Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
Google uses data encryption as a method of ensuring that data stored in its cloud is secured and confidential (Bradley, 2010). GovCloud is a special cloud established by Google for storing government related information and data (Bradley, 2010). Due to the sensitivity of the information stored in GovCloud, Google encrypts the data in such a way that the data is not availab...
... middle of paper ...
...USA: ACM.
IBTimes, (2011). Will iCloud be the Next Target of Hackers? Retrieved from:
http://newyork.ibtimes.com/articles/158777/20110607/apple-icloud-security-hack-threat-
Infosecurity, (2010). Google Assures Customers on Cloud Security Practices. Retrieved from:
http://www.infosecurity-us.com/view/10025/google-assures-customers-on-cloud-
security-practices/
Krutz, R and Vines, D, (2010). Cloud Security: a Comprehensive Guide to secure Cloud
Computing. Indianapolis, Indiana: Wiley Publishing Inc
Vormetric, (2011). Vormetric Data Security for Amazon Web Services: Securing and
Controlling Data in the Cloud. Retrieved from:
http://www.vormetric.com/products/vormetric_data_security_amazon_web_services.html
Wiki.mozilla, (2007). Phishing Protection. Retrieved from:
http://wiki.mozilla.org/Phishing_Protection:
target-sony-amazon-google.htm
We now accept the sharing and digital storage of our personal information as a necessary evil. We continue to incorporate, into our lives, technology that uses this data. Microsoft and Google are envisioning and developing ways to commercialize the use of even more of our stored personal information.
Homomorphic Encryption allows access to highly scalable, inexpensive, on-demand computing resources that can execute the code and store the data that are provided to them. This aspect, known as data outsourced computation is very attractive, as it alleviates most of the burden on IT services from the consumer. Nevertheless, the adoption of data outsourced computation by business has a major obstacle, since the data owner does not want to allow the un trusted cloud provider to have access to the data being outsourced. Merely encrypting the data prior to storing it on the cloud is not a viable solution, since encrypted data cannot be further manipulated. This means that if the data owner would like to search for particular information, then the data would need to be retrieved and decrypted a very costly operation, which limits the usability of the cloud to merely be used as a data storage centre.
In the rapidly developing field of computer science, there is no more controversial issue than encryption. Encryption has become a highly contested issue with the broad use of global networks including the Internet. As more and more sensitive documents are being placed on computer networks, and trusted information is being sent from computer to computer throughout the world, the need for encryption has never been greater. However, the effects of encryption on our lifestyle and the government's role in encryption has been (and will continue to be) debated for years to come.
What concerns the government of the United States most is the security of the critical infrastructure from the cyber threats. The nation is depending heavily on the technology in most of its critical sectors to keep it up and running. Thus, this makes its more vulnerable to cyber-attacks from outsiders and insiders. Therefore, its protection must be a priority.
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
Political, economic, and technological are three factors of the external environment that Google must identify with doing an external analysis. Political factor can profit Googles growth through different markets. Chinese’s and US government placed an obstacle for any growth that Google had in these markets. According to Google 2009, “They viewed Google as a monopoly and request authority to monitor its activities. The pressure of the government provides additional problems with copyright and privacy issues. As the technology expands, it offers more problems for Google. “New...
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
Public cloud computing reduces infrastructure requirements for small business customers and creates a smaller technology profile which reduces maintenance requirements for the small business while simultaneously giving hackers less targets to hit. Software,...
This report will describe the history of government regulations and FTC. How that applied to Google search and personal privacy. The changes made from the settlement between Google and the FTC, the difference Google's practices and policies from before the settlement and after the settlement, and the current demands and expectations from current and vocal Google users. The report will also draw a conclusion from the findings and will determine if additional regulations are needed or if the regulations currently in place are sufficient.
The second characteristic of cloud computing is resource pooling. A computer company such as Google can own a powerful computer such as the mainframe or cluster of those and “rent” processing power and/or storage space to people or companies that may not have the infrastructure or may need to supplement their existing infrastructure. These customers can use the storage space to store files when their own hard drives have been filled up or use as a server for running programs.
In a society where technology is prevalent and integrated in our daily lives, it is absolutely critical that we keep it as secure as possible. However, there are criminals and companies out there who intend to steal and sell our data, identity, and even our lives by interfering with our technology. Securing our national computer infrastructure isn’t a simple solution or two-step process. Instead, it is something that would require a lot of work, time, commitment, and technology innovations and advancements. With the right technology, security, and ethics training, we could make our computer infrastructure miles safer and more secure than it is right now.
In Today’s world, with the increasing popularity of several types of internet and communication technologies more information is transmitted over the network, due to which the security of the content being transmitted becomes one of the important issue which should be taken into consideration. The content being transmitted may be digital data, images, text, etc. So to prevent this digital data to be interfered and forged by unauthorized parties is one of the most critical demands in computer’ era. The sender on the network should have to take the security issues into consideration specially when transmitting the secret information before enjoying the services provided by the interne. So in order to provide security mechanism, the technique used is the cryptography. Cryptography is a art of protecting information by encrypting it into the unreadable format i.e. the cipher text. It is the technique of secure transmission in the presence of third parties and is employed in protecting integrity or secrecy of electronic messages by converting them into unreadable (cipher text) form More g...
As aforementioned, in recent years the internet has increased popularity and with that comes some concerns in laws regarding the cloud. Few laws have been created to protect the users of the internet from non consensual use of personal information. “Usually the only legal precedents restricting a company is its own privacy policy but most companies give you a sense of protection without any legality behind it,”(2013, CQ Researcher, Big data and privacy). This is a problem because with no laws or policies protecting the private internet user companies will be able to do what they want with the information and nothing will stop them.
We live our lives through our cell phones and handheld devices which makes every moment of your life able to be put on display in real time. One of the newest products to enter the realm of sharing every moment is the Google Glass. Google Glass is a wearable computer with an optical head-mounted display that is developed by Google. Google Glass displays information in a Smartphone-like hands-free format that can communicate with the Internet via natural language voice commands. This pair or glasses basically conveys all information you see with your eye to a Google cloud where it is stored. Such data, knowingly and unknowingly, collected and bandwidth pe...
According to www.washingtonpost.com, “A government can also subpoena data from Google, which doesn’t require a judge’s approval—but they can’t subpoena the actual content of their searches or emailsâ€