Saturday, June 15, 2019

Cloud Security and Privacy Issues Research Paper

Cloud Security and Privacy Issues - Research Paper sheathThe purpose of this literature review is to dodging some of the important security aspects which are discussed in other researches. These days the use of cloud computing has break an attractive trend. Many organizations at the present use clouds to manage their business operations. However, there are several security issues attached with cloud computing. Cloud computing is an up-and-coming paradigm, which guarantees to make the utility computing model broadly implemented by using Virtualization technologies. Additionally, an increasing number of business organizations defecate begun offering and utilizing cloud-enabled architectures and services. On the other hand, the progression of cloud computing creates a number of new challenges to existing techniques and approaches to build up and change software intensive systems. In this scenario, outline a number of security issues in a cloud computing environment. These problems and issues comprise physical security, data security, middleware safety, application security and network security. However, the key name and address is to effectively store and administer data that is not managed by the owner of the data. In addition, the previous researches have focused on specific areas and aspects of cloud computing. Especially, those researches have assessed such issues in a bottom-up approach to security where we are operating on little issues in the cloud computing arrangement that we trust will resolve the bigger issues and complexities of cloud security (Hamlen, Kantarcioglu, Khan, & Thuraisingham, 2010). Initially, they have shown that how can we protect data, information and documents that can be published by a third party organization. After that, they have shown that how to protect co-processors and how they can be utilized to improve security. This research lastly discussed how XACML can be established in the Hadoop glory and in protected federated

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.