logo

Cloud Security

   

Added on  2023-04-20

8 Pages1682 Words310 Views
Running head: CLOUD SECURITY
Cloud Security
Name of Student-
Name of University-
Author’s Note-
Cloud Security_1
1CLOUD SECURITY
Cloud Security
The cloud security mainly consists of many policies, procedures, technologies, as well as
controls that are used together for providing protection to the systems, data and the infrastructure
that are based on clouds (Almorsy, Grundy & Müller, 2016). The security measures that are
configured for protecting the data, supporting the regulatory compliance, as well as protecting
the privacy of the customers and setting the authentication rules for the individuals users and for
all the devices. Starting from the authentication access to the filtering traffic, the security of the
cloud can be configured for extracting the needs of a particular business. The rules can also be
configured as well as managed only at one place, the overheads of the administration teams and
the IT departments can then focus on other business activities of the organization.
The way of delivering the cloud security mainly depends on a particular cloud provider or
on some solutions of cloud security (Jouini & Rabai, 2016). Implementing the cloud security
mainly that are possessed by a cloud computing are responsibility of the business owners and the
cloud solution provider.
The cloud security mainly provides different control levels in a network infrastructure for
providing continuity as well as protection for the assets such as websites or the web applications
that are based on the cloud. Irrespective of cloud being private or public, it is the responsibility
of the business to provide protection to the data involved in the organization (Hashem et al.,
2016). Cloud security is necessary for DDoS protection, data security, regulatory compliance, as
well as high availability by provider of cloud security.
Security Issues and Trends in Cloud Computing
The main issues that are involved in the cloud computing security are explained below:
Cloud Security_2
2CLOUD SECURITY
Confidentiality
Confidentiality is considered as the topmost security of protection. The word
confidentiality itself means securing the data from the cloud providers and from the other
customers (Jones et al., 2017). Customer who stores their data on the servers of cloud can be
managed by many untrustworthy providers of clouds or may be some hackers. Outsourcing the
data of customer means losing the physical control over their personal data.
Integrity
The word integrity means data should remain in its original form. They are not to be
modified. The data are given to the providers with a trust that the data will not be altered neither
will be modified.
Availability
The data that are stored on the cloud should be available and should be present when
needed. If customer does not get the data when needed, they will not believe on the cloud service
provider any more.
Privacy
Another most important security issues is privacy. Keeping the data private is a difficult
job for the customers. The data that are given by the customer with trust should be shared with
other customers. The data are distributed on the servers of cloud and are then managed by the
cloud providers. All the individuals want to keep their data safe on the cloud servers and the data
should be kept confidentially in the cloud.
Solution for the Issues
Cloud Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Integrated Professional Skill in Digital Age :|Assignment
|8
|1994
|78

Cloud Computing Report Executive Summary: Sensitive Approach to Data Mining Techniques
|10
|1947
|418

Report On Cloud Computing Security | Data Protection
|9
|2109
|168

(Solution) Assignment on Cloud Computing
|12
|755
|59

Cloud Security and Privacy
|9
|1887
|372

Cloud Security and Privacy Name of the University Author's Note
|9
|1844
|410