Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

perpare the \"the fllowing papaer :A Study on Data Storage Security Issues in Cl

ID: 3848259 • Letter: P

Question

perpare the "the fllowing papaer :A Study on Data Storage Security Issues in Cloud Computing Naresh vurukonda1 , B.Thirumala Rao2 " in power point presentation you will find the paper in the fallowing link http://www.sciencedirect.com/science/article/pii/S1877050916315812#

explain each of the following point in detailes and start your topic with introduction about the paper

Data Privacy & Integrity

Data Recovery & Vulnerability

Improper Media Sanitization

Data Backup

Malicious Insider

Outside Intruder

Service Level Agreements

Legal Issues

Explanation / Answer

cloud computing:

In todays software field cloud computing is the hot topic and its benefits are awesome when compared with the other technologies.This service provides rich benefits to the clients due to its cost less services,elasticity odf resources,easy access through the internet etc.Every organization form small to large companies are using this technology and got more number of benefits.

Even though it has so many benefits cloud users are unwilling to place sensitive data or confedential data in the cloud.coming to cloud storage issues

Data privacy:
It is also called as information privacy.The main aspect of this data privacy is it points(selects) out which data in the system should be shared to the third parties.That means data privacy will occur so that confidential data is protected.

Data integrity:

It refers the validity, accuracy, consistency of the data over its life cycle.For security point of view this will helps to many core organizations and entreprises to get a better security.

Data recovery and vulnerability:

To the sensitive data this concept become major threat.Actually the cloud ensures dynamic and on-demand resource due to the reason of elasticity characteristics and resource pooling .As some point or later point of time the resource allocated to a particular user may be assigned to the other user.SO there is chance that the other user or hacker can use data recovery techniques to get the data of pevious users.

To get a solution for this to do regular backups if any accidental or intentional disasters suddenly occur.SO that data availability is more and secure.Due to this we can prevent malicious activities and unauthorized access.

Improper media refinement:

Becuase of the following reasons the the storage medias should sanitize.Here they are conditions like 1) should not maintain disk for longer period that means should replace the disk
2)great risk to the data id due to improper refinement.


Malicious Insiders:

Usually insider threats will occur due to the emloyees or person working the inside the oraganization like contractors etc.This leads to the the loss of users personal data at both environments.This attack will occur in most of the oraganizations and still didnt come up for better solution for this.SO there is no solution and should be careful for not occuring the data breeches in the compnay by keeping security programmes in the company.


outside Intruder:

Attacks will occur from outside or external sources are called outside intruder attacks.We know data security is the main problem in cloud computing.To get the full data security the service providers will totally depend on infrastructure provider.But in virtual private cloud environment the service provider will explain the security settings remotely and may be 100 percent it is not implemented by infrastructure provider.In that case the infrastructure provider shoukld reach the following
objectives.1) auditing 2)confidentiality for secure data transfer and access.SO by this methods the outsiders cannot have access to hack the data which is present in cloud.


Service level agreements

It is nothing but the aggreement or conditions and terms among the user and cloud service provider on what are the certain actions should perform and what are the actions should not perform and should be aggreed for the laws.


Legal issues

If the user is changed to one location to the other kocation then the issue will raise of different legal
jurisdictions.So that here the data is distributed to various locations and data centers crossing the security guidelines.This is the serious issue in cloud computing.