University Data Security and Privacy in Cloud Computing Report
VerifiedAdded on 2022/11/14
|18
|4909
|424
Report
AI Summary
This report provides a comprehensive analysis of data security and privacy in cloud computing. It explores various aspects, including software, infrastructure, storage, and network security, highlighting the significance of the CIA triad (Confidentiality, Integrity, and Availability) in maintaining data protection. The report discusses real-life examples and analyzes theoretical frameworks like hash methods, Third-Party Auditing (TPA), Identity Access Management (IAM), and Profitable Data Possession (PDP) schemes. It emphasizes the importance of encryption methods, such as AES and RSA cryptosystems, and addresses challenges related to data breaches, unauthorized access, and ethical considerations. The report also covers the challenges of security faced by cloud entities and problem-solving skills to be used. The report concludes by emphasizing the need for robust security measures to ensure data confidentiality and privacy in cloud environments.

Running head: DATA SECURITY AND PRIVACY IN CLOUD COMPUTING
Data Security and Privacy in Cloud Computing
Name of the student:
Name of the university:
Author Note
Data Security and Privacy in Cloud Computing
Name of the student:
Name of the university:
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1DATA SECURITY AND PRIVACY IN CLOUD COMPUTING
Abstract
In this study, the report has made analyses of the security and data privacy of cloud computation.
This involves the prioritization, explaining and finding of main issues within complex issues of
information technology. Here, the relevant theories and real life examples are implemented. Them
the study analyzes the clear vision from various literatures dealing with this area. Thus, the study
shows how cloud computing provides different scopes for business. It is useful in showcasing the
potential for the business scenario.
Abstract
In this study, the report has made analyses of the security and data privacy of cloud computation.
This involves the prioritization, explaining and finding of main issues within complex issues of
information technology. Here, the relevant theories and real life examples are implemented. Them
the study analyzes the clear vision from various literatures dealing with this area. Thus, the study
shows how cloud computing provides different scopes for business. It is useful in showcasing the
potential for the business scenario.

2DATA SECURITY AND PRIVACY IN CLOUD COMPUTING
Table of Contents
Introduction............................................................................................................................................3
Software security...................................................................................................................................3
Infrastructure security............................................................................................................................4
Storage security.....................................................................................................................................4
Network security....................................................................................................................................4
Security Issues under CIA Triad Confidentiality..................................................................................4
Checking security integrity....................................................................................................................5
Real life examples..................................................................................................................................6
Analyzing the theories like hash methods, TPA, IAM and PDP...........................................................6
Maintaining of CIA for security............................................................................................................7
Adopting RSA Cryptosystem................................................................................................................8
Privacy and security analysis.................................................................................................................9
Discussion of performance metrix.........................................................................................................9
Security in crypto-cloud......................................................................................................................10
Challenges of security faced by cloud entities....................................................................................11
Problem solving skills to be used:.......................................................................................................11
Conclusion...........................................................................................................................................14
References............................................................................................................................................15
Table of Contents
Introduction............................................................................................................................................3
Software security...................................................................................................................................3
Infrastructure security............................................................................................................................4
Storage security.....................................................................................................................................4
Network security....................................................................................................................................4
Security Issues under CIA Triad Confidentiality..................................................................................4
Checking security integrity....................................................................................................................5
Real life examples..................................................................................................................................6
Analyzing the theories like hash methods, TPA, IAM and PDP...........................................................6
Maintaining of CIA for security............................................................................................................7
Adopting RSA Cryptosystem................................................................................................................8
Privacy and security analysis.................................................................................................................9
Discussion of performance metrix.........................................................................................................9
Security in crypto-cloud......................................................................................................................10
Challenges of security faced by cloud entities....................................................................................11
Problem solving skills to be used:.......................................................................................................11
Conclusion...........................................................................................................................................14
References............................................................................................................................................15
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3DATA SECURITY AND PRIVACY IN CLOUD COMPUTING
Introduction
The cloud technology provide various scopes to business. This is helpful to showcase the
potential for the business environment.
Most of the security risks in cloud computing is due to data security. This includes lack of
visibility of data, inability to control data, theft of data n cloud and so on. On the other hand privacy
concerns are rousingly important under the online world. Securing the process of personal
information under cloud denotes a huge challenge.
The following report makes an analysis of the data privacy and security of cloud computing.
In includes the determination, explanation, and prioritizing of the primary concerns under the
complicated IT relates issues. This draws on the related theory and the real instances. Further, it
evaluates the clear expertise of the various literatures in the area. The various security concerns for
the cloud computing are demonstrated hereafter.
Software security
The first one is the software security. This delivers the primary concept of the software
security. This originates from the department of engineering software. This continues to function
properly within the malicious tasks. For creating the environment of cloud a critical and central
issues has been there the issue of software security. It has been affecting the security that involves
the bugs of implementation, buffer overflows and flaws in design and promises to handle errors
(Singh, Jeong & Park, 2016).
Introduction
The cloud technology provide various scopes to business. This is helpful to showcase the
potential for the business environment.
Most of the security risks in cloud computing is due to data security. This includes lack of
visibility of data, inability to control data, theft of data n cloud and so on. On the other hand privacy
concerns are rousingly important under the online world. Securing the process of personal
information under cloud denotes a huge challenge.
The following report makes an analysis of the data privacy and security of cloud computing.
In includes the determination, explanation, and prioritizing of the primary concerns under the
complicated IT relates issues. This draws on the related theory and the real instances. Further, it
evaluates the clear expertise of the various literatures in the area. The various security concerns for
the cloud computing are demonstrated hereafter.
Software security
The first one is the software security. This delivers the primary concept of the software
security. This originates from the department of engineering software. This continues to function
properly within the malicious tasks. For creating the environment of cloud a critical and central
issues has been there the issue of software security. It has been affecting the security that involves
the bugs of implementation, buffer overflows and flaws in design and promises to handle errors
(Singh, Jeong & Park, 2016).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4DATA SECURITY AND PRIVACY IN CLOUD COMPUTING
Infrastructure security
Then there is the infrastructure security. Here, the most fundamental and common issue is to
discuss that the physical and virtual infrastructure of the cloud can be trusted. This attestation of
third part has not been sufficient for the business process that are critical. It has been absolutely
important for the business for verifying the necessities that the underpinning is secured (Zhao, Li &
Liu, 2014).
Storage security
After that the storage security is highly essential. Under the cloud storage, the end user cans
tore the information to the cloud and can own the information of where it gets stored. This has been
vital element of the quality service. Moreover, it has been vital aspect of the service and quality. This
has been assuring that the users data is corrected within the data. Here, the concerns of storage
security has been regarding data sanitization, data remaining and cryptography, leakage of data and
malware and data availability of the snooping (Khan & Tuteja, 2015).
Network security
Lastly, there is the network security. Under cloud computing, the communication is done
through Internet. It is backbone of the cloud scenario. Here, the security concerns of network
regarding the external and internal are attacked.
Security Issues under CIA Triad Confidentiality
The availability, integrity and confidentiality of the CIA has been making a smarter effect on
cloud’s business. This is due to the data at the central component for various business. Further, data
integrity is the assurances provided to digital information. This is uncorrupted and is assessed
Infrastructure security
Then there is the infrastructure security. Here, the most fundamental and common issue is to
discuss that the physical and virtual infrastructure of the cloud can be trusted. This attestation of
third part has not been sufficient for the business process that are critical. It has been absolutely
important for the business for verifying the necessities that the underpinning is secured (Zhao, Li &
Liu, 2014).
Storage security
After that the storage security is highly essential. Under the cloud storage, the end user cans
tore the information to the cloud and can own the information of where it gets stored. This has been
vital element of the quality service. Moreover, it has been vital aspect of the service and quality. This
has been assuring that the users data is corrected within the data. Here, the concerns of storage
security has been regarding data sanitization, data remaining and cryptography, leakage of data and
malware and data availability of the snooping (Khan & Tuteja, 2015).
Network security
Lastly, there is the network security. Under cloud computing, the communication is done
through Internet. It is backbone of the cloud scenario. Here, the security concerns of network
regarding the external and internal are attacked.
Security Issues under CIA Triad Confidentiality
The availability, integrity and confidentiality of the CIA has been making a smarter effect on
cloud’s business. This is due to the data at the central component for various business. Further, data
integrity is the assurances provided to digital information. This is uncorrupted and is assessed

5DATA SECURITY AND PRIVACY IN CLOUD COMPUTING
through the users are authorized. It integrates the involving the maintaining of the trustworthiness,
consistency and accuracy. Thus maintain CIA is similar for the enterprises computing. However,
under cloud is the vital due to the multi-tenant architecture. There are various stages to be gained for
maintaining the CIA cloud computing. As the data is created, the data is classifies, sensitive data are
to be identified, policies are defined and access methods are generated. This is for various kinds of
data. Further, policies are to be created for data archiving and destroying the data (Gariba & Van Der
Poll, 2018). Further, the data is stored with suitable logical and physical protection of security. This
involves the recovery and backup plans. Next, various kinds of data are identified and how and
whom that can be shared. Then, it involves the policies of data sharing. Under cloud computing,
there are policies are collectively known as the SLA or Service Level agreement. Next, a prior action
plan must be created as the case data gets hacked or hacked for the communication and network
devices. It involves the flaws in security as the data is under transit (Subramanian & Jeyaraj, 2018).
Checking security integrity
Here, it must be reminded that the integrity is to checked by the information long with the
level for competition. The integrity of computation indicates to the authorized applications that are
permitted to access the data and use that regarding computation. The abnormality coming from the
normal computing must also be avoided. The Access Management or effective identity an avid the
loss of integrity and confidentiality. Here, the data loss can occur through the data inaccessibility and
data loss (Tari et al., 2015). Again, the cloud computing deploys various techniques such as high
availability and scalability at the architecture level. Further, there are various procedures and
methods that are followed for developing the data security. This is related to the CIA triad at various
stages of the lifecycle of data.
through the users are authorized. It integrates the involving the maintaining of the trustworthiness,
consistency and accuracy. Thus maintain CIA is similar for the enterprises computing. However,
under cloud is the vital due to the multi-tenant architecture. There are various stages to be gained for
maintaining the CIA cloud computing. As the data is created, the data is classifies, sensitive data are
to be identified, policies are defined and access methods are generated. This is for various kinds of
data. Further, policies are to be created for data archiving and destroying the data (Gariba & Van Der
Poll, 2018). Further, the data is stored with suitable logical and physical protection of security. This
involves the recovery and backup plans. Next, various kinds of data are identified and how and
whom that can be shared. Then, it involves the policies of data sharing. Under cloud computing,
there are policies are collectively known as the SLA or Service Level agreement. Next, a prior action
plan must be created as the case data gets hacked or hacked for the communication and network
devices. It involves the flaws in security as the data is under transit (Subramanian & Jeyaraj, 2018).
Checking security integrity
Here, it must be reminded that the integrity is to checked by the information long with the
level for competition. The integrity of computation indicates to the authorized applications that are
permitted to access the data and use that regarding computation. The abnormality coming from the
normal computing must also be avoided. The Access Management or effective identity an avid the
loss of integrity and confidentiality. Here, the data loss can occur through the data inaccessibility and
data loss (Tari et al., 2015). Again, the cloud computing deploys various techniques such as high
availability and scalability at the architecture level. Further, there are various procedures and
methods that are followed for developing the data security. This is related to the CIA triad at various
stages of the lifecycle of data.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6DATA SECURITY AND PRIVACY IN CLOUD COMPUTING
Real life examples
Here, some of the vital methods are highlighted. Here, the application of data encryption
takes place as there is the data at rest and the data is in transit. For example, the Amazon S3 utilizes
the strongest algorithm of encryption. This is the 256-bit AES. Here, the methods of encryptions are
to supply the confidentially attacks taking place against the cloud providers. Again, it has been
unable to secure the data against various errors of configurations and the bugs of software (Jouini &
Rabai, 2016).
Analyzing the theories like hash methods, TPA, IAM and PDP
Moreover, the hash methods are useful to seek the intentional and accidental changes in data.
On the other hand, the TPA or Third Party Auditing can be deployed for checking the integrity of
data. Moreover, there are various researches that has been insisting for auditing data integrity
through the auditors of third-party due to the reason that they are specialized in the field. Again, the
PDP or Profitable Data Possession scheme has been to investigate the statistical way of properness
of the data. This is instead of retrieving led to that has been outsourced to the cloud strategies. Then,
proper identify and IAM or identity Access Management are helpful for users in accessing the
information (Kumar, Raj & Jelciana, 2018).
The security challenges under the CIA Triad Confidentiality losses has been making big
effect on the business of cloud computing. The reason is that the data is the central component for all
the business. Furthermore, the data integrity is the assurance provided to the digital data that is
uncorrupted. It can be accessed by the authorized users. In this way the integrity has been including
the maintenance of accuracy trustworthiness and consistency of information in the complete life
cycle.
Real life examples
Here, some of the vital methods are highlighted. Here, the application of data encryption
takes place as there is the data at rest and the data is in transit. For example, the Amazon S3 utilizes
the strongest algorithm of encryption. This is the 256-bit AES. Here, the methods of encryptions are
to supply the confidentially attacks taking place against the cloud providers. Again, it has been
unable to secure the data against various errors of configurations and the bugs of software (Jouini &
Rabai, 2016).
Analyzing the theories like hash methods, TPA, IAM and PDP
Moreover, the hash methods are useful to seek the intentional and accidental changes in data.
On the other hand, the TPA or Third Party Auditing can be deployed for checking the integrity of
data. Moreover, there are various researches that has been insisting for auditing data integrity
through the auditors of third-party due to the reason that they are specialized in the field. Again, the
PDP or Profitable Data Possession scheme has been to investigate the statistical way of properness
of the data. This is instead of retrieving led to that has been outsourced to the cloud strategies. Then,
proper identify and IAM or identity Access Management are helpful for users in accessing the
information (Kumar, Raj & Jelciana, 2018).
The security challenges under the CIA Triad Confidentiality losses has been making big
effect on the business of cloud computing. The reason is that the data is the central component for all
the business. Furthermore, the data integrity is the assurance provided to the digital data that is
uncorrupted. It can be accessed by the authorized users. In this way the integrity has been including
the maintenance of accuracy trustworthiness and consistency of information in the complete life
cycle.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7DATA SECURITY AND PRIVACY IN CLOUD COMPUTING
The IAM or efficient “Identify and Access Management” is helpful to avoid the loss of
integrity and confidentiality. The loss of availability has been occurring with the loss of data
inaccessibility. Further, the cloud computing deploys various measures such as high availability and
scalability at the level of architecture. Here, various methods are there with different procedures to
be followed for developing the data security and is relevant to CIA triad (Kazim & Zhu, 2015). This
occurs at various stages of the lifecycle of the data. Again, some of the vita processes are
demonstrated hereafter. Here, data encryption must be applied as the data is at rest and the data is
under transit. Further, strong encryption algorithms are to be implemented such as AES or Advanced
Encrytion Standard and RSA or Rivest Shamir Adleman algorithms. Again, there are various kinds
of methods of encryptions that are demonstrated under the Amazon S3 as the most effective
algorithm of encryption.
Maintaining of CIA for security
Again, the maintaining CIA is simpler for the enterprise computing (Bhardwaj et al., 2016).
However under the cloud computing, this has been complex due to the architecture that is
multitenant. This has been also involving the distributed nature of the infrastructure. Here, various
steps can be followed to maintain suitable CIS under cloud computing. As the data is generated, the
data is to be classified, and the sensitive data are to be identified (Luna et al., 2015). Besides, the
sensitive data is to be defined, policies are to be defined and access methods are to be created.
Moreover, policies are to be created for data security and data archive. Then the data is to be stored
with suitable logical and physical protection of security. This must also involve the recovery and
backup plan. Next, it is to be identified what kind of data is to be shared, how and who to be shared.
Then the policies of data sharing are to be defined. Under cloud computing, various policies has
been collectively known SLA or Service Level Agreements. Again, a corrective action planning is to
The IAM or efficient “Identify and Access Management” is helpful to avoid the loss of
integrity and confidentiality. The loss of availability has been occurring with the loss of data
inaccessibility. Further, the cloud computing deploys various measures such as high availability and
scalability at the level of architecture. Here, various methods are there with different procedures to
be followed for developing the data security and is relevant to CIA triad (Kazim & Zhu, 2015). This
occurs at various stages of the lifecycle of the data. Again, some of the vita processes are
demonstrated hereafter. Here, data encryption must be applied as the data is at rest and the data is
under transit. Further, strong encryption algorithms are to be implemented such as AES or Advanced
Encrytion Standard and RSA or Rivest Shamir Adleman algorithms. Again, there are various kinds
of methods of encryptions that are demonstrated under the Amazon S3 as the most effective
algorithm of encryption.
Maintaining of CIA for security
Again, the maintaining CIA is simpler for the enterprise computing (Bhardwaj et al., 2016).
However under the cloud computing, this has been complex due to the architecture that is
multitenant. This has been also involving the distributed nature of the infrastructure. Here, various
steps can be followed to maintain suitable CIS under cloud computing. As the data is generated, the
data is to be classified, and the sensitive data are to be identified (Luna et al., 2015). Besides, the
sensitive data is to be defined, policies are to be defined and access methods are to be created.
Moreover, policies are to be created for data security and data archive. Then the data is to be stored
with suitable logical and physical protection of security. This must also involve the recovery and
backup plan. Next, it is to be identified what kind of data is to be shared, how and who to be shared.
Then the policies of data sharing are to be defined. Under cloud computing, various policies has
been collectively known SLA or Service Level Agreements. Again, a corrective action planning is to

8DATA SECURITY AND PRIVACY IN CLOUD COMPUTING
be made as the data gets corrupted or gets hacked because of the communication or network devices.
Next, the security flaws has been there as the data is under transit. Further, the computation integrity
indicates to the authorized applications that are permitted or then accessing the data and used for
computation (Chang & Ramachandran, 2018). Again, the abnormality coming from the normal
computing is required to be avoided.
Adopting RSA Cryptosystem
Here, the RSA Cryptosystem can be effective adopted that can accept various models such as
two-factor authentication. It involves the adaptive authentication and knowledge based
authentication. These methods are efficient for big data protection under cloud computing. Next, the
IDS or the Intrusion Detection System, firewalls and segregation of obligations can be deployed over
various network and layers of cloud for enabling the suitable access controls under cloud computing.
It is helpful for smarter date protection. Next, there are various solutions o third-party identity
management at the market. Here, some of the third party solutions can be deployed such as Okta
Identity management, Microsoft Azure Active Directory, McAfee cloud identity managers and so
on. Again, the cloud applications can be utilized for various open standards where tit is applicable
(Narula & Jain, 2015). This involves the SAML or Security Assertion Markup Language. It can also
involve the “Organization for the Advancement of Structured Information Standards” or OASIS.
This is the open standard for exchanging authorization and authentication data taking place between
the open authorization and authentication of data taking place between the Open Authorization and
security domains like OAuth. This is the open standard to make authorization and permit the users in
sharing the private resources. This can be done using token instead of the credentials.
be made as the data gets corrupted or gets hacked because of the communication or network devices.
Next, the security flaws has been there as the data is under transit. Further, the computation integrity
indicates to the authorized applications that are permitted or then accessing the data and used for
computation (Chang & Ramachandran, 2018). Again, the abnormality coming from the normal
computing is required to be avoided.
Adopting RSA Cryptosystem
Here, the RSA Cryptosystem can be effective adopted that can accept various models such as
two-factor authentication. It involves the adaptive authentication and knowledge based
authentication. These methods are efficient for big data protection under cloud computing. Next, the
IDS or the Intrusion Detection System, firewalls and segregation of obligations can be deployed over
various network and layers of cloud for enabling the suitable access controls under cloud computing.
It is helpful for smarter date protection. Next, there are various solutions o third-party identity
management at the market. Here, some of the third party solutions can be deployed such as Okta
Identity management, Microsoft Azure Active Directory, McAfee cloud identity managers and so
on. Again, the cloud applications can be utilized for various open standards where tit is applicable
(Narula & Jain, 2015). This involves the SAML or Security Assertion Markup Language. It can also
involve the “Organization for the Advancement of Structured Information Standards” or OASIS.
This is the open standard for exchanging authorization and authentication data taking place between
the open authorization and authentication of data taking place between the Open Authorization and
security domains like OAuth. This is the open standard to make authorization and permit the users in
sharing the private resources. This can be done using token instead of the credentials.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9DATA SECURITY AND PRIVACY IN CLOUD COMPUTING
Privacy and security analysis
As an unauthorized access is done to the resident of sensitive data as the Cloud is gained. It
can be done by the hackers of the data to get abused. This has been leading to various ethical
challenges. Thus, the security and privacy mechanisms are essential has been avoiding different
ethical issues.
Here, the compliance is a vital part of the security and privacy mechanisms as is formed as
various set of standards. Further, the cloud service model has been complying to be subset of
standards as per the application service. The compliance covers the various set of principles seen to
be considered the maintenance and development of the system’s process (Duncan & Whittington,
2016). As the application of the cloud based are under the SAS model having security requirement
and some perquisites. Here, the model has been with privacy or needs security requirements. This is
compiled with predefined standards. Again, there are notable parameters for choosing the cloud
providers for PaaS or IaaS service. As the cloud providers has been conflicting to the compliances
and thus one cannot choose as the provider for clients with compliance requirements.
Security in crypto-cloud
Various advantages to use public cloud infrastructure are identified here. Here, it can also be
pointed hat the usage of public cloud leads to various risks of security. Moreover, integrity and
confidentiality of the information are among the greatest risks that results into grave concerns. The
architecture of grave concerns comprises of three primary entities, the data authority, data consumer,
CSSP or cloud storage service provider. Here, the data authority unloads he encrypted file and the
user and consumer of the cloud authenticates the access to files. As the conditions are fulfilled, the
requested file can be downloaded and then decrypted. This can be done through suitable credentials
Privacy and security analysis
As an unauthorized access is done to the resident of sensitive data as the Cloud is gained. It
can be done by the hackers of the data to get abused. This has been leading to various ethical
challenges. Thus, the security and privacy mechanisms are essential has been avoiding different
ethical issues.
Here, the compliance is a vital part of the security and privacy mechanisms as is formed as
various set of standards. Further, the cloud service model has been complying to be subset of
standards as per the application service. The compliance covers the various set of principles seen to
be considered the maintenance and development of the system’s process (Duncan & Whittington,
2016). As the application of the cloud based are under the SAS model having security requirement
and some perquisites. Here, the model has been with privacy or needs security requirements. This is
compiled with predefined standards. Again, there are notable parameters for choosing the cloud
providers for PaaS or IaaS service. As the cloud providers has been conflicting to the compliances
and thus one cannot choose as the provider for clients with compliance requirements.
Security in crypto-cloud
Various advantages to use public cloud infrastructure are identified here. Here, it can also be
pointed hat the usage of public cloud leads to various risks of security. Moreover, integrity and
confidentiality of the information are among the greatest risks that results into grave concerns. The
architecture of grave concerns comprises of three primary entities, the data authority, data consumer,
CSSP or cloud storage service provider. Here, the data authority unloads he encrypted file and the
user and consumer of the cloud authenticates the access to files. As the conditions are fulfilled, the
requested file can be downloaded and then decrypted. This can be done through suitable credentials
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10DATA SECURITY AND PRIVACY IN CLOUD COMPUTING
and tokens. Here, the entities has been facing various issues in communication levels, SLAs and
computations.
Challenges of security faced by cloud entities
Apart from various requirements of legal security, it is needed to gain few primary
requirements such as audits, availabilities, confidentialities, transparencies, integrity and
authentication. Here, the security tree can illustrates the significance of primary security perquisites.
Here, the issues specified have the root to be addressed suitably like the root secure tree under the
soil. As the primary requirements are net suitably, the tree of security assures the advantages as per
everything or anything like XaaS. This is metaphorically depicted as the levees or fruits in the tree.
The SSL or TLS protocols are the Transport Layer Security and Layer of Security Socker. These can
be utilized for secured transmission of data chosen under the tree trunk.
Problem solving skills to be used:
They are highlighted hereafter.
Techniques used:
Techniques Discussion
Network discussion First of all the network virtualization in cloud computing can be used.
This is to split up the available and width available bandwidth into
various channels. They are distinguished and separate.
Storage virtualization Next, the storage virtualization provides the user with the pool of
hardware storage spaces managed from a single command control. Next,
the server virtualization has been masking on server resources
and tokens. Here, the entities has been facing various issues in communication levels, SLAs and
computations.
Challenges of security faced by cloud entities
Apart from various requirements of legal security, it is needed to gain few primary
requirements such as audits, availabilities, confidentialities, transparencies, integrity and
authentication. Here, the security tree can illustrates the significance of primary security perquisites.
Here, the issues specified have the root to be addressed suitably like the root secure tree under the
soil. As the primary requirements are net suitably, the tree of security assures the advantages as per
everything or anything like XaaS. This is metaphorically depicted as the levees or fruits in the tree.
The SSL or TLS protocols are the Transport Layer Security and Layer of Security Socker. These can
be utilized for secured transmission of data chosen under the tree trunk.
Problem solving skills to be used:
They are highlighted hereafter.
Techniques used:
Techniques Discussion
Network discussion First of all the network virtualization in cloud computing can be used.
This is to split up the available and width available bandwidth into
various channels. They are distinguished and separate.
Storage virtualization Next, the storage virtualization provides the user with the pool of
hardware storage spaces managed from a single command control. Next,
the server virtualization has been masking on server resources

11DATA SECURITY AND PRIVACY IN CLOUD COMPUTING
simulating physical servers can be used here. Further, there is data
virtualization helpful to abstract the technical details utilized in data
management.
Geo fencing Here, IP address and additional data of geo-location for generating
geographic boundary and suspicious activities can be used
Policy based retention
of life-cycle
Here, the systems has been using the policies of data classification.
This is to control and automate the ways data is stored archived,
retained and removed.
Data-aware filtering This technique permits the business to seek articular events and
conditions. Further, this can be tied to the various types of role-based
privileges and authorizations.
Detailed logs and total
user workloads and
reporting of audit
trail
It involves the peer for the logs and workloads of audits providing
insights security issues n risks of vulnerability.
Utilizing multi-factor
authentication around
every systems and
devices
This broad usage of authentication at multi-factor levels can decrease
the risk to gain unauthorized access to application and system. This can
be done through using that for unleashing malware or create a back door
towards the data. Though the risk has been higher for the accounts of
administrator, this has been never disappearing for the standard tools
and applications. Apart from this, the multi-factor authentication has
been aiding protecting sensitive information from the side of hackers,
different disgruntled employees with other insiders. This can put
inadvertently or intentionally data at risk.
simulating physical servers can be used here. Further, there is data
virtualization helpful to abstract the technical details utilized in data
management.
Geo fencing Here, IP address and additional data of geo-location for generating
geographic boundary and suspicious activities can be used
Policy based retention
of life-cycle
Here, the systems has been using the policies of data classification.
This is to control and automate the ways data is stored archived,
retained and removed.
Data-aware filtering This technique permits the business to seek articular events and
conditions. Further, this can be tied to the various types of role-based
privileges and authorizations.
Detailed logs and total
user workloads and
reporting of audit
trail
It involves the peer for the logs and workloads of audits providing
insights security issues n risks of vulnerability.
Utilizing multi-factor
authentication around
every systems and
devices
This broad usage of authentication at multi-factor levels can decrease
the risk to gain unauthorized access to application and system. This can
be done through using that for unleashing malware or create a back door
towards the data. Though the risk has been higher for the accounts of
administrator, this has been never disappearing for the standard tools
and applications. Apart from this, the multi-factor authentication has
been aiding protecting sensitive information from the side of hackers,
different disgruntled employees with other insiders. This can put
inadvertently or intentionally data at risk.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 18
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





