Ask a question from expert

Ask now

Cloud Security and Privacy Name of the University Author's Note

9 Pages1844 Words410 Views
   

Victorian Institute of Technology

   

Network and Information Security (ITNE2002)

   

Added on  2021-10-07

About This Document

1 1CLOUD SECURITY AND PRIVACY CLOUD SECURITY AND PRIVACY Cloud Security and Privacy Name of the Student Name of the University Author’s Note: Introduction 2 Discussion 2 Cloud Computing Security 2 Cloud Storage Security 3 Advantages of Cloud Security and Privacy 3 Challenges of Cloud Security and Privacy 4 Conclusion 5 References 7 Introduction Cloud computing can be stated as the shared pools of the configurable resources of computer system as well as high level services, which could be rapidly provisioned with extremely less

Cloud Security and Privacy Name of the University Author's Note

   

Victorian Institute of Technology

   

Network and Information Security (ITNE2002)

   Added on 2021-10-07

BookmarkShareRelated Documents
Running head: CLOUD SECURITY AND PRIVACY
Cloud Security and Privacy
Name of the Student
Name of the University
Author’s Note:
Cloud Security and Privacy Name of the University Author's Note_1
1
CLOUD SECURITY AND PRIVACY
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Cloud Computing Security.....................................................................................................2
Cloud Storage Security..........................................................................................................3
Advantages of Cloud Security and Privacy...........................................................................3
Challenges of Cloud Security and Privacy.............................................................................4
Conclusion..................................................................................................................................5
References..................................................................................................................................7
Cloud Security and Privacy Name of the University Author's Note_2
2
CLOUD SECURITY AND PRIVACY
Introduction
Cloud computing can be stated as the shared pools of the configurable resources of
computer system as well as high level services, which could be rapidly provisioned with
extremely less effort of management over the Internet connection (Rong, Nguyen and Jaatun
2013). This technology of cloud computing majorly relies on the resource sharing for the core
purpose of achieving coherence or economies of scales. The third party clouds eventually
enable the organizations for focusing on the major businesses and not on expending the
resources on the computer maintenance and infrastructure. This cloud computing also enables
the organizations for avoiding or minimizing the upfront costs of IT infrastructure (Almorsy,
Grundy and Müller 2016). The applications could be easily run with the help of this
technology and hence security and privacy are important. The following report outlines a
brief description of cloud privacy and security with relevant details.
Discussion
Cloud Computing Security
The cloud computing security is the specified set of several control based policies and
technologies that are eventually designed for adhering to the rules of regulatory compliance
and hence protecting the information, applications of data or infrastructure that is associated
with the utilization of cloud computing (Aljawarneh 2013). Since, the nature of the cloud is
of shared resources, the identity management, access controls and privacy controls are the
concerns faced by its users. Moreover, the organizations that are utilizing cloud computing as
well as the associated providers of cloud for the data operations, privacy and security are kept
on top priorities. These are often termed as extremely vulnerable in respect to other
technologies (Chou 2013). The major processes of cloud computing security is responsible
for addressing each and every security control, which is often incorporated by the cloud
Cloud Security and Privacy Name of the University Author's Note_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Security and Privacy
|9
|1887
|372

Cloud Privacy and Security
|21
|6371
|142

Cloud Security and Risk
|19
|5365
|373

Security and Privacy Issues in Cloud and Fog Domain
|5
|823
|66

Migration of DTGOV to Cloud Computing
|12
|844
|56

Cloud Computing Issues Assignment
|10
|2234
|41