We are on the advent of continuous innovation with technological advancement in this time we call the Information Age. One such technology that is on the peak of the horizon is Cloud computing. Cloud computing, any of those who are unfamiliar with the term, deals with using a network of remote servers hosted on the Internet to store, manage and process data rather than on a local server or personalized computer. Most popular services nowadays are backed by Cloud computing such as Shopify, Microsoft Office 360, Adobe Creative Cloud, Intuit Quickbooks, Rosetta Stone Catalyst and a myriad of other services and products. The Cloud is becoming so popular not only because it others several models of service; Platform-as-a-Service, Infrastructure-as-a-Service, Software-as-a-Service, Database-as-a-Service, but it is also flexible, scalable, cost efficient, offers unlimited storage, provides backup and recovery features, offers automatic integration and and can be quickly deployed.
However, hindrances to its growing popularity continue to be the same; a lack of efficient security. For instance, public clouds are just that PUBLIC. With any public system, there is a greater risk associated. Public clouds offer multi-tenancy features and the number of users continues to increase. As users increase it is possible for them to gain access to other organizations and their private data. There are also malicious insiders who may want to obtain or leak data from organizations. Since the cloud is hosted by a third party we have to trust that they operate with integrity which is not always the case. There is an increased exploitation of this innovative technology and this paves the way for such significant research interests. Common sense helps us realize that no system can be completely rid of all security threats especially when so many businesses of the present are constantly being hacked. No system can be completely immune to risk or attack, however, a system can be managed effectively against security threats. Studying paradigms like security with the cloud can effectively alter the way in which we consider how to protect data an how we an mitigate threats to cloud systems.