The issues related to security mount with the nature of the organization computing with multi-tenancy. The service providers need to address the challenges related to the paradigm in such a way that they maintain trust among their clients. The prominent challenge that faces cloud computing is loss of governance when the clients hands-over the control of the service to service providers.
Existence of such challenges culminates into other uncertainties related to unauthorized access, corruption and deletion of the client’s data. Incomplete privacy and insecurity that characterizes cloud computing enhances the paradigm’s susceptibility to replay attacks, sniffing, spoofing and hacking. The security concerns are aggravated by the fact that cloud computing is closely associated with web browsing; thus, raising the probability to internet-based malicious activities. Such security challenges include distributed denial of service attacks, data leakage during transfer, loss of encryption keys, compromising the service engine and undertaking of malicious scans or probes.
For instance, different countries possess unique cryptographic techniques. Insecurity in terms of performance may prevent some companies from indulging in cloud computing. When transferring information and applications to the Cloud, organizations subject this data to international regulations. This implies that the information must conform to the law governing those regions. Pandey, Buyya and Vecchiola, posits that although the service is easier to use and more efficient, the paradigm is difficult to use for non-developers because each service is utilized through unique web services. Broberg et al (2008) also suggests that users may feel cheated if they are not well informed of the service. Those migrating to a new vendor face the challenge of vendor lock-in. Armbrust et al (2009) notes that people are focusing on the core technologies to improve their businesses in the near future.
Adoption of the paradigm will also enable them overcome the risks associated with the application of cloud computing in business operations. However, they are wary of hastily adopting the technology; behavior that is common with the introduction of any new technology.