Cloud Security and Privacy Name of the University Author's Note
9 Pages1844 Words410 Views
Victorian Institute of Technology
Network and Information Security (ITNE2002)
Added on 2021-10-07
About This Document
1 1CLOUD SECURITY AND PRIVACY CLOUD SECURITY AND PRIVACY Cloud Security and Privacy Name of the Student Name of the University Author’s Note: Introduction 2 Discussion 2 Cloud Computing Security 2 Cloud Storage Security 3 Advantages of Cloud Security and Privacy 3 Challenges of Cloud Security and Privacy 4 Conclusion 5 References 7 Introduction Cloud computing can be stated as the shared pools of the configurable resources of computer system as well as high level services, which could be rapidly provisioned with extremely less
Cloud Security and Privacy Name of the University Author's Note
Victorian Institute of Technology
Network and Information Security (ITNE2002)
Added on 2021-10-07
BookmarkShareRelated Documents
Running head: CLOUD SECURITY AND PRIVACY Cloud Security and Privacy Name of the Student Name of the University Author’s Note:
1 CLOUD SECURITY AND PRIVACY Table of Contents Introduction................................................................................................................................2 Discussion..................................................................................................................................2 Cloud Computing Security.....................................................................................................2 Cloud Storage Security..........................................................................................................3 Advantages of Cloud Security and Privacy...........................................................................3 Challenges of Cloud Security and Privacy.............................................................................4 Conclusion..................................................................................................................................5 References..................................................................................................................................7
2 CLOUD SECURITY AND PRIVACY Introduction Cloud computing can be stated as the shared pools of the configurable resources of computer system as well as high level services, which could be rapidly provisioned with extremely less effort of management over the Internet connection (Rong, Nguyen and Jaatun 2013). This technology of cloud computing majorly relies on the resource sharing for the core purpose of achieving coherence or economies of scales. The third party clouds eventually enable the organizations for focusing on the major businesses and not on expending the resources on the computer maintenance and infrastructure. This cloud computing also enables the organizations for avoiding or minimizing the upfront costs of IT infrastructure (Almorsy, Grundy and Müller 2016). The applications could be easily run with the help of this technology and hence security and privacy are important. The following report outlines a brief description of cloud privacy and security with relevant details. Discussion Cloud Computing Security The cloud computing security is the specified set of several control based policies and technologies that are eventually designed for adhering to the rules of regulatory compliance and hence protecting the information, applications of data or infrastructure that is associated with the utilization of cloud computing (Aljawarneh 2013). Since, the nature of the cloud is of shared resources, the identity management, access controls and privacy controls are the concerns faced by its users. Moreover, the organizations that are utilizing cloud computing as well as the associated providers of cloud for the data operations, privacy and security are kept on top priorities. These are often termed as extremely vulnerable in respect to other technologies (Chou 2013). The major processes of cloud computing security is responsible for addressing each and every security control, which is often incorporated by the cloud
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Cloud Security and Privacylg...
|9
|1887
|372
Cloud Privacy and Securitylg...
|21
|6371
|142
Cloud Security and Risklg...
|19
|5365
|373
Security and Privacy Issues in Cloud and Fog Domainlg...