Professional Documents
Culture Documents
Outcome : Students will deliver effective oral presentations and demonstrate a command of the English language.
Journal Synthesis
PRELIM
1. Cloud Computing
a. Security Issues and Solutions in Cloud Computing
b. Cloud Computing Challenges and Solutions
c. Secure Cloud Storage
Article 2: Cloud computing and security issues in Based from the research this three articles Ive been
the cloud (2014), the global computing infrastructure is study that the cloud computing is an developing
rapidly moving towards cloud based architecture. computing model which emanates from grid
Recent developments in the field of could computing computing, distributed computing, parallel computing,
have immensely changed the way of computing as well virtualization technology, utility computing and other
as the concept of computing resources. In a cloud based computer technologies and it has more advantage
computing infrastructure, the resources are normally in characters such as sizably voluminous scale
someone else's premise or network and accessed computation and data storage, virtualization, high
remotely by the cloud users (Petre, 2012; Ogigau- expansibility, high reliability and low price
Neamtiu, 2012; Singh & jangwal, 2012). The term cloud accommodation. The security quandary of cloud
computing is rather a concept which is a generalized computing is very consequential and it can obviate the
meaning evolved from distributed and grid computing. rapid development of cloud computing. This paper
Cloud computing is described as the offspring of introduces some cloud computing systems and analyzes
distributed and grid computing by some authors (Che, cloud computing security quandary and its strategy
Duan, Zhang & Fan, 2011). While it is important to take according to the cloud computing concepts and
advantages of deploying it to expand the sectors, the characters. The data privacy and accommodation
security aspects in a cloud computing environment availability in cloud computing are the key security
remains at the core of interest. Cloud services and service quandary. Single security method cannot solve the
providers are being evolved which has resulted in a new cloud computing security quandary and many
business trend based on cloud technology. traditional and incipient technologies and strategies
must be used together for forfending the total cloud
computing system.
In the first article, the security issues involving data, References
application, and virtualization technologies and
solutions to these issues present. Cloud computing [1] Pengfei You, Yuxing Peng, Weidong Liu, and
system, particularly in the public cloud, users' data is Shoufu Xue. Security Issues and Solutions in Cloud
stored and processed. Users cannot control the cloud Computing, National University of Defense
structure that dealing with their data, which cause by Technology, Jiangsu Automation Research Institute,
threats to the data. These security issues about users' data Air Defense Forces Academy, CPLA, Zhengzhou,
are showed: Data Breach, It usually violates the users China, 2012.
security properties of data by integrity and
confidentially. Integrity, it refers to the users protecting
data from the unauthorized modification, fabrication or [2] Monjur Ahmed and Mohammad Ashraf
removal. While the data from unauthorized deletion, Hossain. CLOUD COMPUTING AND SECURITY
modification or fabrication. While the confidentiality ISSUES IN THE CLOUD. Senior Lecturer, Daffodil
refers to the only authorize parties or systems that having Institute of IT, Freelance IT Consultant, Dhaka,
the ability to access the protected data. Bangladesh, 2013.
Second article, tell that the cloud computing is a
global computing infrastructure is speedily moving [3] Mahima Joshi, and Yudhveer Singh Moudgil.
towards cloud based architecture. While the important Secure cloud storage. Computer Science and
advantage of a cloud base computing is to deploy a Engineering Department & Uttaranchal Institute of
diversified sector, the security aspects in a cloud-based Technology, Dehradun, 2011.
computing environment remain at the core of interest.
The security is the most emphasized feature for any form [4] Storage Network Industry Alliance,
of computing, making it an obvious expectation that http://www.snia.org, 2011.
security issues are important for cloud environment as
well. As the cloud computing approach, the associate the [5] P. Mell and T. Grance, The NIST definition of
users' sensitive data stored both at clients' end as well as Cloud Computing, National Institute of Standards
in cloud servers, identity management, and and Technology (NIST),
authentication are very crucial in cloud computing. http://csrc.nist.gov/publications/nistpubs/800-
There is a need for advanced and extended technologies, 145/SP800-145.pdf, 2011.
concepts, and methods that provide a secure server
which leads to a secure cloud.
While in the third article, which the cloud
foundations can approximately categorize by private or
public. In a private cloud, the infrastructure was
managed and owned by the customer and located on
premise. In specific. While in a public cloud
infrastructure is owned and managed by a cloud service
provider and is located on premise. To secure the data
information of an organization by the cloud the used the
Encryption works. Whether the company wants to
protect their documents from potential identity thieves,
files should be locked down in case the company host
access, encrypting them is the only way to make sure
there is the only one with access to them. Another
problem that may arise from using a cloud storage
backup is security. You are essentially passing on
responsibility for the protection of the data to other
people and if these providers are not that careful about
the data that is being stored, it may find the backed up
data compromised. One solution to such an issue is to get
the source to make sure that the data is definitely secure
from security breaches.