Introduction
Data security and privacy protection techniques are the most static elements in cloud computing. The transfer of packets, as well as the channel used, determines the security of the conveyed data. It also depends on the technological advancement in both the software system as well as hardware system (Takabi, Joshi & Ahn, 2010). Through a review of other analytical works of cloud computing, it is evident that the security and privacy of the data can never be fully attained. The programmers and software wizard may always find a way to dismantle the software and also internet encoding and decoding process. The internet servers are quite sensitive in matters pertaining to cloud computing. Cloud computing technologies are widely used in Government, businesses and industry managements. Data security and privacy protection, therefore, are one of the ideal factors that need much attention for proper management and smooth running of different operations especially those using computing techniques (Takabi, Joshi & Ahn, 2010). The paper, therefore, will discuss or rather make a comparative analysis concerning data security and privacy protection that exists through cloud computing.
The software and hardware system are inseparable, and they work together in ensuring excellent data organization, storage and security are achieved. The cloud computing involves a combination of various services that include software programming, internet connections, server, storage and data security. Different connections are connected to the host server that stores the packets and later on sent in terms of impulse depending on the user's request (Chen & Zhao, 2012). However, it is from malicious users or intruders they find a way to access other data despite security code. The advancement in technological techniques and programming methodologies that at times compromises the existing one, thus intruding others data. The terms and condition, therefore, are broken.
Networking is one of the aspects that creates a pool of data sharing by virtual machines from the host server. National institute of standard and technology have developed a clear implication of the networking as well as insecurities that zip in as a result. The interaction that exists in the access to data and data transfer from the main host may be unsustainable. Similarly, it has done a research cloud computing that shows exposure of the virtual machines to the risk of privacy (Chen & Zhao, 2012). It clearly indicates that the connection between the host server and the other virtual machines leads to data sharing that does not purely restrict each other's data access. The configuration to such computing resources, therefore, create informalities of data security across all connected virtual devices to the host server.
Generally considering the research conducted, cloud computing has been addressed or categorized in three aspects. They include platform as a service, infrastructure as well as software as a service. The three models perform different task in cloud computing. The software program provides a service interface to the user that helps him or her solve a particular problem. The server provides related data that the user wants to fulfil the needs of a specific task. It is usually through internet applications such as browsers (Chen & Zhao, 2012). On the other hand, the platform as service provides a board whereby various tasks can be done depending on their specified commands. It comprises of multiple programs that are aimed at achieving a specific workload. Finally, infrastructural as a service, at this service, businesses can store their data as well as accessing it to host server to their virtual machines. The infrastructural system creates virtual storage as well as access to other services to the virtual machines.
However, various analysis has been carried out to show how cloud computing is related to grid computing. In just a light mention, cloud computing involves interlinking server host with virtual machines that allow sharing of the packets as well as storage. However, due to the assigned task, it performs various urgencies keeps calling for the improvement of data security and privacy. In comparison to grid computing, they are similar in that both use resources together and control them in the manipulation of the data access and confidentiality; however, they differ in the use of the operating system. Grid computing allows operating systems to work together for better service delivery. Still, on the other hand, cloud computing compiles computing and storage resources control together but with the different operating system to allow specific data access and comprehensive data management. Generally, cloud computing is an integration of grid computing.
Data security is an issue that so complex to maintain. However, there are several ways to be employed in ensuring that the information is safe. First and foremost is to ensure that the cloud computing environment is trustworthy. It implies that those dealing with the confidential information are trusted and they cannot tamper with the data diversions or alteration. The user of the technology should be conversant with cloud computing and should not expose their security codes whosever. Regarding the clouding security analysis, the issues that exist should be first identified and analyzed.
In various organizations, cloud computing has been seen as a structure that is used in saving documents as well as an important transaction. The documents are always sensitive in that upon their leakage, may cost the dissolving of the organization. Therefore data storage, protection as well as security are very crucial elements to entrust cloud computing technologies with specific users.
