Home Title Introduction Background Potential Benefits Further Research Conclusion Bibliography Graphic Biblography

Hui Zheng
IT Department
George Mason University


The next level of Cloud Computing

Further Research

The challenging aspect for cloud computing is security; there isn't any guarantee that data won't be accessed by other users! Under cloud computing, the data and storage of multiple computers is shared, and can be accessed by multiple users or hackers. This wills increase the risk for hackers finding methods to insert viruses into cloud computing system to obtain data for personal gains. The lack of protection is extremely serious and very dangerous. According to Srinivasen "Security threats as malware, spam, spoofing, man-in-middle attacks, exist in all cloud communications and is one of the major reasons that not all major enterprises have switched to cloud computing." Without a good protection, cloud computing will not be worth its value. Nobody wants to lose their information in the cloud or stolen by hackers. Many methods had been created to prevent secure issue for cloud computing. According to Hwang and Li "To protect clouds, providers must rest secure virtualized data-center resources, uphold user privacy, and preserve data integrity. The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. Data coloring and software watermarking techniques protect shared data objects and massively distributed software modules."

Valid XHTML 1.0 Transitional