Cloud Computing Security

1601 Words4 Pages

Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.

Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.

Google uses data encryption as a method of ensuring that data stored in its cloud is secured and confidential (Bradley, 2010). GovCloud is a special cloud established by Google for storing government related information and data (Bradley, 2010). Due to the sensitivity of the information stored in GovCloud, Google encrypts the data in such a way that the data is not availab...

... middle of paper ...

...USA: ACM.

IBTimes, (2011). Will iCloud be the Next Target of Hackers? Retrieved from:

http://newyork.ibtimes.com/articles/158777/20110607/apple-icloud-security-hack-threat-

Infosecurity, (2010). Google Assures Customers on Cloud Security Practices. Retrieved from:

http://www.infosecurity-us.com/view/10025/google-assures-customers-on-cloud-

security-practices/

Krutz, R and Vines, D, (2010). Cloud Security: a Comprehensive Guide to secure Cloud

Computing. Indianapolis, Indiana: Wiley Publishing Inc

Vormetric, (2011). Vormetric Data Security for Amazon Web Services: Securing and

Controlling Data in the Cloud. Retrieved from:

http://www.vormetric.com/products/vormetric_data_security_amazon_web_services.html

Wiki.mozilla, (2007). Phishing Protection. Retrieved from:

http://wiki.mozilla.org/Phishing_Protection:

target-sony-amazon-google.htm

Open Document