The significance of cloud computing is enhancing at a tremendous rate and the conception has received growing focus in the communities of sciences and industries. According to a study performed by Gartner, it was evaluated that cloud computing is the initial amongst the top 10 most significant technological advancements especially because it is bound to offer better prospects in the nearing future across industries (Ju et al, 2010). The concept helps to enhance access to networks allowing ubiquitous and convenience on-demand to a configurable share pool resource of computing such as servers, storage devices, applications etc. that can be provisioned rapidly and transformed with minimum effort of management through interaction effectiveness. Even though there are several benefits to adopt Cloud computing, there also exist significantly grave threats towards the concepts adoption. The most prominent challenge in the concepts adoption is security threat followed through issues with regard to complying, privacy and matters of legality. The model of cloud computing is new and therefore requires an even intense focus (Ju et al, 2010). This report has been developed in order to present cloud computing security issues through findings and then to understand the influence of each in daily lives of people.
Security issues related to areas of risk in cloud computing are inclusive of data storage externally, public internet dependency, control inadequacy, multiple tenants and internal security integration. Key functions of cloud computing are divided into 4 different layers which are inclusive of resources and network layer, service layer, access and user layer. The functions of security and privacy are considered as functions for the cross layer that are responsible for covering every cloud layer (Ju et al, 2010). The architecture’s main principle lies in all the layers being optional. In turn this implies that a provider of cloud who needs to make use of referencing architecture has the choice of selecting and implementing only subset of the layers. From the perspective of security however, the separation principle needs every layer to take up the responsibility specifically. In security control situations when a layer by-passes to the other, remaining functions of security may be compensated and therefore cross layer functions implementation is crucial.