Wednesday, April 17, 2019

Cloud security, DATA LOSS and HIJACKING Literature review

Cloud security, info LOSS and HIJACKING - Literature review ExampleUsers can upload and access uploaded pictures, documents, music files. www.dropbox.com debauch cipher lay caters possible free 18 gigabytes of memory to its users (Blaisdell, 2012).Further, the users of debase computing can call for between public or private computing types. The public computing type allows anyone to access the selective information carry throughd in the remote server (Howell, 2012). Under the private type computing, unauthorized persons are non allowed to access the data saved on the remote server. The term cloud equates to creation invisible. Cloud computing entails outsourcing data storage to another location, cloud (Shor, 2011).The cloud is user-prioritized, filling the computing needs of the users (Gillam, 2010). The persons using the cloud serving do know the hardware or software used by the cloud service providers. Likewise, the cloud service clients do not know where the files are s aved, the location of the cloud service providers being hidden from the cloud service users. People using internet capable cell phones, tablets, and computers can save their files in the cloud computing sites. They can then access their files from the cloud server sites from any uncommitted computer, tablet, or internet- capable cell phones. Consequently, the users of the cloud computing sites do not need unnecessarily high-pitched gigabyte capacity memory cards or drives to save their huge files on their cell phones, tablets, or computers. To ensure high quality cloud computing service, data loss and hijacking must be reduced to allowable levels.In addition, the above picture shows how the basic cloud computing setup works. 1 cloud computing person can access the same files from the same cloud computing site from a tablet, cell phone or any computer terminal. Some cloud computing sites offer either the free or paid membership its users (Jamsa, 2011). One cloud computing service provider offers the file saving privileges to many clients.

No comments:

Post a Comment