{"id":676,"date":"2016-10-03T03:21:21","date_gmt":"2016-10-03T00:21:21","guid":{"rendered":"https:\/\/community.virtono.com\/?p=676"},"modified":"2016-10-03T03:21:21","modified_gmt":"2016-10-03T00:21:21","slug":"data-security-in-cloud-computing","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/knowledgebase\/data-security-in-cloud-computing\/","title":{"rendered":"Data Security in Cloud Computing"},"content":{"rendered":"<p>\u0097With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic problem of cloud computing data security. .<\/p>\n<p>\u0097Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share distributed resources via network in the open environment thus it makes security problems<\/p>\n<p>\u0097In this method some important security services including authentication, encryption and decryption and compression are provided in Cloud Computing system.<\/p>\n<p><b>DATA SECURITY IN CLOUD COMPUTING:<\/b><\/p>\n<p>Data outsourcing: users are relieved from the burden of data storage and maintenance<\/p>\n<p>When users put their data (of large size) on the cloud, the data integrity protection is challenging<\/p>\n<p>Enabling public audit for cloud data storage security is important.<\/p>\n<p>Cloud computing is built on top of virtualization, if there are security issues with virtualization, then there will also security issues with cloud computing.<\/p>\n<p>Data segregation. Data in the cloud is typically in a shared environment alongside data from other customers. Encryption is effective but isn&#8217;t a cure-all. The cloud provider should provide evidence that encryption schemes were designed and tested by experienced specialists.<\/p>\n<p>A data center full of servers supporting cloud computing is internally and externally indistinguishable from a data center full of &#8220;regular&#8221; servers. In each case, it will be important for the data center to be physically secure against unauthorized access.<\/p>\n<p>Computer and network security is fundamentally about three goals\/objectives:<\/p>\n<p>&#8212; confidentiality (C)<br \/>\n&#8212; integrity (I), and<br \/>\n&#8212; availability (A).<\/p>\n<p><i>Confidentiality <\/i>refers to keeping data private. Privacy is of the amount importance as data leaves the borders of the organization. Not only must internal secrets and sensitive personal data be safeguarded, but metadata and transactional data can also leak important details about firms or individuals. Confidentiality is supported by, among other things, technical tools such as encryption and access control, as well as legal protections<\/p>\n<p><i>Integrity <\/i>is a degree confidence that the data in the cloud is what is supposed to be there, and is protected against accidental or intentional alteration without authorization. It also extends to the hurdles of synchronizing multiple databases. Integrity is supported by well audited code, well-designed distributed systems, and robust access control mechanisms.<\/p>\n<p><i>Availability <\/i>means being able to use the system as anticipated. Cloud technologies can increase availability through widespread internet-enabled access, but the client is dependent on the timely and robust provision of resources. Availability is supported by capacity building and good architecture by the provider, as well as well-defined contracts and terms of agreement<\/p>\n<p><b>Reduces<\/b> the exposure of sensitive data<\/p>\n<p><b>Simplifies<\/b> security auditing &amp; testing<\/p>\n<p><b>Enables<\/b> automated security management<\/p>\n<p><b>Improves<\/b> redundancy &amp; disaster recovery<\/p>\n<p><strong>Latest technologies used\u00a0 in data security in cloud computing:<\/strong><\/p>\n<ul>\n<li>Latest Training Program on Cloud Computing and Windows Azure In order to address the aforementioned challenges, Fujitsu Laboratories developed new cloud information gateway technology that can flexibly control data, including data content, transmitted from the inside of a company to a cloud and between multiple clouds.<\/li>\n<li>In addition to the option of blocking confidential data, the data gateway also includes the following three features.<\/li>\n<\/ul>\n<p>Data Masking Technology<\/p>\n<p>Secure Logic Migration and Execution Technology<\/p>\n<p>Data Traceability Technology<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0097With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic problem of cloud computing data security. . \u0097Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share<\/p>\n","protected":false},"author":3,"featured_media":129,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5],"tags":[],"class_list":["post-676","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=3264%2C2448&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-aU","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":836,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/the-future-of-big-data-what-we-learned-from-2016\/","url_meta":{"origin":676,"position":0},"title":"The Future Of Big Data, What We Learned From 2016.","author":"Daniel Draga","date":"January 6, 2017","format":false,"excerpt":"#1: Cloud-Based BDA Technology Complexity in managing on- and off-premises data from disparate sources