logo

Cloud Computing and its Security

   

Added on  2023-04-10

6 Pages1303 Words492 Views
Running head: CLOUD COMPUTING AND ITS SECURITY
Cloud Computing and its Security
Name of the student:
Name of the university:
Author note:

1CLOUD COMPUTING AND ITS SECURITY
Introduction:
Cloud computing is actually a simple idea where computing capabilities are taken to
be used in products and those capabilities are turned into services that are available instantly
on demand. The services in cloud computing are generally divided into three layers. One is
the infrastructure layer, the next is the platform layer and the last one is the software layer.
The infrastructure layer consists of the servers which can be borrowed through cloud
computing as per needs. With cloud computing rather than buying a whole stack of servers
and having them sit idly around most of the time, a whole bunch of software us available in
cloud computing which can be returned after use. As technology can help in solving the
major challenges that are faced inn organisations, the popularity of cloud computing is
gradually increasing day by day. Technology impacts everything we do it has also the power
to disrupt the norm. As cloud computing serves as the platform that can be maintained with
low maintenance and huge data can be stored there, it is essential that security feature of the
cloud should be enhanced. As cloud offers storing of huge data of different fields it is also
possible that a risk may occur where the private information in these spaces can be seen by
other people. The study here aims in discussing about certain tools and techniques that have
developed to provide secure data storage in cloud computing and hence safeguarding the
information of users.
As major of the organizations are using cloud interface to store their crucial data,
cloud security needs to be established in cloud computing. By cloud security we mean the use
of latest technologies and tool with the help of programming and various other techniques to
secure the applications, data and the infrastructure that are hosted on the cloud (Ali, Khan &
Vasilakos, 2015). It is necessary that all the techniques and tools that are used to secure cloud
environment should be updated frequently as possible because every day new threats are

2CLOUD COMPUTING AND ITS SECURITY
gradually emerging. In terms of securing cloud based applications, some of the techniques
and tools that are used commonly includes-
Encryption: As day by day huge data sets and information gets stored in cloud, securing the
perimeter of the cloud is not the only solution to ensure data security within it. In order to
ensure data security in cloud, it is necessary to find a way to protect sensitive data that is
stored in and moving to the cloud (Coppolino et al., 2017). Here in lies the use of encryption
in cloud computing. Data encryption in cloud security is referred to as the method of
encoding data before moving it to the cloud storage (Wang et al., 2016). Data encryption
process is often offered by cloud service providers to encrypt sensitive data and enabling
encrypted key in order to decrypt the information to be used by authenticated users. Cloud
encryption is almost similar to in house encryption method the only difference in it is that the
users need to learn about the policies and SLAs that are provided by the cloud providers and
hence the encryption procedure starts. Business organisations find cloud encryption to be
extremely useful as the encryption keys can benefit in providing prevention against security
risks which can be managed through controls, contracts and audits.
Firewall: Implementing cloud based firewall provides another solution for securing data in
cloud environment. Cloud based software are platforms that are deployed in cloud
environment to prevent unwanted access in private cloud networks. Cloud based firewalls are
designed such a way to meet modern business needs and securing credentials from hackers
(Fernandez, Yoshioka & Washizaki, 2014). The benefits that are served with the
implementation of cloud based firewalls are scalability, availability, extensibility, migration
security and identity protection.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computing and Storage infrastructure Design
|9
|2115
|409

Secure and Efficient Search Techniques in Cloud Computing
|7
|1912
|79

Cloud Computing In Mobile Application
|5
|1709
|77

Security Threats in Cloud Computing and Preventive Methods
|4
|2565
|96

VMWare for Proposal and Procurement Report
|2
|951
|39

Security in Cloud Computing and Preventive Methods Assignment
|14
|3523
|58