Cloud Computing1

1. Abstract
Data security is a serious issue in cloud computing because of the location of use data in
different places across the world. This paper will discuss the security and privacy of end
user data in cloud computing. The paper will delve into the details of data protection
measures used to ensure maximum data protection while reducing the risks to user data.
This research paper will also compare existing research on the techniques and approaches
used to secure user data on cloud platforms.
2. Objectives
To highlight data security challenges in cloud computing and propose effective solutions.
Review literature on existing security and privacy measures used to safeguard user data
in cloud platforms.
Assess the effectiveness of some important security measures such as encryption,
authentication, compression and decryption.
Examine emerging challenges for cloud computing security and privacy.
The focus will be directed towards critical issues that emerge when data is in transit
especially during migration from one cloud service provider to the next.
3. Research Question
How safe is end user data in the cloud? To examine the security of end user data, it is
important to ask several questions. These include but are not limited to: how to gain
visibility and achieve transparency in cloud environments, how to ensure the safety of
web applications and protect them from becoming vectors of attacks, and how to control
access of cloud platforms by users across the globe.
4. Expected results
Despite modern techniques meant to protect end user data in cloud platforms, there is still
a possibility that cloud services or applications may be hacked. To maximize cloud
storage security, it is advisable to combine various data protection approaches or
strategies. Hardening data protection using multiple techniques rather than just
encryption is important when considering powerful attacks meant to steal or destroy
private user data.
5. References
Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud
computing. In Computer Science and Electronics Engineering (ICCSEE), 2012
International Conference on (Vol. 1, pp. 647-651). IEEE.
Zhang, X., Du, H. T., Chen, J. Q., Lin, Y., & Zeng, L. J. (2011, May). Ensure data
security in cloud storage. In Network Computing and Information Security
(NCIS), 2011 International Conference on (Vol. 1, pp. 284-287). IEEE.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud
computing using encryption algorithms. International journal of engineering
research and applications, 3(4), 1922-1926.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.