Data Storage Security in Cloud Computing White Paper

Cloud computing is the widely used technology across the software organizations these days. In general cloud computing refers to the on demand usage of the resources required for the clients and these requirements can be on the lines of data and software through a typical computer network. If the clients or users of the cloud computing need some resources like word processing, they can request the service providers even if the required software or data is missing at their local location .

All the data and the required software operations as per the need of the clients and the users are provided by the service providers. If the client or the end users has a minimum set of software’s like a operating system or a web browser, they can be connected easily to the cloud computing service provider and enjoy the privileged benefits of the cloud provider.

In general a cloud computing technology works under the guidance of sophisticated techniques and the minimum requirement for this technology to work is a well established network with the appropriate connections to the end users and the service providers. The cloud can be accessed through an internet or an intranet or both in some cases and the service providers utilizes the network connections to provide the required services to their client or end users as per their requirements.

Dependable and Secure Storage in a Cloud-of-Clouds

The usage of the required cloud depends on the requirements of the end users and the clients and they can opt the required cloud and make the best usage of the cloud. In general the major issue that make most of the vendors or clients to think twice across the implementation of the cloud computing the data storage and the corresponding security issues related to the data storage.

Data storage across cloud computing is done at the third party level and stored across multiple servers at a separate remote location rather than the dedicated servers to a particular client. This implementation makes the clients to worry about the security of their data, as the data is stored at a remote location under the supervision of a third party which they are not aware of the security policies implemented by them. Most of the hosting companies provide ample storage space as per the requirements of the clients and the clients can store their data at the data centers, even this is a good implementation across the cloud computing, the main reason why the companies look backward is the security.

The main two issues with the cloud computing in the perspective of the clients is reliability and security. Most of the clients never show their interest towards managing their data at the third party level as the data may hold lot of confidential issues and thus they always think about the reliability of their data served by the third party service providers. To get the required confidence from the clients and the end users, most of the vendors are striving a lot to provide the at most security to their data in different forms and they implement many techniques like authentication, authorization and traditional methods like encryption algorithms. Apart from the efforts kept by the third party vendors, still the clients worry about the data stored at the remote location and always are in a mindset that their data may be accessed by unauthorized users at some time and even the clients doubt about the service providers with respect to their financial status and technical feasibility of the clouds provided by the vendors.

Frequent crashes to the clouds of the service provider may cause the clients to worry a lot with respect to their data and the corresponding reliability and security. This idea made me to work on the data storage issues of the cloud computing the learn the perspective of the small organizations who are looking to upgrade their process to a cloud computing level and following research questions are identified across this research

One Reply to “Data Storage Security in Cloud Computing White Paper”

Leave a Reply

Your email address will not be published. Required fields are marked *