Secure Approach for Data in Cloud Computing

Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
Previously, computer software was not written with security in mind; but because of the increasing frequency and sophistication of malicious attacks against information systems, modern software design methodologies include security as a primary objective. With cloud computing systems seeking to meet multiple objectives, such as cost, performance, reliability, maintainability, and security, trade-offs have to be made. Any cloud server is vulnerable to an attacker with unlimited time and physical access to the server. Additionally, physical problems could cause the server to have down time. This would be a loss of availability, which is one of the key principles of the security triad - Confidentiality, Integrity, and Availability (CIA).

Find By Topic