This website uses cookies to ensure you have the best experience. Learn more

Cloud Security Computing Essay

1737 words - 7 pages

• Situational Analysis
Cloud computing comprise of a disseminated infrastructure made of several interconnected machines whose assets are placed together in a virtual machine (VM) that upholds and controls itself (Marks, 2010). Different from other distributed systems, the architecture of cloud computing is detached from the physical system it depends on. This allows intense flexibility since resources can be removed or added according to real needs.
Even though cloud computing is not a critical breakthrough with respect to technology (most technologies used in this paradigm were already accessible); it has changed the usability of technology in most virtual environments (Pfleeger and Pfleeger, 2007). Another business model has surfaced whereby each resource or application is given as a service, accessible on-demand and payable on a per-usage basis on the Internet.
Another concept in cloud computing is virtualization; a major technology for implementing cloud computing settings (Velte, Velte, and Elsenpeter, 2010). The main objective of virtualization involves polling together various material resources into one virtualized setting through detailed virtualization software, such as Xen and Vmware. The other goal involves creating a sequence of logical or virtual machines using an active selection of resources. Additionally, virtualization allows effective use of obtainable resources. Certainly, this expertise has ensured that the computing reserves allocated to virtual machines are indirectly associated with the fundamental physical infrastructure, although they are instead allocated according to the real requirements of that moment (Subashini and Kavitha, 2011).
Virtualization is an insufficient characteristic of cloud computing; It is also a self-provisioning and automated feature of cloud computing, which differentiates itself from previous technologies in virtualized settings (Marks, 2010). Alternatively, human involvement is not needed in cloud computing since resources can control and re-arrange themselves in accordance to relative and sequential contingencies. Despite the advancement brought forward by technology, cloud computing varied categories namely, IaaS (Infrastructure as a Service), SaaS (Software as a Service), and PaaS (Platform as a Service) are faced with major services that can negatively affect the privacy and integrity of important data (Rittinghouse and Ransome, 2010).

• Statement of the Problem
Cloud Computing: Cloud computing is related to a new model that provides computing infrastructure, which then transfers computing amenities of an on-premise datacenters to distant systems placed on the internet. Cloud computing symbolizes a change away from computation as a commodity, to computation as an amenity that is delivered to clients via the internet from major datacenters or ‘clouds.’ This distant service is a new computing approach that uses the Internet to offer virtualized and scalable resources.
According to...

Find Another Essay On Cloud Security Computing

Cloud Computing Virtualization – A Threat to Security of the System

2040 words - 9 pages The main aim of this paper is to study the concept of cloud computing through virtualization, how security is compromised in cloud computing and how we can secure the system from security breach in case of virtualization. Keywords: cloud computing, Hypervisor, Virtual machine, Virtualization Security. 1. INTRODUCTION Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing

Ensuring Data Security Using Homomorphic Encryption in Cloud Computing

1302 words - 5 pages reversible protocol known as a padding scheme. He then computes the ciphertext c corresponding to C=me( mod n) This can be done quickly using the method of exponentiation by squaring. Bob then transmits c to Alice. Decryption Alice can recover m from c by using her private key exponent d via computing M=cd (mod n) 5. CONCLUSION: The cloud computing security based on Homomorphic encryption, is a new concept of security which enables

the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the information...

3968 words - 16 pages Media has the maximum level of security at every level of management and in each of the information system they use. Employee and customer records must be kept secured so that no one can access it. Example: T-Mobile customers' private details were sold to a rival firm. So, in this case security of data is very important. (www.16) (Laudon, K. Pg. 434-442) CLOUD COMPUTING: Cloud computing is a general term for anything that

What is Cloud Computing?

1335 words - 6 pages prevalent, there are still some security concerns that can keep us worrying. For example, who has access to the data that you submit onto Google’s virtual machines? Do those people have the encryption key? Can you trust Google if they tell you that no one but you has access? Such security concerns can be found in almost any cloud-based product, which is a definite drawback to cloud computing. 4. Summary Paragraph As we enter the “2010s” of the

What´s Cloud Computing?

