Data security in cloud computing
Research methodology
A rapid growth in the development and adoption of cloud computing is the most significant driver towards sensitivity to data security. A research methodology will evaluate the applicability of access control in ensuring that data in a cloud computing system is secure. The analysis shall assume that the traditional system is obsolete and prone to a security threat. The case shall thus assess the viability of limited control of systems by a sole owner who determines the access. A different case shall entail the determination of the accessor by the system through an intelligence filter system. A MAC control eventually shall assign a trust verification to a subject while the system shall assess the object.
The rationale for your plan
The methodology is varied substantially at the peak of cyber-development
, where the identification and authentification. Don't use plagiarised sources.Get your custom essay just from $11/page
method is prone to errors. The access models can also be modified in the protocol of ownership ranging from an individual group to corporate ownership. Additionally, the intelligent filter system entails the labeling of data. The case is reported to have resulted in great success, preferably for top-secret, confidential, and unclassified information. The methodology is also easier to embed to sophisticated systems like MAC for windows, as noted in the case of the United States department on defense.
Potential problems
Even though ownership is varied, a change in employee
status would lender the system subject to modification. Another issue that arises is how well a system responds to life cycles. Aspects such as backups, in this case, imply that the stored data may be prone to mal-access at a future date, and thus, access policies need regular adjustments. A common tragedy eventually ensues in the segregation of sensitive and insensitive data, an aspect that would result in a different treatment.