Introduction
First, when computers or PCs were introduced, they literally took the space of the whole room. They were heavy and bulky but still had many limitations in terms of what can those PC actually do or perform daily human tasks. As PCs have evolved, the new software’s have also evolved. A software that satisfies the needs of sending secure data over the Internet is called cloud computing. With PCs, cloud computing has evolved to another level making it easier and simpler to use and provide others with secure information. One problem that is faced by cloud computing organization is the doubt of it keeping files secured. Security reasons are the main concern for cloud computing since everything is over the Internet. On the other hand, cloud computing is transforming problem solving. For example, thirty years ago, PCs were introduced and it changed the way people worked. Today, we are witnessing a new revolution with the convergence of the cloud and the billions of mobile devices in use today (Baxter, 2014). Today, cloud is giving people access to all massive amounts of computing powers, and data which enables government, designers and many more to solve problems in a whole new way. The ability, collaboration, efficiency, and data insights are enabled by the cloud are driving this new emerging technology faster than ever before. “ With cloud computing, governments are receiving these benefits to keep data secured. With the recent paradigm shift in IT from physical data centers to virtualized data centers in the cloud, government agencies can take benefits of on-demand provisioning of application, platforms, software, data and other services while controlling resources, cost and meeting ever changing demands” (Iyoob & Rao). ...
... middle of paper ...
...that the records they preserve have to follow schedules, be accessible and most importantly they should be organized. Cloud computing enable independent perspective on location, how people collaborate, work and communicate. It also enables providers to use cloud computing data centers. The cloud computing will transform IT in corporate world and in government information technology. In the article Federal government enter the era of cloud it stated that the “government agencies are hoping to benefit from the cost savings, scalability and collaboration cloud computing offers” (Berg, 2011). The White House officials want government to start using cloud computing as it provides a secure future. Adaptation of this new technology for a small town government will provide them with secure servers, and reliability and affordable cost-effectiveness.
The healthcare industry has access to a patient’s personal health information, in electronic and paper form, and is responsible for protecting this information. The Health Insurance Portability and Accountability Act (HIPAA) establish requirements for the healthcare industry. The establishment and implementation of an effective information security plan is critical to meet these requirements and ensure this protection. There are however challenges and risks that must be addressed. Cloud computing can be defined as the use of computer resources without the expense of owing the hardware and software. Cloud computing is becoming more and more popular in major corporations as a way to gain use of specific programs, applications and even hardware by way of the Internet.
If organisation’s sensitive data and intellectual property resides on public cloud then it is strongly advisable to implement strong encryption techniques. The threat of data tampering is at its highest when data is being processed in the cloud. Essentially, this is because when data are
The study [1] shows that there are some Implications for data breaches. While data loss and data leakage are both serious threats to cloud computing, the measures to mitigate one of these threats can trigger the other. Encrypting the data may reduce the impact of a data breach, but losing the encryption key, means losing the data as well. Also, keeping offline backups of the data to reduce the impact of a catastrophic data loss, will increases the exposure to data breaches.
Cloud is the result of a decade research in the field of distributing computing , utility computing, virtualization , grid computing and more recently software, network services and web technology which is changeable evolution on demanding technology and services also as looking to the rapid growth of cloud computing which have changed the global computing infrastructure as well as the concept of computing resources toward cloud infrastructure. The important and interest of cloud computing increasing day by day and this technology receives more and more attention in the world (Jain, 2014) the mostly widely used definition of cloud computing is introduced by NIST “as a model for enabling a convenient on demand network access
The main driving forces of cloud data storage are reputable companies such as Amazon and Google building comprehensive computing infrastructures (Google, 2009). These infrastructures are removing the complexity of in-house data storage and ultimately reducing costs of limited networked data centres (Hitachi, 2010). The traditional inefficient model of purchasing servers every time you need to accommodate for high use or growth is now being replaced by internet based systems that replicate your data centres but without the big overheads (Google, 2009). This flexibility assists in the ever changing business world and its continuous improvement initiatives to remove waste, improve efficiency, and ultimately reduce costs. Another key driving force is the support for effective business continuity which will remove again the hardware costs and the strain on risk assessment and management. Removing this hassle can free up valuable time for the Chief Information Officer (CIO) and the Information Technology (IT) department to implement IT and Information Management (IM) efficiently and in due course reduce cost. Werner Vogles of Amazon of Web Services (Twitter) supports the idea of less hardware because if you have to buy more hardware to initiate this cloud movement it is not a cloud. This further supports the need to shed the old procedures of having in-house hardware and data storage and instil efficacy.
At the World Congress on Engineering 2011 conference in London, U.K., it was noted that the issue of security matters for cloud computing requires revising (Pinto et al., 2011). As mentioned earlier, when going to a cloud network any internal control system is essentially transferred to the service provider. As such, Pinto et al. (2011) explains about the “existence of a new entity called a cloud security manager” whose responsibility it is to keep documentation of client access to the cloud as well as third party processing. To put it differently, the duties of the cloud security manager will be to manage the overall cloud system by instituting an internal control matrix.
