logo

Data Security in Cloud Computing

   

Added on  2023-01-20

14 Pages2815 Words29 Views
Running head: CLOUD COMPUTING
CLOUD COMPUTING
Name of the Student
Name of the University
Author Note
Data Security in Cloud Computing_1
CLOUD COMPUTING 1
Abstract:
The purpose of this paper is to discuss the significant problem of cloud computing that is data
security, and this paper will also discuss the possible solution to this problem. Cloud
computing is a technology that is related to the computing that is based on the internet, in
cloud computing the shared resources like platform, software and the information that are
offered to the consumers on their demand. The technology of Cloud computing is one of the
cloud platforms, and the purpose of this is to share the resources which include software,
business processes, application and infrastructures. Confidentiality, availability, privacy,
authenticity and integrity are the major concerns for both the consumers as well as the cloud
providers as well. The concerns that are related to the security have given new life to the
immerging that is one of the most active areas of the research.
Data Security in Cloud Computing_2
2CLOUD COMPUTING
Table of Contents
Introduction:...............................................................................................................................3
Problem:.....................................................................................................................................3
Data security:.........................................................................................................................4
PaaS:...................................................................................................................................6
SaaS:...................................................................................................................................6
IaaS:....................................................................................................................................6
Possible solution:.......................................................................................................................6
Conclusion:..............................................................................................................................10
Data Security in Cloud Computing_3
3CLOUD COMPUTING
Introduction:
Cloud computing is a technology that is related to the computing that is based on the
internet, in cloud computing the shared resources like platform, software and the information
that are offered to the consumers on the demand of them (Chang & Ramachandran, 2016).
The actual definition of the cloud computing, that is a massive scale of paradigm of the
computing that is distributed, is also driven through the scales’ economics within that one
pool of the virtualized, abstract, dynamically scalable, storage, managed power of the
computing, services and platforms that have been delivered to the external consumers on their
demand over the internet. The primary purpose of this paper is to discuss the significant
problem of cloud computing that is data security, and this paper will also discuss the possible
solution of this problem (Hashizume et al., 2013). The present cloud computing systems are
able to pose limitations for the protection of confidentiality of the user data. Since the
sensitive data of the users is presented in the form of an unencrypted format for the remotely
controlled machines that are operated and owned by the third party providers. There are so
many techniques to protect the data of the users from hackers. An approach that is presented
for protection of the user data confidentiality from the providers of the services as well as it
ensures that the service providers are not able to collect the confidential data of the users
when the data has been stored and processed in the systems of the cloud computing. The
cloud computing offers different types of services and data storage that is based on the
internet.
Problem:
The major problem of cloud computing is, the data protection. The capabilities of the vendor
security are the key to the establishment of the strategic value (Arora, Parashar &
Transforming, 2013). When it is the matter of private, public and hybrid solutions of the
Data Security in Cloud Computing_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Threats in Cloud Computing and Preventive Measures
|16
|3755
|361

Framework Modeling for User Privacy in Cloud Computing
|8
|5479
|500

Cloud Computing Security Challenges
|15
|4893
|403

(PDF) Cloud Computing Assignment
|3
|2868
|157

Encryption and Security in Cloud Computing
|6
|2894
|168

ICT and Environment in Computer Science
|47
|5501
|364