Literature Review IntroductionTo investigatehowinternational students use cloud computingin DIFC college. Theliteraturereviewed forthis proposal has been collected through several sources such asGoogle Books, online journals and Google Scholar. Some books from the Griffith Collegeand the public librarywere also utilized. The keywords were cloud storage advantages and disadvantages, student use cloud security.Advantages and disadvantage aspects of Cloud storage. Intheinternetera inwhichwe live, people areincreasingly using cloud computingto savetheir data onlineinstead of saving on a computerhard disk. Firstly, cost and efficiencyincloud storageis maybethe biggest advantage of usingitin daily lifeinterms of price orupgradingthe …show more content…
This means the customer softwareneeds to beintuitiveto use, and that operation of all factors of the solution (Rhoton and Haukioja,2011, p. 223). Since cloud computing security appeared, many peoplehavequestioned whethertheirinformationis in a secure place, particularlywhenit comes to sharingwithother users. Obviouslythereis the dependence onthe cloud application and online connection(Barnatt, 2010, p. 8). Transferringinformation between cloud storage users without data protection can present legal issues. To avoid this problem, all users must choose data protectionwhenthey apply (Oppenheim, 2011, p. 27). Service breakdowns for cloud storageare one of thenegative aspects to the continuity of cloud computing. Forexample, connectionproblems or cut-off cables and system interruptions (Qian, 2009, p. 629). DB-14-0054 Project Proposal4Security of cloud computing. Cloud computing and cloud computing securityhavehad a massiveimpact on computingsystems inthe last fewyears. Thereis no doubtthat
We would like to provide the benefits of cloud computing without any troubles to propel in the direction it is designed for. This is to be achieved by preventing the owner's data from all risks associated and providing a cloud model that is more secure and efficient. The proposed model shall overcome the security risks defined by the security functions over cloud computing, as follows in (Passent M. et al., 2015):
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
This project is going to discuss about the Cloud Computing and its application in business. To briefly describe what cloud
Services such as, data storage and security, are provided by cloud computing over the internet. In cloud computing, users can pay for what they consume (Bisong & Rahman, An Overview of the Securtiy Concerns in Enterprise Cloud Computing, 2011). Cloud computing is an emerging information technology, which can make it easier for the users to manage their data. Cloud computing allows businesses to expand as new cloud-based models are being discussed and implemented as solutions (Bamiah & Brohi, 2011).
Cloud computing has become so famous; there is much widespread news about the cloud these days. This is mainly because of the exponential shift of the business applications from traditional models of software towards the Internet, and now through mobile devices. Cloud computing is a model that uses the network of remote servers that has been hosted on the internet rather than on a specific hardware. This would enable a better shared pool for storing, accessing and processing of data. With the huge information being available in the internet, the security for cloud computing has been challenging and this paper would elucidates the security threats of cloud computing also stating the possible countermeasures for them.
The economic case for cloud computing is compelling and at the same time there are striking challenges in its security. The concepts of cloud computing security issues are fundamentally new and intractable. What appears new is only relative to traditional computing that has been practiced since several years. Many such security problems have been giving attention since the time-sharing era. Cloud computing providers have and can build datacenters as large due to their expertise in organizing and provisioning computational resources at as low cost as possible.
Cloud because of its wide range of applications it allows users to store data their data remotely in the cloud and enjoy the on-demand high quality cloud applications and reveal burden from the local storage, cost and maintenance. In this according to the user’s perspective, including both individuals (private) and enterprises like companies appealing the cloud benefits by storing data remotely into the cloud in a flexible on-demand manner and relief of the burden of storage management along with this he/she can also enjoy the universal data access which dependent geographical locations and avoidance of the capital expenditure, software, hardware and personnel management and maintenances and so on.
Cloud computing is defined by the article as the use of various softwares (such as hardware, storage and systems software) based in large global data centres rather than in local servers in personal computers. Cloud computing is believed to provide a range of benefits such as increased flexibility, reliability, portability and efficiency. It will simplify devices as well as reduce costs and the time taken to complete tasks.
