AN OVERVIEW OF PRIVACY SCHEME IN CLOUD COMPUTING
2014
Cloud computing provides a virtualized pool of computing resources. Cloud computing is categorized in three different broad service models: Software as a Service (SaaS); Platform as a Service (PaaS); Infrastructure as a Service (IaaS).An example is the accessing ofservices from remote databases through the use of Internet. This means users cannot physically or directly access data from the cloud server, without a client’s knowledge. Therefore, there is no need for users to know the exact location of the server; but there is a need for securing the data and information especially in public cloud computing. The aim of this study was to investigate the security challenges or vulnerabilities of cloud computing and propose a conceptual solution. In this regard, a systematic literature search was conducted. Descriptive statistics was used to analyse the data. The researcher found that there are a lot of research issues within the area of security in cloud computing. Furthermore, through this overview study the researcher found that most policies of cloud computing providers allow them to modify or delete data which is not used or that occupy a chunk of the storage space without consulting the clients. This is another security vulnerability issue which creates a research platform.
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
12
References
0
Citations
NaN
KQI