Intentional Vs Unintentional Data Leakage Types and the Corresponding Prevention Techniques in Cloud Computing Environments

Download Now
Provided by: International Journal of Engineering, Applied and Management sciences paradigms (IJEAM)
Topic: Cloud
Format: PDF
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. The cloud model promotes availability and is composed of five essential characteristics, three service models and four deployment models. The advantages of the cloud computing are including scalability, resilience, flexibility, efficiency and outsourcing non-core activities. However, organizations are slow in accepting cloud computing due to security issues and challenges associated with it. The consumers need to be vigilant in understanding the risks of data breaches in this new environment.
Download Now

Find By Topic