A study on cloud computing security
Thông tin tài liệu:
Nội dung trích xuất từ tài liệu:
A study on cloud computing security A STUDY ON CLOUD COMPUTING SECURITY SVTH: Đỗ Chí Bằng, Nguyễn Thị Ninh Thuận GVHD: ThS Hoàng Thị Kiều Hoa Tóm tắt - Bảo mật điện toán đám mây là một lĩnh vực nghiên cứu sâu rộng với nhiều mối quan tâm khác nhau ở nhiều khía cạnh. Trong khi lợi ích của điện toán đám mây và các dịch vụ đám mây có thể dễ dàng nhận thấy, các vấn đề về quyền riêng tư và bảo mật của công nghệ này luôn được chú trọng. Bài báo này nhằm mục đích xác định các vấn đề bảo mật và giải pháp của chúng trong việc sử dụng các dịch vụ điện toán đám mây. Và đây sẽ là tài liệu tham khảo cho bất kỳ ai cần cái nhìn tổng quan về các yếu tố rủi ro và các giải pháp khả thi trong môi trường đám mây. Abstract - Cloud computing security is an extensive field of research with various concerns in many aspects. While the benefits of cloud computing and cloud services are easily noticeable, the privacy and security problems of this technology has always been concentrated on. This paper aim to identify the security issues and their solutions in using cloud computing services. And this would serve as a reference for anyone in need of an overview on the risks factors and possible solutions in a cloud environment. Key words: Privacy, Cloud computing, Cloud Consumer, Cloud Service Provider, Cloud User, Security. I. Introduction about cloud computing security Since its popularization by Amazon’s Elastic Computer Cloud (EC2) in 2006, cloud computing has been heavily focused on and developed by many other information Enterprises such as Dell, Microsoft, Google…During 2020, the COVID-19 pandemic has affected the cloud computing market exponentially. The demand for Software-as-a-Service (SaaS) surged due to the adaptation of work from home model in some enterprises. Video conferencing programs using cloud computing such as Google Hangouts, Zoom, WeChat Work, Tencent Meeting, Cisco Webex,… has experienced over three times in new user registration number (Marketsandmarkets, 2020). Moreover, streaming platforms such as Netflix, Twitch, Hulu, Amazon, Disney+, Youtube… has also undergone a significant increase in demand due to country lockdowns causing most of the people to stay indoors. Thus, Video on Demand (VoD) which uses the cloud is vital and has remarkably raised the demand for Infrastructure as a Service (IaaS). According to Research and Market, the global cloud computing market size in 2020 is 371.4 billion USD and should reach 832.1 billion by 2025. This clearly shows the importance of cloud computing during this digital age. With new technology comes new risks and issues, the problem of Cloud security has become a major challenge of cloud computing. To prevent such issue, many solutions are 131 introduced by IT workers (Subashini & Kavitha, 2011). In this paper, Cloud computing basic information will be mentioned, following with the security risks cloud computing possesses and then possible solutions will be presented before we conclude the paper. II. Cloud computing, Cloud security risks and solution A. Definition 1. Cloud computing Cloud computing or cloud is referred to deliver possibly on-demand network, which operates from applications to store data and processing power. People access to cloud computing through the Internet and have a pay for their business. With an invention of cloud computing, users no longer spend a huge amount of money getting their own computing infrastructure of data centers, instead, they might rent cloud computing (CC) provider applications to store their data on the Internet. In addition, the benefit of cloud computing is that we can use our information every time and everywhere on the Internet without carrying a hardware disk or settling work on computing infrastructure at the office (Steve R., 2018). Therefore, since the beginning of cloud computing, it has been attracting many attention in both the industrial field and the academic field because of its convenience (M. Sadiku & S. Musa & O. Momoh, 2014). Clouds nowadays are so familiar for the people in their daily life, which most of which is not recognized by the users. Some typical examples of cloud computing are iCloud, Office 365, Google Drive or Dropbox,… Certainly, cloud computing is a big leap for IT (Information of Technology) as this new-born network model has drastically changed the way we conceive networking today. 132 The cloud system can be dived into front-end and backend. The frontend helps the user to access a data stored in the cloud using an internet browser or a cloud computing software while the backend comprise of servers, computers, databases, and central servers - the primary component of cloud computing, responsible for securely storing data and information. Fig. 1. Public Cloud Adoption for Enterprises 2. Security information Security information is a common problem for all operational system, security within cloud computing happens expectably (2015). The term “cloud security” refers to discipline of policies, controls, procedures and technologies for protecting cloud based-system, applications, data and information. These used solutions are to protect data, regulatory fidelity and importantly clients’ privacy while backup rules for individual users and devices as well. Running cloud security shall be a co-operation between the cloud owner and solution provider to get the most effective cloud protection (Cyber Edu, 2020). The measures for security issue are flexible depending on the various types of cloud computing, with an attempt to bring the best solutions for each characteristic (Mall &a ...
Tìm kiếm theo từ khóa liên quan:
A study on cloud computing security Cloud computing Cloud consumer Cloud service provider Cloud user Cloud security risksTài liệu cùng danh mục:
-
Chương trình khung trình độ trung cấp nghề nghề Thiết kế trang Web - Trường CĐN GTVT Đường Thuỷ 1
6 trang 386 0 0 -
45 trang 370 4 0
-
Elasticity for MQTT brokers in IoT applications
13 trang 288 0 0 -
13 trang 270 0 0
-
Đề thi thực hành môn Thiết kế Web - Trường Cao đẳng nghề Vĩnh Phúc
3 trang 252 2 0 -
EBay - Internet và câu chuyện thần kỳ: Phần 1
143 trang 249 0 0 -
14 trang 231 0 0
-
8 trang 196 0 0
-
Tìm kiếm thông minh hơn với Google
4 trang 187 0 0 -
hướng dẫn đăng ký địa chỉ mail @fac.com
4 trang 177 0 0
Tài liệu mới:
-
Khảo sát tình trạng dinh dưỡng trước mổ ở người bệnh ung thư đại trực tràng
9 trang 20 0 0 -
94 trang 17 0 0
-
Tham vấn Thanh thiếu niên - ĐH Mở Bán công TP Hồ Chí Minh
276 trang 18 0 0 -
Kết hợp luân phiên sóng T và biến thiên nhịp tim trong tiên lượng bệnh nhân suy tim
10 trang 17 0 0 -
Đề thi giữa học kì 1 môn Ngữ văn lớp 9 năm 2024-2025 có đáp án - Trường THCS Nguyễn Trãi, Thanh Khê
14 trang 20 0 0 -
Đánh giá hiệu quả giải pháp phát triển thể chất cho sinh viên Trường Đại học Kiến trúc Hà Nội
8 trang 17 0 0 -
Tỉ lệ và các yếu tố liên quan đoạn chi dưới ở bệnh nhân đái tháo đường có loét chân
11 trang 18 0 0 -
39 trang 18 0 0
-
Đề thi học kì 1 môn Tiếng Anh lớp 6 năm 2024-2025 có đáp án - Trường TH&THCS Quang Trung, Hội An
6 trang 18 1 0 -
Tôm ram lá chanh vừa nhanh vừa dễRất dễ làm, nhanh gọn mà lại ngon. Nhà mình
7 trang 18 0 0