Data Security in the Cloud Computing

Cybertechnology is becoming a major industry as more organizations begin to utilize the Internet in their infrastructure. Cloud computing is a segment of cybertechnology that is particularly relevant today since it offers many opportunities to enterprises. Specifically, cloud computing provides high efficiency of data processing, scalability, and automatic updates of software and other components and does not require a high degree of maintenance. At the same time, cloud computing also has certain issues, and one of the primary ones is data security. The issue of cloud data security involves various factors, including technology solutions, procedures, and policies implemented by enterprises, as well as user access. To provide a thorough analysis of the issue, proper sources of information had to be identified using a series of guiding questions.

The search strategy involved five main questions on the topic of data security in cloud computing, some of which were later modified. The first question utilized in the attempt to locate appropriate sources was the following, “What are the relevant methods of ensuring data security in cloud computing.” Another question concerned the exact procedures of data protection, “Which procedures do organizations use to protect data in cloud-based systems.” The third question was about the existing security issues, “Which data security issues do enterprises encounter most often when using cloud-based solutions?” The fourth question concerned the aspects of user access to cloud-based data, “Which mechanisms are utilized in the control of user access in the cloud environment?” The question later was modified to yield more relevant results and became the following, “What type of software is used in cloud user access management?” The change in the fourth question enabled me to identify more results that contained important information on the topic. Finally, the fifth question was, “What is the most effective system for the protection of data in cloud computing?”

References

Kumara, R., Rajb, H., &, Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691–697.

Mehdar, Z. (2022). Cybersecurity and cloud computing: Risks and benefits. Rewind.

Sibai, R., Gemayel, N., Abdo, J., & Demerjian, J. (2020). A survey on access control mechanisms for cloud computing. Transactions on Emerging Telecommunications Technologies, 31(2), 1–13.

Tariq, M., Balas, V., &, Tayyaba, S. (2022). Security and privacy trends in cloud computing and big data. CRC Press.

Cite this paper

Select style

Reference

StudyCorgi. (2023, June 17). Data Security in the Cloud Computing. https://studycorgi.com/data-security-in-the-cloud-computing/

Work Cited

"Data Security in the Cloud Computing." StudyCorgi, 17 June 2023, studycorgi.com/data-security-in-the-cloud-computing/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2023) 'Data Security in the Cloud Computing'. 17 June.

1. StudyCorgi. "Data Security in the Cloud Computing." June 17, 2023. https://studycorgi.com/data-security-in-the-cloud-computing/.


Bibliography


StudyCorgi. "Data Security in the Cloud Computing." June 17, 2023. https://studycorgi.com/data-security-in-the-cloud-computing/.

References

StudyCorgi. 2023. "Data Security in the Cloud Computing." June 17, 2023. https://studycorgi.com/data-security-in-the-cloud-computing/.

This paper, “Data Security in the Cloud Computing”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.