Control And Ownership In Cloud Research Proposal

The greatest degree of security in cloud computing, however, is not found within the hosted, on-demand variety but rather within on-site cloud computing products and servers. Despite the oxymoronic nature of this concept, such products actually exist and allow a degree of security and data ownership far surpassing hosted cloud computing services, since the need for any third party intervention is eliminated by the server, supporting infrastructure and all applicable hardware being contained, managed, and accessed on an enterprises' own grounds. On-site cloud computing utilizes the same architecture that the hosted kind does, meaning it allows software and platforms to be offered as services while providing virtual data back-up and storage. There is never a need to question the specific ownership of the data, since it is all onsite and very obviously the property of a particular enterprise. The measures of security to reinforce such information are all in-house as well. The primary distinction between onsite and hosted cloud computing is that the former requires a greater emphasis on a company's information technology team to upgrade, repair, and propagate the efficient running of the cloud, which is still accessed by employees and even by an enterprise's...

...

2009. Cloud Security Front and Center. Retrieved from http://blogs.forrester.com/security_and_risk/2009/11/cloud-security-front-and-center.html
Kamath, Dilip. 2009. Data Ownership in the Cloud. Retrieved from http://cloudcomputing-rainmaker.blogspot.com/2009/09/data-ownership-in-cloud.html

Robbins, David. 2009. Cloud Computing Explained. Retrieved from http://www.pcworld.com/businesscenter/article/164933/cloud_computing_explained.html

Yasin, Rutrell. 2009. Security and Data Ownership: Old Issues in a New Wineskin. Retrieved from http://fcw.com/articles/2010/09/17/data-center-consolidation-security.aspx

Balding, Craig. 2011. GoGrid Security Breach. Retrieved from http://cloudsecurity.org/

Brodkin, Jon. 2008. Garner: Seven Cloud Computer Security Risks. Retrieved from http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853

Yunus, Mamoon. 2009. "Swamp Computing" A.K.A. Cloud Computing. Retrieved from http://security.sys-con.com/node/1231725

http://cloudcomputing-rainmaker.blogspot.com/2009/09/data-ownership-in-cloud.html

Sources Used in Documents:

References

Wang, Chenxi. 2009. Cloud Security Front and Center. Retrieved from http://blogs.forrester.com/security_and_risk/2009/11/cloud-security-front-and-center.html

Kamath, Dilip. 2009. Data Ownership in the Cloud. Retrieved from http://cloudcomputing-rainmaker.blogspot.com/2009/09/data-ownership-in-cloud.html

Robbins, David. 2009. Cloud Computing Explained. Retrieved from http://www.pcworld.com/businesscenter/article/164933/cloud_computing_explained.html

Yasin, Rutrell. 2009. Security and Data Ownership: Old Issues in a New Wineskin. Retrieved from http://fcw.com/articles/2010/09/17/data-center-consolidation-security.aspx
Balding, Craig. 2011. GoGrid Security Breach. Retrieved from http://cloudsecurity.org/
Brodkin, Jon. 2008. Garner: Seven Cloud Computer Security Risks. Retrieved from http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853
Yunus, Mamoon. 2009. "Swamp Computing" A.K.A. Cloud Computing. Retrieved from http://security.sys-con.com/node/1231725
http://cloudcomputing-rainmaker.blogspot.com/2009/09/data-ownership-in-cloud.html


Cite this Document:

"Control And Ownership In Cloud" (2011, May 21) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/control-and-ownership-in-cloud-44882

"Control And Ownership In Cloud" 21 May 2011. Web.26 April. 2024. <
https://www.paperdue.com/essay/control-and-ownership-in-cloud-44882>

"Control And Ownership In Cloud", 21 May 2011, Accessed.26 April. 2024,
https://www.paperdue.com/essay/control-and-ownership-in-cloud-44882

Related Documents

It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to

This approach to defining a performance-based taxonomy will also allow for a more effective comparison within industries as well. All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing for more thorough measures of application performance. The net result will be much greater visibility into how cloud computing is actually changing the global economics of the enterprise computing industry. III. Final Report: Introduction The foundational

Cloud Security and Privacy Cloud computing's exponential growth is fueling a corresponding need for greater compliance, governance and regulations to ensure data and knowledge are secured and accessed for intended use. A regulation by definition is a rule or law, and has inherent within its definition support for compliance and enforcement (Halpert, 2011). Regulations differ from legal frameworks or standards in that the former is broadly protective and more focused on

Cloud Computing As cloud computing became more and more popular, many major business names jumped at the chance to execute cloud strategies and services within their IT management strategies. Ericsson was one of those companies and has seen major benefits in terms of cost reduction, ease of automatic software updates, increased capabilities of remote access, and on-demand availability. Since its adoption of AWS services as provided from Amazon, it has

adopting the use of cloud-based technologies in the last five years. This trend has caused a significant shift in the way that many organizations interact with information both internally and externally. Yet there are also many risk factors inherent in these technologies, some of which are the result of insider conspiracy (Brender & Markov, 2013). Cloud computing offers many advantages over traditional IT infrastructure which make it an attractive option,

Risk, Risk Management Strategies, and Benefits in Cloud Computing SITUATIONAL ANALYSIS PREMISE STATEMENT KEY DEFINITIONS SERVICE AND DEPLOYMENT MODELS BENEFITS OF CLOUD COMPUTING SECURITY ASPECTS Storage Reliability Virtualization Trust Physical Security Legal Compliance CLOUD COMPUTING RISKS RISK Management STRATEGIES Vendor Evaluation Centralized Information Governance Other Organization-Level Measures Individual-Level Security Measures Cloud computing model Cloud computing service and deployment models ISO/IEC broad categories The emergence of cloud computing has tremendously transformed the world of computing. Today, individuals, organizations, and government agencies can access computing resources provided by a vendor on an on-demand basis.