Abstract
The issues of cybersecurity these days are extremely relevant. With the massive use of the Cloud Computing system, new concerns about the processes to provide this technology with security appeared. The Cloud Computing infrastructure is based on virtualization and distributed computing, often using the shared resource pooling system. For these scenarios, key issues are considered: authentication, and access control. These issues make relevant the following items: data security, regulatory data, privileged access and data recovery. The issue of security in cloud computing involves encryption, it is important to specify the advantages and disadvantages of symmetric encryption and asymmetric encryption. Parallel to this it is important to develop a set of policies for the creation of passwords and subsequent maintenance and alteration of them, as well as their security. the two mandatory pillars for security in Cloud Computing are encryption and a strong passwords policy.
Highlights
A good way to see cloud computing is a framework that already offers great value-added services, but is still in the state of full maturity, especially in security
NIST defines it as the process of allocating information resources exclusively to an information system in which the security limit is defined for that same system [4]
The issue of authentication and authorization is very important in Cloud Computing security, because data access is layered and the required passwords are various
Summary
A good way to see cloud computing is a framework that already offers great value-added services, but is still in the state of full maturity, especially in security. Not all cloud deployment models (public, hybrid, private, and community) are appropriate for each service, each service customer, or all interested parties. Likewise, it is not cost effective for all cloud providers to implement high security or provide the same level of security. Cloud computing is compelling, it is a growing trend in IT, and is forcing significant advances in supporting technologies such as security. In this paper, are exposed some of the common security issues or prospective issues that adapt to cloud computing. Issues related to cloud architecture security will be addressed
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal on Data Science and Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.