Preview

Nt1330 Unit 3 Research Paper

Good Essays
Open Document
Open Document
470 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Research Paper
2.1 Implicit Storage Security to Data in Online
Data is stored in a distributed way, Data partitioned in this scheme is already implicitly secured and each packet is stored distributed in different servers, log structure is maintained to keep track of each data block. Reconstruction of the data packet makes use of the log files.
2.2 Identify Based Authentication
IBE-Identify based encryption/decryption and Identify based signatures are used for ensuring authentication at all levels, client and server handshake each other with Random number generated before transferring data establishing a secure connection. 2.3 Effective and secure storage protocol
A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography
…show more content…
3.1 Security Threats on Cloud
Cloud being single point of data access it even suffers from single point data failure /
Security attacks. A huge number of attacks are been made on cloud every day by malicious programs.
Data Breach at Target resulting in loss of 110 million individual’s sensitive information
Like credit card and personal details. Side channel timing exposure been just a way where a user on one virtual machine can tamper with the secured key on another virtual Machine on same host. Unfortunately Data loss is a huge threat to cloud computing, the more u encrypt the data and once u lost key u have lost entire information on the other hand, Cloud systems back up data copies for emergency situations exposes data for more attacks.
Consumer or user loosing data permanently is the last thing that a company can afford in enterprise scale. Phishing, taking Advantage of software loop holes, password loss can all lead to loss of control over the user information. Most security measure being refraining from sharing credentials between users and use a strong encryption -Decryption while exchanging critical

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In the New York Times article, Sean Collins Walsh details the ongoing concerns with Cloud Computing. He discusses the beneficial and problematic financial issues cloud computing is having on the U.S. Government. Walsh discusses the unforeseeable consequences that cloud computing may have for the government due to the technology being fairly…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Business Trend Memo

    • 1299 Words
    • 6 Pages

    The term “cloud” implies an idea that users are able to access applications from any location in the world. Cloud computing is defined as a collection of disembodied services accessible from anywhere using any mobile device that has access to the Internet (Mondal 2009). In other words, cloud computing is an application service that is like e-mail and uses ubiquitous resources that can be shared by many…

    • 1299 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The system must be safe and secure allowing customers to transfer or access information through a security encrypted connection. Allowing data to be safely transferred from one place to another without getting information…

    • 701 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The basics of the cloud computing is that information is stored over web-based (Internet) servers as opposed to individual local servers; thereby, the only…

    • 3864 Words
    • 16 Pages
    Powerful Essays
  • Best Essays

    Cloud Computing

    • 1425 Words
    • 6 Pages

    Cloud computing is defined by Cearly and Phifer in their case study titled “Case Studies in Cloud Computing” as “a style of computing in which scalable and elastic IT-related capabilities are provided ‘ as a service’ to customers using Internet technologies”. Cloud computing services had been provided by major vendors such as Google, Amazon, Microsoft, IBM, Hewlett-Packard, and others for business computing until recently when Apple Corporation announced iCloud for consumers. Therefore, cloud computing is now available for businesses as well as consumers. Read the case study titled, “ Ericsson”, located here, about Ericsson cloud computing.…

    • 1425 Words
    • 6 Pages
    Best Essays
  • Best Essays

    Cyber Security

    • 4964 Words
    • 20 Pages

    This research paper tackles the issues that faces Cloud Computing today and gives the experts and industry’s point of view on the matter. The aspects explored are the significant industry questions that have risen about the use of Cloud Computing, business value, organization impact, adaptability, limitations, initial cost of implementation, and the severe business security risks due to centralization of resources. Brian Proffitt will argue in is IT World article [24], there are some serious limitations with cloud computing that is being blithely ignored such as bandwidth limitation, storage, and availability. Interviews conducted with colleagues that are experts in the Enterprise Systems network arena reveals that, the impact is all in planning before implementation, the selected architecture and the security policy. Findings in manuscripts and online libraries reflect that Cloud Computing is a technological revolution that provides computer resources as a service; offering flexible IT usage, computing efficiency through improved utilization and reduced administration and infrastructure costs. Users are not limited to applications confined to a computer, data stored to a hard drive, or bounded by the organization’s network. Also known as the sum of Software as a Service (SaaS) and Utility Computing, Cloud Computing is argued to be more efficient and scalable. My hope is to identify the common issues that face Cloud Computing in organizations that have implemented it, and find the answer or probable solutions.…

    • 4964 Words
    • 20 Pages
    Best Essays
  • Good Essays

    Another advantage of cloud computing is that it would make computer viruses and malware almost nonexistent. Any attacks would be stopped at the cloud level and never reach your computer.…

    • 1281 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Network Security Concepts

    • 1883 Words
    • 8 Pages

    File security falls into two categories, encryption and access. Access to files can mean physical access to a computer with unsecured files or access via user permissions or privileges in the form of access control lists (ACLs) (Strengthen Your Users ' File Security, 2003). The files kept on a server with NTFS storage can be locked to prevent anyone who does not have the correct permissions from opening them. This is secure but can be bypassed with physical access to an open computer and should not be used for sensitive information. The other method of securing files is by encrypting the information in the files using an Encrypting File System (EFS), which employs public key encryption privileges (Strengthen Your Users ' File Security, 2003).…

    • 1883 Words
    • 8 Pages
    Powerful Essays
  • Best Essays

    |An investigation into the impact of cloud computing on educational institution in UK: AN EMPIRICAL STUDY |…

    • 4098 Words
    • 17 Pages
    Best Essays
  • Good Essays

    Cloud computing

    • 575 Words
    • 3 Pages

    Though it is true that information and data on the cloud can be accessed anytime and from anywhere, there are times when this system can have some serious dysfunctions. A good example is the AWS.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Besides explaining the technique of data storage in each of the above mentioned applications, this paper also gives an appreciable comparison between existing technologies and emerging technologies.…

    • 5235 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Cloud computing is somewhat like the sun on a cloudy day; you cannot see it, but you know it is there. You do not get to see what is on the other side of the clouds themselves, but you know there is something on the other side from which you can get the benefits of its presence and service.…

    • 4786 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Cloud Computing in Banks

    • 287 Words
    • 2 Pages

    Security is a key concern among potential users and the cloud model is evolving accordingly. Once the security concern…

    • 287 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Though it is true that information and data on the cloud can be accessed anytime and from anywhere at all, there are times when this system can have some serious dysfunction. It should be aware of the fact that this technology is always prone to outages and other technical issues.…

    • 1418 Words
    • 6 Pages
    Good Essays