ITNE2002 Network Security: Cloud Computing Security and Privacy Report

Verified

Added on  2023/04/03

|13
|446
|329
Report
AI Summary
This report delves into the critical aspects of cloud computing security and privacy, examining the features and benefits cloud computing offers, such as on-demand self-service, scalable architecture, and efficient storage. It discusses the three types of data stored in the cloud: data in transit, data at rest, and data at processing. The report emphasizes the importance of securing data through encryption, strong authentication, and data integrity, referencing TrueCrypt software as an example. It also covers key features of cloud data security, including authentication, provider and user encryption, data integrity implementation, fast data recovery, and key management. The report addresses challenges faced by cloud environments, such as DDoS attacks, data breaches, and human error, while also providing recommendations for enhancing security and privacy, such as avoiding sensitive data storage and using strong passwords. The report concludes with a broad overview of technologies, applications, controls, and policies aimed at protecting cloud-stored data, referencing relevant academic papers.
Document Page
CLOUD COMPUTING
SECURITY AND
PRIVACY
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
About cloud computing
Cloud computing
offers several feature
towards the users
This includes on
demand self service,
scalable
architecture, easy
storage and better
computing power.
Scalable and flexible
Document Page
Data in cloud
The three types of data stored within
the cloud includes:
Data in transit
Data at rest
Data at processing
Document Page
Cloud Computing
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cloud computing security
and privacy
Cloud computing is
referred to the way of
storing users data
effectively within the
data centers. The
main concern is to
ensure that the data
stored within the
system is secured and
protected from further
breaches and thefts.
Document Page
Data security model
The model of data
security must have
following features:
Data in an encrypted
way
Using strong
encryption algorithm
for protecting data
Use of strong
authenticated data
Ensuring file
integrity
Document Page
TrueCrypt software
This focuses on primary
concepts that are described
below:
Securing data by proper
encryption before it is written
within the disk
Decrypting the encrypted data
once it is being read from disk
Three level defense system is
used by TrueCypt This are strong
authentication , data encryption
and fast recovery of user data.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Features of cloud data
security and privacy
Authentication- using proper OTP
authentication system
Provider encryption
Private user encryption
Implementing proper data integrity
Data fast recovery
Key management
Document Page
Challenges faced by
Cloud
DDoS attacks
Data breaches
Human error
channel attacks
Data loss
Malicious insiders
Abusing cloud services
Document Page
Security and privacy in cloud
computing
The user should avoid storing
sensitive information within
the cloud.
Before integrating with cloud
provider it becomes essential
to for the user to ensure that
proper cloud storage is being
maintained by the provider.
User should use strong
password
Proper encryption will ensure
better way of storing the data
within the cloud storage.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Security and privacy in cloud
computing
Cloud computing security and privacy is mainly
referred to the broad set of technologies, application,
controls and policies that helps in protecting the data
that are stored within the cloud storage.
Document Page
References
Hussein, N.H. and Khalid, A., 2016. A survey of cloud
computing security challenges and
solutions. International Journal of Computer Science and
Information Security, 14(1), p.52.
Ibrahim, A.S., Hamlyn-Harris, J. and Grundy, J., 2016.
Emerging security challenges of cloud virtual
infrastructure. arXiv preprint arXiv:1612.09059.
Rao, R.V. and Selvamani, K., 2015. Data security
challenges and its solutions in cloud
computing. Procedia Computer Science, 48, pp.204-209.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud
computing: implementation, management, and security.
CRC press
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]