Monday, September 23, 2019

Cloud based computing security Essay Example | Topics and Well Written Essays - 2000 words

Cloud based computing security - Essay Example ability) , discusses the security challenges that currently face the enterprise when storing data in its own local severs or deploying it the cloud and introduces available solution for these issues . Security is simply protecting data against improper disclosures, modification or destruction; whether these are intentionally or accidentally caused. That is to say, a complete solution to data security issues should meet three basic requirements: confidentiality, integrity and availability. Confidentiality requires that data should be protected from unauthorized individuals or systems . Integrity refers to an assurance in the accuracy of the data. This means preventing of unauthorized or improper data modification or deletions must be engaged. Availability refers to keeping timely access to data and resources by authorized person. It also refers to the protection from malicious data denials making the system no longer available; or the recovery from hardware and software errors. The importance assigned to these requirements significantly depends on the considered environment. For example, in military environments, most attention devoted to the confidently, while integrity is the mo st relevant aspect of commercial environment. In public institutions, such as hospitals and airline companies and credit institutions in which data correction is essential in addition to the privacy constraints, a combination of integrity and confidentiality are needed. Developments in networking technology and an increase in the need of computing resources have encouraged many enterprises to outsource their storage and computing needs. This new model of computing is commonly referred to as â€Å"cloud computing†. Cloud computing is computing which leverages computer resource through the internet. It is defined by the national institute of standards and technology (NIST) as: â€Å"A model for enabling convenient, on-demand network access to shared pool of configurable computing resource

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.