0% found this document useful (0 votes)
46 views

Variables

The document discusses cloud computing and related security and privacy issues. It provides background on cloud computing, describing how it delivers computing resources and applications over the internet. It then discusses three key issues: [1] data security is a significant challenge in cloud computing due to data being distributed across multiple devices; [2] privacy is also a major concern as sensitive personal data is stored remotely; [3] ensuring data integrity is important to prevent unauthorized changes to data stored in the cloud. The document examines various approaches to addressing these security and privacy challenges.

Uploaded by

Ray Mays
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

Variables

The document discusses cloud computing and related security and privacy issues. It provides background on cloud computing, describing how it delivers computing resources and applications over the internet. It then discusses three key issues: [1] data security is a significant challenge in cloud computing due to data being distributed across multiple devices; [2] privacy is also a major concern as sensitive personal data is stored remotely; [3] ensuring data integrity is important to prevent unauthorized changes to data stored in the cloud. The document examines various approaches to addressing these security and privacy challenges.

Uploaded by

Ray Mays
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Running head: CLOUD COMPUTING 1

Cloud computing

By: ABC

Dated:
CLOUD COMPUTING 2

Abstract

In this paper, a discussion will be made on cloud computing. Cloud computing has been

intended as the next generation paradigm in computation. In the cloud computing atmosphere,

both resources and applications have been delivered on-demand of the internet as in the form of

service. Cloud computing has been quite talented for IT implementation, furthermore, there have

still some issues to be solved for personal users and corporations for the storage of data and

organizing application in the cloud computing atmosphere. Most of the presenting cloud services

have been offered by great cloud service companies like Amazon, Google, and IBM. An

information security structure for distributed computing networks has been recommended. The

developers for the most part talked about the security issues identified with cloud information

stockpiling. Dealing with element's permission and rights to explicit endeavor assets guarantees

that important information and administrations are not manhandled, misused, or taken.
CLOUD COMPUTING 3

Introduction

Cloud computing has been intended as the next generation paradigm in computation. In

the cloud computing atmosphere, both resources and applications have been delivered on-

demand of the internet as in the form of service. Cloud has an atmosphere of software and

hardware resources in data centers which offer different services with network or the internet for

the satisfaction of users. Furthermore, the description of cloud computing from the national

institute of standards and technology which has been sanction by cloud computing, suitable on

request network available to a shared pool of configurable computing resources networks,

servers, storage, implementation, and services that could be instantly provisioned and unconfined

with decreased management effort or services giver interaction. As per the description, cloud

computing offers easy on-demand network admission to a shared pool of configurable computing

resources. Whereas, some of the resources denote computing applications, network resources,

and computing frameworks. (Ghorbel & Mahmoud , 2017). The main concern of the users of

cloud computing is related to the privacy and security in cloud computing. This is for the

protection of the data. In case if privacy and security is neglected then the confidential

information of all the users will be at risk. The attacker can get the information by hacking the

system and by exploiting the private data of user from the storage or database.

While cloud computing has also been taken as a new computing prototype that could give

services on demand at a lower cost. As well, three well-known and randomly utilized service

models within the cloud paradigm have software as service. Whereas, in paas, a service giver

simplifies services to the users with essential machines and storage to enhance their business

abilities. Cloud computing is connected to but not similar to network computing. Network

computing participates in different resources composed and controls the resources with the
CLOUD COMPUTING 4

united functioning systems to offer high-performance computing services, while cloud

computing merges storage and computing resource measured by different operating systems to

offer services like large-scale data storage and high-performance computing to users. The

general picture of grid computing has been transformed by cloud computing. While delivery of

data has in the recent way of cloud computing likening with network computing. (Domingo &

Josep, Orio, 2019)

Background

Cloud computing has been quite talented for IT implementation, furthermore, there have

still some issues to be solved for personal users and corporations for the storage of data and

organizing application in the cloud computing atmosphere. One of the most essential limitations

for the acceptance is data, and it has been escorted by problems involving, adherence, trust,

privacy, and legal substances. The role of organization and foundation development has been

adjacent to privacy and security in cloud computing. Cloud computing would sanction services

to be expended simply on demand. Cloud computing has the properties of demand and self-

service, omnipresent network admittance, location self-governing resource combining, usage-

based pricing, and transference of threat. The privacy concerns are increasing for the security of

confidential data from the hackers attack. The new policies are designed to reduce the privacy

disabling systems. The secure process of keeping the data in the cloud is a huge challenge. The

privacy enhancing technologies are designed to secure the data but it depends on the structure

and activities of the cloud.

Cloud Computing

Cloud computing atmosphere offers two fundamental kinds of functions: computing and

data storage. While customers cloud services do not require anything which they could get
CLOUD COMPUTING 5

viability to their data and complete their finish data and complete their computing tasks through

the internet association, during the admittance to the data and computing, the customers did not

even aware of the data and computing where the data have been stored and which machines

perform the computing tasks. The phenomenon of cloud has some applications that depend on

the services from service givers. As per the difference of admission and could be used in private

and public cloud denotes to be the characteristics of the organization and hybrid cloud has the

combination of public and private cloud. Most of the presenting cloud services have been offered

by a great cloud service company like Amazon, Google, and IBM. A private cloud has been

explained as a cloud in which authentic users access the services from the giver. (Arora & Linesh

, 2018). There are five key characteristics of cloud computing including network access, on

demand cell service, resource pooling, measured services , and rapid elastic.

