Cloud computing facilitates the sharing of computing and storage resources with the goal of reducing IT expenses in organizations. Additionally, cloud computing facilitates the sharing of information between individuals within a cloud. While convenient, data stored in a cloud is generally prone to hacking attacks and other security issues. This document addresses the various mitigation measures that organizations use to ensure that data stored in the cloud is secure. Despite the many benefits offered by cloud computing, security is a major issue related to cloud computing. There are various security issues and concerns associated with cloud computing, including phishing, data leakage, and data privacy. There are several mitigation measures that cloud pioneers are currently using to ensure that data stored in the cloud remains as secure and confidential as intended. Encryption is a mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding data stored in the cloud so that hackers cannot access the data. Data encryption appears to be the most effective method for ensuring cybersecurity (Krutz and Vines, 2010). However, it is crucial to note that encrypted data is usually difficult to search or perform various calculations on it. Google uses data encryption as a way to ensure that data stored in its cloud is secure and confidential (Bradley, 2010). GovCloud is a special cloud created by Google to store government-related information and data (Bradley, 2010). Due to the sensitivity of the information stored in GovCloud, Google encrypts the data so that the data is unavailable...... middle of paper ......USA: ACM.IBTimes, (2011). Will iCloud be hackers' next target? Retrieved from: http://newyork.ibtimes.com/articles/158777/20110607/apple-icloud-security-hack-threat-Infosecurity, (2010). Google assures customers of cloud security practices. Retrieved from: http://www.infosecurity-us.com/view/10025/google-assures-customers-on-cloud-security-practices/Krutz, R, and Vines, D, (2010). Cloud Security: A Complete Guide to Securing Cloud Computing. Indianapolis, Indiana: Wiley Publishing IncVormetric, (2011). Vormetric Data Security for Amazon Web Services: Protect and control your data in the cloud. Retrieved from: http://www.vormetric.com/products/vormetric_data_security_amazon_web_services.htmlWiki.mozilla, (2007). Phishing protection. Retrieved from: http://wiki.mozilla.org/Phishing_Protection:target-sony-amazon-google.htm
tags