Preview

Nt1330 Unit 3 Research Paper

Good Essays
Open Document
Open Document
470 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Research Paper
2.1 Implicit Storage Security to Data in Online
Data is stored in a distributed way, Data partitioned in this scheme is already implicitly secured and each packet is stored distributed in different servers, log structure is maintained to keep track of each data block. Reconstruction of the data packet makes use of the log files.
2.2 Identify Based Authentication
IBE-Identify based encryption/decryption and Identify based signatures are used for ensuring authentication at all levels, client and server handshake each other with Random number generated before transferring data establishing a secure connection. 2.3 Effective and secure storage protocol
A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography
…show more content…

3.1 Security Threats on Cloud
Cloud being single point of data access it even suffers from single point data failure /
Security attacks. A huge number of attacks are been made on cloud every day by malicious programs.
Data Breach at Target resulting in loss of 110 million individual’s sensitive information
Like credit card and personal details. Side channel timing exposure been just a way where a user on one virtual machine can tamper with the secured key on another virtual Machine on same host. Unfortunately Data loss is a huge threat to cloud computing, the more u encrypt the data and once u lost key u have lost entire information on the other hand, Cloud systems back up data copies for emergency situations exposes data for more attacks.
Consumer or user loosing data permanently is the last thing that a company can afford in enterprise scale. Phishing, taking Advantage of software loop holes, password loss can all lead to loss of control over the user information. Most security measure being refraining from sharing credentials between users and use a strong encryption -Decryption while exchanging critical


You May Also Find These Documents Helpful

  • Best Essays

    Bibliography: Bauer, Eric and Randee Adams. The Reliability and Availability of Cloud Computing. Hoboken: Wiley, 2012.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Each e-commerce have to keep their online data safe such as customers personal details, their bank details and many more and in order to make sure that their data stays safe and secured, they have to be aware of all the frauds that is taking place now days because e-commerce have to deal with payments such as online banking, electronic transactions, using debit cards, credit cards and many other ways and because of these e-commerce’s have more compliance issues as they are at more risk from being targeted than other websites. Data’s can be stolen in many ways such as by hacking and by adding viruses into systems and many other ways.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    In the New York Times article, Sean Collins Walsh details the ongoing concerns with Cloud Computing. He discusses the beneficial and problematic financial issues cloud computing is having on the U.S. Government. Walsh discusses the unforeseeable consequences that cloud computing may have for the government due to the technology being fairly…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Cloud Computing

    • 1425 Words
    • 6 Pages

    Cloud computing is defined by Cearly and Phifer in their case study titled “Case Studies in Cloud Computing” as “a style of computing in which scalable and elastic IT-related capabilities are provided ‘ as a service’ to customers using Internet technologies”. Cloud computing services had been provided by major vendors such as Google, Amazon, Microsoft, IBM, Hewlett-Packard, and others for business computing until recently when Apple Corporation announced iCloud for consumers. Therefore, cloud computing is now available for businesses as well as consumers. Read the case study titled, “ Ericsson”, located here, about Ericsson cloud computing.…

    • 1425 Words
    • 6 Pages
    Best Essays
  • Best Essays

    Cyber Security

    • 4964 Words
    • 20 Pages

    This research paper tackles the issues that faces Cloud Computing today and gives the experts and industry’s point of view on the matter. The aspects explored are the significant industry questions that have risen about the use of Cloud Computing, business value, organization impact, adaptability, limitations, initial cost of implementation, and the severe business security risks due to centralization of resources. Brian Proffitt will argue in is IT World article [24], there are some serious limitations with cloud computing that is being blithely ignored such as bandwidth limitation, storage, and availability. Interviews conducted with colleagues that are experts in the Enterprise Systems network arena reveals that, the impact is all in planning before implementation, the selected architecture and the security policy. Findings in manuscripts and online libraries reflect that Cloud Computing is a technological revolution that provides computer resources as a service; offering flexible IT usage, computing efficiency through improved utilization and reduced administration and infrastructure costs. Users are not limited to applications confined to a computer, data stored to a hard drive, or bounded by the organization’s network. Also known as the sum of Software as a Service (SaaS) and Utility Computing, Cloud Computing is argued to be more efficient and scalable. My hope is to identify the common issues that face Cloud Computing in organizations that have implemented it, and find the answer or probable solutions.…

    • 4964 Words
    • 20 Pages
    Best Essays
  • Powerful Essays

    Network Security Concepts

    • 1883 Words
    • 8 Pages

    File security falls into two categories, encryption and access. Access to files can mean physical access to a computer with unsecured files or access via user permissions or privileges in the form of access control lists (ACLs) (Strengthen Your Users ' File Security, 2003). The files kept on a server with NTFS storage can be locked to prevent anyone who does not have the correct permissions from opening them. This is secure but can be bypassed with physical access to an open computer and should not be used for sensitive information. The other method of securing files is by encrypting the information in the files using an Encrypting File System (EFS), which employs public key encryption privileges (Strengthen Your Users ' File Security, 2003).…

    • 1883 Words
    • 8 Pages
    Powerful Essays
  • Best Essays

    |An investigation into the impact of cloud computing on educational institution in UK: AN EMPIRICAL STUDY |…

    • 4098 Words
    • 17 Pages
    Best Essays
  • Good Essays

    Cloud computing

    • 575 Words
    • 3 Pages

    Though it is true that information and data on the cloud can be accessed anytime and from anywhere, there are times when this system can have some serious dysfunctions. A good example is the AWS.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Besides explaining the technique of data storage in each of the above mentioned applications, this paper also gives an appreciable comparison between existing technologies and emerging technologies.…

    • 5235 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Another advantage of cloud computing is that it would make computer viruses and malware almost nonexistent. Any attacks would be stopped at the cloud level and never reach your computer.…

    • 1281 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cloud Computing in Banks

    • 287 Words
    • 2 Pages

    Security is a key concern among potential users and the cloud model is evolving accordingly. Once the security concern…

    • 287 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cloud computing is somewhat like the sun on a cloudy day; you cannot see it, but you know it is there. You do not get to see what is on the other side of the clouds themselves, but you know there is something on the other side from which you can get the benefits of its presence and service.…

    • 4786 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Though it is true that information and data on the cloud can be accessed anytime and from anywhere at all, there are times when this system can have some serious dysfunction. It should be aware of the fact that this technology is always prone to outages and other technical issues.…

    • 1418 Words
    • 6 Pages
    Good Essays