840 words - 4 pages information within the internal cloud behind the corporate firewall. While the external cloud would hold applications that have fewer security concerns shared on a web platform. An example of hybrid cloud is a company using an external cloud to hold archived data but keep the operational data customer on the internal cloud. Advantages of Cloud computing I researched into the different advantages that cloud computing can bring to both to end users

The Managerial Aspects of Cloud Computing

1093 words - 4 pages Internet-based technologies (Wilshusen, 2010). Cloud computing promises to reduce the cost of IT organizations by utilizing cloud’s economies of scale, which allows organizations to buy the exact amount of computing and storage needed at the exact time they need it (Wilshusen, 2010). Cloud computing has the potential to provide information technology services more quickly and at a lower cost (Wilshusen, 2010). There are also potential security

Introduction to Cloud Computing

1033 words - 5 pages Cloud service providers while some data and operations remain on company machines. This is less cost effective than public networks but provides more control over the data and is less of a security issue. Private networks may be used if data security is more important than cost. Private networks lose most of the cost benefits of Cloud Computing because the company hosts the network on its own hardware, and all processing is done internally. If

Cloud computing software

2192 words - 9 pages to say that many large companies will most likely adopt the hybrid cloud approach (combination of the public and private cloud) and its popularity will be on the increase. (Morrissey, 2014) Improved security and reliability of cloud computing In spite of previous efforts of cloud application provider to secure sensitive data in their secure data centers, major companies have experienced promulgated breeches in security that have cause the services

Security in The Cloud

1724 words - 7 pages Rahul Shah Paper #1 Digital Hardware Basics Security in the cloud Hackers have gotten there way into every technological gadget out there. Something simple as browsing the web can give hackers information about the people’s data. Before Cloud computing, hackers were stealing data from the physical hard drive by implementing a virus that would open a back door and send the data straight to the hacker’s server. As security measure

towards privacy preserving

1073 words - 5 pages some cases depending on the other deployed applications. The security challenges associated with Infrastructure as a Service based cloud computing need to investigate in order to protect data. In this project it represented a distributed reputation based trust management system for inter-cloud computing system. Trust value storage is distributed at the levels of the clouds in the system, which enables each cloud to make independent local

Cloud Computing

1666 words - 7 pages expansion determine what services they need. Though, most organizations acquire IaaS. When this happens, companies surrender their data to the cloud. They are unaware of how their information is kept safe and confidential. All of their operations are dependent on the cloud operations. Cloud computing should not be considered as a significant option for data storage and network infrastructure solutions because of evident security concerns. What

Similar Essays

Cloud Computing Security Essay

1573 words - 6 pages Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the

Security: Cloud Computing Essay

1554 words - 6 pages Now a day even though Cloud services offer flexibility, scalability, there have been proportionate concerns about security. As more data moves from centrally located server storage to the cloud storage. Security is the most important factor related to the cloud computing. As the users can stores his private data on cloud with the help of cloud service providers. Data stored on single cloud is risk of service availability failure due to attacker

Analysis Of Cloud Computing Security

1549 words - 7 pages Cloud computing security or cloud security is a growing sub-domain of network security, computer security and more broadly information security. It refers to a set politics, technologies and controls deployed to protect the data, applications and the associated infrastructure of cloud computing. Cloud computing importance is increasing and gaining scientific attention and industrial communities. Cloud computing is one among the top 10 most

Using Data Encryption For Security In Cloud Computing

2098 words - 8 pages remotely access their information from many different locations and they are saving money not having to invest in the servers. Security and privacy issues are a concern within cloud computing. The introduction of cloud computing has presented some security challenges that many consumers may question. There are a number of possible security issues or risks pertaining to how the data is stored and secured within cloud computing. This research paper