Write 10 pages thesis on the topic hijacking, cloud security and data loss. Users can upload and access uploaded pictures, documents, music files. www.dropbox.com cloud computing site offers possible free 18 gigabytes of memory to its users (Blaisdell, 2012).
Further, the users of cloud computing can choose between public or private computing types. The public computing type allows anyone to access the data saved in the remote server (Howell, 2012). Under the private type computing, unauthorized persons are not allowed to access the data saved on the remote server. The term cloud equates to being invisible. Cloud computing entails outsourcing data storage to another location, cloud (Shor, 2011).The cloud is user-prioritized, filling the computing needs of the users (Gillam, 2010). The persons using the cloud service do know the hardware or software used by the cloud service providers. Likewise, the cloud service clients do not know where the files are saved, the location of the cloud service providers being “hidden” from the cloud service users. People using internet –capable cell phones, tablets, and computers can save their files in the cloud computing sites. They can then access their files from the cloud server sites from any available computer, tablet, or internet- capable cell phones. Consequently, the users of the cloud computing sites do not need unnecessarily high gigabyte capacity memory cards or drives to save their huge files on their cell phones, tablets, or computers. To ensure high quality cloud computing service, data loss and hijacking must be reduced to allowable levels.