Is the cloud computing perfect now?
Cloud computing, or the cloud, is a colloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet. And with various terminals developing fast, the durative, massive and intricate computing related to these terminals really become urgent problems. And for the present, cloud computing is a solution. But if we allow the cloud computing to contact with our private information, is it secure enough? And in which field can we improve the security? In the Security Benefits of Cloud Computing, Felician Aleca introduced the cloud computing and analyze its extensive application in the Internet field. It clarified many advantages of the cloud computing. In addition, it also introduced some major security benefits for individuals or companies which are provided by the cloud computing. But nearly every Internet technique will produce some latent vulnerability. In an essay about computer hacker, How Do Computer Hackers “Get Inside” a Computer?, by Julie J. C. H. Ryan, it introduced the various ways that hackers use to invade into computer. And there are three major patterns of these ways, which are gaining access to the stored contents of a computer system, gaining access to the processing capabilities of system, or capturing information being communicated between systems (J.C.H.Ryan,2004). And in the end, it reminds the importance of protecting our computer. As we all known, the personal terminals always store many private information, and the cloud store the users’ data on the Internet servers , in this way, it will cause large-scale information leakage once the hackers invade to these servers online. In fact, we are becoming more vulnerable while we enjoy the benefit of centralized processing by cloud computing. So how to improve the security of the users’ data stored in the cloud is really worth studying.
Reference
Julie J. C. H. Ryan. How Do Computer Hackers “Get Inside” a Computer?. Scientific American, August 16, 2004.
Felician Alecu. Security Benefits of Cloud Computing. International Conference on Security for Information Technology and Communication, November 2008, Bucharest, Romania.
学术英语(理工)literature review



