109,184 research outputs found

    Development of Cloud Computing and Security Issues

    Get PDF
    In past three decades, the computing world is based on the Internet, featured by the rapid development and application of computer technology. The cloud computing model is one of the very important  shapes of a new era. This technology based on the distributed  computing, parallel computing, grid computing, Virtualization technologies, property- based remote attestation technologies, etc.  The cloud computing market and development are growing rapidly and bringing up numerous challenges and big  security issues of the today's world. Some  issues concern on the cloud computing is  the security and confidentiality of user data in terms of its location, relocation, availability and security. In this paper we will focus on the basic way of cloud computing development, growths and common security issues arising from the usage of cloud services. Keywords: Cloud computing, Security, Saas, Cloud Security, Internet

    Security and Privacy Issues in Cloud Computing

    Full text link
    Cloud computing transforming the way of information technology (IT) for consuming and managing, promising improving cost efficiencies, accelerate innovations, faster time-to-market and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew ex-ponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy issues still pose significant challenges. In this chapter, we describe various service and deployment models of cloud computing and identify major challenges. In particular, we discuss three critical challenges: regulatory, security and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment

    Data Security in Cloud Storage

    Get PDF
    Cloud Computing is a generic term for delivering hosted services over the Internet. It follows a pay-per-use approach. Cloud Computing offers numerous benefits for the enterprises, however, there are also many issues, as with any new paradigm or technology. One of the main issues relate to the security and confidentiality of customer data in terms of its location, relocation, availability and security. From the consumer’s perspective, cloud computing security concerns, especially data security, remain the primary inhibitor for adoption of cloud computing services. This reports outlines the Cloud technology overview, brief explains the delivery and deployment models for data storage security, analysis on data security and discusses the issues relating to data in the Cloud computing across all stages of data life cycle

    Information security management in cloud computing:a case study

    Get PDF
    Abstract. Organizations are quickly adopting cloud computing in their daily operations. As a result, spending’s on cloud security solutions are increasing in conjunction with security threats redirecting to the cloud. Information security is a constant race against evolving security threats and it also needs to advance in order to accommodate the cloud computing adaptation. The aim of this thesis is to investigate the topics and issues that are related to information security management in cloud computing environments. Related information security management issues include risk management, security technology selection, security investment decision-making, employees’ security policy compliance, security policy development, and security training. By interviewing three different types of actors (normal employees, IT security specialists, and security managers) in a large ICT-oriented company, this study attempts to get different viewpoints related with the introduced issues and provide suggestions on how to improve information security management in cloud computing environments. This study contributes to the community by attempting to give a holistic perspective on information security management in the specific setting of cloud computing. Results of the research illustrate how investment decisions directly affect all other covered topics that in turn have an effect on one another, forming effective information security
    corecore