Introduction In the past few years cloud computing has become the latest mainstream technology for individuals and businesses(McDermott, 2009). Cloud defines the use of assembly of services, infrastructure, information and applications which are comprised of pools of network, compute, information and storage assets. The cloud is a centralized shared data storage network that enables an individual or business to be able to store personal data such as: personal files, images and videos etc.(Camp, 2009). It offers the convenience to be able to store personal data in one centralized location and allows easy access to the data even from a remote location by use of user assigned passwords and user login details. This concept may sound straight forward, easy and user friendly but cloud computing poses potential security threats that can possibly put the user’s privacy and security at risk in case another party is able to log in their account, resulting in an unsafe storage of their personal information. Users are assured that their data is safe and won’t be exploited, however the user does not have control where the data is being stored and cannot track precisely how well their data is being protected(McDermott, 2009). In most cases, users just rely on trust and confidence to their storage provider that they can be able to securely store their data and prevent unauthorized persons from accessing the data. This means users are unsure of who and what may be accessing their data and
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
First, when computers or PCs were introduced, they literally took the space of the whole room. They were heavy and bulky but still had many limitations in terms of what can those PC actually do or perform daily human tasks. As PCs have evolved, the new software’s have also evolved. A software that satisfies the needs of sending secure data over the Internet is called cloud computing. With PCs, cloud computing has evolved to another level making it easier and simpler to use and provide others with secure information. One problem that is faced by cloud computing organization is the doubt of it keeping files secured. Security reasons are the main concern for cloud computing since everything is over the Internet. On the other
Services such as, data storage and security, are provided by cloud computing over the internet. In cloud computing, users can pay for what they consume (Bisong & Rahman, An Overview of the Securtiy Concerns in Enterprise Cloud Computing, 2011). Cloud computing is an emerging information technology, which can make it easier for the users to manage their data. Cloud computing allows businesses to expand as new cloud-based models are being discussed and implemented as solutions (Bamiah & Brohi, 2011).
Data breaches and data loss is a severe issue when it comes to cloud computing. Since some or all of the infrastructure is located off site at the cloud services infrastructure, we do not control the overall security of the system. If an attacker gains access to the cloud computing system, even if it is through a different customers account there is a chance that they could gain access to our data that is stored on the cloud services system. These data breaches can expose our customers private data such as names, addresses, and account information. If the cloud company does not properly store credit card numbers it may expose them as well (Babcock, 2014).
Question 1. What is the most appropriate Cloud Deployment model (or combination) for BPI (Public, Private, Community, or Hybrid)?
Cloud technology links remote computers to a network of data servers that contain user data. It serves to increase efficiency in data access, increase user convenience and lower costs. It also has created efficiencies in terms of user hardware requirements necessary to access files and programs in multiple locations. A system designed in only 2006, it has already become a $68 billion global industry, with an anticipated $17 billion per annum growth rate. With such a growth rate, cloud technology is rapidly becoming an increasingly important aspect of individual and corporate data storage. While cloud technology provides an expansive range of possibilities of use for individuals and businesses alike, it has also posed challenges for its effective governance and privacy.
In September, there was breaking news in the American entertainment world – private pictures of Hollywood movie star Jennifer Lawrence and other celebrities were leaked online by hacker who stole the pictures from their Apple’s iCloud. People were shocked by this news, and a debate was generated online on whether cloud technology is safe enough to upload private files. Despite this incident, cloud database can be trusted as a secure space to store information as long as the users have some basic safety awareness.
Cloud computing is an ideas that information in addition programs that may be stowed centrally, in the cloud, as well as gain access to some extent time as of anyplace by means of reedy users plus portable devices. This system lead too many benefits, containing with information ubiquity and give of access (Ryan, 2013). Cloud computing also might improve security, which might be able to invest in more informed technologies in addition training. But, meanwhile cloud computing essentially places information or data separate of the control for the data proprietor, the situation presents challenges as well.
