Cloud Technology: The Importance And Uses Of Cloud Computing

714 Words2 Pages

Cloud Computing is one of the predominant and emerging technologies. It provides easy access to the resources from all around the world remotely through internet access .As a result of this all the organizations/business enterprises are looking to take advantage of the cloud technology to make efficient use of resources and minimizing the storage cost. Cloud technology is designed with different type of services like IaaS (Infrastructure as a service),SaaS (Software as a Service),and PaaS (Platform as a Service) for the different type of business /users. Cloud computing is all about storing the files at third party. So, in that terms cloud environment is very unsafe. In spite of weak security measures that are maintained using standard authentication methods, this type of access will be vulnerable and easy for the intruders to breach out the data from the cloud.

“A major goal of hackers is to have control over system with ability to monitor, intercept, and modify system events and activities” (Rahman, 2011). And “All the sensitive data is received from the organization is processed by SaaS application and stored at the SaaS vendor end” (Goyal & Supriya, 2013). describes about how cloud architecture was designed .In addition to it “Many organizations are legally required to protect their data because organization don’t have any control over the sensitive information.” (Kuyoro Shade O, Chigozirim, Omotunde Ayokunle A, & Ibikunle Frank A, 2012). So, we need a secure mechanisms to deliver the data integrity and reliability for the cloud.

Figure1. Cloud Architecture Source : Google

Addressing the above issues I did a research on the security mechanisms that enhance and improve the security in cloud. And I found Trusted Com...

... middle of paper ...

...cutes the boot loader, which in turn does the same with the OS kernel, and so forth”(Chen & Lee, 2014) and next the ”TPM processor saves the system hardware and software configuration and delivers it to the cloud server ,it will directly process the request using the master private key from the TPM processor which serves as authentication for the client”(Sandhya, 2011). This technology was earlier implemented in conventional pc’s figure 4 describes the difference between conventional pc and TPM embedded pc.
Figure 4 Conventional PC vs TPM embedded PC.

In addition to this we can also monitor user behavior in the cloud “because user’s identity is proved by user’s personal key and this mechanism is integrated in the hardware, such as the BIOS and TPM, so it is very hard to the user to make deceiving for their identity information”(Dawson, 2010).using this mechanism
.

Open Document