preview

Cloud Computing Security

explanatory Essay
1601 words
1601 words
bookmark

Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.

Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.

Google uses data encryption as a method of ensuring that data stored in its cloud is secured and confidential (Bradley, 2010). GovCloud is a special cloud established by Google for storing government related information and data (Bradley, 2010). Due to the sensitivity of the information stored in GovCloud, Google encrypts the data in such a way that the data is not availab...

... middle of paper ...

...USA: ACM.

IBTimes, (2011). Will iCloud be the Next Target of Hackers? Retrieved from:

http://newyork.ibtimes.com/articles/158777/20110607/apple-icloud-security-hack-threat-

Infosecurity, (2010). Google Assures Customers on Cloud Security Practices. Retrieved from:

http://www.infosecurity-us.com/view/10025/google-assures-customers-on-cloud-

security-practices/

Krutz, R and Vines, D, (2010). Cloud Security: a Comprehensive Guide to secure Cloud

Computing. Indianapolis, Indiana: Wiley Publishing Inc

Vormetric, (2011). Vormetric Data Security for Amazon Web Services: Securing and

Controlling Data in the Cloud. Retrieved from:

http://www.vormetric.com/products/vormetric_data_security_amazon_web_services.html

Wiki.mozilla, (2007). Phishing Protection. Retrieved from:

http://wiki.mozilla.org/Phishing_Protection:

target-sony-amazon-google.htm

In this essay, the author

  • Explains that cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. however, data stored in a cloud is usually prone to hacking and other security issues.
  • Explains that encryption is one of the mitigation measures used to ensure security in cloud computing. however, encrypted data is difficult to search or perform calculations on.
  • Explains that google uses data encryption as a method of ensuring that data stored in its cloud is secured and confidential.
  • Explains that amazon employs the principle of data encryption to ensure data security in its cloud.
  • Explains that physical security at data storage centers is important to ensure that data stored in the cloud is secure and available even in cases of a data center breakdown.
  • Explains that phishing is one of the security issues commonly affecting cloud computing. google has been able to cope with the problem through using fishing detection tools.
  • Explains that google maintains a blacklist of phishing urls to curb attacks in its cloud, especially the firefox search engine.
  • Explains that cloud providers must establish and maintain good risk management procedures and practices. microsoft identifies and reports various vulnerabilities to clients to ensure security for the clients.
  • Explains that microsoft has established remedies for dealing with fraudulent e-mails used for phishing activities. microsoft outlook is equipped with same definition files as those found in vista and windows 7.
  • Explains that microsoft ensures that phishing detection tools are always updated and availed to its clients.
  • Explains that apple's cloud is the most secure because of its vertical nature and closed space. apple advises its clients on appropriate measures against data loss and unintended retrieval.
  • Explains that cloud computing, despite its great achievements, has been limited by security concerns associated with the data stored in the cloud.
  • Explains that cloud computing pioneers are using various mitigation measures against cloud security issues, such as data encryption, phishing detection tools, and security maintenance in storage centers.
  • Cites bradley, t, provos, n, chew, m, & rubin, d. google apps project delays highlight cloud security concerns.
  • Cites acm.ibtimes, measurement of phishing attacks and google assures customers on cloud security practices
  • Cites krutz, r, and vines, d. cloud security: a comprehensive guide to secure cloudcomputing.
Get Access