Data Security in Cloud Computing

   

Added on  2023-04-10

6 Pages874 Words413 Views
qwertyuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiopasdfghj
klzxcvbnmqwertyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcvbnmqwerty
uiopasdfghjklzxcvbnmqwertyuiopasdfg
hjklzxcvbnmqwertyuiopasdfghjklzxcvb
nmqwertyuiopasdfghjklzxcvbnmqwert
yuiopasdfghjklzxcvbnmqwertyuiopasdf
ghjklzxcvbnmqwertyuiopasdfghjklzxcv
bnmqwertyuiopasdfghjklzxcvbnmqwer
tyuiopasdfghjklzxcvbnmqwertyuiopasd
fghjklzxcvbnmqwertyuiopasdfghjklzxcv
bnmqwertyuiopasdfghjklzxcvbnmqwer
Cloud Computing
Data Security in Cloud Computing_1
Table of Contents
Problem Background – Data Security.............................................................................................3
Proposed Solution – Data Encryption..............................................................................................4
Authorization...................................................................................................................................5
References........................................................................................................................................6
2 | P a g e
Data Security in Cloud Computing_2
MEMORANDUM
TO:
CC:
FROM:
DATE:
SUBJECT:
A computing cloud is a dense cluster of computers working together in such a way that to a
normal observer, they appear to be one giant computer resource, so the content that appears to be
running on one singular laptop or desktop, mobile phone or any other computing device. (Li, et
al., 2018) It is running over the internet on an array of computers that are sharing resources with
each other, storing vast amount of data and other meta-data. With the advancement in technology
and rise in virtual environment work systems, cloud technology became an inseparable part
offering data scalability advantage with reduced cost of maintenance and storage (Ali, Khan, &
Vasilakos, 2015).
Problem Background – Data Security
As the expansion in technology took over standard and obsolete data storage and data access
mechanism, various newer issues ranging from data safety to data theft started emerging.
Multiple threats ranging from various severity like virus attack, denial of service attacks and
hacking of the client’s site are the biggest cloud computing data security issues. Data residency is
one of the biggest concerns of cloud users as they have no control over the location and access of
their valuable data once it is in the cloud (Rao & Selvamani, 2015).
A cyber-criminal looks for weaknesses in the cloud's security in any way possible. An attack
occurs when the systems and its components are being used by identifying its weaknesses to
infiltrate the network. Once an attack player gets access inside a system files, the network and
3 | P a g e
Data Security in Cloud Computing_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CLOUD COMPUTING SECURITY AND PRIVACY.
|13
|446
|329

Cyber Security – Challenges and Solutions
|13
|3663
|313

Cyber Crime for New Threats of 2018 - Desklib
|6
|477
|389

(Solved) Cyber security challenges Assignment
|8
|2715
|216

Cloud Computing Security with VPN
|5
|1900
|39

Database Security
|4
|824
|76