A Review Paper on Cloud Computing Security
Main Article Content
Abstract
Cloud computing has become an increasingly popular means of delivering valuable, IT-enabled business services. Adopting cloud
technology can be an affordable way to get access to a dynamically scalable, virtualized computing environment. The cloud provider is
responsible for the environment, so organizations can make use of resources for short periods of time without having to maintain the
environment when it is not being used. While cloud computing models are attractive because of their flexibility and cost effectiveness, certain
challenges must be addressed in order to provide a viable option to traditional data services. First and foremost is the issue of security. The
externalized aspect of outsourcing can make it harder to maintain data integrity and privacy, support data and service availability, demonstrate
compliance, and secure highly available access to applications and information. In short, cloud computing can present an added level of risk.
This paper discusses security and availability-related challenges in cloud computing environments. The paper takes a closer look at the shared
security responsibilities that exist between consumer and provider. Finally, the paper investigates high availability concerns and demonstrates
how to help improve the resilience of your virtual servers in a cloud computing environment.
Keywords: cloud computing, security, IaaS, PaaS, SaaS
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.