Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Essay

Security in Cloud Computing

Rating
-
Sold
-
Pages
8
Grade
A
Uploaded on
12-05-2021
Written in
2019/2020

The review paper goes over cloud security, behind the scenes of how it works and the threats against it. This is a good paper to read for absolute beginners in cyber security especially in cloud computing.

Institution
Course

Content preview

FUTURE INTERNET
TECHNOLOGIES:
SECURITY IN CLOUD
COMPUTING
Albert Savill 3505901




31st October 2019

, Contents
Abstract.............................................................................................................................................1
1.1 Introduction.................................................................................................................................1
1.2 Cloud Computing.....................................................................................................................1
1.3 Cloud Networking....................................................................................................................2
1.3.1 Networking in Iaas................................................................................................................2
2.1 Security........................................................................................................................................4
2.2 Privacy......................................................................................................................................4
2.3 Security Issues..........................................................................................................................4
2.4 Security Solutions.....................................................................................................................6
3 Conclusion......................................................................................................................................7
References.........................................................................................................................................7
Abstract
This review paper will go over what exactly is cloud computing and the security behind it. Of
course, if security is needed in this modern world of computing it means there are risk factors
involved. This paper will explore the risks that are involved in cloud computing and how it is
handled. This review paper is researched through multiple academic journals found online
found via Google Scholar. It is crucial to explore security issues and ideas in the hope there is
more knowledge on how to protect cloud computing, especially if it becomes the new normal
rather than using a hub or a router in the future for businesses and personal use.
Keywords: Cloud computing, cloud networking, security, Iaas, Trust, Integrity, Availability,
Authentication, Authorisation, Confidentiality, PKI, LDAP, SSO.
1.1 Introduction
Through the growth of internet technologies networking has also evolved over the decades. It
is common everyone relies on a router in order to have access to the internet through network
protocols. However, through this evolution of technology cloud computing has grown over
the years. Through the growth of this new technology, there may be a lack of security as there
is possibly a lack of understanding of this technology as it is still a new concept to the
majority of the modern world.
1.2 Cloud Computing
So what exactly is cloud computing? According to the NIST (National Institute of Standard
and Technology) definition of cloud computing [1], defines that cloud computing is a “model
for applying ubiquitous, convenient, on-demand network access to a shared pool of
configurable computing resources (e.g. networks, servers, storage, applications and services)
releases in fast and minimal management effort or service provider interaction”.
What this means exactly is that cloud computing is made with the intention of a more
convenient network, a series of sub-networks connected together that runs on the same
computing resources as mentioned above in the quote [1]. Through the shared resources,
these networks will perform at a reliable speed with good availability.

1

Written for

Institution
Study
Course

Document information

Uploaded on
May 12, 2021
Number of pages
8
Written in
2019/2020
Type
ESSAY
Professor(s)
Unknown
Grade
A

Subjects

$12.83
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
savilla1110

Get to know the seller

Seller avatar
savilla1110 I hop
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
4 year
Number of followers
1
Documents
0
Last sold
4 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions