Verified Document

Control And Ownership In Cloud Research Proposal

The greatest degree of security in cloud computing, however, is not found within the hosted, on-demand variety but rather within on-site cloud computing products and servers. Despite the oxymoronic nature of this concept, such products actually exist and allow a degree of security and data ownership far surpassing hosted cloud computing services, since the need for any third party intervention is eliminated by the server, supporting infrastructure and all applicable hardware being contained, managed, and accessed on an enterprises' own grounds. On-site cloud computing utilizes the same architecture that the hosted kind does, meaning it allows software and platforms to be offered as services while providing virtual data back-up and storage. There is never a need to question the specific ownership of the data, since it is all onsite and very obviously the property of a particular enterprise. The measures of security to reinforce such information are all in-house as well. The primary distinction between onsite and hosted cloud computing is that the former requires a greater emphasis on a company's information technology team to upgrade, repair, and propagate the efficient running of the cloud, which is still accessed by employees and even by an enterprise's...

2009. Cloud Security Front and Center. Retrieved from http://blogs.forrester.com/security_and_risk/2009/11/cloud-security-front-and-center.html
Kamath, Dilip. 2009. Data Ownership in the Cloud. Retrieved from http://cloudcomputing-rainmaker.blogspot.com/2009/09/data-ownership-in-cloud.html

Robbins, David. 2009. Cloud Computing Explained. Retrieved from http://www.pcworld.com/businesscenter/article/164933/cloud_computing_explained.html

Yasin, Rutrell. 2009. Security and Data Ownership: Old Issues in a New Wineskin. Retrieved from http://fcw.com/articles/2010/09/17/data-center-consolidation-security.aspx

Balding, Craig. 2011. GoGrid Security Breach. Retrieved from http://cloudsecurity.org/

Brodkin, Jon. 2008. Garner: Seven Cloud Computer Security Risks. Retrieved from http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853

Yunus, Mamoon. 2009. "Swamp Computing" A.K.A. Cloud Computing. Retrieved from http://security.sys-con.com/node/1231725

http://cloudcomputing-rainmaker.blogspot.com/2009/09/data-ownership-in-cloud.html

Sources used in this document:
References

Wang, Chenxi. 2009. Cloud Security Front and Center. Retrieved from http://blogs.forrester.com/security_and_risk/2009/11/cloud-security-front-and-center.html

Kamath, Dilip. 2009. Data Ownership in the Cloud. Retrieved from http://cloudcomputing-rainmaker.blogspot.com/2009/09/data-ownership-in-cloud.html

Robbins, David. 2009. Cloud Computing Explained. Retrieved from http://www.pcworld.com/businesscenter/article/164933/cloud_computing_explained.html

Yasin, Rutrell. 2009. Security and Data Ownership: Old Issues in a New Wineskin. Retrieved from http://fcw.com/articles/2010/09/17/data-center-consolidation-security.aspx
Balding, Craig. 2011. GoGrid Security Breach. Retrieved from http://cloudsecurity.org/
Brodkin, Jon. 2008. Garner: Seven Cloud Computer Security Risks. Retrieved from http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853
Yunus, Mamoon. 2009. "Swamp Computing" A.K.A. Cloud Computing. Retrieved from http://security.sys-con.com/node/1231725
http://cloudcomputing-rainmaker.blogspot.com/2009/09/data-ownership-in-cloud.html
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now