logo

Cloud Computing Security and Privacy Issues: Assignment

   

Added on  2020-03-16

11 Pages2593 Words64 Views
Running Head: CLOUD COMPUTING SECURITY AND PRIVACY ISSUESAssessment [Student Name Here][Institution’s Name Here] [Professor’s Name Here][Date Here]

CLOUD COMPUTING SECURITY AND PRIVACY ISSUES2Executive SummaryData security has always been a recurring problem in the operations of information technology.In itself, information technology advocates for extensive information availability andaccessibility through the different mediums of the digital environment. This outcome increasesthe prevalence of system attacks which intensifies the problems of data security and even privacyas the users cannot guarantee the secrecy of their resources. In cloud computing, these concernsare made even worse owing to the minimal control given to the end user. In essence, the data ofthe users (subscriber) is stored in unknown locations and using unknown technologies.Therefore, even without considering the security features of the technology, the general structureof cloud computing exposes it to the concerns of data security and privacy. Now, this reportanalyses these issues as featured by reputable researchers and highlights the existing gaps withinthese materials. Moreover, the report also offers some recommendations for solving these issues.

CLOUD COMPUTING SECURITY AND PRIVACY ISSUES3Table of ContentsContents PageIntroduction.............................................................................................................3Summary of the discussion issues..........................................................................3Issues not addressed...............................................................................................5Impact of these issues.............................................................................................6Reflection..................................................................................................................7Conclusion................................................................................................................7References................................................................................................................9

CLOUD COMPUTING SECURITY AND PRIVACY ISSUES4IntroductionInformation technology is characterized by computing technologies as they provide the access toits resources. These technologies include facilities such as networks and the internet whichgenerally dispense data to the users. As a computational technology, cloud computing representsthe next evolution of the computing paradigm where resource allocation shift from a physicalfoundation to a virtualized system[ CITATION Abb17 \l 1033 ]. Therefore, in its infrastructure, allthe computing resources such as applications, network and computer hardware are delivered byservice providers based on the user demands. Furthermore, unlike the traditional or conventionalstructures of cloud resources, the modern application of the technology hinges on the model ofusing the internet as a service. In addition to this, cloud computing bases its foundationalelements on data centres which serve the users with the necessary computationalresources[ CITATION Sen13 \l 1033 ]. Now, it is these structures that expose the vulnerability of thetechnology as they are hosted in public environments/platforms.Summary of the discussion issuesAccording to Hashizume et al (2013), data security and privacy are a big problem for cloudresources because the subscriber solely depends on the service providers for data security andprotection. Therefore, although the users will integrate and apply security features to their enddevices, the security of the data structures depends on the service provider whose systems maybe compromised using a wide range of vulnerabilities associated with virtual systems.Furthermore, the service providers also cater for the security of the data while it's beingprocessed which is an intensive process that is escalated by the number of subscribers[ CITATIONHas13 \l 1033 ]. However, while these attributes may affect the security and privacy of the data,they are facilitated by the vulnerabilities of virtual systems more virtual machines which are the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment Cloud Computing Information Technology
|14
|3513
|308

ITC561 - Cloud Computing Classifications
|10
|2246
|76

Data Security and Privacy in Cloud Computing
|23
|1935
|89

(Solved) Assignment on Cloud Computing
|13
|2925
|208

Data Security in Cloud Computing
|14
|2815
|29

Components for Building IT Infrastructure
|1
|646
|51