Cloud Computing And Data Security Risk Research Paper

PAGES
5
WORDS
1474
Cite

Executive Summary Cloud computing allows organizations in multiple sectors to maximize their resources. Individual consumers have already shifted their email and data storage to the cloud, as with web-based email and file sharing applications like Dropbox. Enterprise-level cloud computing presents additional benefits that allow companies of all sizes to remain flexible in their use of IT services. Cloud-based computing also precludes heavy investment in initial technologies or proprietary systems, shifting to a pay-per-use model. The fears related to security of enterprise data and potential impediments to service can be mitigated by choosing the right cloud computing provider and securing all client-side devices.

Introduction: What Is Cloud Computing?

The essence of cloud computing is sharing critical resources. Convenience and cost-effectiveness are the cornerstones of cloud computing, which is why cloud computing services have become ubiquitous. Other core components of cloud computing include its on-demand nature, self-serve features, rapid and easy scaling (elasticity), optimization of resources like bandwidth, and accessibility on multiple devices and platforms (Mell and Grance). Cloud infrastructure includes both hardware (such as servers or storage) and software. Cloud computing clients pay for the services, such as through a subscription fee. Clients do not need to worry about maintaining servers or storage systems. Likewise, the cloud provider handles all maintenance, troubleshooting, and support issues.

There are three types of cloud computing models: Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). Software as a service means the client runs the proprietary software as a stand-alone application or as a software accessible on a web browser. Web-based email is probably the most common SaaS.

Platform as a service is primary useful for clients that develop their own software applications. The client benefits from reduced resources spent on maintaining the underlying platform, while still being able to develop the products and services they sell. Google’s App Engine is an example of PaaS.

Finally, IaaS is for clients who need actual...

...

The client benefits from IaaS by not needing to make the costly up-front investment in the actual infrastructure. Likewise, the client can also reduce or expand IaaS serves as needed to more efficiently manage variable costing. Many of the most established cloud computing companies like Sales Force, Amazon Web Services, and Microsoft Azure offer both IaaS and PaaS.
Costs and Benefits

Cloud computing presents far more benefits than costs for most companies. The primary benefits include improved cost management, as there are no up-front costs associated with investment in either hardware or software, allowing you, the client, to focus on developing your business. Also, cloud computing services are fully scalable. When any cloud-based software or hardware system is no longer needed, it can be removed from the list of services. An analogy would be cellular phone service; a customer only pays for the plan that suits their needs. With cloud computing, the client only pays for the products and services they need. This benefits companies that rapidly expand, as well as companies that plan on diversifying or changing their focus regularly. The client does not need to perform regular maintenance on software or hardware systems, or be concerned about upgrades. Most of the risks involved with hardware and software management are transferred to the cloud provider (Zhang, Cheng and Boutaba). Finally, employees enjoy cloud computing because of the flexibility it affords in accessing their work remotely and on multiple devices including their mobile phones (Franklin, Bowler, and Brown).

However, the drawbacks of cloud computing should be included in any sensible risk assessment. One risk is service reliability and availability. The client depends on the cloud provider for essential business services including email. If the provider’s own systems fail, then the client suffers. This risk can be mitigated easily by purchasing cloud based services only from reputable providers. Another risk is data lock-in, which essentially means that once you, the client, commits to working with a specific cloud provider, your data might not be easily transferable to other software systems should…

Sources Used in Documents:

Works Cited



Armbrust, Michael, Fox, Armando, Griffith, Rean, et al. “Above the Clouds: A Berkeley View of Cloud Computing.” Feb 10, 2009. Retrieved: http://home.cse.ust.hk/~weiwa/teaching/Fall15-COMP6611B/reading_list/AboveTheClouds.pdf

Franklin, Joshua, Bowler, Kevin, Brown, Christopher, et al. “Mobile Device Security: Cloud and Hybrid Builds.” NIST/CSRC. Nov 2015: https://csrc.nist.gov/publications/detail/sp/1800-4/draft

Mell, Peter and Grance, Timothy. “The NIST Definition of Cloud Computing.” September 2011. http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf

Walker, Kari. “Cloud Security Alliance Announces Release of Newest Report on ‘Improving Metrics in Cyber Resiliency” Cloud Security Alliance. Retrieved: https://cloudsecurityalliance.org/media/news/cloud-security-alliance-announces-release-of-newest-report-on-improving-metrics-in-cyber-resiliency/

Zhang, Qi, Cheng, Lu, and Boutaba, Raouf. “Cloud Computing.” J Internet Serv Appl (2010) 1: 7–18. https://link.springer.com/content/pdf/10.1007%2Fs13174-010-0007-6.pdf



 


Cite this Document:

"Cloud Computing And Data Security Risk" (2017, October 16) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/cloud-computing-and-data-security-risk-2166209

"Cloud Computing And Data Security Risk" 16 October 2017. Web.25 April. 2024. <
https://www.paperdue.com/essay/cloud-computing-and-data-security-risk-2166209>

"Cloud Computing And Data Security Risk", 16 October 2017, Accessed.25 April. 2024,
https://www.paperdue.com/essay/cloud-computing-and-data-security-risk-2166209

Related Documents

Cloud Computing Assessing the Risks of Cloud Computing Despite the many economic advantages of cloud computing, there are just as many risks, both at the information technologies (IT) and strategic level for any enterprise looking to integrate them into their operations. The intent of this analysis is to evaluate three of the top risks of cloud computing and provide prescriptive analysis and insight into how best to manage each. Despite widespread skepticism

This approach to defining a performance-based taxonomy will also allow for a more effective comparison within industries as well. All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing for more thorough measures of application performance. The net result will be much greater visibility into how cloud computing is actually changing the global economics of the enterprise computing industry. III. Final Report: Introduction The foundational

Security in Cloud Computing
PAGES 10 WORDS 3274

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

Cloud Computing
PAGES 3 WORDS 752

Cloud and all of its benefits have begun taking hold in today's society. This trend of outsourcing important computer operations has been met with some resistance. The purpose of this essay is to explore the risks involved with cloud computing. This essay will argue that there are four main risks that potential cloud users must be aware of before fully adopting it: security, compliance, data loss, outages. Security The largest and most

There is a difference in the approach to this challenge considering the two platforms, and the fact that they may be based on different configurations. Therefore, it is essential that proper techniques are instituted counter this. Evidently, insider threats are a menace in the cloud computing environment, just as is the case in a normal organizational set up. Most of the threats posed by such individuals are detrimental to the

Risk, Risk Management Strategies, and Benefits in Cloud Computing SITUATIONAL ANALYSIS PREMISE STATEMENT KEY DEFINITIONS SERVICE AND DEPLOYMENT MODELS BENEFITS OF CLOUD COMPUTING SECURITY ASPECTS Storage Reliability Virtualization Trust Physical Security Legal Compliance CLOUD COMPUTING RISKS RISK Management STRATEGIES Vendor Evaluation Centralized Information Governance Other Organization-Level Measures Individual-Level Security Measures Cloud computing model Cloud computing service and deployment models ISO/IEC broad categories The emergence of cloud computing has tremendously transformed the world of computing. Today, individuals, organizations, and government agencies can access computing resources provided by a vendor on an on-demand basis.