and types in a hybrid environment will persist. Integration, orchestration, provisioning, and data management requirements will increase during the transition to cloud. IT needs to work closely with business to identify and prioritize workloads to move\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/bigdata.jpg?fit=1200%2C821&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/bigdata.jpg?fit=1200%2C821&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/bigdata.jpg?fit=1200%2C821&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/bigdata.jpg?fit=1200%2C821&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/bigdata.jpg?fit=1200%2C821&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3151,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/virtono-at-cloudfest-2023-a-journey-into-the-future-of-cloud-computing\/","url_meta":{"origin":676,"position":1},"title":"Virtono at CloudFest 2023: A Journey into the Future of Cloud Computing","author":"Teo Moraru","date":"April 3, 2023","format":false,"excerpt":"As members of the Virtono team, we were excited to attend CloudFest 2023 and explore the latest advancements and trends in cloud computing. The three-day conference provided us with an incredible opportunity to network with industry peers, learn from experts, and showcase our own cloud hosting solutions. The event was\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"CloudFest","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":760,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/3-major-challenges-in-cloud-security\/","url_meta":{"origin":676,"position":2},"title":"3 major challenges in Cloud security","author":"Daniel Draga","date":"November 17, 2016","format":false,"excerpt":"Is your institution planning to leverage cloud computing and mobile computing in order to improve service agility, increase increase student and research success and lower costs of ownership, and lower capital expenses? If so, you are no doubt aware that your institution is also increasing its attack surface. Cloud-based technologies,\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":4073,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/virtono-admintools-at-davos-2025-innovation-recognition-and-a-vision-for-the-future\/","url_meta":{"origin":676,"position":3},"title":"Virtono &amp; AdminTools at Davos 2025: Innovation, Recognition, and a Vision for the Future","author":"Teo Moraru","date":"February 4, 2025","format":false,"excerpt":"Earlier this year, the world\u2019s most influential business, tech, and policy leaders gathered in Davos for the\u00a0World Economic Forum (WEF) 2025. Alongside this prestigious event,\u00a0Davos Innovation Week - Quantumfai\u00a0brought together the brightest minds in technology, investment, and entrepreneurship to discuss and showcase groundbreaking innovations. Among the standout participants was\u00a0Teodora Moraru,\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"WEF Teodora Moraru","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":777,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/business-intelligence-roadblocks\/","url_meta":{"origin":676,"position":4},"title":"Business Intelligence Roadblocks","author":"Daniel Draga","date":"November 27, 2016","format":false,"excerpt":"Business Information asked attendees at the BI Leadership Summit, \u00a0a conference in New York co-hosted by SearchBusinessAnalytics and \u00a0consultancy Eckerson Group, about the biggest challenges they face \u00a0in increasing the use of business intelligence, or BI, and analytics \u00a0applications inside their organizations. \u00a0 IT User-oriented technology trends like self-service BI\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Business-Intelligence-Buzzwords-panda.jpg?fit=901%2C533&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Business-Intelligence-Buzzwords-panda.jpg?fit=901%2C533&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Business-Intelligence-Buzzwords-panda.jpg?fit=901%2C533&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Business-Intelligence-Buzzwords-panda.jpg?fit=901%2C533&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":705,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/what-is-network-function-virtualisation-nfv\/","url_meta":{"origin":676,"position":5},"title":"WHAT IS NETWORK FUNCTION VIRTUALISATION (NFV)?","author":"Daniel Draga","date":"October 14, 2016","format":false,"excerpt":"Network Function Virtualisation (NFV) In computer science, network function virtualisation (NFV) is a network architecture concept which uses the technologies of IT virtualisation. It is used to virtualise entire classes of network node functions into building blocks that may connect, or chain together, to create communication services. 1. Fast standard\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/10\/123.png?fit=464%2C266&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=676"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/676\/revisions"}],"predecessor-version":[{"id":677,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/676\/revisions\/677"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/129"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}