. Security threats in cloud computing. In SpringerBriefs in Computer Science

. Security threats in cloud computing. In SpringerBriefs in Computer Science

Running head: APPLICATION SECURITY 1

APPLICATION SECURITY 3

Application Security

Data Security and Cloud Computing

Introduction

Today, data moves from a sever storage centrally located to the cloud storage, the cloud services offer the scalability, flexibility, and the proportionate concerns about the security (Lele, 2019). Therefore, safety is the most important aspect associated to cloud computing since users can store their information on the cloud with the help of the cloud service providers. In the cloud computing and data security, there are various problems associated with it such as inadequate and improper data backups that have made many organizations vulnerable to security threats (Singh, Dhawan, Arora, & Patail, 2018).

These threats interfere with an organization’s data in encrypted files. The problem under investigation is relevant to the study in that the threats created as a result of the improper data backups pose a significant issue on the application security in the cloud computing and data security.

This study assumes that data security and cloud computing provide the best way possible in protecting private data and classified information away from threats such as cyber attacks and loss during disasters. On the other hand, the limitation of this study is that there is no assurance that the cloud computing security will provide a 100% protection of vital data in an organization (V, 2010).

Background

Data security and cloud computing is an internet-based utility computing used by end users hosted on virtual servers. Cloud computing is a way of increasing the capacity adds capabilities without investing in other infrastructure like computer hardware. Additionally, cloud computing is innovative and uses an advanced computational power resource in storage capabilities.

In the world today, various organizations and businesses have integrated the data security and cloud computing aspect to protect classified and personal data from reaching unauthorized personnel. This is important in that it reduces the threats that are associated with the non-use of cloud computing technologies.

Problem Statement

In data security and the cloud computing services, various security issues need to be addressed by including the cloud end users and the cloud service providers. In cloud computing, the most crucial issues that are to be addressed are the data privacy associated with cloud services.

Additionally, cloud computing has provided data storage service due to the increased demand for digital data, large storage devices and extensive data computation. Therefore, data security and cloud computing should seek to provide secure data storage and access. Additionally, in cloud computing security, it is evident that the end users data are usually shared in the cloud for storing and carrying out the computation.

This has, in the long run, led to a reduction in integrity and trust in the private data of users with the cloud environment. In data security, it is crucial that the private information such as patient’s health records, credit card details, and other classified information are protected from potential threats of hackers or other unauthorized personnel (Alani, 2016).

These problems need to be solved, which will help improve the security data. For instance, it is significant that different organizations and businesses should seek to migrate from single cloud storage to a multi-cloud storage service. This is because the multi-cloud service will offer a robust security option by ensuring that your organization has the capabilities in the protection of private and classified data. Additionally, the multi-cloud service can also work to improve reliability.

Moreover, it is also crucial to solving the cloud computing problem that it tends to enhance the security and the data recovery process. This is because, in the event of a disaster in a business or organization, the improved cloud computing system can be able to recover lost data and thus ensuring the business continuity.

Consequently, there is also the benefit of cost control as a result of the solution of the problem by establishing an efficient cloud computing. This can be seen in that, with the improved cloud computing, there is a reduction in expenditure such as acquiring software and hardware (Chen & Zhao, 2012). This means that your capital will reduce significantly, hence establishing a cost control.

Research Question

The research question was the problems associated with data security and cloud computing. There are several issues related to the topic, such as the threat of loss of private and classified information to unauthorized personnel as a result of cloud sharing by the end users. This has seen to lead in reduction of trust and loss of integrity to the end users. It is essential that the vital and crucial information is protected at all cost.

Reference

Alani, M. M. (2016). Security threats in cloud computing. In SpringerBriefs in Computer Science. https://doi.org/10.1007/978-3-319-41411-9_3

Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. In Proceedings – 2012 International Conference on Computer Science and Electronics Engineering, ICCSEE 2012. https://doi.org/10.1109/ICCSEE.2012.193

Lele, A. (2019). Cloud computing. In Smart Innovation, Systems and Technologies. https://doi.org/10.1007/978-981-13-3384-2_10

Singh, B., Dhawan, S., Arora, A., & Patail, A. (2018). A View of Cloud Computing. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY. https://doi.org/10.24297/ijct.v4i2b1.3226

V, C. C. (2010). Top Threats to Cloud Computing. Security.

Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees


We value our customers, and so ensure that our papers are 100 percent original. Our Team of professionals does not miss the mark; they ensure that step by step each paper is written uniquely. We never duplicate or work as we compare papers rest assured. We deliver our work a day before time to ensure that you don’t miss your deadlines. It is not only doing the work but delivering it at the right time. We capture the consequences of late remittances. .

Money-back guarantee

We value customer satisfaction here at popularessaywriters.com and make sure that you get the best value for your Money. It happens that sometimes you can pay twice for your order or may want to cancel it, or you feel that it doesn’t meet your requirements; our money back guarantee will give you the opportunity to get back your money. We will also refund 100% of money paid double. In case your paper does not satisfy your requirements , we request that you notify us via writing within 2 days otherwise on the third day we will assume that you have been satisfied. Do all your correspondences through our email address popularessaywriters@gmail.com.

Read more

Zero-plagiarism guarantee

At popularessaywriters.com, our professional writers know the consequence plagiarism does for our clients. We have updated software’s such as article checker and copyscape to check for originality of the custom papers before submission of the final paper to the you. Our guarantee to the customer is that we will write 100% original papers for them that are quality, timely and of low cost. We have experienced professional and competent PhD writers who will write quality custom papers for you..

Read more

Free-revision policy

. At popularessaywriters.com, we are proud to provide top-quality Essay writing service to our esteemed customers. We are ready to take up that challenging academic assignment that is giving you sleepless nights and simplify it for you according to your desired requirements. We are willing to revise your paper if it does not meet your requirements. At popularessaywriters.com, we do not compromise with quality; thus, we offer unlimited free revisions until the customer is satisfied with their custom paper. Our unlimited free revision services are provided under the following terms:.. .

Read more

Privacy policy

Popularessawriters.com knows that client’s information is an essential tool for our company. It means that whatever the client requests from our service is kept strictly confidential. It means that whoever writes for this company understands the terms and conditions hence you should not be worried because you will never see your work somewhere else...

Read more

Fair-cooperation guarantee

Rest assured that we will always be attentive to your needs and requirements. We belief in the phrase treat your neighbour as you would want them to treat you. We leave nothing to chance and always look forward to a good interaction with each other.. .

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency