SlideShare a Scribd company logo
1 of 9
Cloud Computing and Data Security

Presented By:
Prem regmi
Rahul Panjiyar
Ram Bahadur Gharti
Cloud Computing
• Storing and accessing data and programs over
Internet.
• Practice of using remote servers on the internet to
manage, store and process data instead of using a
personal computer.
Cloud computing is a general term that
is better divided into three categories:
• Infrastructure-as-a-Service providing servers and
storage on demand with the consumer paying
accordingly.
• Platform-as-a-Service allows for the construction
of applications within a provider’s framework,
like Google’s App Engine.
• Software-as-a-Service enables customers to use
an application on demand via a browser. Dropbox
Why Cloud Computing?
• can allow a user to access applications and data from any
computer at any time
• reduces the need for companies to purchase top-of-the-line
servers and hardware or hire people to run them since it is
all maintained by a third party
• Software licenses do not have to be purchased for every
user as the cloud stores and runs the software remotely.
• Data can also be stored with cloud computing so
companies do not have to house servers and databases
themselves
• By centralizing memory, bandwidth, storage & processing in
an off-site environment for a fee, cloud computing can
significantly reduce costs
• Goggle Docs, YouTube, Online file storage,facebook,gmail
etc are the examples of cloud computing where you can
access your stored data from any computer with internet
access and they are widely used by many people worldwide
Data Security Questions
As data is save in cloud not in user hard drive there are
many questions
• Who is Managing My Data?
• Is the Data Secured?
• Where is the Data Actually Located?
• If we choose to put sensitive or protected data in the
cloud, how well does the cloud provider’s security
policies and procedures align with our organizations?
• Who will have access to my data?
• What will happen to my data if I decide to close my
account?
Data Security in Cloud Computing
There are 3 types of different layers of data security in cloud
computing.
1. Physical layer security
it serve as an data center, which includes biometric
scanning, finger prints and voice recognition.
For eg. Building itself is a physical data security. It is design to
stand against hurricane, rain, earthquake etc.
2. Logical layer security
integrated design of networks.
firewalls.
3. Methodological layer security
This includes passwords, controlled environment and
encrypted form.
Cloud Computing Ontology(cocoon)
Thank You!

More Related Content

What's hot

Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Teja Babu
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitymaheralgamdi
 
Docu box intro_12-07-17
Docu box intro_12-07-17Docu box intro_12-07-17
Docu box intro_12-07-17MikeSadowski6
 
microsoftazure.presentation
microsoftazure.presentationmicrosoftazure.presentation
microsoftazure.presentationakshay kohli
 
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesPrakhyath Rai
 
Distributed systems
Distributed systemsDistributed systems
Distributed systemsRavi Yasas
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityMamta Saxena
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580Joanna Hendricks
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceAsim Kumar Pathak
 
172506 633746925739945000
172506 633746925739945000172506 633746925739945000
172506 633746925739945000Van Pham
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber SecurityNiki Upadhyay
 
Cloud Computing Courses in Pune
Cloud Computing Courses in PuneCloud Computing Courses in Pune
Cloud Computing Courses in PuneClassboat.com
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitygangal
 
Cloud Computing for Education Sector
Cloud Computing for Education SectorCloud Computing for Education Sector
Cloud Computing for Education SectorWinastwan Gora
 
BBA MDU unit 1 Computer network
BBA MDU unit 1 Computer networkBBA MDU unit 1 Computer network
BBA MDU unit 1 Computer networkRohini SharmaOhlan
 

What's hot (19)

Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Docu box intro_12-07-17
Docu box intro_12-07-17Docu box intro_12-07-17
Docu box intro_12-07-17
 
microsoftazure.presentation
microsoftazure.presentationmicrosoftazure.presentation
microsoftazure.presentation
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging Technologies
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governance
 
cloud abstract
cloud abstractcloud abstract
cloud abstract
 
172506 633746925739945000
172506 633746925739945000172506 633746925739945000
172506 633746925739945000
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber Security
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Cloud Computing Courses in Pune
Cloud Computing Courses in PuneCloud Computing Courses in Pune
Cloud Computing Courses in Pune
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud Computing for Education Sector
Cloud Computing for Education SectorCloud Computing for Education Sector
Cloud Computing for Education Sector
 
BBA MDU unit 1 Computer network
BBA MDU unit 1 Computer networkBBA MDU unit 1 Computer network
BBA MDU unit 1 Computer network
 

Viewers also liked

Viewers also liked (12)

електрик
електрикелектрик
електрик
 
Catholic identity dr. vanders
Catholic identity dr. vandersCatholic identity dr. vanders
Catholic identity dr. vanders
 
Catholic identity dr. vanders
Catholic identity dr. vandersCatholic identity dr. vanders
Catholic identity dr. vanders
 
Diwali
DiwaliDiwali
Diwali
 
Tutores 2012
Tutores 2012Tutores 2012
Tutores 2012
 
Behaviour driven development present
Behaviour driven development presentBehaviour driven development present
Behaviour driven development present
 
1Us Application - Quick Pitch
1Us Application - Quick Pitch1Us Application - Quick Pitch
1Us Application - Quick Pitch
 
Company profile
Company profileCompany profile
Company profile
 
Gás natural: perspectiva e utilização
Gás natural: perspectiva e utilizaçãoGás natural: perspectiva e utilização
Gás natural: perspectiva e utilização
 
Prueba diagnostica 02
Prueba diagnostica 02Prueba diagnostica 02
Prueba diagnostica 02
 
Presentacion pnle
Presentacion pnlePresentacion pnle
Presentacion pnle
 
In situ emerita_rodriguez
In situ emerita_rodriguezIn situ emerita_rodriguez
In situ emerita_rodriguez
 

Similar to Cloud Computing and Data Security: Understanding Risks and Best Practices

Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing NASIMTAHIR2
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410IJRAT
 
Cloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxCloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxDeveshKhandare
 
Leverage the Best Cloud Storage
Leverage the Best Cloud StorageLeverage the Best Cloud Storage
Leverage the Best Cloud Storageifcloudus
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptxnischal52
 
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsCloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsGaruda Trainings
 
Cloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabusCloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabusNANDINI SHARMA
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databasesIJARIIT
 
Free online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfFree online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfifcloudus
 
Free online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfFree online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfifcloudus
 
Public Cloud Model.pptx
Public Cloud Model.pptxPublic Cloud Model.pptx
Public Cloud Model.pptxchinmidbz2
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 

Similar to Cloud Computing and Data Security: Understanding Risks and Best Practices (20)

Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410
 
Cloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxCloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Leverage the Best Cloud Storage
Leverage the Best Cloud StorageLeverage the Best Cloud Storage
Leverage the Best Cloud Storage
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
 
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda TrainingsCloud computing Latest Interview Questions with Answers by Garuda Trainings
Cloud computing Latest Interview Questions with Answers by Garuda Trainings
 
Cloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabusCloud computing notes unit I as per RGPV syllabus
Cloud computing notes unit I as per RGPV syllabus
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Free online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfFree online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdf
 
Free online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdfFree online cloud storage-compressed.pdf
Free online cloud storage-compressed.pdf
 
Public Cloud Model.pptx
Public Cloud Model.pptxPublic Cloud Model.pptx
Public Cloud Model.pptx
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Cloud Computing and Data Security: Understanding Risks and Best Practices

  • 1. Cloud Computing and Data Security Presented By: Prem regmi Rahul Panjiyar Ram Bahadur Gharti
  • 2. Cloud Computing • Storing and accessing data and programs over Internet. • Practice of using remote servers on the internet to manage, store and process data instead of using a personal computer.
  • 3.
  • 4. Cloud computing is a general term that is better divided into three categories: • Infrastructure-as-a-Service providing servers and storage on demand with the consumer paying accordingly. • Platform-as-a-Service allows for the construction of applications within a provider’s framework, like Google’s App Engine. • Software-as-a-Service enables customers to use an application on demand via a browser. Dropbox
  • 5. Why Cloud Computing? • can allow a user to access applications and data from any computer at any time • reduces the need for companies to purchase top-of-the-line servers and hardware or hire people to run them since it is all maintained by a third party • Software licenses do not have to be purchased for every user as the cloud stores and runs the software remotely. • Data can also be stored with cloud computing so companies do not have to house servers and databases themselves • By centralizing memory, bandwidth, storage & processing in an off-site environment for a fee, cloud computing can significantly reduce costs • Goggle Docs, YouTube, Online file storage,facebook,gmail etc are the examples of cloud computing where you can access your stored data from any computer with internet access and they are widely used by many people worldwide
  • 6. Data Security Questions As data is save in cloud not in user hard drive there are many questions • Who is Managing My Data? • Is the Data Secured? • Where is the Data Actually Located? • If we choose to put sensitive or protected data in the cloud, how well does the cloud provider’s security policies and procedures align with our organizations? • Who will have access to my data? • What will happen to my data if I decide to close my account?
  • 7. Data Security in Cloud Computing There are 3 types of different layers of data security in cloud computing. 1. Physical layer security it serve as an data center, which includes biometric scanning, finger prints and voice recognition. For eg. Building itself is a physical data security. It is design to stand against hurricane, rain, earthquake etc. 2. Logical layer security integrated design of networks. firewalls. 3. Methodological layer security This includes passwords, controlled environment and encrypted form.