Topic: Politics & GovernmentInfrastructure

Last updated: October 4, 2019

LITERATURE SURVEY2.1 CLOUD COMPUTING.In software development literature survey is considered to be the most important factor. Before developing any tool it is really important to determine many things such as economy, its advantage, disadvantage, its opportunities in the near future and many more such considerations are to be taken. Once these things are satisfied, then next steps are to determinewhichoperatingsystemandlanguagecanbeusedfordevelopingthetool.Cloud Computing Cloud computing provides an unlimited platform and infrastructure to store and execute and secure the clients or the customers data and program.

As a customer it is not required that you have to own the system or the infrastructure as a whole, they can just be accessed or rented; adding as an advantage to the customer using it minimizing the tendency to decrease the expenditure. Instead of running the data individually in one computer or even in several; they are hosted in the “cloud ‘—computers and servers assemblage accessed via the Internet. Cloud computing lets you access all the documents, data’s and application from anywhere in the world, making it free for the people to be confined in the desktop only and making it easy for the people indifferent parts of the world to collaborate. Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users’ loss control of data under Cloud Computing. Whenever it comes to the matter relating to cloud services the user is put at a disadvantage regarding to the security of the file.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Basically the file is stored on a server which is a pool resource that is any one with user’s credentials can access the file and if in case the attacker comes to know about the password as well as the encryption keys the attacker can modify the file contents, thus making the information stored in the file to be accessed by the unauthorized user. So, the problem is that what if someone copy’s your work and claims to be his own work. Anything we design, anything we invent is governed by the principle of whether or not it guarantees customer satisfaction.Hence, the problem is underlying whether the customer can rest assured that his data is safe from unauthorized access or not.

x

Hi!
I'm Piter!

Would you like to get a custom essay? How about receiving a customized one?

Check it out