The research here is going to know how cloud computing are helping institutions in UK to provide better services and get more productivity. Since it is not easy to consider all the educational institutions in UK in order to answer the research question, it has been planned to do a case study on school of technology and management (STM) which is one of the famous educational institutions in the United Kingdom (UK).
The scope of this memorandum is to develop a research project on the subject of cloud computing security and specifically the innovative ways developers are trying to secure data in the cloud. I will briefly describe the current cloud computing security structure and discuss measurement protocols that have been developed recently in order to test and measure the effectiveness of cloud security (Yesilyurt, et al.,
Several researchers have addressed the issue of depending on a single cloud storage service, such as cite {AbuLibdeh2010} cite {Scalia}, and they believe that adopting multiple cloud storage services is a useful approach to tackling the problems associated with the dependence on a single cloud provider. Simply, This method combines several independent cloud services and considers them as one cloud. Although the distribution of data among several cloud storage services increase availability, performance, and reduces the probability of losing data, it may increase the amount of storage and bandwidth used and as a result, the cost rises. Scalia cite {Scalia} introduced a cloud brokerage solution that continuously adapts the placement of data, based on files access statistics among several cloud storage services to minimise the storage cost, improve the data availability, and eliminate vendor lock-in risk. However, The work does not evaluate the impact of the system on the latency time. HAIL cite {Bowers2009} used the principle of RAID to distribute files across a collection of cloud storage to enhance the availability of data and remotely manage data security risks (i.e. data integrity) in the cloud by employing the Proofs of Retrievability (PORs) system. Although this work shows a reduce in storage cost, they do not consider the effect of access patterns on the network cost. Besides, they assume that
In this paper, the authors survey many sources and literature on cloud security issues, namely vulnerabilities, threats, and attacks. A total of 504 articles were look at to gather the data used in this paper. While the authors use this number to say that the research trend is up on mitigating security risks, they also suggest that security is the main priority of most research to the detriment of other areas. They offer no concrete numbers to back up this claim..
Cloud computing is revolutionizing many ecosystems by providing organizations with computing resources featuring easy deployment, connectivity, configuration, automation and scalability. This paradigm shift raises a broad range of security and privacy issues that must be taken into consideration. Loss of control, and trust are key challenges in cloud computing environments. This paper will be describing and focusing on cloud security and privacy. In addition to cloud security, the general model of cloud computing is also described where the cloud security and privacy issues can be approached. To preserve such issues, some propositions for cloud security for reference are also proposed along with a brief description for deployment in cloud computing.
Additionally, a major component of this paper will include a breakdown of the views of relevant psychological theories and how the advanced technology reflects those psychological theories. Furthermore, the emergent feature of the advanced technology, will be investigated cloud computing, in regards to how it is a recognizable issue in view of the fact that the concept has been considerably deliberated in recent years. However its capabilities have not been wholly understood until recent. As a result there is great consequence in learning more about the existence and integration of cloud computing to appropriately support the characteristics and functionalities of it as an emerging technology in to education.
Cloud computing is a topic of which much is assumed. The average person recognizes the term “cloud computing” as having to do with their storage from their iPad or iPhone on the online storage area which syncs their Apple devices to their computer. This common cloud is called the iCloud. That is where common knowledge ends about this topic. However, upon further exploration, a deeper understanding is gained with greater explanation, and it is realized that cloud computing is something that is used all of the time on many levels of everyday technology. While the terminology remains cryptic to the mind of most people, the concepts behind the practical uses of cloud computing become quite clear. It is relatable and understandable. Upon this revelation, the iCloud is recognized as the tip of the preverbal iceberg when speaking about cloud computing. It is important to discuss and further understand the many types of cloud computing as well as the various applications to life through technology. This affects how information is stored online, computers are protected, information is secured, emails are processed, and many other factors that are taken for granted in the world of technology. Cloud computing is a general term used to describe how information is stored, utilized, and accessed over the internet. There is no cloud, but the word cloud gives the connotation of an abstract place which is known to exist but is too vast to touch or contain (Griffith,