This website uses cookies to ensure you have the best experience. Learn more

Analysis Of Cloud Computing Security

1549 words - 7 pages

Cloud computing security or cloud security is a growing sub-domain of network security, computer security and more broadly information security. It refers to a set politics, technologies and controls deployed to protect the data, applications and the associated infrastructure of cloud computing.
Cloud computing importance is increasing and gaining scientific attention and industrial communities. Cloud computing is one among the top 10 most important technologies and with a better prospect in successful companies and organizations. Cloud computing permit convenient, on-demand network access to a share pool of configurable computing resources that can be rapidly provisioned and released with minimal service and effect provided interaction.
Cloud computing acts as distribution architecture as well as computational paradigm and the main idea of the cloud computing is to provide quick, secure, net computing services and convenient data storage with all computing resources visualized as services and delivered on the internet. Cloud computing binds number of technologies and computing concepts like as Service Oriented Architecture, Virtualization and other similar technologies that dependent on the internet, providing similar business applications online on web browsers to satisfy the needs of the customer while their information and software are stored on the server.
The cloud provides three services to the user, they are
1. Software as a Service (SaaS)
2. Platform as a Service (PaaS)
3. Infrastructure as a Service (Iaas)
1. Software as a Service (SaaS) :
The credentials provided to the user is use to provider’s application running on the cloud infrastructure. The client can access these applications from various client devices through thin client interface like as wed browser.
2. Platform as a Service (PaaS) :
The credentials provided to the user to install onto the cloud infrastructure to use own applications without installing any platform or software on their local machines. PaaS refers to giving platform layer resources that includes operating system support and software development frameworks that are used to construct high-level services.

3. Infrastructure as a Services (IaaS) :
The credentials provided to the user is to provide processing, networks, storage and other fundamental computing resources where the client able to install and arbitrary software which can include operating system and applications.
Cloud computing security issues :
The cloud computing security issue is main concern with Cloud Development Model
Cloud Deployment Model :
In this model platform, storage, networking and software infrastructure are provided as services that grows up and down depending on their demand. The Cloud Computing Model has 3 main deployment model , they are
1. Private Cloud
2. Public Cloud
3. Hybrid Cloud
1. Private Cloud:
The term private cloud new the vendors use to describe that corresponding cloud computing on the...

Find Another Essay On Analysis of Cloud Computing Security

Using Data Encryption for Security in Cloud Computing

2098 words - 8 pages remotely access their information from many different locations and they are saving money not having to invest in the servers. Security and privacy issues are a concern within cloud computing. The introduction of cloud computing has presented some security challenges that many consumers may question. There are a number of possible security issues or risks pertaining to how the data is stored and secured within cloud computing. This research paper

Ensuring Data Security Using Homomorphic Encryption in Cloud Computing

1302 words - 5 pages reversible protocol known as a padding scheme. He then computes the ciphertext c corresponding to C=me( mod n) This can be done quickly using the method of exponentiation by squaring. Bob then transmits c to Alice. Decryption Alice can recover m from c by using her private key exponent d via computing M=cd (mod n) 5. CONCLUSION: The cloud computing security based on Homomorphic encryption, is a new concept of security which enables

the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the information...

3968 words - 16 pages Media has the maximum level of security at every level of management and in each of the information system they use. Employee and customer records must be kept secured so that no one can access it. Example: T-Mobile customers' private details were sold to a rival firm. So, in this case security of data is very important. (www.16) (Laudon, K. Pg. 434-442) CLOUD COMPUTING: Cloud computing is a general term for anything that

Overview of Cloud Computing

2304 words - 9 pages using the network. For instance, Dropbox is one of the cloud computing services where it provides free storage to allow users to save photos, videos, or any documents that users wish to store and at the same time by using cloud computing, users are allow to share them easily. Cloud computing have many useful characteristics despite the usefulness of cloud computing, it also have drawbacks such as the security issues. 1.1 Characteristics There are

