The Final Project must contain at least 20 slides, a one page single spaced abstract with a good title, and a reference list of at least 5 sources. The proposal must be at least one page single spaced (500 words). An annotated reference list must be appended. The annotations should each include two paragraphs for each source – a summary and a reflection. Include a meaningful title.

please prepare presentation based on below information:

Final Project

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Security on Cloud

Abstract:

In the current regime, it’s obvious that we are living in a world where there is constant clod revolution.Most business is witnessed moving from the critical Information Technology data and structure to the cloud. The shift is promoted by the excellent cloud platform which promises operational efficiency, agility, flexibility, profitability, and productivity.The data is assumed to be secure, in the cloud since there are cases of limited access. However, every technology is reported to have its drawback.For instance, the flip side of the cloud includes lack of control and ownership which means it’s a security threat. The nature of the cloud technology makes it susceptible to the open to cyber-crimes like hacking of the data. Data is collected through interviewing business providers who are currently using the technology (Asghar et al. 2017). Therefore, the research is to help us understand how data is secured in the clouds.

Introduction :

According to the recent survey, the cloud is supposed to drive around 85% of the business enterprises by the year 2020. Since it has the capability of capturing customers, it intends to achieve customer delight so that they can at least use one cloud platform. A lot of sensitive data lies within the cloud, and the amount of high value grows exponentially as the time lapses (Asghar et al. 2017). However, in the shadows, information like, health records, marketing data, and election data have been compromised.

Securing data on the cloud :

The main aim of darkness is to keep the stored data secure from intruders.The onus of the cloud security in most cases it lies between the cloud and the individual. Cloud security is presumed to be the effort between the owner and the CSP. Therefore, one should ask him or herself how to read is their CSP to help in securing the applications and the data. The following are some critical point to assist in understanding the security of data:

  • One should make sure that he or she has signed with the cloud service provider who has got strict security measures. The policies will be used as strategies to ensure that the data has been secured adequately and can only be retrieved by the owner. The business person will check and ensure that the business person will be happy about the storage of the data in the cloud since confidentiality is an essential aspect of their service delivery (Orsini et al. 2016).
  • One should understand how to use security measures to reduce the gap between the cloud provider’s standards and expectation. In most cases, service providers have limitations on what they can offer. On the other hand, have his or her expectations to he or she aims to achieve.
  • The two leading companies in the provision of cloud services that is, Microsoft and Amazon, have launched their credentials to ensure that access to the information stored is legitimate. They are aiming at reducing unauthorized access into the system (Asghar et al. 2017).

Conclusion:

In conclusion, therefore, if the above policies and procedure are implemented, an individual is guaranteed success in securing the data in the cloud.Strict policies like those of California consumer privacy Act, the general data protection regulation, etc. are some of the best means to secure the data for future use.

Reference:

Orsini, R. L., O’hare, M. S., & Martin, D. (2016). U.S. Patent No. 8,654,971. Washington, DC: U.S. Patent and Trademark Office.

Asghar, M. R., Ion, M., Russello, G., & Crispo, B. (2017). Securing data provenance in the cloud. Open problems in network security (pp. 145-160). Springer, Berlin, Heidelberg.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.