Topic Introduction

 [

           Introduction: Cloud Computing and Security Challenges

What is the Topic?

My blog explores the world of cloud computing, with a special focus on the real-world security challenges that arise in multi-cloud environments. Multi-cloud computing means using two or more cloud providers like AWS, Microsoft Azure, or Google Cloud—to run applications and store data. This strategy offers greater flexibility and scalability, but it also makes it more complicated to manage security, privacy, and compliance across all these different platforms (AWS, 2024; Cisco, 2024).

Research Methods

To explore this topic, I have chosen secondary research methods, including:

  • Reviewing online articles and official cloud provider documentation (AWS, Azure, Google Cloud)

  • Analysing journal papers and whitepapers on cloud security (NIST, 2011; IBM, 2024)

  • Examining case studies and reports on multi-cloud breaches and risk management

I chose these methods because they provide reliable, up-to-date information from authoritative sources. Secondary research is also efficient for understanding the broader trends, best practices, and risks in cloud computing security.


Advantages and Disadvantages

Advantages of Cloud Computing:

  • Scalability: Easy to increase or decrease resources as needed

  • Cost Efficiency: Reduces costs related to hardware, maintenance, and IT staff

  • Accessibility: Data and applications are accessible from anywhere with an internet connection

  • Flexibility: Multi-cloud setups allow organizations to avoid vendor lock-in

Disadvantages / Challenges:

  • Security Risks: Data breaches and misconfigurations are common in multi-cloud environments

  • Complex Management: Monitoring multiple platforms can be difficult

  • Compliance Issues: Organizations must adhere to diverse regional laws and regulations

  • Dependency on Internet: Cloud services require constant, reliable connectivity



  • Why I am Researching This Topic

    I am researching this topic because cloud computing is central to modern IT infrastructure, yet its rapid adoption has amplified security concerns. Understanding how to secure multi-cloud environments is crucial for businesses and IT professionals who rely on cloud services.



    What I Hope to Achieve

    Through this research and blog series, I hope to:

    • Educate readers on the basics and benefits of cloud computing

    • Raise awareness of security challenges in multi-cloud setups

    • Explore best practices and strategies for secure cloud adoption

    • Provide practical insights for students, IT professionals, and enthusiasts interested in cloud computing

    References

    Cisco (2024) Managing the Rise of Multi-Cloud Environments. Available at: https://www.cisco.com/ (Accessed: 26 November 2025).

    National Institute of Standards and Technology (NIST) (2011) NIST Cloud Computing Reference Architecture (SP 500-292). Gaithersburg, MD: NIST.

    IBM (2024) Cloud Security Risks and Best Practices. Available at: https://www.ibm.com/cloud/security (Accessed: 26 November 2025).

Comments

Popular posts from this blog

Welcome Blog Post

Primary Research

Secondary Research