Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Security issues with cloud computing
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Security issues with cloud computing
Introduction
The information technology industry is growing at a rapid pace. Every business entity needs some form of IT support to ensure that business operations are continuously running. As an entity grows in size and revenue, the information system needed to support the entity needs to grow as well. Some businesses may not have enough resources to accommodate this expansion. Their building may be too small or they cannot afford to purchase the equipment. When this is the case, an organization will choose to migrate their network infrastructure to a cloud computing environment. Cloud computing allows for a company to implement a large scale network without having to incur expenses for modifying the building infrastructure. Cloud computing can offer three services; infrastructure as a service (IaaS), software as a service (SaaS), and platform as a service (PaaS). A firm’s needs in expansion determine what services they need. Though, most organizations acquire IaaS. When this happens, companies surrender their data to the cloud. They are unaware of how their information is kept safe and confidential. All of their operations are dependent on the cloud operations. Cloud computing should not be considered as a significant option for data storage and network infrastructure solutions because of evident security concerns.
What is Cloud Computing?
The purpose of cloud computing is to offer software as a service. In cloud technology, software is not installed locally on machines but dealt with outside by a third party. Use of the application must be done through a network connection or the software be installed on a local computer and accessed elsewhere. All of the data and information processing is done separately by a large war...
... middle of paper ...
... 27(22), 17.
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., &…Zaharia, M. (2010). A View of
Cloud Computing. Communications of The ACM, 53(4), 50-58.
Bhadauria, R., Chaki, R., Chaki, N., & Sanyal, S. (2011). A Survey on Security Issues in Cloud
Computing. Retrieved from EBSCOhost.
Currier, G. (2011). SPEEDING TO THE CLOUD. Baseline, (110), 18. Retrieved from EBSCOhost
Misra, S., & Mondal, A. (n.d). Identification of a company's suitability for the adoption of cloud computing
and modelling its corresponding Return on Investment. MATHEMATICAL AND COMPUTER
MODELLING, 53(3-4), 504-521. Retrieved from EBSCOhost.
S. Subashini, (., & V., K. (2011). Review: A survey on security issues in service delivery models of cloud
computing. Journal of Network And Computer Application,341-11.
Doi:10.1016/j.jnca.2010.07.006
As its core essences cloud computing is nothing but a specialized form of grid computing and distributing computing’s which various in terms of infrastructure , deployment, service and Geographic’s dispersion (Veeramachanenin, Sepetember 2015) the cloud enhance scalability, collaboration, availability , ability to adapt to fluctuation according to demand accelerate development work and provide optional for cost reduction and through efficient and optimized computing. (BH kawljeet, June 2015) cloud computing (CC) recently become as a new paradigm for the delivery and hosting of services our the internet. There are mainly three service delivery model Software as Service (SaaS) required software, operating system and network is provided or we can say in SaaS the customer can access the hosted software instead of installing it in local computer and the user can access these software through local computer internet browser (e.g web enabled E-mail ) the user only pay and the cloud service provider is responsible for management or control of mobile cloud infrastructure some of the company which provide such service are Google, Microsoft , Salesforce ,Facebook, etc…..Infrastructure as Service(IaaS)the cloud provider only provide some hardware resources such as network and virtualization is
Wynn, D., Kaufman, M., Montalban, X., Vollmer, T., Simon, J., Elkins, J., I Rose, J. W. (2010).
Ottenberg, A. L., Wu, J. T., Poland, G. A., Jacobson, R. M., Koenig , B. A., & Tilburt, J. C.
Kobau, R., Zack, M. M., Manderscheid, R., Palpant, R. G., Morales, D. S., Luncheon, C., et al.
Segal, E. A., Cimino, A. N., Gerdes, K. E., Harmon, J. K., & Wagaman, M. (2013). A
Vahey, C. D., Aiken, H. L., Sloane, M. D., Clarke, P. S., and Vargas, D. (2010 Jan. 15).
Wood, W. M., Karvonen, M., Test, D. W., Browder, D., & Algozzine, B. (2004). Promoting
At the World Congress on Engineering 2011 conference in London, U.K., it was noted that the issue of security matters for cloud computing requires revising (Pinto et al., 2011). As mentioned earlier, when going to a cloud network any internal control system is essentially transferred to the service provider. As such, Pinto et al. (2011) explains about the “existence of a new entity called a cloud security manager” whose responsibility it is to keep documentation of client access to the cloud as well as third party processing. To put it differently, the duties of the cloud security manager will be to manage the overall cloud system by instituting an internal control matrix.
With the booming of cloud, a increasing number of enterprises are considering transferring the business to cloud because the move seems to help the enterprises not only to enhance working efficiency but also to decrease operating cost. However, findings indicate that under current circumstance, the portability of enterprises based on cloud is limited (Armbrust et al., 2010). Comparing to the potential expenditure one enterprise may face, the benefits it gains from may appears less attractive. Evidences in aspect of costing, efficiency and security are showed and discussed to get a conclusion.
Mangiuc, Dragos-Marian. (2012) Security Issues of Cloud Based Services-A guide for Managers. Review of International Comparative Management. 13(3), 468-477.
Whelan, R., Conrod, P. J., Poline, J., Lourdusamy, A., Banaschewski, T., Barker, G. J, Bellgrove, M. A.,
To understand how cloud computing can be of value to an organization, it is important to us that we understand the cloud and its components. There are three different types of cloud computing services referred to as Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS). IaaS delivers cloud computing infrastructure servers, storage, network and operating systems as an on-demand service. SaaS is about software deploying over the Internet. PaaS allows a creation of web applications without the complexity of buying and maintaining the software and infrastructure. In this paper, I will suggest that Innovartus Technology Inc should use IaaS as a replacement for PaaS because IaaS is a rapidly developing field with resources such as better services, cost variability, utility pricing model and dynamic scaling.
Timpano, K. R., Keough, M. E., Mahaffey, B., Schmidt, N. B., & Abramowitz, J. (2010).
To conclude, the greatest worries about cloud computing are security and protection. The thought of giving over essential information to an alternate organization stresses some individuals. Corporate executives may waver to exploit a distributed computing framework on the grounds that they can't stay with their data secure. It profits these organizations to have solid efforts to establish safety set up. Overall, the administration might lose all its customers. It's in their enthusiasm to utilize the most progressive strategies to secure their customers' information.
In cloud computing, the word cloud is used as a metaphor for “the internet”. So the cloud computing means “a type of internet-based computing”, where different services such as servers, storage and applications are delivered to an organization’s computers and devices through the internet.