From different sources, it is evident that cloud computing issues are associated with resources security, management and monitoring. The problems have been analyzed as well as drawing possible solutions. However, privacy and data security can never be fully be achieved. Several researchers have tried to identify common cloud computing issues, as well as how they are addressed. Below is their discussion.
Data integrity as a crucial element information organization entails protection of data from unauthorized access which prevents malice to data. Data integrity achievement depends on a standalone system that maintains database protection via transaction and database system finalized by a database management system by following acid protocol (Sun et al., 2014). The access of data happens via organized access. Cloud computing experts are entrusted with the provision of data integrity and accuracy management remotely by application deployment.
A company or any individual needs to keep their data private and confined. Clouding experts employ access control and authentication to increase reliability and honesty. Simple encryption experiences management issues and cannot support intricate details such as fine-grained authorization, parallel modification and query. Ensuring of data confidentiality, one follows various steps which include, deletion confirmation, data concealment, hybrid technique, encrypted search and database and distributive storage (Sun et al., 2014).
The extent to which data can be retrieved or used and hoe clients verify data rather than depending on credit guarantee service provider. Data transfer over Tran's border servers raises issues in cloud computing (Sun et al., 2014). The cloud service provider needs to guarantee the client data safety and explain the jurisdiction of local laws to the customers. Location of data helps increase users confidence to their client. Data availability assurance to customers will depend on the reliability of hard disk, and reliable storage agreement.
Privacy entails the capacity of a group and indusial to seclude their data or themselves by revealing them selectively. Data privacy requires answering, how to what extent and why. In commerce, the content of consumer and privacy demands intimacy which entails application of mechanisms, legal actions, standards and processes which personally identified information gets protection. In cloud computing means that when client's access sensitive data, the cloud service providers can prevent potential data leakage by focusing on obligation random access memory technology (Sun et al., 2014). This technology visits several copies of data to hide the reals visiting aims of clients. Oram technology has recorded massive employment in the software industry, although privacy issues differ according to different companies. It is subcategorized into how to guarantee data replication inconsistent state and jurisdiction, which apart bears responsibility for ensuring legal requirements for personal data, how users gain control of their data and to what extent cloud providers involve themselves. Data privacy must address the issue of identity management, aversion of attacks and service abuse issues. Different levels need provision by cloud computing service providers in ensuring that data gets protection over third party involvement.
The world evolves at vastly technologically, and employment of computers in the firms has become an obvious thing. Any per in the business world who does not employ technology or has not thought of applying it should expect failure in the nearby future. The principal purpose of employment of cloud computing system in organizations proves crucial due to the fast and easy conversion of information between firms as well as demand for portability. The increase in data in the large enterprise needs a great information integrated system and cloud computing proves to be the solution for the issue.
References
Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24-31. https://ieeexplore.ieee.org/abstract/document/5655240/
Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks, 10(7), 190903. https://doi.org/10.1155/2014/190903
Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In 2012 International Conference on Computer Science and Electronics Engineering (Vol. 1, pp. 647-651). IEEE. https://ieeexplore.ieee.org/abstract/document/6187862/
Cite this page
Data Security and Privacy Protection in Cloud Computing - Research Paper. (2023, Feb 20). Retrieved from https://proessays.net/essays/data-security-and-privacy-protection-in-cloud-computing-research-paper
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Police Fume at Security Firms: Article Review
- Product Growth and Improving the Decision-Making Process Project Paper Example
- Jail Offender Issues Reentry to Society - Essay Sample
- Essay Sample on Risk Management & Mitigation Strategies: Accepting, Transferring & Avoiding
- Marijuana Legalization: The Public Controversies & National Effects - Research Paper
- Essay Example on Community-Based Correction: Decarceration for Prison Overcrowding
- Free Report Sample on Strategic Planning: Internal & External Environmental Analysis