History of cloud computing
The word "cloud" is used to represent the internet and other communications systems. Cloud computing is the result of an evolution of the widespread adoption of virtualization, service-oriented architecture, autonomic, and utility computing in the past, telecommunications companies mainly gave simply dedicated, point-to-point data circuits to their users. Starting from the 1990's, virtual private network services was included in their contributions. It made the telecommunication companies offer equally improved services whereby cutting down on cost as well as using resources effectively.
Over the past several years the term cloud computing has become common in homes and organizations alike. Cloud computing can be defined as a pooled set of computing resources that are furnished via the internet. There are three types of cloud services typically available, these services are Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Software as a Service (SaaS). Organizations can benefit greatly from cloud services because they eliminate the need to buy and manage physical resources. Although such an action cuts cost it leaves organization victim to the vulnerabilities and threats that exist in cloud computing.
Managing the security of an Electronic Medical Record (EMR) system in a cloud computing environment can be challenging. Even without the addition of the cloud computing environment, the EMR system is vulnerable to the compromise of login information, unauthorized viewing or editing of medical records, and denial of service attacks. First of all, the data contained within the Electronic Medical Record (EMR) itself is sensitive. Inside the structure of an EMR, one is potentially looking to find patient data that pertains to identity, billing information, dentistry, cardiology, dermatology, mental health, and physical attributes among other forms of data. In many EMR systems, tools to provide security and privacy are implemented. In these systems however, the security is managed by the health care provider. This means that the patient has no say on who can view their medical information. When cloud computing is introduced to this scenario, privacy and security becomes more of an issue because data that is stored in a cloud could potentially end up in being dispersed throughout many geographic locations. Additionally, this data could be viewed during transit to the cloud servers, and the data could be viewed after storage on the cloud server (Narayan, Gagne, & Naini, 2010, p.47).
Data Integrity: Sensitive data stored in cloud computing environment emerges as a major issue with regard to security in a cloud based system. Since anyone can access data from the cloud as the data may be public, private or sensitive. So concurrently, many cloud computing users and providers access and modify data. Thus there is a need of some mechanism to ensure data integrity in cloud computing.
Once you login to your computer you are bound to use an application that is related to the cloud computing infrastructure. For example, when any service needs an internet connection it immediately uses what is known as a “cloud” network, which is a broad term for the use of a device or application that is not physically present. The computer user is then accessing a network in the cloud, which stores personal information and allows for multiple tasks to be completed in an efficient manner rather than just using a single personal computer. Computer Scientists do find an importance for expanding the cloud network since it not only helps them create projects using multiple computers linked on the cloud but it also helps deliver applications to any computer user. Unfortunately, there are some deficiencies that computer science majors should be aware of; the biggest default the risk of cloud security issues constantly. These issues include vulnerability to data loss and hackers overtaking the system; computer scientists should be aware of the structure’s defaults and be able to use cloud services efficiently. Cloud computing is a highly useful and quickly growing aspect of technology, and although the security issues are a risk, it is a useful service that should be used with the proper prior knowledge.
With computers and technology rapidly evolving, staying relevant is becoming more and more difficult to companies in the information technology industry. Cloud computing is a rising technology that could possibly be a great help or a burden to the IT infrastructure. With many new technologies, businesses wonder whether it is profitable enough to invest in such a technology and whether the company will benefit greatly from it. Although cloud computing is an emerging technology, it will come with risks such as security vulnerabilities, but could also be a great cost effective measure that will help out an organization’s infrastructure. Although a new technology, cloud computing is very advantageous for organizations and companies.
Regulation on Cloud to Protect User Privacy
This essay discusses regulation that rules cloud provider to protect privacy of data citizens within country. This essay will describe about what cloud services and its wide range of service In the second section, it will explain more about the security threat of cloud services and going more specific into privacy issue. The next section, I will discuss about the extent of technical regulation that porposed from case given by taking model from exist country regulation. In the Fourth section, this essay will discuss about evaluation and another policy as alternative of the previous policy.
Second: Protect data from damage and loss: The philosophy of cloud computing includes the importance of keeping information, the statement and the file of loss first and damage. Second, the use of cloud computing reduces the risk in both directions.
In the world, where security breaches and information stealing occurs more frequently, a service offering a secure data storage is a significant factor of a security arrangement. Encryption is simply stated as the practice of systematic information scrambling, so that it can be unscrambled later . Data encryption interprets data into a different form, or cryptograph, so that a person holding a secret key (i.e. a decryption key) or password can access that data. The encrypted data is known as cipher text, whereas the unencrypted data is termed as plaintext. Presently, encryption is considered as one of the most effective data security technique and is widely used by a number of organizations for the purpose of secure and reliable transmission of data containing secret information. Asymmetric encryption and Symmetric encryption are two main types of encryption techniques.
The dark side of Cloud Computing
The inception of Cloud Computing could be traced back to 1950s when large scale mainframe computers were being utilised for only communication purposes with no processing capacities. Within a short span of time, the proliferation of technology has taken Cloud Computing into a new era where no one has ever thought or imagined before. It seems to be limitless, some even says addictive. It is like taking steroid to enhance your personnel well-being, corporate performance, productivity and growth depending on which perspective that you are coming from.