet to be resolved. Each and every security problem

associated with cloud computing has the need of proper trust management by the respective

parties and thus author proposes further investigation and on the corresponding cyber-attacks and

thus reviewed few of the existing solutions to the security problems related to cloud computing

architecture. Key cyber security properties and attacks are considered while addressing the trust

management challenges, where the author proposed a propelling design solution for effective and

robust trust management over cloud computing. Trust management over cloud security could

address most of the challenges with the traditional security mechanisms against providing ample

cyber security.

Page 3: CyberSecurity Final

Author concentrated on the traditional challenges associated with the traditional security

mechanism adopted to provide cloud computing security to defend the cyber-attacks. Based on

the recent studies discussed over the article most of the trust management models were built on

authentication, secured service and access control against the respective security problems

identified as a result cyber-attacks on cloud applications. Trust evaluation is done in this article

to find an effective solution in investigating the potential attacks on cloud computing architecture

and applications, where lot of efforts were discussed in proposing the desired trust management

design and solution.

A brief note on the existing work related to trust management system across the network system

like P2P, MANETs, VANETs and Wireless Sensor networks is given by the author. From the

respective contribution, the current research can be extended to the private, public and hybrid

cloud application like VoIP, multimedia and video conferencing application further. These

researches will rationale the future growth of cyber security constraints on cloud computing

challenges, where the proposed solution will can be used a key reference in proposing a more

robust and secured cloud platform. Mutual authentication, Privacy preservations and Global new

corner aspects reviewed over the current article can be laid as foundation for future research in

defending the cyber-attacks on cloud applications. Sophisticated service oriented, access rights

and privacy oriented cyber security architecture will be implemented based on the current article

contribution.