logo

Cloud Computing Security Challenges

15 Pages4893 Words403 Views
   

Added on  2020-01-28

About This Document

These risks involve the factors like misplacement of the intellectual property, interference with the privacy of data, manipulation of the important data as well as loss of proper control over the data. There are several impacts of these risks on the users like loss of revenue and goodwill of the company, the loss of trust of customers on the companies as well as a violation of certain laws due to the leakage of highly confidential data. Table of contents Discussion 4 Introduction 5 Outline of the research 5 Purpose of research 5

Cloud Computing Security Challenges

   Added on 2020-01-28

ShareRelated Documents
SECURITY CHALLENGES OF CLOUD COMPUTINGSTUDENT NAME: STUDENT ID: PROFESSOR NAME: 1
Cloud Computing Security Challenges_1
AbstractCloud computing is a computing model which enables the sharing of data, resources, andsoftware by different computers simultaneously. The data is present in a central database and allthe computers are connected to the database with a proper networking system. However, thesecurity issues related to the cloud computing has proved to be a barrier to the smoothimplementation of the technology in the market. The data handled by the cloud is very large aswell as important and needs to be properly and sensitively handled. After the proper analysis, ithas been discovered that there are many risks associated with the security of data. These risksinvolve the factors like misplacement of the intellectual property, interference with the privacy ofdata, manipulation of the important data as well as loss of proper control over the data. There areseveral impacts of these risks on the users like loss of revenue and goodwill of the company, theloss of trust of customers on the companies as well as a violation of certain laws due to theleakage of highly confidential data. There is several security models designed to solve theseissues. The models IaaS, SaaS, and PaaS shall be discussed in details in the project.2
Cloud Computing Security Challenges_2
TABLE OF CONTENTSDiscussion...................................................................................................................................................4Introduction.................................................................................................................................................5Outline of the research.................................................................................................................................5Purpose of research......................................................................................................................................5Research Rationale......................................................................................................................................5Research context..........................................................................................................................................6Literature review.........................................................................................................................................6Impact of the security challenges on the consumer....................................................................................10Conclusion.................................................................................................................................................11Methodology.............................................................................................................................................11Reference list.............................................................................................................................................133
Cloud Computing Security Challenges_3
Discussion Cloud computing basically deals with storing the data on a server and enable the sharing of thestored data by different systems. The basic concept is that the data is stored centrally in the cloudand the different systems can access the data with the help of internet. The cloud computingtechnology is a significant development in the field of technology. However, it has its ownlimitations which have prevented the implementation of the technology at a large scale. Thereare several risks associated with the security of the data. These risks may include the risk of lossof data, loss of control of the concerned authority over the data, the misuse of the confidentialdata as well the manipulation of data. These issues can be solved using the different securitymodels PaaS or platform as a service, iaaS or infrastructure as a service and the saaS or softwareas a service. The PaaS allows the user to deploy his own applications on the cloud infrastructure;the iaaS provides the user with network and storage so that they are able to use differentsoftware. The saaS allows the people to access the applications running on the cloud.4
Cloud Computing Security Challenges_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Web Server Migration
|13
|776
|89

Virtualisation and Cloud Computing PDF
|9
|1856
|161

Implementation of Cloud Computing in VideoDev
|32
|2579
|320

Webb Store Data Management Challenges
|12
|2562
|80

Cloud Based Infrastructure for MetaSoft
|10
|561
|335

Evaluate Cloud Architecture
|11
|1697
|300