CLOUD TECHNOLOGY AND ITS ISSUES

THE TCHNOLOGY WHICH HAS CHANGED EVERYTHING!!!
Introduction:
It is used at wide scale by the internet user’s. The Cloud Computing reshapes IT industry and in software development process. The need of personal life is increases day by day with passage of time. Where as the idea of cloud computing is help to the public users clients and it professional and companies by providing their services.. Cloud computing is an online web based storage which is given to its user to protect and save their data for long purpose. According to this view ,today the cloud computing play important role in many fields like as information technology industry and also in our modern life. (Cloud computing is the combination of technologies) There are some definitions by some researches or developers.

First is written by( Gartner)” Cloud Computing as being scalable, delivering IT- enabled services using the Internet”. (webopedia.com, n.d.)
Second is written by :( Rhoton,J)”Cloud Computing is a set of business models and technologies that enables IT functions to be delivered and consumed via third party.” (www.whatls.com, n.d.)
The third is definition is mostly use.it is written by ( Garnet., Mell.P)
“a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, application and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction “ (www.wekipedia.com, n.d.)
ISSUES IN CLOUD COMPUTING :
The basic cloud computing issues discuss in detail as below. Security Issues In Cloud Computing. There are some security issues in cloud computing some are written like as, Data Issues, Privacy issues. Infected Application. Security issues, These are some issues which creates problems for users. Data Issues Sensitive data in a cloud computing is the major issues of cloud. Firstly, when a client store his data on cloud, anyone anytime can access private and necessary data from the cloud from anywhere. So that the user of cloud computing not feel secure their data on cloud computing.
Privacy issues:

The service provider of cloud computing sure make sure that the personal and private data of one client is secure by other user or clients. The privacy of data is very necessary today ,the service provide make sure the privacy of data for its user because it is the responsibility of service provider to protect the data of its clients and users
Infected Application:
The service provider of cloud computing have complete access and the right to access to data and service to maintained and for security purpose. The computer program which is provide computer service another company does for you over the internet is affected by the computer criminals and developers which want to access the private data of people.
SOLUTIONS AND TIPS FOR ISSUES:
First layer is secure virtual machine layer. Second layer is cloud storage layer. This layer has a storage basic equipment needed for a business socity to operate which combines different things together so they work as one unit usfulthings from multiple computer service another company does for over the Internet providers to build a huge virtual storage system. Fourth layer is virtual network monitor layer. This layer combining both hardware and software solutions in virtual machines to handle problems.
such as key logger examining.
(Kevin Hamlen, 4(2),)
However, there are more than two groups working and interested in developing standards and security for clouds. The Cloud Standards web site is collecting and coordinating information about cloud-related standards being worked on now by other groups. The Cloud Security Friendly partnership (CSA) is one of them. CSA gathers solution providers, non-(moneymade/good things received) and people to enter into discussion about the current and future best practices for information promise
in the cloud. Another group is Open Web Application Security Project (OWASP). OWASP maintains a list of weaknesses (that could be used to hurt something or someone) to cloud-based or Software as a Service use/military service models
which is updated as the threat (wide view of a nature scene/wide area of beautiful land) changes. The Open Grid Forum publishes documents to containing security and infrastructural (described/explained descriptions of exactly what isneeded/demanded) and information for grid figuring out/calculating developers and (people who work to find information).
There are some tips and tricks that cloud security solution providers should kept in mind when they delivers their service to (computer service another company does for you over theInternet) person in a public cloud solution.
Verify the access controls:
Set up data access control with rights and then prove that these access controls by the cloud service provider whenever data is being used by cloud service consumer. To put into use access control methods for consumer side, the cloud service provider must describe and secure that the only approved users can access the user or consumer’s data.
Control the consumer access devices:
Be sure the consumer’s access devices or points such as Personal Computers, virtual terminals,, newspapers, very short and mobile phones are secure enough. The loss of an endpoint access device or access to the device by an unauthorized user can cancel even the best security rules of conduct in the cloud. Be sure the user computing devices are managed properly and secured from harmful programs or apps functioning and supporting advanced verifying someone’s identity features.

Monitor the Data Access:
cloud service providers have to promise to about whom, when andwhat data is being accessed for what purpose. For example many website or server had a security complaint related to trying to find out private things in a sneaky way activities by many people such as listening to voice calls, reading emails and personal data etc.
Share demanded records and Verify the data deletion:
If the user or person needs to report its following the law, then the cloud service provider will share diagrams or any other information or provide audit records to the person or user. Also verify the proper deletion of data from shared or reused devices. Many providers do not provide for the proper degaussing of data from drives each time the drive space is empty/left alone. Insist on a secure deletion process and have that process written into the contract.
(Tackle your client’s security issues with cloud computing in 10 steps,)

SECURITY CHECK EVENTS:
Secure that the cloud service provider gives enough details about getting what is wanted of promises, break problem fixing and reporting related to one thing depending on another thing that might or might not happen. These security events will describe responsibility, promises and actions of the cloud computing service provider.
CONCLUSION AND FRAMEWORK:
One of the big security issue in cloud computing is sharing of data or use full things. The service provider of cloud storage is need to inform their clients or user to the level of security on cloud computing which is given to them. In this paper, we discuss what is cloud computing and also discuss its functions and the challenges cloud computing and discuss their issues and also discuss their solutions which are given by some companies , researchers in it. Our main topic of this research is security issues in cloud storage. The major issue is in data security. There are a lot of challenges and security issues in cloud computing. In this paper highlighted the major and some issues and discuss its solution. New security ways of doing things are require to develop for security and the old security ways of doing things need to updated with the passage of time.

H2
H3
H4
3 columns
2 columns
1 column
Join the conversation now
Logo
Center