Cloud based computing security - Essay Example

Comments (0) Cite this document
Many enterprises rely on database systems for day-to-day operations and decision making; as such, the security of data managed by these systems becomes critical. Misuse or damage of data can affect not only a single user; it may have devastating consequences on the entire…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Cloud based computing security
Read TextPreview

Extract of sample "Cloud based computing security"

Download file to see previous pages ability) , discusses the security challenges that currently face the enterprise when storing data in its own local severs or deploying it the cloud and introduces available solution for these issues .
Security is simply protecting data against improper disclosures, modification or destruction; whether these are intentionally or accidentally caused. That is to say, a complete solution to data security issues should meet three basic requirements: confidentiality, integrity and availability. Confidentiality requires that data should be protected from unauthorized individuals or systems . Integrity refers to an assurance in the accuracy of the data. This means preventing of unauthorized or improper data modification or deletions must be engaged. Availability refers to keeping timely access to data and resources by authorized person. It also refers to the protection from malicious data denials making the system no longer available; or the recovery from hardware and software errors. The importance assigned to these requirements significantly depends on the considered environment. For example, in military environments, most attention devoted to the confidently, while integrity is the most relevant aspect of commercial environment. In public institutions, such as hospitals and airline companies and credit institutions in which data correction is essential in addition to the privacy constraints, a combination of integrity and confidentiality are needed.
Developments in networking technology and an increase in the need of computing resources have encouraged many enterprises to outsource their storage and computing needs. This new model of computing is commonly referred to as “cloud computing”. Cloud computing is computing which leverages computer resource through the internet. It is defined by the national institute of standards and technology (NIST) as: “A model for enabling convenient, on-demand network access to shared pool of configurable computing resource ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Cloud based computing security Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Cloud based computing security Essay Example | Topics and Well Written Essays - 2000 words. Retrieved from
(Cloud Based Computing Security Essay Example | Topics and Well Written Essays - 2000 Words)
Cloud Based Computing Security Essay Example | Topics and Well Written Essays - 2000 Words.
“Cloud Based Computing Security Essay Example | Topics and Well Written Essays - 2000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cloud based computing security

Cloud Computing and Security Issues

...on performance, costumer confidence about this service, security issues in large distributed systems and security concerns and software licensing issues. 2.2 Cloud Computing - Concepts and Definitions Cloud Computing is a new technology, which is delivered as a computing service rather than a product in this modern technology driven market (Bernstein et al, 2009; Davies, 2009). Several definitions can be derived for the term “Cloud Computingbased on who is using it and where is it being deployed for what purpose. Basically, Cloud...
51 Pages(12750 words)Dissertation

Cloud Computing

.... Gilliam, L., 2010. Cloud Computing, Principles, Systems And Applications, New York: Springer. Hurwitz, J., Bloor, R., Kaufman, M. & Halper, F., 2009. Cloud Computing For Dummies, New York: John Wiley & Sons. Miller, M., 2008. Cloud Computing, Web-Based Application That Change The Way You Work And Collaborate Online, California: Que Publishing. Miller, M., 2008. Journal of Strategic Information Systems; European Journal of Information System, London: Harvard University Press. Rittinghouse, J.W. & Ransome J. F., 2009. Cloud Computing, Implementation, Management And...
9 Pages(2250 words)Assignment

Cloud computing

...a user-friendly interface to perform and manage functions related to the cloud. These functions may include creation and deletion of virtual machines, allocation and balancing of load, modification of resources including connections, accounting, security etc. The technical difference in the usage of network resources under the contexts of HPC and Cloud Computing poses another issue that hinders the exploitation of cloud for HPC. The computational requirements of HPC paradigm are usually fulfilled through assimilating the dispersed results computed under rigorous computational procedures via software...
4 Pages(1000 words)Thesis

Cloud Computing

...that are developed specifically for the individual companies can be run over a cloud computing system. b. Different to regular software Some of the differences of cloud to a regular software are that cloud computing offers scalable software and infrastructure offsite that results in saving of the costs related to labor, power, and hardware. Financially, the virtual resources of the cloud are usually cost effective as compared to the dedicated physical resources that are connected to a network or a personal computer. 3. Agreeability with current configurations a. Compatibility b. Network protocol 4. Testing a. Differences...
10 Pages(2500 words)Research Paper

Cloud Computing and Security

...Cloud Computing and Security In the last few years, the paradigm of cloud computing has evolved from a talented business idea to one of the rapidly developing tools of information technology all over the world. Additionally, with its talent to offer users animatedly extendable and collective business resources over the web based technology like internet cloud computing prevents from large level business expenses. In addition, cloud computing guarantees to modernize the future of business as well as corporate computing environment extensively. At the...
7 Pages(1750 words)Term Paper

Security Concerns in Cloud Computing

...? Full Paper Introduction Cloud computing is considered to be a value driven technology, as it saves cost along with advanced virtualization of business functions that is globally accessible. Organizations consider it a cost effective tools, as the requirement of maintaining a complex technology infrastructure along with resources is not essential. Likewise, risk factors are also been considered, as the risk, mentioned in the underpinning contract is now owned by a third party i.e. cloud computing vendors. Martin Sandler, who is a director of HP systems security Lab says, “People often think of virtualization as adding to security...
5 Pages(1250 words)Research Paper

Cloud Computing Security

..., making use of cheap, simply available tools to launch application-layer based security attacks. In this scenario, a main cause they have been successful is that corporation data center because cloud operators are not effectively equipped to defend beside them. Given below are some of the well-known security issues that can minimize the effectiveness of cloud computing (Burns; Jansen; Bruening and Treacy). Denial of Service (DoS) attacks Loss of confidential data Managing complexity and risk Downtime due to a cloud outage Employee ‘personal clouds’ Lack of visibility Changes in governance and operations...
5 Pages(1250 words)Dissertation

Cloud Computing Security

...? Cloud Computing Security Cloud Computing Security Introduction The rising cost of computing resources has been a matter of concerns for many organizations whether large, medium, or small. As a result, many organizations are struggling to adopt a cost effective computing resources for their business applications. In this regard, many organizations have moved towards adoption cloud-computing concept in their business environment in a bid to reduce cost. Iyer and Henderson (2010) define cloud computing as a collection of information...
4 Pages(1000 words)Essay

Cloud computing risks & security concerns the public; community, shared by organisation; hybrid, bringing together multiple clouds between which application and data portability could occur; and partner, offered to a limited and definite number of parties (Pearson & Yee 2013). With cloud computing, organisations do not have to invest in physical infrastructure. Instead, they contract computing services based on demand. This therefore presents immense benefits and cost savings to organisations. For this reason, over 33% of UK companies compute in the cloud (Buyya, Broberg & Goscinski 2011). However, the technology has aroused numerous risk and...
12 Pages(3000 words)Essay

Cloud Computing Security Policy

...Cloud Computing Security Policy for SNPO-MC Cloud Computing Security Policy for SNPO-MC Purpose The policy outlines the security practices and processes for using cloud services in the daily operations, data manipulation and storage and use of applications at SNPO-MC organization. Scope The policy will be used by managers, executive, staff and as a guide to negotiating terms with cloud providers. Definitions Employees of the organization are people who work in the organization. Executives who are on the loan are referred to as loaned staff members, and they usually telework for the...
5 Pages(1250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Cloud based computing security for FREE!

Contact Us