Preview

master

Satisfactory Essays
Open Document
Open Document
467 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
master
Summary

This report was funded by an Information Research Institution and carried out by Cheng-kang Chu with other researchers from Chinese Academy of Sciences. It was published by the IEEE CS in 2013.

The authors provide an analysis and evaluation of the security about the current three main cloud storage services, which are Google Drive, Dropbox and Microsoft SkyDrive respectively. They put their opinion that each of the cloud storage services has same security weakness (Cheng-kang, 2013).

This report can be split into three parts. On the beginning the authors introduce the general way for sharing data in these three cloud storage services, which are public sharing, private sharing and secret URL sharing. They think that public sharing is the easiest way for sharing data, but people cannot access and apply the private information by using this method. The most secure way is private sharing, but it is very trouble. People have to register an account and sign into the system. At the same time, the system could not be registered by the same computer with same IP address. However, there is a balance between the public sharing and the private sharing, which is Secret-URL sharing. It can let people access the shared information without an account access, if they have required a data link address (Cheng-kang, 2013).

The authors then look to see the problem on the three ways from each cloud storage services. For secret-UPL sharing, when want to share a data with another people, the URL can be used to access the data by the people. Even if the data has been removed and other data associated with the same data name, it still can be accessed by the same name. For public sharing, when delete a file from cloud storage services, the file is moved to a "Recycle Bin", people can still access the file even if it has been moved, because there is a cache data on the DNS. For private sharing, it is the same problem with public sharing. The data can still be accessed by

You May Also Find These Documents Helpful

  • Good Essays

    Cloud being single point of data access it even suffers from single point data failure /…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mis 535 Course Paper

    • 2829 Words
    • 12 Pages

    A main server that is big enough to route files in it for storage can help a computer and website run faster. Just as an external hard drive can store data on it away from a computer to free up the main hard drive can help a computer run faster. Cloud storage operates in the same concept, instead of having a hard drive, there is a huge server with a lot of storage. In this paper, the company that I have chosen has issues with server space and need a newer solution to developing a better service to the company and its production facilities. I will explain what it will take to boost service speed and help the company to ship products out faster with just a solution in server space.…

    • 2829 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Term Paper Intro to I.T.

    • 1605 Words
    • 7 Pages

    Cloud computing is one of the leading buzz terms in the world of IT today. Seemingly every possible solution has been enhanced with the mere addition of the word “cloud”. Cloud computing refers to applications and services offered over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the "cloud." This metaphor represents the intangible, yet universal nature of the Internet. The idea of the "cloud" simplifies the many network connections and computer systems involved in online services. In fact, many network diagrams use the image of a cloud to represent the Internet. This symbolizes the Internet 's broad reach, while simplifying its complexity. Any user with an Internet connection can access the cloud and the services it provides. Since these services are often connected, users can share information between multiple systems and with other users. Examples of this technology include online backup services, social networking services, and personal data services such as Apple 's MobileMe. Cloud computing also includes online applications, such as those offered through Microsoft Online Services. Hardware services, such as redundant servers, mirrored websites, and Internet-based clusters are also examples of cloud computing. ("Technology terms," 2009)…

    • 1605 Words
    • 7 Pages
    Better Essays
  • Good Essays

    institutions across the country. In doing so, these government agencies will be able to better…

    • 732 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Master

    • 375 Words
    • 2 Pages

    This source shows us President Clemenceau’s view on Woodrow Wilson whom was the current President of America at the time. Clemenceau stated this very cleverly as he says very discreetly that Wilson thinks himself better than God as ‘God only has ten commandments’. Clemenceau also thinks that Wilson’s points are commandments so the other major powers have to abide and serve these points.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Powerful Essays

    Cloud computing is a new name for an old concept: the delivery of computing services from a remote location, analogous to the way electricity, water, and other utilities are provided to most customers. Cloud computing services are delivered through a network, usually the Internet. Some cloud services are adaptations of familiar applications, such as e-mail and word processing. Others are new applications that never existed as a local application, such as online maps and social networks. Since 2009, the federal government has been shifting its data storage needs to cloud-based services and away from agency-owned data centers. This shift is intended to reduce the total investment by the federal government in information technology (IT) (data centers), as well as realize other stated advantages of cloud adoption: efficiency, accessibility, collaboration, rapidity of innovation, reliability, and security. In December 2010, the U.S. Chief Information Officer (CIO) released “A 25-Point Implementation Plan to Reform Federal IT Management” as part of a comprehensive effort to increase the operational efficiency of federal technology assets. One element of the 25-Point Plan is for agencies to shift to a “Cloud First” policy, which is being implemented through the Federal Cloud Computing Strategy. The Cloud First policy means that federal agencies must (1) implement cloud-based solutions whenever a secure, reliable, and cost-effective cloud option…

    • 13907 Words
    • 56 Pages
    Powerful Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Along with the development speed of technology, the amount of data passing by or consumed by people around the world keeps growing rapidly. The storage devices seem to unable for storing growing data amount. In addition, maintenance and back-up of data are needed just in case of accident. To meet the needs mentioned above, the cloud computing is developed especially cloud storage which have become a necessary data storage for everyone recently. There are four competitive huge cloud storages in the IT industry – Google Drive, SkyDive, ICoud, Dropbox.…

    • 2094 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Itm 501 Cloud Computing

    • 717 Words
    • 3 Pages

    Cloud computing has moved from being just a business feature to also servicing the needs of individuals. Apple, Samsung, Google, Century Link Prism and many other customer based businesses have identified that individuals need the cloud service to manage their everyday needs. Pictures, contacts, music, account information and various other data are synced in the cloud and is able to be retrieved on any of the individuals’ devices.…

    • 717 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Cyber Security

    • 4964 Words
    • 20 Pages

    This research paper tackles the issues that faces Cloud Computing today and gives the experts and industry’s point of view on the matter. The aspects explored are the significant industry questions that have risen about the use of Cloud Computing, business value, organization impact, adaptability, limitations, initial cost of implementation, and the severe business security risks due to centralization of resources. Brian Proffitt will argue in is IT World article [24], there are some serious limitations with cloud computing that is being blithely ignored such as bandwidth limitation, storage, and availability. Interviews conducted with colleagues that are experts in the Enterprise Systems network arena reveals that, the impact is all in planning before implementation, the selected architecture and the security policy. Findings in manuscripts and online libraries reflect that Cloud Computing is a technological revolution that provides computer resources as a service; offering flexible IT usage, computing efficiency through improved utilization and reduced administration and infrastructure costs. Users are not limited to applications confined to a computer, data stored to a hard drive, or bounded by the organization’s network. Also known as the sum of Software as a Service (SaaS) and Utility Computing, Cloud Computing is argued to be more efficient and scalable. My hope is to identify the common issues that face Cloud Computing in organizations that have implemented it, and find the answer or probable solutions.…

    • 4964 Words
    • 20 Pages
    Best Essays
  • Good Essays

    Security Principles

    • 682 Words
    • 3 Pages

    The management issue has concurred with technological innovations that enable information to be used and stored more effectively than previously. Management needs to understand the issues impacting information systems to be effective meet the company goals. A cloud is a powerful arrangement of cloud computing, networking, storage, management solutions, and business applications that facilitate a new generation of IT and consumer services. These services are available on demand and are delivered economically without compromising security or functionality. Solving today 's biggest business and technology challenges requires an approach that fully integrates the three pillars of cloud computing: applications and services, data centers, and networks (Cloud Computing, 2012). There is an issue that should be very important to all of us regarding the internet. Security problems happen on a consistent when we are using our computer to do business online. When we are doing our banking or setting up…

    • 682 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cloud Computing and Apple

    • 2017 Words
    • 9 Pages

    "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/honor-code/ . I am fully aware of the following sections of the Honor Code: Extent of the Honor Code, Responsibility of the Student and Penalty. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on http://universitypolicy.gmu.edu/1301gen.html web site."…

    • 2017 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Master

    • 832 Words
    • 4 Pages

     xotiiks: i love when he gets into games with people that dont know him…

    • 832 Words
    • 4 Pages
    Satisfactory Essays