Data security

These merits of cloud computing have involved considerable interests from both the

industrial universe and academic research. Cloud computing technology has recently

transformed the way to business around the globe. Data security has constantly been a significant

problem in IT. While data security becomes specifically serious in cloud computing

surroundings, because data has been dispersed in diverse machines and storage devices involving

attendants, pcs, and different mobile devices such as wireless sensor networks and smartphones.

Furthermore, data security in cloud computing has been more critical than data security in typical

information systems. For the development of cloud computing to be accepted by users and

organizations. The paradigm of cloud computing is changing to manage the data processing well

with the high security. The main concern is the privacy of data processing in cloud computer.

The key characteristics of full cloud computing offers are reduced privacy concern, and it goes to
CLOUD COMPUTING 6

full security system. The key characteristic of cloud computing is the advantage of storing the

data without sharing with the third party. In the privacy report it is determined policy for the

right of owner and the right of those securing the information. Since the privacy issues are

increasingly overwhelming therefore it requires consideration for the confidence. Cloud

computing can be secured by using the standardization work. The best way to secure the data

issue to use a standard development organization mitigation rules along with the privacy

enhancing techniques. However the biggest challenge is to secure the personal information and

to manage it on the cloud.

Data Privacy

An information security structure for distributed computing networks has been

recommended. The developers for the most part talked about the security issues identified with

cloud information stockpiling. Furthermore, there are likewise a few licenses about the

information stockpiling security methods. While some of them give an overview on secure

distributed computing for the basic foundation. A security and protection system for RFID in

distributed computing was proposed for RFID innovation coordinated to the distributed

computing, which will consolidate the distributed computing with the Internet of Things. (Wang

& Jiyuan , 2018)

Data Integrity

Data integration trustworthiness is perhaps the most basic component in any data

framework. For the most part, information trustworthiness implies shielding information from

unapproved erasure, alteration, or creation. Dealing with element's permission and rights to

explicit endeavor assets guarantees that important information and administrations are not

manhandled, misused, or taken. Data integration, trustworthiness is handily accomplished in an


CLOUD COMPUTING 7

independent framework with a solitary data set. Information trustworthiness in the independent

framework is kept up utilizing data set imperatives and exchanges, which is normally wrapped

up by a data set administration framework (DBMS). Exchanges ought to follow ACID

(atomicity, consistency, separation, and toughness) properties to guarantee information

respectability. Most information bases support ACID exchanges and can save information

honesty. (Youliang , 2019)

Equipment to avoid the adoption of Cloud Computing

Between the obstacles which might avoid or delay the adoption of cloud computing by

enterprises have the following

Internal Resistance: cloud computing has the benefit of decreasing the number of

management tasks which hold out on back-end IT system. Significantly, it will create the staff of

the firm to work more on visible-end applications. For this, reason it might attain an in the form

of an essential decrease in the size of IT department members. Though a specialist in the IT

department in an enterprise might observe cloud computing as a risk. Such entities might be

afraid of losing their job or their control of the key system. Security and privacy challenges:

the security and privacy problem linked with cloud computing have serious anxieties for

different companies. Whereas from the glass-half-empty viewpoint, some firms take security

challenges as hurdles that can not be detached neither has there an efficient solution to address

them. Such kind of firm did not take into account the benefits of adopting technology.

Reliability and Trust: whereas, cloud outages experienced by their developers like Amazon and

Google have been well documented and exposed. This has disheartened possible companies who

had been believing in moving within the cloud atmosphere. Cloud computing has a trust-based

technology where a decline of trust constrains their acceptances. (Wakrime, 2017)


CLOUD COMPUTING 8

Conclusion

It is concluded that Cloud has an atmosphere of software and hardware resources in data

centers that offer different services with network or the internet for the satisfaction of users.

Furthermore, the description of cloud computing from the national institute of standards and

technology has been sanction by cloud computing. The role of organization and foundation

development has been adjacent to privacy and security in cloud computing. Cloud computing

would sanction services to be expended simply on demand. Cloud computing would sanction

services to be expended simply on demand. Cloud computing has the properties of demand and

self-service, omnipresent network admittance, location self-governing resource combining,

usage-based pricing, and transference of threat.

As it is concluded that Data integration trustworthiness is perhaps the most basic

component in any data framework. For the most part, information trustworthiness implies

shielding information from unapproved erasure, alteration, or creation. Cloud computing has the

benefit of decreasing the number of management tasks which hold out on back-end IT system.

Significantly, it will create the staff of the firm to work more on visible-end applications. A

security and protection system for RFID in distributed computing was proposed for RFID

innovation coordinated to the distributed computing, which will consolidate the distributed

computing with the Internet of Things.

References

Arora, A., & Linesh, R. (2018). Data centric security approach: A way to achieve security &

privacy in cloud computing. " In Proceedings of 3rd International Conference on

Internet of Things and Connected Technologies, 26-27.


CLOUD COMPUTING 9

Domingo, F., & Josep, Orio, F. (2019). Privacy-preserving cloud computing on sensitive data: A

survey of methods, products and challenges. Computer Communications , 38-60.

Ghorbel, A., & Mahmoud , G. (2017). Privacy in cloud computing environments: a survey and

research challenges." . The Journal of Supercomputing, 2763-2800.

Wakrime, A. (2017). Satisfiability-based privacy-aware cloud computing. The Computer

Journal , 1760-1769.

Wang, T., & Jiyuan , Z. (2018). A three-layer privacy preserving cloud storage scheme based on

computational intelligence in fog computing. IEEE Transactions on Emerging Topics in

Computational Intelligence , 3-12.

Youliang , T. (2019). Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in

Cloud Computing. Access , 131534-131542.


CLOUD COMPUTING 10

You might also like