Studyspark Study Document

Security Issues in Cloud Computing Data Analysis Chapter

Pages:5 (1450 words)

Sources:5

Subject:Other

Topic:Security

Document Type:Data Analysis Chapter

Document:#95023300


Despite these concerns however the world's largest companies still actively promote and routinely hype the value of cloud computing without mentioning the myriad of risk associated with this platform, despite its continual maturation from a security and stability standpoint [2].

An example of this is type of hype is when Microsoft's Steve Balmer described cloud computing as the next frontier and Dr. Ajei Gopal verified that the cloud is there to alter everything. Joe Tucci, the CEO of EMCCorp described the impact of cloud computing as "We're now going through what I believe is pretty much going to be the biggest wave in the history of information technology." These claims of corporate executives must be balanced against reality and the fact that these platforms require a continual focus on quantifying and validating trust on the one hand [1] and designing the systems to ensure a higher level of content agility and flexibility on the other [5]. The National Institute of Standards and Technology (NIST) defined cloud computing as a model for allowing "convenient on-demand network access to a shared collection of customizable resources such as services, storage, applications, networks and servers that can be quickly provided and issued with minimal management effort or interaction with service provider.

Cloud computing history began in the nineties through the development of World Wide Web. Using the Mosaic browser, internet-based computing started. Using a business perspective, it provided virtual shopping experience and chain integration. The aspect of e-business obtained a foothold in almost any company. As a significant side-effect, users became used to this leading-edge technology whilst seeking for information, performing online shopping, chatting with family and family, watching movies online or handling bank accounts. The following generation of cloud services was inspired by consumer experiences, accessible 24/7, an intuitive user interface that does not need training and comprehensive self-services from opening a new back account to purchasing holiday packages. Technology changed to produce a comprehensive interactive web interfaces and service-to-service interaction. It also went far beyond business applications and this includes social networks and collaboration tools. This clearly changed the way business people acquire and share information while some companies including Amazon and Google took advantage of such trends through offering their storage and computing capacity to consumers and business users.

As of today, the attention surrounding cloud services in the company focuses on these forms of techniques and sourcing alternatives for IT capabilities -- IT as a service. Through the use of standardized, highly virtualized infrastructure and applications, this new strategy can encourage higher degrees of consolidation which reduce costs.

2.0 Cloud Models

3.1 Cloud Delivery Models

When people hear the word "cloud computing," things that come first to their mind are the giants such as Amazon, Google, Twitter, YouTube, Facebook and Salesforce.com. They are called public cloud because they are providing resources for free or rent. This also includes storage capacity and increasing array of business applications and services. Learning the differences between the private, public and hybrid model as well as community cloud is a common method of understanding the cloud.

Private Cloud: a specific organization solely operates their respective private clouds. It can be maintained by the organization itself or by a third party, which means it could be on premise or off premise. On premise means that the owner is based inside the office of the organization and their private cloud is maintained by their own IT staff. The organization has the complete control over the infrastructure, data center and services. Off premise is based outside the organization, taking advantage of the expertise of the third party provider such as hosting facility. Off-premise approach is for those organizations that do not have needed expertise or resources to build and maintain their own data center. One good example of private cloud is Microsoft Private Cloud. In addition, private cloud, whether off-premise or on-premise is entirely dedicated to the needs of the organizations and not of the public. Another difference between large-scale corporate data centers and private clouds is in terms of governance model. The cloud model recognizes that the customers are actually the "business." The risks associated with the operation are in the IT side rather than the business idea. The new challenge here for the IT is not only the cost center but as


Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Security in Cloud Computing

Pages: 10 (3274 words) Sources: 6 Subject: Education - Computers Document: #13618479

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

Studyspark Study Document

Security and Cloud Computing

Pages: 8 (2417 words) Sources: 9 Subject: Internet Document: #99841160

Cloud Computing: Security Threats & Countermeasures, Auditing and Strategies Regarding the Cloud
Abstract
The cloud is the latest development in the world of the Information Age. It provides a way for data to be stored, shared, managed, and protected in an efficient and effective manner. This paper looks at some of the security threats and countermeasures that can be conducted to help make the cloud safer. It examines why auditing

Studyspark Study Document

Cloud Computing Information Security in

Pages: 18 (6099 words) Sources: 25 Subject: Education - Computers Document: #68840563

This approach to defining a performance-based taxonomy will also allow for a more effective comparison within industries as well. All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing for more thorough measures of application performance. The net result will be much greater visibility into how cloud computing is actually changing the global economics of the enterprise computing industry. III. Final Report: Introduction The foundational

Studyspark Study Document

Cloud Computing and Business

Pages: 5 (1606 words) Sources: 5 Subject: Information Technology Document: #56152092

Cloud Computing Security Pros & Cons Over the last ten years, cloud computing has rapidly grown and it is expected to grow even further as more businesses move online. When cloud computing was first conceived, many skeptics dismissed it as being just another tech fad that will quickly disappear. However, over the last three years cloud computing has truly changed the way we think about IT nowadays. The Cloud has significantly

Studyspark Study Document

Cloud Computing Digital Forensics the

Pages: 4 (1273 words) Sources: 4 Subject: Education - Computers Document: #10510745

This means that no deeper view into the system and its underlying infrastructure is provided to the customer." The constant flow of information makes compiling a forensics report on any given item very difficult. Legal issues may also hamper digital forensics in dealing with cloud issues. Cloud computing raises some unique law enforcement concerns regarding the location of potential digital evidence and its subsequent forensic analysis. When a savvy and

Studyspark Study Document

Cloud Computing

Pages: 10 (3424 words) Sources: 20 Subject: Education - Computers Document: #28144914

Brodkin, J. (2008). Gartner: Seven cloud-Computing security risks. Infoworld, pp. 1 -- 3. Carlin, S. & Curran, K. (2011). Cloud computing security. International Journal Of Ambient Computing And Intelligence (IJACI), 3 (1), pp. 14 -- 19. Cloud Computing Benefits, risks and recommendations for information security. (2009). [e-book] Available through: ENISA https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security [Accessed: 24 Mar 2014]. Cloudsecurityalliance.org. (2011). Top threats to cloud computing: cloud security alliance. [online] Retrieved from: https://cloudsecurityalliance.org/research/top-threats [Accessed: 24 Mar 2014]. Feng,

Join thousands of other students and

"spark your studies".