ABSTRACT

Cloud Security Access control can be a daunting task. Having hundreds of users accessing systems from across the world and with many different devices can require a great deal of thought and planning. One of the top ways to keep the operating system secured is to limit physical access to the server to a small number of people. Distributed cloud servers enable remote access to data anywhere in the world through an internet connection. Human negligence of security is arguably the largest contributor to cloud and network invasion. According to the Online Trust Alliance, a full 90% of data breaches could have been prevented if businesses had better internal controls. Most often, a personal computer, tablet, or cell phone is used by the person to access the cloud system. Most commercial cloud services and applications want many users to join their systems.