There are clear indications that private data center use may have peaked. Cloud storage faces the same risks as the enterprise network, adding a virtual location that is also vulnerable to hacked APIs, account hijacking, poor key/certificate management and lax authentication. With the cloud/hybrid model as the growing standard, it is critical for companies to secure data and applications in both the physical and virtual locations.
Cloud computing has numerous advantages to businesses today. It enables scalability of services that are delivered over the internet when needed. User data is stored in remote servers that the users do not operate. This brings unprecedented convenience. Although it brings so many advantages and efficiencies, cloud computing results to fears arising from loss of data control. This becomes a hindrance to the wide adoption of the emerging technology. As a way of solving these problems, techniques have been developed to ensure that data held in the remote servers is secure and that it cannot be used to achieve malicious activities targeted against the owner of the data.
This section of paper includes why we need cloud computing as a security control tool against the cyber criminal activities and in how many ways it can be implemented. As we are living in a technical era, many aspects of our lives rely on the Internet and computers, including transportation, communications, government, medicine, finance and education. Consider how much of our personal information is stored either on our own computer or on someone else’s system.
Cloud computing is a type of computing, instead of having local servers or personal devices to handle applications it trusts on sharing computing resources. Cloud data storage has many advantages over local data storage. This paper mainly focuses on security concerned privacy data enhancement in the cloud environment. This would serve as the promising analysis to ken about the reinforcing approach utilized for resolving the privacy issues and the security threats occurred in the cloud resources. This paper describes different problems associated to privacy while saving user’s data on third party service providers, which is more generally called as cloud service. There is a lot of investigation being made to spot out the issues with these cloud service providers and cloud security in general. This would serve as the promising analysis to know about the strengthening approach used for resolving the privacy issues and the security threats occurred in the cloud resources. The Major problem in Cloud Computing is a Data security. Data is accessed anywhere without retaining local copy of data in cloud storage. The data is not secured with others as cloud provider cannot be trusted. Thus, enabling public audibility for cloud storage is of critical importance so that users can resort to a TPA to check the integrity of outsourced data.
Computers and privacy is an ever growing topic of conversation. Technology has advanced so much over the past 10 years it is hard to know how secure files on our computing devices really are. Storage methods like “The Cloud” are used by millions of people every single day to store files like music, images and personal details like bank account details that people simply don’t have the space to hold on their devices but how much do we really know about the cloud? How secure is it, who could gain access to the files and where the physical location that the “Cloud” servers are stored? The cloud gives users the impression that their files are quite literally up in the air, but should we not have more of an idea what the cloud actually is? Many mobile devices such as Apple iPhones are often set up to automatically back up to the cloud so users of the cloud can often be unaware what they are saving to this server.
The cloud is a data storage method that stores information on the iInternet rather than in a secure facility. Cloud data revolutionized the way companies store their information by making it easier to organize files from any location —, not just the office desktop. Suddenly CEO’s could work from Bermuda, having access to every file on the go.
Cloud computing is a topic of which much is assumed. The average person recognizes the term “cloud computing” as having to do with their storage from their iPad or iPhone on the online storage area which syncs their Apple devices to their computer. This common cloud is called the iCloud. That is where common knowledge ends about this topic. However, upon further exploration, a deeper understanding is gained with greater explanation, and it is realized that cloud computing is something that is used all of the time on many levels of everyday technology. While the terminology remains cryptic to the mind of most people, the concepts behind the practical uses of cloud computing become quite clear. It is relatable and understandable. Upon this revelation, the iCloud is recognized as the tip of the preverbal iceberg when speaking about cloud computing. It is important to discuss and further understand the many types of cloud computing as well as the various applications to life through technology. This affects how information is stored online, computers are protected, information is secured, emails are processed, and many other factors that are taken for granted in the world of technology. Cloud computing is a general term used to describe how information is stored, utilized, and accessed over the internet. There is no cloud, but the word cloud gives the connotation of an abstract place which is known to exist but is too vast to touch or contain (Griffith,