A MODEL TO INVESTIGATE THE SECURITY CHALLENGES AND VULNERABILITIES OF CLOUD COMPUTING SERVICES IN WIRELESS NETWORKS

Authors

Desta Dana Data, Assistant Professor
Department of Information Technology, School of Informatics, Wolaita Sodo University, Ethiopia.

Abstract

This study identifying networks security challenges and vulnerabilities of cloud computing services by using wireless networks. To achieve this, I have used various methods that includes reviewed different related works on network challenges in wired or wireless network by using Systematic literature review(SLR), analysis packet flow by using network analyzer tool, data from practical demonstration identifies the packet flow, packet length time, data flow statistics, end-to-end packet flow, reached or lost packets in the network, and input or output packet statistics graphs, and SPSS tool to interpret the data that imported from Wireshark analyzer by .CSV file. Then, finally the study identifies the data end-to-end data communication streams, and the security challenges (Cybercrime, insider threat, attackers, hacktivists, malware, and Ransomware).   Lastly, I have developed the proposed model that is used to secure the Wireless network solution and prevent vulnerabilities of the network security challenges and, applying the developed model to identify and investigate the security challenges and vulnerabilities of cloud computing services I the wireless network.