Many clients worry about their susceptibility to attack if their businesses ' crucial IT resources and information
According to Winkler [1], public cloud is based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. The main benefits of using public cloud services include: Easy and inexpensive setup. Scalability to meet needs. No resource wastage. The term "public cloud" was invented to differentiate between the standard model and the private cloud, which is a proprietary network or data center that uses cloud-computing technologies, such as virtualization. Examples of public clouds include Amazon Elastic Compute Cloud [2], IBM's Blue Cloud, and Sun Cloud. Despite of the advantages it also has some faults in its infrastructure. With the customer being unaware of their data storage over the internet, the problem is mainly the security and storage of client's data. In the paper the faults on security of their data storage and it's privacy is reviewed. It also includes in it conducted experiment and statistical analysis using ubuntu simulation. The paper identifies the faults and proposes solutions to combat the identified problems.
Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved is through effective enhancement and management of data security and privacy in clouds. This research paper analyzes the privacy and protection of data in cloud computing through all data lifecycle stages providing an overall perspective of cloud computing while highlighting key security issues and concerns which should be addressed. It also discusses several current solutions and further proposes more solutions which can enhance the privacy and security of data in clouds. Finally, the research paper describes future research work on the protection of data privacy and security in clouds.
Recently the topic of Cloud Computing use is considered to be a burning issue as this notion is rather new and still not studied enough. Therefore, its advantages and disadvantages are currently discussed by the specialists. According to the definition, Cloud Computing is "a model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic device has access to the web. The vital requirements include networking infrastructure that is physically available. The internet and the evolution that has taken place in the internet are also recognized as a major source and driving force behind the growth of cloud computing. End devices that are constantly evolving e.g. mobile, laptops, desktops are also recognized as essential in the support of cloud computing as a service. The problem is mainly the security and storage of client's data. In the paper the faults on security of their data storage and it's privacy is reviewed. It also includes in it conducted experiment and statistical analysis using ubuntu simulation. and CloudSim The paper identifies and evaluation the faults and proposes solutions to combat the identified problems.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.