Security Issues In Cloud Computing Data Analysis Chapter

Despite these concerns however the world's largest companies still actively promote and routinely hype the value of cloud computing without mentioning the myriad of risk associated with this platform, despite its continual maturation from a security and stability standpoint [2]. An example of this is type of hype is when Microsoft's Steve Balmer described cloud computing as the next frontier and Dr. Ajei Gopal verified that the cloud is there to alter everything. Joe Tucci, the CEO of EMCCorp described the impact of cloud computing as "We're now going through what I believe is pretty much going to be the biggest wave in the history of information technology." These claims of corporate executives must be balanced against reality and the fact that these platforms require a continual focus on quantifying and validating trust on the one hand [1] and designing the systems to ensure a higher level of content agility and flexibility on the other [5]. The National Institute of Standards and Technology (NIST) defined cloud computing as a model for allowing "convenient on-demand network access to a shared collection of customizable resources such as services, storage, applications, networks and servers that can be quickly provided and issued with minimal management effort or interaction with service provider.

Cloud computing history began in the nineties through the development of World Wide Web. Using the Mosaic browser, internet-based computing started. Using a business perspective, it provided virtual shopping experience and chain integration. The aspect of e-business obtained a foothold in almost any company. As a significant side-effect, users became used to this leading-edge technology whilst seeking for information, performing online shopping, chatting with family and family, watching movies online or handling bank accounts. The following generation of cloud services was inspired by consumer experiences, accessible 24/7, an intuitive user interface that does not need training and comprehensive self-services from opening a new back account to purchasing holiday packages. Technology changed to produce a comprehensive interactive web interfaces and service-to-service interaction. It also went far beyond business applications and this includes social networks and collaboration tools. This clearly changed the way business people acquire...

...

Through the use of standardized, highly virtualized infrastructure and applications, this new strategy can encourage higher degrees of consolidation which reduce costs.
2.0 Cloud Models

3.1 Cloud Delivery Models

When people hear the word "cloud computing," things that come first to their mind are the giants such as Amazon, Google, Twitter, YouTube, Facebook and Salesforce.com. They are called public cloud because they are providing resources for free or rent. This also includes storage capacity and increasing array of business applications and services. Learning the differences between the private, public and hybrid model as well as community cloud is a common method of understanding the cloud.

Private Cloud: a specific organization solely operates their respective private clouds. It can be maintained by the organization itself or by a third party, which means it could be on premise or off premise. On premise means that the owner is based inside the office of the organization and their private cloud is maintained by their own IT staff. The organization has the complete control over the infrastructure, data center and services. Off premise is based outside the organization, taking advantage of the expertise of the third party provider such as hosting facility. Off-premise approach is for those organizations that do not have needed expertise or resources to build and maintain their own data center. One good example of private cloud is Microsoft Private Cloud. In addition, private cloud, whether off-premise or on-premise is entirely dedicated to the needs of the organizations and not of the public. Another difference between large-scale corporate data centers and private clouds is in terms of governance model. The cloud model recognizes that the customers are actually the "business." The risks associated with the operation are in the IT side rather than the business idea. The new challenge here for the IT is not only the cost center but as

Cite this Document:

"Security Issues In Cloud Computing" (2013, March 10) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/security-issues-in-cloud-computing-86592

"Security Issues In Cloud Computing" 10 March 2013. Web.19 April. 2024. <
https://www.paperdue.com/essay/security-issues-in-cloud-computing-86592>

"Security Issues In Cloud Computing", 10 March 2013, Accessed.19 April. 2024,
https://www.paperdue.com/essay/security-issues-in-cloud-computing-86592

Related Documents
Security in Cloud Computing
PAGES 10 WORDS 3274

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

Cloud Computing: Security Threats & Countermeasures, Auditing and Strategies Regarding the Cloud Abstract The cloud is the latest development in the world of the Information Age. It provides a way for data to be stored, shared, managed, and protected in an efficient and effective manner. This paper looks at some of the security threats and countermeasures that can be conducted to help make the cloud safer. It examines why auditing is essential

This approach to defining a performance-based taxonomy will also allow for a more effective comparison within industries as well. All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing for more thorough measures of application performance. The net result will be much greater visibility into how cloud computing is actually changing the global economics of the enterprise computing industry. III. Final Report: Introduction The foundational

Cloud Computing Security Pros & Cons Over the last ten years, cloud computing has rapidly grown and it is expected to grow even further as more businesses move online. When cloud computing was first conceived, many skeptics dismissed it as being just another tech fad that will quickly disappear. However, over the last three years cloud computing has truly changed the way we think about IT nowadays. The Cloud has significantly

This means that no deeper view into the system and its underlying infrastructure is provided to the customer." The constant flow of information makes compiling a forensics report on any given item very difficult. Legal issues may also hamper digital forensics in dealing with cloud issues. Cloud computing raises some unique law enforcement concerns regarding the location of potential digital evidence and its subsequent forensic analysis. When a savvy and

Cloud Computing
PAGES 10 WORDS 3424

Brodkin, J. (2008). Gartner: Seven cloud-Computing security risks. Infoworld, pp. 1 -- 3. Carlin, S. & Curran, K. (2011). Cloud computing security. International Journal Of Ambient Computing And Intelligence (IJACI), 3 (1), pp. 14 -- 19. Cloud Computing Benefits, risks and recommendations for information security. (2009). [e-book] Available through: ENISA https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security [Accessed: 24 Mar 2014]. Cloudsecurityalliance.org. (2011). Top threats to cloud computing: cloud security alliance. [online] Retrieved from: https://cloudsecurityalliance.org/research/top-threats [Accessed: 24 Mar 2014]. Feng,