Cloud Computing
CIS 500
August 28, 2012
Introduction The world is turning to cloud computing to manage data. Businesses are at the forefront of this new trend with companies such as Google, Amazon, Microsoft, and others leading the way by providing these services. What exactly is cloud computing? According to Turban & Volonino (2011), cloud computing is Internet- based computing in which shared resources (such as hard drives for storage) and software apps are provided to computers and other devices on- demand (p. 48).
The author will explain in this case study how Ericsson benefitted from using Amazon Web Services (AWS) in terms of cost reduction, automated software updates, remote access, and on-demand availability. The
…show more content…
Security Concerns for Cloud Based services In this burgeoning world of cyber criminals, it is imperative that companies address cloud computing security with their providers as they entrust their data to them. One of the biggest concerns with using cloud computing is the threat of a data breach or data loss. How do businesses combat that threat? According to Modis.com. (n.d), “Reputable cloud providers will offer security solutions like firewalls, secure login and data transfer” (p. 7). Though some companies will be worried about the cost of paying for enhanced security, it is imperative that this issue is incorporated into the cloud computing agreements. By addressing this issue upfront, the costs can be mitigated to a certain extent. A simple way to provide another layer of security is to require stronger password protocol of all users. Another security issue conducting penetration tests (pentest) for evaluating the
security of the cloud computing system. As stated in Gwu.edu. (2010), “We must be able to
conduct a pentest in a cloud computing environment without triggering a response
from the provider or causing loss of service for our company as well and any of the multitenant
customers” (p.6). It is imperative that cloud computing vendors have the pentest as a part of their tool box to offer perspective clients. According to gwu.edu. (2010), Amazon has published a policy that includes a procedure for customers to conduct a pentest.
As previously mentioned, cloud computing has recently emerged as a pioneering model for hosting and distributing services over the Internet. Actually, the model entails sharing resources on a huge scale through a value effective and location independent process. While the resources on the cloud are deployed by the seller, they are utilized by the consumer (Belamkar, 2014). Cloud computing is very beneficial to organizations and companies because it is engaging to business organizations
Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
We would like to provide the benefits of cloud computing without any troubles to propel in the direction it is designed for. This is to be achieved by preventing the owner's data from all risks associated and providing a cloud model that is more secure and efficient. The proposed model shall overcome the security risks defined by the security functions over cloud computing, as follows in (Passent M. et al., 2015):
The economic case for cloud computing is compelling and at the same time there are striking challenges in its security. The concepts of cloud computing security issues are fundamentally new and intractable. What appears new is only relative to traditional computing that has been practiced since several years. Many such security problems have been giving attention since the time-sharing era. Cloud computing providers have and can build datacenters as large due to their expertise in organizing and provisioning computational resources at as low cost as possible.
According to Prasad, Gyani and Murti (2012), “Cloud computing can be defined as a new style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet” (p.7). This statement is from five years ago, and although cloud computing is no longer considered new, this definition still describes what cloud computing means today. Cloud computing being private or public is becoming more primordial in the IT sector due to the numerous advantages it gives to its end users (Basmadjian et al. 2012). Since the interest in cloud computing keeps on increasing, efforts need to continue to evaluate current trends in security and privacy. Cloud computing
The main issue that slows down the growth of cloud computing is security. No matter how many security management tools are released or assurances of reliability are made, complications with data privacy and data protection continue to plague the market. Covering all potential security issues in this article is simply impossible. This is because of the fact that we 're still discovering many of the security issues which challenges cloud computing as it is still a work-in-progress. Cloud Computing is rapidly evolving and hence what we see today may quickly become irrelevant.
DATA SECURITY IN CLOUD COMPUTING Introduction: Cloud computing has prompted a movement in how individuals consider IT frameworks structural engineering. Numerous associations today are either executing cloud-based services, or assessing which cloud-based measures they will be portraying later on. As indicated by Gartner Inc. distributed computing is "no less compelling than e-business". This sprocess in building design from an undertaking normal server-based framework to a cloud-based framework will have related expenses of passage and dangers, yet it can bring about inconceivable advantages in reserve funds and in IT and business deftness.
Cloud Computing is an on demand, flexible and cost friendly delivery platform that has provided IT consumers and organizations services such as networks, storage, servers and applications over the Internet. Its importance is increasing as a large number of industrial and technological communities are rapidly adopting it.
The reason for the author selecting to look at literature regarding cloud security within this review is because of how it ties in with a Computing Science degree currently being worked towards at Staffordshire University. One of the modules being studied involves the creation of a database system, with the client formally requesting a cloud-based data centre as part of their system. Therefore, it would interesting to take an in-depth look at the security concerns surrounding what is a technology that is still within its infancy stage.
The cloud computing has more security threats from the cyber hackers, to avoid the cyber-attacks on the cloud the organization must take concerning the cloud security problems like privacy, trust, authentication, data loss. Though the cloud anyone can access the computing technology and the storage of data from the network, as it used for the network cause
This section of paper includes why we need cloud computing as a security control tool against the cyber criminal activities and in how many ways it can be implemented. As we are living in a technical era, many aspects of our lives rely on the Internet and computers, including transportation, communications, government, medicine, finance and education. Consider how much of our personal information is stored either on our own computer or on someone else’s system.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Cloud computing is regarded as one of the most rapidly developing technologies in the present world and giving superb solutions to the small and medium sized enterprises with remarkably low cost. The data of the entrepreneurs is stored in the cloud servers and accessed by the users of the company. But there is reasonable doubts are instigating the users of the cloud computing data availability, confidentiality and the security. Cloud Computing has become famous because of the low cost and customizable business needs to be provided with its three basic services IaaS, PaaS and SaaS. Many research works have been done to incorporate a strong security to prevent the possible threats in cloud computing. The securities incorporated in cloud computing for data security, Application security and transactional security. In developing the security the relative analysis has to be done, a suitable frame work has to be instigated and a novel approach has to be followed for the management of security in cloud computing. In establishing the security the architecture of cloud computing has to be taken care in relation with SAAS, PAAS and IAAS implementation
Cloud computing is a computing model which is widely applied and is one of the most recent terms in the computing industry. The cloud allows for outsourcing of computing infrastructures for storing data and applications of which are remotely accessible by a server. Cloud computing can be referred to network-based hosting of programs in a way that users are not expected to update software/hardware or purchase updated versions. Clouds allow on-demand delivery of software, hardware and data services. Cloud services can be dynamically scaled to meet the needs of its users and are designed to provide easy and scalable access to additional applications (Almutairi, Sarfraz and Ghafoor, 2015). However, the security challenges in cloud computing