Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

An overview of threats to data security and integrity in cloud computing

View through CrossRef
Cloud computing has become an integral part of our lives, and today it is used almost everywhere. In general, cloud computing is a concept of providing IT resources in the form of services. There are two cloud computing models: deployment models, which differ in the type of cloud management and access to the cloud and the level of security, and service models, which differ in the level of service provision, which affects, among other things, the level of responsibility of the service provider and the consumer. Cloud services began to gain popularity in 2009, and the demand for them has grown exponentially every year. They became especially popular during the pandemic in 2019, when people had to stay at home without interrupting their work processes, and now, in post-covid times, they also remain popular due to their convenience, high availability, easy scalability and cost savings. Due to the widespread use of cloud computing services, a high level of security is required. Unfortunately, the popularity of cloud computing has its drawbacks – in addition to the fact that it is more difficult to monitor the security of a remote environment than the security of a local computer, there are many other threats. In today's reality, people use cloud computing technologies in large volumes, for example, at work, for personal purposes, etc., as they have great trust in these technologies. This is the reason why it is necessary to maintain a high level of security and constantly improve it. Cloud computing security threats are usually divided into confidentiality, integrity, and availability threats. To prevent the loss of confidential information, service providers must ensure its integrity. Users want to be sure that their data will not fall into the hands of an intruder or third-party services. Therefore, this article discusses the most common threats to data security and integrity in cloud computing and the existing methods that prevent these vulnerabilities and possible problems at different levels and with the help of different tools.
Kharkiv National University of Radioelectronics
Title: An overview of threats to data security and integrity in cloud computing
Description:
Cloud computing has become an integral part of our lives, and today it is used almost everywhere.
In general, cloud computing is a concept of providing IT resources in the form of services.
There are two cloud computing models: deployment models, which differ in the type of cloud management and access to the cloud and the level of security, and service models, which differ in the level of service provision, which affects, among other things, the level of responsibility of the service provider and the consumer.
Cloud services began to gain popularity in 2009, and the demand for them has grown exponentially every year.
They became especially popular during the pandemic in 2019, when people had to stay at home without interrupting their work processes, and now, in post-covid times, they also remain popular due to their convenience, high availability, easy scalability and cost savings.
Due to the widespread use of cloud computing services, a high level of security is required.
Unfortunately, the popularity of cloud computing has its drawbacks – in addition to the fact that it is more difficult to monitor the security of a remote environment than the security of a local computer, there are many other threats.
In today's reality, people use cloud computing technologies in large volumes, for example, at work, for personal purposes, etc.
, as they have great trust in these technologies.
This is the reason why it is necessary to maintain a high level of security and constantly improve it.
Cloud computing security threats are usually divided into confidentiality, integrity, and availability threats.
To prevent the loss of confidential information, service providers must ensure its integrity.
Users want to be sure that their data will not fall into the hands of an intruder or third-party services.
Therefore, this article discusses the most common threats to data security and integrity in cloud computing and the existing methods that prevent these vulnerabilities and possible problems at different levels and with the help of different tools.

Related Results

CLOUD COMPUTING - NAVIGATING THE DIGITAL SKY
CLOUD COMPUTING - NAVIGATING THE DIGITAL SKY
“Cloud Computing – Navigating the Digital Sky” is an extensive guide designed to provide a thorough understanding of cloud computing, an essential technology in today’s digital age...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
SECURITY THREATS AND COUNTERMEASURES IN CLOUD
SECURITY THREATS AND COUNTERMEASURES IN CLOUD
Cloud computing refers to the continuous availability of computer infrastructure technology, enabling the handling and storage of information without direct client management. Peop...
THE ROLE OF CLOUD COMPUTING IN SCALING E-COMMERCE BUSINESSES
THE ROLE OF CLOUD COMPUTING IN SCALING E-COMMERCE BUSINESSES
In the rapidly evolving digital landscape, e-commerce has emerged as a cornerstone of global trade, necessitating robust, scalable solutions to accommodate increasing consumer dema...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
Title Case
Title Case
Abstrak Bisnis saat ini mulai bersaing secara global untuk dapat memuaskan pelanggan, sehingga perusahaan membutuhkan akses informasi yang cepat dan akurat. Agar dapat mengakses in...
Cyber Security in Cloud Computing
Cyber Security in Cloud Computing
Cloud computing cybersecurity must be offered by the elements that make up its structure. Accurately identifying the hazards associated with this technology is the first step towar...

Back to Top