Design and auditing of Cloud computing security

Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. While data outsourcing relieves the owners of the burden of local data storage and maintenance, it also eliminates their physical control of storage dependability and security, which traditionally has been expected by both enterprises and individuals with high service-level requirements. This paper, gives a brief introduction to Cloud computing privacy issue being addressed is then introduced, by describing some of the unique factors to be considered when data enters the Cloud. Finally, a data protection scheme with public auditing scheme is outlined that will address a number of these factors, by providing a mechanism to allow for data to be encrypted in the Cloud without loss of accessibility or functionality for authorized parties. This scheme is not necessarily a replacement for traditional privacy and security measures for data, but rather an enhancement which allows users (again, at either the individual or enterprise level) a greater degree of confidence in the adoption of innovative, cost-saving Cloud computing technologies.