0% found this document useful (0 votes)
39 views2 pages

Dta Security in Cloud Computing

The document discusses various technologies for data security in cloud computing, emphasizing the importance of protecting data stored on remote servers. Key technologies include data encryption, identity and access management, firewalls, intrusion detection and prevention systems, data backup and disaster recovery, and secure APIs. Each technology is briefly defined and exemplified, highlighting their roles in safeguarding data from unauthorized access and loss.

Uploaded by

chourasia.work
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views2 pages

Dta Security in Cloud Computing

The document discusses various technologies for data security in cloud computing, emphasizing the importance of protecting data stored on remote servers. Key technologies include data encryption, identity and access management, firewalls, intrusion detection and prevention systems, data backup and disaster recovery, and secure APIs. Each technology is briefly defined and exemplified, highlighting their roles in safeguarding data from unauthorized access and loss.

Uploaded by

chourasia.work
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

4/23/25, 9:03 PM Cloud Computing Exam Help

Explain Technologies for Data Security in Cloud Computing. (6 or 8 Marks)


Answer:
In cloud computing, data is stored on remote servers and accessed over the internet. This makes data security a
very important concern. Cloud service providers use several technologies to keep data safe from unauthorized
access, hacking, and data loss. These technologies protect data during transmission, processing, and storage.

1. Data Encryption:
Definition: Encryption is the process of converting data into unreadable code so that only authorized users
can read it.
Types:
At-rest encryption: Protects data stored on cloud servers.
In-transit encryption: Protects data being transferred over the internet.
Example: AES (Advanced Encryption Standard) is a commonly used encryption method.

2. Identity and Access Management (IAM):


Definition: IAM controls who can access cloud resources and what they can do.
Features:
Multi-factor authentication (MFA)
Role-based access control (RBAC)
Password policies
Example: AWS IAM allows admins to create users and assign permissions.

3. Firewalls:
Definition: Firewalls act as barriers between trusted and untrusted networks.
Use: They block unauthorized traffic and allow only safe data to pass.
Example: Cloud providers use both hardware and software firewalls.

4. Intrusion Detection and Prevention Systems (IDPS):


Definition: These systems detect and stop suspicious activities or attacks in real-time.
Use: Protect cloud servers from hacking, malware, and unauthorized access.
Example: Snort is a popular open-source intrusion detection system.

https://chatgpt.com/c/6808ddcc-3800-8013-bba1-d14582c7e2d1 1/2
4/23/25, 9:03 PM Cloud Computing Exam Help

5. Data Backup and Disaster Recovery:


Definition: Regular backups ensure that data is not lost during failures or cyberattacks.
Use: Helps recover data quickly if it is deleted or corrupted.
Example: Cloud providers like Google Cloud and AWS offer automated backup solutions.

6. Secure APIs (Application Programming Interfaces):


Definition: APIs allow apps to communicate with cloud services securely.
Use: Only authorized users or apps can access cloud resources.
Example: OAuth is used to secure APIs by providing tokens for access.

https://chatgpt.com/c/6808ddcc-3800-8013-bba1-d14582c7e2d1 2/2

You might also like