Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Ensayo

Security in Cloud Computing

Puntuación
-
Vendido
-
Páginas
8
Grado
A
Subido en
12-05-2021
Escrito en
2019/2020

The review paper goes over cloud security, behind the scenes of how it works and the threats against it. This is a good paper to read for absolute beginners in cyber security especially in cloud computing.

Institución
Grado

Vista previa del contenido

FUTURE INTERNET
TECHNOLOGIES:
SECURITY IN CLOUD
COMPUTING
Albert Savill 3505901




31st October 2019

, Contents
Abstract.............................................................................................................................................1
1.1 Introduction.................................................................................................................................1
1.2 Cloud Computing.....................................................................................................................1
1.3 Cloud Networking....................................................................................................................2
1.3.1 Networking in Iaas................................................................................................................2
2.1 Security........................................................................................................................................4
2.2 Privacy......................................................................................................................................4
2.3 Security Issues..........................................................................................................................4
2.4 Security Solutions.....................................................................................................................6
3 Conclusion......................................................................................................................................7
References.........................................................................................................................................7
Abstract
This review paper will go over what exactly is cloud computing and the security behind it. Of
course, if security is needed in this modern world of computing it means there are risk factors
involved. This paper will explore the risks that are involved in cloud computing and how it is
handled. This review paper is researched through multiple academic journals found online
found via Google Scholar. It is crucial to explore security issues and ideas in the hope there is
more knowledge on how to protect cloud computing, especially if it becomes the new normal
rather than using a hub or a router in the future for businesses and personal use.
Keywords: Cloud computing, cloud networking, security, Iaas, Trust, Integrity, Availability,
Authentication, Authorisation, Confidentiality, PKI, LDAP, SSO.
1.1 Introduction
Through the growth of internet technologies networking has also evolved over the decades. It
is common everyone relies on a router in order to have access to the internet through network
protocols. However, through this evolution of technology cloud computing has grown over
the years. Through the growth of this new technology, there may be a lack of security as there
is possibly a lack of understanding of this technology as it is still a new concept to the
majority of the modern world.
1.2 Cloud Computing
So what exactly is cloud computing? According to the NIST (National Institute of Standard
and Technology) definition of cloud computing [1], defines that cloud computing is a “model
for applying ubiquitous, convenient, on-demand network access to a shared pool of
configurable computing resources (e.g. networks, servers, storage, applications and services)
releases in fast and minimal management effort or service provider interaction”.
What this means exactly is that cloud computing is made with the intention of a more
convenient network, a series of sub-networks connected together that runs on the same
computing resources as mentioned above in the quote [1]. Through the shared resources,
these networks will perform at a reliable speed with good availability.

1

Escuela, estudio y materia

Institución
Estudio
Grado

Información del documento

Subido en
12 de mayo de 2021
Número de páginas
8
Escrito en
2019/2020
Tipo
ENSAYO
Profesor(es)
Desconocido
Grado
A

Temas

$12.83
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
savilla1110

Conoce al vendedor

Seller avatar
savilla1110 I hop
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1
Miembro desde
4 año
Número de seguidores
1
Documentos
0
Última venta
4 año hace

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes