SlideShare a Scribd company logo
1 of 4
Download to read offline
CLOUD COMPUTING
Cloud computing is a new paradigm where services and resources are
provided to users over the Internet.
The cloud itself is not a product, but rather a data transmission and storage
model. Basically, it is a term used to describe a global network of
interconnected remote servers functioning as a single ecosystem to store
and manage data, run applications, provide content or services to users.
Although the term “cloud” may suggest something ethereal, there is actually
a huge infrastructure consisting of numerous physical resources
(communications networks, servers, storage systems, applications, services,
etc.) behind it. This allows multiple users manage all their files at any time
and from anywhere as long as they stay connected to the Internet.
TYPES OF CLOUDS
There are several different models of cloud computing services. They have
emerged to provide the right solution for a wide range of user needs.
• Public Cloud: Cloud resources, such as servers and storage, are owned and
managed by a third-party provider who delivers them over the Internet. This
provider also owns and manages all hardware, software, and other
infrastructure components. A user can access these services and manage
his/her account using a web browser.
• Private Cloud: Cloud computing resources are used exclusively by a single
organization which manages them and decides who can access the
infrastructure that is usually installed at a local data center of on the
organization premises.Hybrid Cloud: This model combines elements of a
public cloud and a private cloud using a technology that allows data and
applications to be shared between them. Users may own some parts and
share others, but in a controlled environment.
CLOUD SERVICES
Cloud services can be divided into three main categories:
• Software as a Service (SaaS): In this model, applications are delivered over the
Internet. Users access them from a connected device using a web browser.
Some of SaaS examples include email servers, online office tools, and file
sharing.
• Platform as a Service (PaaS): This is a model where a user can enjoy the
benefits of a fully functional service-oriented platform without having to
purchase or maintain the equipment or applications. For example, procuring
hosting services for websites, databases, email, etc.
• Infrastructure as a service (IaaS): In this model, users are provided with all the
infrastructure they need to install their applications and services without
having to worry about maintaining a physical server, communications
infrastructure, or storage. It can be a virtual machine, a CPU, a hard disk along
with the necessary storage and bandwidth.
ADVANTAGES OF CLOUD COMPUTING
• Files can be accessed and modified anytime, from any location, on any
Internet-connected device.
• Flexibility in terms of storage capacity and processing power.
• Saving backup copies in the cloud.
• Reasonable price.
• Facilitating teamwork.
DISADVANTAGES OF CLOUD COMPUTING
• When there is no Internet connection or if the service provider’s equipment
fails, you will not be able to access the files in the cloud.
• Since the service provider owns, manages and controls the cloud
infrastructure, customers have minimal control over it, even after it is
removed from the cloud.
• Even though service providers tend to implement the best security standards,
a cyberattack could compromise the data stored in the cloud.
• Apart from attacks by third parties, information security threats can also
originate from the service provider itself.
CLOUD SECURITY
Cloud computing provides various data storage and processing capabilities
based on third-party servers. As a result, when you decide to use the cloud,
you lose physical access to your data and have to trust your cloud service
provider to implement adequate security measures to protect your
information.
Cloud computing security includes a wide range of policies, technologies, and
controls aimed at protecting cloud-based data, applications, and
infrastructure.
There are many different security concerns associated with cloud computing
all of which can be divided into two broad categories: issues faced by
providers (organizations offering cloud-based software, platforms, or
infrastructure as a service) and those faced by customers (companies or
people using the cloud to run applications or store data).
Cloud security is a shared responsibility: the provider must make sure that
the offered infrastructure is secure and that the customers’ data is protected,
while users are responsible for taking measures to ensure secure access by
using efficient authentication methods.
For an effective cloud security architecture, the right defenses must be
deployed in the right places by identifying potential entry points for attacks,
establishing safeguards to eliminate weaknesses and mitigate the effect of
attacks.
While there are many types of controls used in a cloud architecture, they
usually fall into one of the following categories:
• Deterrent controls: They are used to reduce the probability of attacks on a
cloud system. They warn potential attackers by informing them that there will
be severe consequences if they choose to proceed.
• Preventive controls: They strengthen the system’s protection against
incidents by reducing or eliminating vulnerabilities. They provide reliable user
authentication, reducing the probability of unauthorized access and ensuring
positive user identification.
• Detective controls: They are designed to detect threats as they occur and
react appropriately. Attacks on the cloud system and its supporting
communication infrastructure are usually detected by system and network
security monitoring, including intrusion detection and prevention.
• Corrective controls: They are implemented while an attack is in progress or
after it has occurred to mitigate the consequences, usually by limiting the
damage. These controls are primarily designed to restore a compromised
system from backup copies.
It is generally recommended to select and implement cloud security controls
according to the existing risks which are determined by assessing threats,
vulnerabilities, and their impact. Furthermore, service providers and their
users should negotiate the terms of liability and establish how incidents
involving data breach will be resolved.
CLOUD ENCRYPTION
Cloud computing security has quickly become a major concern for everyone
who uses this technology due to the sensitive nature of information they
store on the Internet.
The process of synchronizing files between different devices and the cloud is
a critical vulnerability from the point of view of data protection, making data
encryption indispensable for a high level of security.
Most cloud storage providers offer some form of file encryption either on the
server side (to store information) or on the client side.
Server-side encryption is the method used by most cloud storage services. It
means that data in an unencrypted form is uploaded to server, where it is
encrypted using the user’s password. Files are transmitted via a secure
connection (HTTPS/SSL). However, while this method offers protection
against attacks by third parties, data privacy is not guaranteed as the server
administrator or another insider can obtain access to the data and/or
encryption keys.
With client-side encryption, files are encrypted locally before they leave the
device connected to a cloud service. Ideally, the password should never leave
the client device, meaning that the cloud service provider only stores and
synchronizes data, but cannot see its content. However, not all applications
support this. Although less common, this method offers the advantage of
better privacy protection: the user’s information in an unencrypted form is
stored only on their devices, and even if the server or files are compromised,
the intruder will obtain only encrypted data and not the original content. The
drawback here is that if you forget the password, you will never be able to
recover it or use the files online, because they are stored on the server in an
encrypted from and can only be modified from the client device.
Cloud security remains a pressing challenge, and both customers and cloud
service providers need to work together proceeding from the understanding
that protecting the information exchanged between them is a shared
responsibility.

More Related Content

Similar to CLOUD COMPUTING.pdf

Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
IJRAT
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 

Similar to CLOUD COMPUTING.pdf (20)

Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud Computing PPT.pptx
Cloud Computing PPT.pptxCloud Computing PPT.pptx
Cloud Computing PPT.pptx
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 
Cloud security
Cloud securityCloud security
Cloud security
 
Is Cloud Computing Secure - Everything Need to Know.docx
Is Cloud Computing Secure - Everything Need to Know.docxIs Cloud Computing Secure - Everything Need to Know.docx
Is Cloud Computing Secure - Everything Need to Know.docx
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
ayvbos
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
F
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
hfkmxufye
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
AS
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
apekaom
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
c6eb683559b3
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 

Recently uploaded (20)

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirt
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
 
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxA LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
Sholinganallur (Chennai) Independent Escorts - 9632533318 100% genuine
Sholinganallur (Chennai) Independent Escorts - 9632533318 100% genuineSholinganallur (Chennai) Independent Escorts - 9632533318 100% genuine
Sholinganallur (Chennai) Independent Escorts - 9632533318 100% genuine
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 

CLOUD COMPUTING.pdf

  • 1. CLOUD COMPUTING Cloud computing is a new paradigm where services and resources are provided to users over the Internet. The cloud itself is not a product, but rather a data transmission and storage model. Basically, it is a term used to describe a global network of interconnected remote servers functioning as a single ecosystem to store and manage data, run applications, provide content or services to users. Although the term “cloud” may suggest something ethereal, there is actually a huge infrastructure consisting of numerous physical resources (communications networks, servers, storage systems, applications, services, etc.) behind it. This allows multiple users manage all their files at any time and from anywhere as long as they stay connected to the Internet. TYPES OF CLOUDS There are several different models of cloud computing services. They have emerged to provide the right solution for a wide range of user needs. • Public Cloud: Cloud resources, such as servers and storage, are owned and managed by a third-party provider who delivers them over the Internet. This provider also owns and manages all hardware, software, and other infrastructure components. A user can access these services and manage his/her account using a web browser. • Private Cloud: Cloud computing resources are used exclusively by a single organization which manages them and decides who can access the infrastructure that is usually installed at a local data center of on the organization premises.Hybrid Cloud: This model combines elements of a public cloud and a private cloud using a technology that allows data and applications to be shared between them. Users may own some parts and share others, but in a controlled environment. CLOUD SERVICES Cloud services can be divided into three main categories: • Software as a Service (SaaS): In this model, applications are delivered over the Internet. Users access them from a connected device using a web browser. Some of SaaS examples include email servers, online office tools, and file sharing. • Platform as a Service (PaaS): This is a model where a user can enjoy the benefits of a fully functional service-oriented platform without having to purchase or maintain the equipment or applications. For example, procuring hosting services for websites, databases, email, etc.
  • 2. • Infrastructure as a service (IaaS): In this model, users are provided with all the infrastructure they need to install their applications and services without having to worry about maintaining a physical server, communications infrastructure, or storage. It can be a virtual machine, a CPU, a hard disk along with the necessary storage and bandwidth. ADVANTAGES OF CLOUD COMPUTING • Files can be accessed and modified anytime, from any location, on any Internet-connected device. • Flexibility in terms of storage capacity and processing power. • Saving backup copies in the cloud. • Reasonable price. • Facilitating teamwork. DISADVANTAGES OF CLOUD COMPUTING • When there is no Internet connection or if the service provider’s equipment fails, you will not be able to access the files in the cloud. • Since the service provider owns, manages and controls the cloud infrastructure, customers have minimal control over it, even after it is removed from the cloud. • Even though service providers tend to implement the best security standards, a cyberattack could compromise the data stored in the cloud. • Apart from attacks by third parties, information security threats can also originate from the service provider itself. CLOUD SECURITY Cloud computing provides various data storage and processing capabilities based on third-party servers. As a result, when you decide to use the cloud, you lose physical access to your data and have to trust your cloud service provider to implement adequate security measures to protect your information. Cloud computing security includes a wide range of policies, technologies, and controls aimed at protecting cloud-based data, applications, and infrastructure. There are many different security concerns associated with cloud computing all of which can be divided into two broad categories: issues faced by
  • 3. providers (organizations offering cloud-based software, platforms, or infrastructure as a service) and those faced by customers (companies or people using the cloud to run applications or store data). Cloud security is a shared responsibility: the provider must make sure that the offered infrastructure is secure and that the customers’ data is protected, while users are responsible for taking measures to ensure secure access by using efficient authentication methods. For an effective cloud security architecture, the right defenses must be deployed in the right places by identifying potential entry points for attacks, establishing safeguards to eliminate weaknesses and mitigate the effect of attacks. While there are many types of controls used in a cloud architecture, they usually fall into one of the following categories: • Deterrent controls: They are used to reduce the probability of attacks on a cloud system. They warn potential attackers by informing them that there will be severe consequences if they choose to proceed. • Preventive controls: They strengthen the system’s protection against incidents by reducing or eliminating vulnerabilities. They provide reliable user authentication, reducing the probability of unauthorized access and ensuring positive user identification. • Detective controls: They are designed to detect threats as they occur and react appropriately. Attacks on the cloud system and its supporting communication infrastructure are usually detected by system and network security monitoring, including intrusion detection and prevention. • Corrective controls: They are implemented while an attack is in progress or after it has occurred to mitigate the consequences, usually by limiting the damage. These controls are primarily designed to restore a compromised system from backup copies. It is generally recommended to select and implement cloud security controls according to the existing risks which are determined by assessing threats, vulnerabilities, and their impact. Furthermore, service providers and their users should negotiate the terms of liability and establish how incidents involving data breach will be resolved. CLOUD ENCRYPTION Cloud computing security has quickly become a major concern for everyone who uses this technology due to the sensitive nature of information they store on the Internet.
  • 4. The process of synchronizing files between different devices and the cloud is a critical vulnerability from the point of view of data protection, making data encryption indispensable for a high level of security. Most cloud storage providers offer some form of file encryption either on the server side (to store information) or on the client side. Server-side encryption is the method used by most cloud storage services. It means that data in an unencrypted form is uploaded to server, where it is encrypted using the user’s password. Files are transmitted via a secure connection (HTTPS/SSL). However, while this method offers protection against attacks by third parties, data privacy is not guaranteed as the server administrator or another insider can obtain access to the data and/or encryption keys. With client-side encryption, files are encrypted locally before they leave the device connected to a cloud service. Ideally, the password should never leave the client device, meaning that the cloud service provider only stores and synchronizes data, but cannot see its content. However, not all applications support this. Although less common, this method offers the advantage of better privacy protection: the user’s information in an unencrypted form is stored only on their devices, and even if the server or files are compromised, the intruder will obtain only encrypted data and not the original content. The drawback here is that if you forget the password, you will never be able to recover it or use the files online, because they are stored on the server in an encrypted from and can only be modified from the client device. Cloud security remains a pressing challenge, and both customers and cloud service providers need to work together proceeding from the understanding that protecting the information exchanged between them is a shared responsibility.