History of Cloud Computing

1139 words - 5 pages , organization have the flexibility to host their virtual IT infrastructure in locations allowing the lowest cost. However, with advantages comes disadvantages. The concentration of computing resources and users in a cloud computing environment also characterizes a concentration of security and privacy threats. Because of the size and significance of computing environment, it is regularly under attack by virtual machines and malware. To better security your

The Benefits of Cloud Computing

1423 words - 6 pages matter of minutes. Then there are disadvantages to computing cloud computing. There are technical issues, security issues, and it is prone to attacking. Disadvantages such as technical issues would be that sometimes there is a problem with the system and this can have some serious dysfunctional problems. This technology is always prone to outages and other technical issues, even the best cloud providers run into this problem. The next is security in

The Managerial Aspects of Cloud Computing

1093 words - 4 pages Internet-based technologies (Wilshusen, 2010). Cloud computing promises to reduce the cost of IT organizations by utilizing cloud’s economies of scale, which allows organizations to buy the exact amount of computing and storage needed at the exact time they need it (Wilshusen, 2010). Cloud computing has the potential to provide information technology services more quickly and at a lower cost (Wilshusen, 2010). There are also potential security

Adoption of Cloud Computing relating to Data Storage

2267 words - 9 pages varies when more data is stored; this model gives flexibility but also can be seen as a marketing ploy to increase the sales of cloud data storage. As the user base increases prices may raise however as cloud computing and data storage is in its infancy it may be worth holding back to allow technical issues such as security, back up procedures and compliance to be resolved. Another key driving force of cloud data storage is the ability to use

The Advantages and Disadvantages of using Cloud computing Service

830 words - 3 pages is almost gives unlimited storage capacity, that will give the public and business no more worries about not having enough storage space. Since data is stored in the cloud, backing up and restoring is much easier then storing on a physical device. Most cloud computing service providers usually are skilled enough to handle recovery of information.The disadvantage of cloud computing service is the technical issues, security issues, and that the

5NINE Software: Cloud Security For Hyper-V Analysis

1516 words - 6 pages security. • CSA standards are based on the best practice of the National Institute of Standards and Technology (NIST) Special publication 800-53A and the Cloud Security Alliance (CSA) Security Guidance for Critical Areas of Focus in Cloud Computing v2.1. By meeting these standards, 5NINES is compliant with PCI-DSS, ISO-IEC 27002-2005, COBIT, HISPAA, and NIST SP800-53 requirements. • To ensure 5NINES continues to meet or exceed these best practice

An Analysis of Security Sector Reforms

1845 words - 8 pages A security sector reform sounds like a very academic term and not something that would be seen often in situations. Well, as a boost of knowledge, it is something that has happened in many places around the world making it that one step better. What is a security sector reform you might ask? It is defined as a concept that first emerged in the 1990s in Eastern Europe, it generally refers to a process to reform or rebuild a state's security

Similar Essays

Cloud Security Computing Essay

1737 words - 7 pages • Situational Analysis Cloud computing comprise of a disseminated infrastructure made of several interconnected machines whose assets are placed together in a virtual machine (VM) that upholds and controls itself (Marks, 2010). Different from other distributed systems, the architecture of cloud computing is detached from the physical system it depends on. This allows intense flexibility since resources can be removed or added according to real

Cloud Computing Security Essay

1573 words - 6 pages Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the

Security: Cloud Computing Essay

1554 words - 6 pages Now a day even though Cloud services offer flexibility, scalability, there have been proportionate concerns about security. As more data moves from centrally located server storage to the cloud storage. Security is the most important factor related to the cloud computing. As the users can stores his private data on cloud with the help of cloud service providers. Data stored on single cloud is risk of service availability failure due to attacker

Cloud Computing Virtualization – A Threat To Security Of The System

2040 words - 9 pages The main aim of this paper is to study the concept of cloud computing through virtualization, how security is compromised in cloud computing and how we can secure the system from security breach in case of virtualization. Keywords: cloud computing, Hypervisor, Virtual machine, Virtualization Security. 1. INTRODUCTION Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing