cloud computing

cloud computing

  • Submitted By: suhaina
  • Date Submitted: 08/10/2014 5:11 AM
  • Category: Technology
  • Words: 901
  • Page: 4
  • Views: 2

Abstract— Security is considered one of the most critical aspects in everyday computing, and it is no different for cloud computing due to the sensitivity and significance of data stored in the cloud. Cloud computing infrastructures use new technologies and services, most which haven’t been fully evaluated with respect to security. Cloud systems are very economical and useful for businesses of all sizes. It has emerged from a recent study that security, privacy and legal matters represent the main obstacles that are encountered when implementing cloud computing, because the market provides only marginal assurance. The main troubles cloud computing faces are preserving confidentiality and integrity of data in aiding data security. The primaryC solution for these problems is encryption of data stored in the cloud. However, encryption of data also brings up new problems. This paper gives a summary of some of the main problems faced by cloud systems and some solutions.

Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. In cloud computing, the word cloud (also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services such as servers, storage and applications are delivered to an organization's computers and devices through the Internet.Cloud Computing has several major issues and concerns, such as data security, trust and performance issues. Cloud services are very exciting and useful, but have many open security issues.

Limitless Flexibility: With access to millions of different databases, and the ability to combine them into customized services.
Better Reliability and Security: users no longer need to worry about their hardware failure, or hardware being stolen....

Similar Essays