Cloud Security Assignment
Cloud Security Assignment
INTRODUCTION
Cloud computing allows the availability of computer system resources in demand that can be
delivered and released rapidly with minimal management effort or interactions between service
providers [ CITATION Kno08 \l 1033 ] [ CITATION Mel11 \l 1033 ]. In simple words, cloud
computing refers to storing and retrieving data and programs over the internet instead of
individuals own computer hard drive [ CITATION Ras19 \l 1033 ]. Cloud computing also allows
users to store their local data in remote data servers and also provides a way to access cloud data
from anywhere using internet [ CITATION Shu10 \l 1033 ].
In 22nd century the demand of cloud computing is still high and will even continue to increase
because of the benefits it provides to its users. Verification or authentication of data integrity at
untrusted servers is the biggest concerns with storage of data in cloud [ CITATION Jia16 \l 1033
] [ CITATION Ras19 \l 1033 ]. Data security in cloud computing is the major concerned to be
addressed nowadays. Data will be in high risk if data security is not provided during data
transmission and operation in cloud [ CITATION Jos19 \l 1033 ]. Security challenges should be
identified and best security measures should be implemented to keep data secure in cloud
[ CITATION Aro13 \l 1033 ].
In simple term, cloud computing refers to internet based computing, where there is on demand
availability of computer system resources, without direct active management by the users (NIST;
[ CITATION Ras19 \l 1033 ]). For an example Google's Gmail. Files and applications hosted by
Google can be accessed by user using Gmail via internet from any devices. GitHub is another
example of cloud-based source code management system. Similarly, DigitalOcean is a cloud-
based infrastructure provider, where developers can deploy and scale their applications. The
architecture of cloud computing is shown below.
Source NIST
1.1.2 Data Security in Cloud
Cloud computing is mainly based on outsourcing of data and applications which was
traditionally stored in on users devices or datacenters they owned [ CITATION Soo14 \l 1033 ].
Today everything is in cloud. Moving to a cloud computing means migrating various levels of
sensitive data to public or hybrid cloud. It means the data of one company is in somewhere else
server to which that company has no control. There is chances of data theft and also threat to
privacy for consumers who uses cloud services. Protecting the company's data is very essential,
so, it is the responsibility of cloud service providers to secure the company's data and also
ensures privacy in cloud [ CITATION Ben15 \l 1033 ].
Data security in cloud refers to a broad set of policies, applications, technologies, and controls
used to protect data of cloud computing[ CITATION Raj09 \l 1033 ]. It is a sub-domain of cloud
computing security. Data can be at risk if an unauthorized person gain access to the resources
shared in cloud and deletes or modifies the data. So, data security has been compulsory on the
cloud service provider.
Cloud storage is becoming popular for the outsourcing of day-to-day management of data, so
integrity monitoring of the data in the cloud is important to escape all possibilities of data
corruption and data crash. The cloud service providers should ensure the user that integrity of
their data is maintained in the cloud. Therefore, it is necessary to find how data integrity in cloud
can be achieved. So this study is of great importance.