logo

Report on Standards for Cloud Computing

   

Added on  2020-03-28

9 Pages1876 Words46 Views
Cloud computingReport

ContentsIntroduction......................................................................................................................................1Security issues for the cloud computing..........................................................................................1Summary of the issues.....................................................................................................................3Issues not addressed.........................................................................................................................4Impact of the above issues...............................................................................................................5Lesson Learnt...................................................................................................................................5Conclusion.......................................................................................................................................6References........................................................................................................................................7

IntroductionThe standards for the cloud computing is completely based on working over the demands where the network need to handle the access of the different shared pools with the easy configuration ofthe different resources. the provisioning is based on working over the management of the efforts with the cloud providers taking hold of the interaction. The cloud computing is mainly considered to be emerging with the major privacy concerns that are also related to the security measures (Hashizume et al., 2013). There are zero investments for the infrastructure development of the IT which has been the major concern for the cloud computingSecurity issues for the cloud computingChallengesAs per the research, there are different issues related to the data loss of control with the dependency standards set for the cloud commuting. The challenge is also related to the data mining techniques where the functions, storing and the processing is depending upon the sensitivity of the day with the services that are related to work on the services for the cloud computing. The devices are set to take hold of the storage of the data with the computation whichincludes that there is a need to drive the services which could be important for the transfer from one to the other devices (Almorsy et al, 2016). The cloud computing measures are depending upon the access to the different measures which includes the eaves dropping, DNS spoofing and then setting the Denial of Service attacks as well. Problems

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing Issues Assignment
|10
|2234
|41

Cloud Computing Report Executive Summary: Sensitive Approach to Data Mining Techniques
|10
|1947
|418

Research Report on Cloud Computing
|7
|1255
|88

Cloud Computing Security and Privacy
|7
|1639
|217

VMWare for Proposal and Procurement Report
|2
|951
|39

Cloud Computing Assignment - Cloud Privacy and Security
|24
|7063
|98