logo

Information Security in Cloud Computing

9 Pages1943 Words57 Views
   

Added on  2022-12-20

About This Document

This article discusses the threats and countermeasures for information security in cloud computing. It covers topics such as distributed denial-of-service attacks, system vulnerabilities, phishing, data loss, and shared cloud computing services. The article also provides insights into the technologies behind cloud computing and their applications.

Information Security in Cloud Computing

   Added on 2022-12-20

ShareRelated Documents
Running head: INFORMATION SECURITY 1
INFORMATION SECURITY
Student’s name
Institution Affiliation
Information Security in Cloud Computing_1
INFORMATION SECURITY 2
Abstract
Cloud computing plays a significant role in the current world of technology. It mainly
accomplishes the needs and resource demands of various customers and thus easing their work
on different platforms. Cloud computing involves mostly delivery and handling of multiple
services of computing through an online platform. However, security is a significant concern
when it comes to cloud computing since cloud computing involves third parties. Therefore, a
secure system should be established when providing various services online.
However, extreme use of virtualization technology when implementing the infrastructure
brings primary concern on the security of customers that access public services through cloud
computing (Navaz, Sangeetha & Prabhadevi, 2013). Typically, with virtualization, some notable
changes between the operating system and hardware bring some concerns. Thus, various
organizations have raised significant concerns about cloud computing threats.
This discussion aims to explore multiple cloud computing threat and the possible
mitigations to curb these threats. Also, this paper seeks to address various issues which aids to
improve user's confidence when using multiple cloud computing applications and to access
services online (Barron, Yu & Zhan, 2013). The article points out the major threat of security in
various cloud computing systems. Ultimately, the development of a comprehensive list of
possible risks and reasonable countermeasures to curb these threats.
Introduction
Overview of cloud computing
Cloud computing is a significant trend in the current world of technology. It is a
computing method where various systems are connected both in private networks and public
Information Security in Cloud Computing_2
INFORMATION SECURITY 3
networks. Thus, this interconnection of networks provides dynamic infrastructure for data,
resources sharing, application, and file storage. Therefore, cloud computing plays a vital role in
any organization that has established this paradigm. However, it reduces the cost of computation,
information delivery, data storage, and application hosting. Typically, cloud computing is mainly
a practical approach which potentially transforms any data center from a capital intensive
environment to a cost-effective variable environment (Grobauer, Walloschek & Stocker, 2011).
Technologies behind cloud computing and their applications
Cloud computing is big paradigm with a variety of technologies. The innovations are
vital in the world of a cloud computing platform. Thus, they make the platform adaptable,
useable and reliable: Examples of these technologies are:
Virtualization technology
Virtualization technology is a significant innovation in cloud computing. It is a process
that licenses sharing an application or some physical resources among various users, customers
or an organization. Virtualization is made possible through the assignment of logical names to
various physical resources, and finally providing pointers to the respective physical resources
when needed by the user. Significant implementation of virtualization technology is to provide
multiple application programs with a standard version to the individual cloud customers.
Virtualization has a wide range of application in the current world. For example, if there is a new
updated version of a particular application, then the cloud provider provides the updated version
to their client through virtualization technology.
Information Security in Cloud Computing_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Components for Building IT Infrastructure
|1
|646
|51

Security Threats in Cloud Computing and Preventive Measures
|16
|3755
|361

Cloud Computing: A New Platform for Information Security
|10
|2837
|87

VMWare for Proposal and Procurement Report
|2
|951
|39

Security Issue in Cloud Computing
|14
|624
|70

Cloud Computing Security and Privacy Issues: Assignment
|11
|2593
|64