Challenges in Cloud Computing

Wine Recognition Dataset
April 17, 2023
Database Management
April 17, 2023

Challenges in Cloud Computing

Challenges in Cloud Computing
Introduction
Cloud computing is the delivery of different services through the Internet. It offers a wide
variety of facilities and services to users without requiring them to acquire the computing devices.
A cloud user can efficiently utilize distant software, processors, and storage devices without
buying them. An article by Abusaimeh (2020) reveals that though cloud computing is a model that
offers various benefits to users, including enabling them to access and modifying vendor’s data,
authentication remains one of the critical issues affecting cloud computing. The author offers
research on different safety attacks in cloud computing and the appropriate mechanisms through
which these attacks may be resolved. In so doing, the author investigates some of the renowned
authentication spasms and highlight the studies that have been employed to solve them.
Methodology
In the study, the author explored some of the most notable authentication assaults and
mentioned different studies that have attempted to settle these assaults. A cloud framework is
inclined to numerous verification assaults. The assault’s impact relies upon the degree of
information affectability, what’s more, the amount it is viewed as fundamental. Un-verified access
for ordinary client archives can be irrelevant; getting to medical services information for patients
could moderate danger. Nonetheless, getting to financial details or exceptionally private
information can cause gigantic harm and horrible impact. The author selected various attacks,
including authentication attacks, man-in-the-middle attacks, malware injection attacks, and cross
VM side-channel attacks. The author explored the different mechanisms that have been used to
solve these attacks. Following the exploration, the author established that multidimensional
passwords were used to solve authentication attacks’ attacks. In a man-in-the-middle attack, a