fbpx

—With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic problem of cloud computing data security. .

—Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share distributed resources via network in the open environment thus it makes security problems

—In this method some important security services including authentication, encryption and decryption and compression are provided in Cloud Computing system.

DATA SECURITY IN CLOUD COMPUTING:

Data outsourcing: users are relieved from the burden of data storage and maintenance

When users put their data (of large size) on the cloud, the data integrity protection is challenging

Enabling public audit for cloud data storage security is important.

Cloud computing is built on top of virtualization, if there are security issues with virtualization, then there will also security issues with cloud computing.

Data segregation. Data in the cloud is typically in a shared environment alongside data from other customers. Encryption is effective but isn’t a cure-all. The cloud provider should provide evidence that encryption schemes were designed and tested by experienced specialists.

A data center full of servers supporting cloud computing is internally and externally indistinguishable from a data center full of “regular” servers. In each case, it will be important for the data center to be physically secure against unauthorized access.

Computer and network security is fundamentally about three goals/objectives:

— confidentiality (C)
— integrity (I), and
— availability (A).

Confidentiality refers to keeping data private. Privacy is of the amount importance as data leaves the borders of the organization. Not only must internal secrets and sensitive personal data be safeguarded, but metadata and transactional data can also leak important details about firms or individuals. Confidentiality is supported by, among other things, technical tools such as encryption and access control, as well as legal protections

Integrity is a degree confidence that the data in the cloud is what is supposed to be there, and is protected against accidental or intentional alteration without authorization. It also extends to the hurdles of synchronizing multiple databases. Integrity is supported by well audited code, well-designed distributed systems, and robust access control mechanisms.

Availability means being able to use the system as anticipated. Cloud technologies can increase availability through widespread internet-enabled access, but the client is dependent on the timely and robust provision of resources. Availability is supported by capacity building and good architecture by the provider, as well as well-defined contracts and terms of agreement

Reduces the exposure of sensitive data

Simplifies security auditing & testing

Enables automated security management

Improves redundancy & disaster recovery

Latest technologies used  in data security in cloud computing:

  • Latest Training Program on Cloud Computing and Windows Azure In order to address the aforementioned challenges, Fujitsu Laboratories developed new cloud information gateway technology that can flexibly control data, including data content, transmitted from the inside of a company to a cloud and between multiple clouds.
  • In addition to the option of blocking confidential data, the data gateway also includes the following three features.

Data Masking Technology

Secure Logic Migration and Execution Technology

Data Traceability Technology

 

 

Categories: Knowledgebase

0 Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.