There are many suggested ways to improve the vulnerability of cloud computing. One of the ways in which prevent some major issues such as security threats is to have a user to go through an authentication to receive resources. The most common means asserted in a Strengthening Plan for Enterprise Information Security Based on Cloud Computing is using ID and Password; however it can be easily targeted from the attack. In order to enhance the solution, the authors of the article, Security Issues in Cloud Computing, assert to send “a security code to the registered customer every-time”. By doing so, the user needs to provide the security code whenever he or she logs in from a different IP-address in order to prove its identity. Another way to ensure the security is through encryption and decryption scheme in which include two types of keys known as a symmetric key and an asymmetric key. The differences between the symmetric key and asymmetric key is that the symmetric key requires only one private key for both encryption and decryption, while a private key is necessary to decrypt a specific public key in an asymmetric key case. Bhadauria et al. argues that although the asymmetric key algorithm requires more time and processes, it provides more secure data transmission than the symmetric encryption does.
Other ways to approach to strengthen the security asserted by Bhadauria et al. is to prevent “the security threats originating from internet and filters the data before they reach the network”. The article argues that business can ensure the security by using multi-layer security and URL filtering. Both multi-layer security and URL filtering block any possible malwares and undesirable web pages from accessing to the Cloud Computing.
The number of firms in which use the Cloud Computing is still increasing and yet there are still some critical disadvantages that make some firms to hesitate in using it. Although some of the aforementioned ways to improve the weakness may not be able to be applied by business firms themselves who use the Cloud Computing, it might be helpful to know when choosing what kind of Cloud Computing to use for their efficiency.
References
1. Bhadauria, R., Chaki, R., Chaki, N., & Sanyal S. (2014). SECURITY ISSUES IN CLOUD COMPUTING. Acta Technica Corvininesis – Bulletin Of Engineering, 7(4), 159-177.
2. Kang, A., Barolli, L., Park, J., & Jeong, Y. (2014). A strengthening plan for enterprise information security based on cloud computing.Cluster Computing, 17(3), 703-710. doi:10.1007/s10586-013-0327-y