logo

Designing a Cloud-Based Data Security System

   

Added on  2019-09-24

7 Pages1634 Words39 Views
 | 
 | 
 | 
TASK 2
1
Designing a Cloud-Based Data Security System_1

Table of Contents
Introduction:....................................................................................................................................3
Key Findings:...................................................................................................................................3
Significance of the current research:...............................................................................................5
Conclusion:......................................................................................................................................5
References:......................................................................................................................................6
2
Designing a Cloud-Based Data Security System_2

Introduction:
The cloud computing is used widely by the organizations in the recent years because of the many
benefits it provide to the users. The benefits provided by the cloud computing includes the higher
flexibility, enhanced efficiency and the better strategic value. The cloud computing depends on
excessive virtualization and so, the data stored in the cloud is vulnerable to the security threats.
Along with it, the hacking techniques are getting improved every day which demand increased
focus of the users to identify the security threats and act accordingly. In the current research, the
security challenges faced by cloud computing users are analyzed. The gaps in the existing
literature are also identified in the current research.
Key Findings:
Cloud computing and security issues
The key motivating factor behind the increasing importance of cloud computing is its numerous
benefits including the excellent opportunity of cost reduction for the businesses. Along with the
benefits obtained from the cloud computing, the privacy and security concerns are also
associated with the cloud computing (Von Solms & Roussel, 2015). Because of the security
issues associated with the cloud computing system, many business organizations hesitate to use
it.
As indicated in the research, the security in the cloud computing can be analyzed from several
aspects including the identity management, the physical security of the system, personal security
of the users and data security of the cloud services. The encryption, privacy, integrity, access
controllability are the other aspects of cloud security.
Identity management is one of the most important factors for the cloud service providers for
controlling access to information and computing resource (Fielder et al.2016). The cloud service
providers can have their own identity management system, can use the client's identity
management system or can employ a biometric-based identification system. When the identity
management system is in place, the risk of unauthorized data access reduces to a significant
extent.
3
Designing a Cloud-Based Data Security System_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Security and Privacy
|27
|5040
|357

Cloud Security and Risk
|19
|5365
|373

Cloud Computing Security and Privacy
|10
|2125
|210

Security Threats in Cloud Computing and Preventive Measures
|16
|3755
|361

CLOUD COMPUTING AND DEPLOYMENT MODEL
|7
|810
|16

Role of Identity Management and Access Control in Application Security
|7
|1394
|288