Discription: Services of cloud are used by both larger and smaller scale organizations.Cloud computing has huge advantages but it is a global phenomenon therefore it has some disadvantages. Both the Service providers and the consumers must work together to ensure safety and security of data on clouds. Customers of cloud services are in fear of data loss and privacy.This paper propose to use The Cloud Security Alliance (CSA) release of a new governance, risk management, and compliance stack for cloud computing. The cloud security tools are available for free download, is meant to help organizations create public and private clouds that act accordingly with industry standards for accepted governance, risk, and compliance (GRC) best practices. The GRC stack has three components: a controls framework, a technical foundation and a questionnaire for assessing what the CSA (cloud security alliance) calls for platform-, infrastructure- and software-as-a-service
The first computer ENIAC was invented by Charles Babbage in 18th century. But the real technological advancement of the computers came with the invention of the first four bit microprocessor in 1971. From 1971 till date, in the span of these 40+ years many operating systems came into existence (such as Windows 95, Windows 98, Windows 2000, Windows NT, Windows XP, Windows 7, Fedora, Mac, Redhat, Ubuntu, Kubuntu, Solaris etc.), many programming languages and web languages came into existence ( such as C, CPP, JAVA, .NET, HTML, XML, DHTML, SQL, PLSQL etc.), and many Multi-National Companies came into existence(such as Wipro, Genpact, Apple, Google, Tech Mahindra, Xerox, Oracle, SUN, Adobe, Microsoft and many more). But Internet is one of the key for the growth of each and every thing mentioned above. Cloud Computing is an emerging concept in which resources of computer infrastructure are provided over the Internet [1]. Cloud computing is a concept in which every device gets connected to the cloud which contains application, platform or Infrastructure or a mixture of them. People of 21st century are more familiar with smart phones rather than anything else. With the advent of phones such as IPhone and Android smartphones, the numbers of people using cloud are increasing substantially. Millions of people are using cloud in the present day scenario and it is equally important to provide the security to all the users who are using it. Cloud computing can be used as a utility to attract many people which can make software attractive as a service [2]. There are several security related issues with cloud which can be discussed in this paper.
In the 1950s Cloud computing started with mainframe computing, where multiple users were able to access a central computer by using a dumb terminal, which had only one function, and that was to provide access to the mainframe. In the 1970s, the concept of virtual machines was created, by using the virtual machine technology it was possible to used more than one operating system simultaneously in a secluded environment. In 1993 cloud computing reached its first milestone with e-mail, which is a method of exchanging information/ data or digital messages through a computer network of the internet. Emails were originally a text based form of communication only, these days’ files like multimedia, images or PDFs can be attached. Today, cloud computing is a part of our everyday lives, we still use it to email, and now we use a more perfected cloud system to store applications or files and can access them anywhere and anytime.
Cloud computing is being heralded as the onrushing future of computing. In fact, in many ways, cloud computing is already here, and has been for some time. The most obvious example of cloud computing is Google Mail. Cloud computing, simply defined, is the implementation of computing services using shared hardware, shared software and in many cases even shared information. Google Mail, for example, makes e-mail services available using a widespread, highly redundant network of systems that remove that same functionality and data from the user’s computer, putting it “in the cloud” where it can be plucked back out as needed – from any capable device such as a smart phone, computer or internet kiosk.
Cloud computing remains firm and has great potential for the future despite its disadvantages and the fact that it is still is a working progress. The number of users are constantly growing and bigger companies are starting to be interested, offering better and finer tuned services and solutions. The best thing to do is to hope that the advantages will further grow and flourish and the disadvantages will slowly disappear, since cloud computing seems to have made IT a little bit easier (Morris, 2011).
Clouding computing is very popular services which people talk and look forward to use now a day with a lot of research are ongoing for the cloud is worthy to be invested in. Very popular service like Gmail, Google drive, Facebook, Dropbox, etc… which people now a day used are obvious cloud technology. Moreover, most of the enterprise, SME and governments are looking forward to implement cloud base solutions to settle technology challenges, reducing costs, targeting new levels of efficiency and trying to create innovative business models.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
When they wanted to save photos online instead of on your personal computer, they are able to use “cloud computing” service. Cloud computing means that the transfer of computing data or information over the internet. Not just to keep data in your personal computer, they are able to save the data on internet server to open their data in any computer. In this report we will walk through about what is cloud computing, what kinds of model did cloud computing have, types of cloud computing, benefits of cloud computing, and security.
Cloud computing is the progression of other computing technologies such as paral-lel computing, distributed computing, and grid computing. Its main principle is to disseminate the computing grind stones to distributed computers. Majority of us still use the PC’s and laptops to cache the data and files, sharing of data and files, and to send emails. If our pc’s diverse...