Danh mục

A study on cloud computing security

Số trang: 15      Loại file: pdf      Dung lượng: 0.00 B      Lượt xem: 254      Lượt tải: 0    
tailieu_vip

Xem trước 2 trang đầu tiên của tài liệu này:

Thông tin tài liệu:

Cloud computing security is an extensive field of research with various concerns in many aspects. While the benefits of cloud computing and cloud services are easily noticeable, the privacy and security problems of this technology has always been concentrated on. This paper aim to identify the security issues and their solutions in using cloud computing services. And this would serve as a reference for anyone in need of an overview on the risks factors and possible solutions in a cloud environment.
Nội dung trích xuất từ tài liệu:
A study on cloud computing security A STUDY ON CLOUD COMPUTING SECURITY SVTH: Đỗ Chí Bằng, Nguyễn Thị Ninh Thuận GVHD: ThS Hoàng Thị Kiều Hoa Tóm tắt - Bảo mật điện toán đám mây là một lĩnh vực nghiên cứu sâu rộng với nhiều mối quan tâm khác nhau ở nhiều khía cạnh. Trong khi lợi ích của điện toán đám mây và các dịch vụ đám mây có thể dễ dàng nhận thấy, các vấn đề về quyền riêng tư và bảo mật của công nghệ này luôn được chú trọng. Bài báo này nhằm mục đích xác định các vấn đề bảo mật và giải pháp của chúng trong việc sử dụng các dịch vụ điện toán đám mây. Và đây sẽ là tài liệu tham khảo cho bất kỳ ai cần cái nhìn tổng quan về các yếu tố rủi ro và các giải pháp khả thi trong môi trường đám mây. Abstract - Cloud computing security is an extensive field of research with various concerns in many aspects. While the benefits of cloud computing and cloud services are easily noticeable, the privacy and security problems of this technology has always been concentrated on. This paper aim to identify the security issues and their solutions in using cloud computing services. And this would serve as a reference for anyone in need of an overview on the risks factors and possible solutions in a cloud environment. Key words: Privacy, Cloud computing, Cloud Consumer, Cloud Service Provider, Cloud User, Security. I. Introduction about cloud computing security Since its popularization by Amazon’s Elastic Computer Cloud (EC2) in 2006, cloud computing has been heavily focused on and developed by many other information Enterprises such as Dell, Microsoft, Google…During 2020, the COVID-19 pandemic has affected the cloud computing market exponentially. The demand for Software-as-a-Service (SaaS) surged due to the adaptation of work from home model in some enterprises. Video conferencing programs using cloud computing such as Google Hangouts, Zoom, WeChat Work, Tencent Meeting, Cisco Webex,… has experienced over three times in new user registration number (Marketsandmarkets, 2020). Moreover, streaming platforms such as Netflix, Twitch, Hulu, Amazon, Disney+, Youtube… has also undergone a significant increase in demand due to country lockdowns causing most of the people to stay indoors. Thus, Video on Demand (VoD) which uses the cloud is vital and has remarkably raised the demand for Infrastructure as a Service (IaaS). According to Research and Market, the global cloud computing market size in 2020 is 371.4 billion USD and should reach 832.1 billion by 2025. This clearly shows the importance of cloud computing during this digital age. With new technology comes new risks and issues, the problem of Cloud security has become a major challenge of cloud computing. To prevent such issue, many solutions are 131 introduced by IT workers (Subashini & Kavitha, 2011). In this paper, Cloud computing basic information will be mentioned, following with the security risks cloud computing possesses and then possible solutions will be presented before we conclude the paper. II. Cloud computing, Cloud security risks and solution A. Definition 1. Cloud computing Cloud computing or cloud is referred to deliver possibly on-demand network, which operates from applications to store data and processing power. People access to cloud computing through the Internet and have a pay for their business. With an invention of cloud computing, users no longer spend a huge amount of money getting their own computing infrastructure of data centers, instead, they might rent cloud computing (CC) provider applications to store their data on the Internet. In addition, the benefit of cloud computing is that we can use our information every time and everywhere on the Internet without carrying a hardware disk or settling work on computing infrastructure at the office (Steve R., 2018). Therefore, since the beginning of cloud computing, it has been attracting many attention in both the industrial field and the academic field because of its convenience (M. Sadiku & S. Musa & O. Momoh, 2014). Clouds nowadays are so familiar for the people in their daily life, which most of which is not recognized by the users. Some typical examples of cloud computing are iCloud, Office 365, Google Drive or Dropbox,… Certainly, cloud computing is a big leap for IT (Information of Technology) as this new-born network model has drastically changed the way we conceive networking today. 132 The cloud system can be dived into front-end and backend. The frontend helps the user to access a data stored in the cloud using an internet browser or a cloud computing software while the backend comprise of servers, computers, databases, and central servers - the primary component of cloud computing, responsible for securely storing data and information. Fig. 1. Public Cloud Adoption for Enterprises 2. Security information Security information is a common problem for all operational system, security within cloud computing happens expectably (2015). The term “cloud security” refers to discipline of policies, controls, procedures and technologies for protecting cloud based-system, applications, data and information. These used solutions are to protect data, regulatory fidelity and importantly clients’ privacy while backup rules for individual users and devices as well. Running cloud security shall be a co-operation between the cloud owner and solution provider to get the most effective cloud protection (Cyber Edu, 2020). The measures for security issue are flexible depending on the various types of cloud computing, with an attempt to bring the best solutions for each characteristic (Mall &a ...

Tài liệu được xem nhiều:

Tài liệu cùng danh mục:

Tài liệu mới: