Thursday, January 2, 2020

Cloud Computing Security And Security - 1432 Words

Cloud Computing is a new computing model where data can be stored in the cloud environment can be accessed from anywhere-anytime due to the distributed architecture of cloud environment [1]. Many companies provide the cloud computing platforms such as Google, Amazon, IBM, Microsoft, and VMware. The use of the cloud computing is increased a lot in the real world as it effective and efficiency in the developing the applications and also as the resources are easily available on cloud which decreases the cost in purchasing and maintain the infrastructure [2]. Both Privacy and Security are crucial in the cloud computing environment and single traditional security mechanism are not enough for the complete cloud system so here in this†¦show more content†¦Data Breach: A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. It can be also called as the data leakage, disclosure of information by the attacker or un- authorized user. In the year 2009 Google documents suffered serious leakage of the user private information. 2. Data Loss: Data loss is an error condition in information systems in which information is destroyed by failures or neglect in storage, transmission, or processing. Information systems implement backup and disaster recovery equipment and processes to prevent data loss or restore lost data. In December 2013, Target Corporation announced that data from around 40 million credit and debit cards was stolen 3. Account Hijacking: Account Hijacking is carried out using the stolen credentials it includes the techniques such as phishing and exploitation of software vulnerabilities. In October 2013, Adobe Systems suffers from their corporate database was hacked data got leaked .It is estimated about 130 millions client records was stolen. 4. Ins ecur e AP I’s: Customer manages and interacts with the cloud services through the interfaces providers must ensure that the security is integrated in to their service models, while user must be aware of security risks in the use, Implementation, management monitoring

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.