AN EXAMINATION OF CLOUD COMPUTING SECURITY CONCERNS AND POTENTIAL REMEDIES
Satish Kumar
Page No. : 49-53
ABSTRACT
Cloud computing solutions are becoming more and more commonplace due to their many benefits. Among them are cost-effectiveness, time savings, and effective utilisation of computer resources. However, one of the main barriers to the widespread use of this new technology is worries about privacy and security. Due to the nature of these paradigms, customers must move their data to the cloud. Data owners might not be aware of the underlying security issues and remedies as service providers are typically in charge of data security and privacy. Concerns concerning the security of the information handled by distributed computing suppliers accompany and at the same time impede the organisation and usage of distributed computing on a large scale in industry. The loss of control organisations have over their framework is one effect of transferring information preparation and premises. Therefore, cloud service (CS) users must believe that the CS provider can protect their data and infrastructure from external and internal threats. However, as of right now, such trust cannot be remotely evaluated and certified by an outside group and can only rely on hierarchical protocols disclosed by the CS supplier. Building trust in the CS provider may be achieved in part by giving the CS client the ability to verify the reliability of the host where the virtual machine example will run and to ensure that the virtual machine image is unaltered. The ability to do this prior to the dispatch of the VM event allows the CS customers to decide in real-time whether specific data should be stored or estimates should be made on the VM occurrence provided by the CS supplier.
FULL TEXT