This website uses cookies to ensure you have the best experience. Learn more

Cloud Computing Security Essay

1573 words - 6 pages

Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.

Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
Google uses data encryption as a method of ensuring that data stored in its cloud is secured and confidential (Bradley, 2010). GovCloud is a special cloud established by Google for storing government related information and data (Bradley, 2010). Due to the sensitivity of the information stored in GovCloud, Google encrypts the data in such a way that the data is not available to unintended persons. All data stored in GovCoud is usually stored in United States-based servers and access to it is only by authorized United States citizens (Bradley, 2010).
Amazon also employs the principle of data encryption to ensure data security in its cloud. Vormetric Data Security provides data security in Amazon’s cloud through data encryption (Vormetric, 2011). According to Vormetric (2011), clients using the Amazon computing cloud can control and protect their private data through encryption. Powerful encryption and flexible key management Vormetric offered for Amazon ensures that both structured and unstructured data in Amazon cloud is secure (Vormetric, 2011). As such, clients using Amazon cloud computing can confidently store and search for files and database in the cloud.
Establishment and maintenance of physical security at data storage centers is also important to ensure that data stored in the cloud is secure. Moreover, it is important that data stored in the cloud be protected from accidental loss especially when there is a breakdown of facilities and infrastructure. According to Infosecurity (2010), Google ensures that security is enhanced at data centers to avoid any possible attack and...

Find Another Essay On Cloud Computing Security

Cloud Computing Virtualization – A Threat to Security of the System

2040 words - 9 pages The main aim of this paper is to study the concept of cloud computing through virtualization, how security is compromised in cloud computing and how we can secure the system from security breach in case of virtualization. Keywords: cloud computing, Hypervisor, Virtual machine, Virtualization Security. 1. INTRODUCTION Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing

Ensuring Data Security Using Homomorphic Encryption in Cloud Computing

1302 words - 5 pages reversible protocol known as a padding scheme. He then computes the ciphertext c corresponding to C=me( mod n) This can be done quickly using the method of exponentiation by squaring. Bob then transmits c to Alice. Decryption Alice can recover m from c by using her private key exponent d via computing M=cd (mod n) 5. CONCLUSION: The cloud computing security based on Homomorphic encryption, is a new concept of security which enables

the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the information...

3968 words - 16 pages Media has the maximum level of security at every level of management and in each of the information system they use. Employee and customer records must be kept secured so that no one can access it. Example: T-Mobile customers' private details were sold to a rival firm. So, in this case security of data is very important. (www.16) (Laudon, K. Pg. 434-442) CLOUD COMPUTING: Cloud computing is a general term for anything that

What is Cloud Computing?

1335 words - 6 pages prevalent, there are still some security concerns that can keep us worrying. For example, who has access to the data that you submit onto Google’s virtual machines? Do those people have the encryption key? Can you trust Google if they tell you that no one but you has access? Such security concerns can be found in almost any cloud-based product, which is a definite drawback to cloud computing. 4. Summary Paragraph As we enter the “2010s” of the

What´s Cloud Computing?

840 words - 4 pages information within the internal cloud behind the corporate firewall. While the external cloud would hold applications that have fewer security concerns shared on a web platform. An example of hybrid cloud is a company using an external cloud to hold archived data but keep the operational data customer on the internal cloud. Advantages of Cloud computing I researched into the different advantages that cloud computing can bring to both to end users

The Managerial Aspects of Cloud Computing

1093 words - 4 pages Internet-based technologies (Wilshusen, 2010). Cloud computing promises to reduce the cost of IT organizations by utilizing cloud’s economies of scale, which allows organizations to buy the exact amount of computing and storage needed at the exact time they need it (Wilshusen, 2010). Cloud computing has the potential to provide information technology services more quickly and at a lower cost (Wilshusen, 2010). There are also potential security

Introduction to Cloud Computing

1033 words - 5 pages Cloud service providers while some data and operations remain on company machines. This is less cost effective than public networks but provides more control over the data and is less of a security issue. Private networks may be used if data security is more important than cost. Private networks lose most of the cost benefits of Cloud Computing because the company hosts the network on its own hardware, and all processing is done internally. If

Cloud computing software

2192 words - 9 pages to say that many large companies will most likely adopt the hybrid cloud approach (combination of the public and private cloud) and its popularity will be on the increase. (Morrissey, 2014) Improved security and reliability of cloud computing In spite of previous efforts of cloud application provider to secure sensitive data in their secure data centers, major companies have experienced promulgated breeches in security that have cause the services

Security in The Cloud

1724 words - 7 pages Rahul Shah Paper #1 Digital Hardware Basics Security in the cloud Hackers have gotten there way into every technological gadget out there. Something simple as browsing the web can give hackers information about the people’s data. Before Cloud computing, hackers were stealing data from the physical hard drive by implementing a virus that would open a back door and send the data straight to the hacker’s server. As security measure

towards privacy preserving

1073 words - 5 pages some cases depending on the other deployed applications. The security challenges associated with Infrastructure as a Service based cloud computing need to investigate in order to protect data. In this project it represented a distributed reputation based trust management system for inter-cloud computing system. Trust value storage is distributed at the levels of the clouds in the system, which enables each cloud to make independent local

Cloud Computing

1666 words - 7 pages expansion determine what services they need. Though, most organizations acquire IaaS. When this happens, companies surrender their data to the cloud. They are unaware of how their information is kept safe and confidential. All of their operations are dependent on the cloud operations. Cloud computing should not be considered as a significant option for data storage and network infrastructure solutions because of evident security concerns. What

Similar Essays

Security: Cloud Computing Essay

1554 words - 6 pages Now a day even though Cloud services offer flexibility, scalability, there have been proportionate concerns about security. As more data moves from centrally located server storage to the cloud storage. Security is the most important factor related to the cloud computing. As the users can stores his private data on cloud with the help of cloud service providers. Data stored on single cloud is risk of service availability failure due to attacker

Cloud Security Computing Essay

1737 words - 7 pages required during the maintenance of on-premise structures. Additionally, cloud computing can prospectively remove several support-based problems because physical infrastructure is not involved. Although cloud computing has many benefits, it also raises some issues about the level of security it can generate in an organization (Pfleeger and Pfleeger, 2007). Migration to cloud computing infrastructure has several risks to organization information

Analysis Of Cloud Computing Security

1549 words - 7 pages Cloud computing security or cloud security is a growing sub-domain of network security, computer security and more broadly information security. It refers to a set politics, technologies and controls deployed to protect the data, applications and the associated infrastructure of cloud computing. Cloud computing importance is increasing and gaining scientific attention and industrial communities. Cloud computing is one among the top 10 most

Using Data Encryption For Security In Cloud Computing

2098 words - 8 pages remotely access their information from many different locations and they are saving money not having to invest in the servers. Security and privacy issues are a concern within cloud computing. The introduction of cloud computing has presented some security challenges that many consumers may question. There are a number of possible security issues or risks pertaining to how the data is stored and secured within cloud computing. This research paper