Popis: |
Many companies are making the move to a cloudbased environment for data storage and management. Having their data in the cloud has many benefits in that it may help the company move forward and innovate. The embracing of cloud-based services by corporates, businesses, and people, has helped to usher in a paradigm shift in the people-data-service relationship. While most steps in the evolution of technology center around "development" and "productivity", given the changing scenario of threats and cybercrime, security in the cloud needs to be thoroughly analyzed, researched, and mitigated, even if it cannot be completely eliminated or avoided. However, cloud-based environments are not completely safe from attacks. Criminals are always looking for ways to make money through malicious activity. Cyber Security is already one of the fastest growing fields in the modern world and the number of incidents that occur on a daily basis are continuing evidence of its necessity. Systems security of all types have been addressed in similar ways but cloud-base environments offer quite a few unique threats that force professionals to become creative when preparing mitigation techniques. This paper introduce a cloud computing security analysis survey where we list out some of the grave security threats that the Workload Distribution and Resource Pooling Architecture in Cloud Systems model faces, and some mitigation techniques to encounter them. |