This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Data

Data security in cloud computing

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Data security in cloud computing

Research methodology

A rapid growth in the development and adoption of cloud computing is the most significant driver towards sensitivity to data security. A research methodology will evaluate the applicability of access control in ensuring that data in a cloud computing system is secure. The analysis shall assume that the traditional system is obsolete and prone to a security threat. The case shall thus assess the viability of limited control of systems by a sole owner who determines the access. A different case shall entail the determination of the accessor by the system through an intelligence filter system. A MAC control eventually shall assign a trust verification to a subject while the system shall assess the object.

The rationale for your plan

The methodology is varied substantially at the peak of cyber-development

, where the identification and authentification.

Don't use plagiarised sources.Get your custom essay just from $11/page

 

method is prone to errors. The access models can also be modified in the protocol of ownership ranging from an individual group to corporate ownership. Additionally, the intelligent filter system entails the labeling of data. The case is reported to have resulted in great success, preferably for top-secret, confidential, and unclassified information. The methodology is also easier to embed to sophisticated systems like MAC for windows, as noted in the case of the United States department on defense.

Potential problems

Even though ownership is varied, a change in employee

status would lender the system subject to modification. Another issue that arises is how well a system responds to life cycles. Aspects such as backups, in this case, imply that the stored data may be prone to mal-access at a future date, and thus, access policies need regular adjustments. A common tragedy eventually ensues in the segregation of sensitive and insensitive data, an aspect that would result in a different treatment.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask