This website uses cookies to ensure you have the best experience. Learn more

Security: Cloud Computing Essay

1554 words - 6 pages

Now a day even though Cloud services offer flexibility, scalability, there have been proportionate concerns about security. As more data moves from centrally located server storage to the cloud storage. Security is the most important factor related to the cloud computing. As the users can stores his private data on cloud with the help of cloud service providers. Data stored on single cloud is risk of service availability failure due to attacker enters in single cloud.
Our approach is to movement towards multi-clouds that is data stored on multi-cloud service providers. In this system we propose a secured cost-effective multi-cloud storage (SCMCS) model in cloud computing in which holds an economical distribution of data among the available cloud service provider (SP) in the market, instead of single cloud to provide customers with data availability as well as security. This work aims to encourage the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user. Our proposed model provides a better security for customer’s data according to their available budgets from that they can choose cloud service provider.

Keywords: Cloud Networks , Service provider ,Multi- Cloud Storage ,Security, Cloud Services, Cloud Computing.
1. INTRODUCTION
Cloud computing is nothing but rate server and internet based model .A huge amount of data being retrieved from geographically distributed data sources and non localized data handling requirements. The industrial information technology towards a subscription based or pay-per-use service business model known as cloud computing. One of the advantage of cloud computing is cloud data storage, in which users do not have to store his own data on their own servers [1], where instead their data will be stored on the cloud service provider’s servers. For that reason users have to pay the service charge to service provider for this storage service. This service does not provide only flexibility and scalability for the data storage it also provides customers with the benefit of paying a charge only amount of data they need to store for particular time.
To access this cloud services security and reliability we are using different modules like: 1) Using single cloud service provider. 2) Using multiple cloud service providers. The drawback of single cloud service provider is that it can be easily hacked by any attacker. In multiple cloud service provider model gives better security and availability of user private data.


Fig 1: Cloud Computing Architecture Example

Data integrity and privacy of the data are the most critical issues in cloud storage. For that reason cloud service provider have standard techniques and hybrid model [4][3][5]. In this work we provide better privacy and availability of user’s data can be achieved by dividing into block of data pieces and distributing them among the cloud service provider’s in such way that for retrieving original...

Find Another Essay On Security: Cloud Computing

Cloud Computing Virtualization – A Threat to Security of the System

2040 words - 9 pages The main aim of this paper is to study the concept of cloud computing through virtualization, how security is compromised in cloud computing and how we can secure the system from security breach in case of virtualization. Keywords: cloud computing, Hypervisor, Virtual machine, Virtualization Security. 1. INTRODUCTION Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing

Ensuring Data Security Using Homomorphic Encryption in Cloud Computing

1302 words - 5 pages reversible protocol known as a padding scheme. He then computes the ciphertext c corresponding to C=me( mod n) This can be done quickly using the method of exponentiation by squaring. Bob then transmits c to Alice. Decryption Alice can recover m from c by using her private key exponent d via computing M=cd (mod n) 5. CONCLUSION: The cloud computing security based on Homomorphic encryption, is a new concept of security which enables

the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the information...

3968 words - 16 pages Media has the maximum level of security at every level of management and in each of the information system they use. Employee and customer records must be kept secured so that no one can access it. Example: T-Mobile customers' private details were sold to a rival firm. So, in this case security of data is very important. (www.16) (Laudon, K. Pg. 434-442) CLOUD COMPUTING: Cloud computing is a general term for anything that

What is Cloud Computing?

1335 words - 6 pages prevalent, there are still some security concerns that can keep us worrying. For example, who has access to the data that you submit onto Google’s virtual machines? Do those people have the encryption key? Can you trust Google if they tell you that no one but you has access? Such security concerns can be found in almost any cloud-based product, which is a definite drawback to cloud computing. 4. Summary Paragraph As we enter the “2010s” of the

What´s Cloud Computing?

840 words - 4 pages information within the internal cloud behind the corporate firewall. While the external cloud would hold applications that have fewer security concerns shared on a web platform. An example of hybrid cloud is a company using an external cloud to hold archived data but keep the operational data customer on the internal cloud. Advantages of Cloud computing I researched into the different advantages that cloud computing can bring to both to end users

The Managerial Aspects of Cloud Computing

1093 words - 4 pages Internet-based technologies (Wilshusen, 2010). Cloud computing promises to reduce the cost of IT organizations by utilizing cloud’s economies of scale, which allows organizations to buy the exact amount of computing and storage needed at the exact time they need it (Wilshusen, 2010). Cloud computing has the potential to provide information technology services more quickly and at a lower cost (Wilshusen, 2010). There are also potential security

Introduction to Cloud Computing

1033 words - 5 pages Cloud service providers while some data and operations remain on company machines. This is less cost effective than public networks but provides more control over the data and is less of a security issue. Private networks may be used if data security is more important than cost. Private networks lose most of the cost benefits of Cloud Computing because the company hosts the network on its own hardware, and all processing is done internally. If

Cloud computing software

2192 words - 9 pages to say that many large companies will most likely adopt the hybrid cloud approach (combination of the public and private cloud) and its popularity will be on the increase. (Morrissey, 2014) Improved security and reliability of cloud computing In spite of previous efforts of cloud application provider to secure sensitive data in their secure data centers, major companies have experienced promulgated breeches in security that have cause the services

Security in The Cloud

1724 words - 7 pages Rahul Shah Paper #1 Digital Hardware Basics Security in the cloud Hackers have gotten there way into every technological gadget out there. Something simple as browsing the web can give hackers information about the people’s data. Before Cloud computing, hackers were stealing data from the physical hard drive by implementing a virus that would open a back door and send the data straight to the hacker’s server. As security measure

towards privacy preserving

1073 words - 5 pages some cases depending on the other deployed applications. The security challenges associated with Infrastructure as a Service based cloud computing need to investigate in order to protect data. In this project it represented a distributed reputation based trust management system for inter-cloud computing system. Trust value storage is distributed at the levels of the clouds in the system, which enables each cloud to make independent local

Cloud Computing

1666 words - 7 pages expansion determine what services they need. Though, most organizations acquire IaaS. When this happens, companies surrender their data to the cloud. They are unaware of how their information is kept safe and confidential. All of their operations are dependent on the cloud operations. Cloud computing should not be considered as a significant option for data storage and network infrastructure solutions because of evident security concerns. What

Similar Essays

Cloud Computing Security Essay

1573 words - 6 pages Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the

Cloud Security Computing Essay

1737 words - 7 pages required during the maintenance of on-premise structures. Additionally, cloud computing can prospectively remove several support-based problems because physical infrastructure is not involved. Although cloud computing has many benefits, it also raises some issues about the level of security it can generate in an organization (Pfleeger and Pfleeger, 2007). Migration to cloud computing infrastructure has several risks to organization information

Analysis Of Cloud Computing Security

1549 words - 7 pages Cloud computing security or cloud security is a growing sub-domain of network security, computer security and more broadly information security. It refers to a set politics, technologies and controls deployed to protect the data, applications and the associated infrastructure of cloud computing. Cloud computing importance is increasing and gaining scientific attention and industrial communities. Cloud computing is one among the top 10 most

Using Data Encryption For Security In Cloud Computing

2098 words - 8 pages remotely access their information from many different locations and they are saving money not having to invest in the servers. Security and privacy issues are a concern within cloud computing. The introduction of cloud computing has presented some security challenges that many consumers may question. There are a number of possible security issues or risks pertaining to how the data is stored and secured within cloud computing. This research paper