The greatest degree of security in cloud computing, however, is not found within the hosted, on-demand variety but rather within on-site cloud computing products and servers. Despite the oxymoronic nature of this concept, such products actually exist and allow a degree of security and data ownership far surpassing hosted cloud computing services, since the need for any third party intervention is eliminated by the server, supporting infrastructure and all applicable hardware being contained, managed, and accessed on an enterprises' own grounds. On-site cloud computing utilizes the same architecture that the hosted kind does, meaning it allows software and platforms to be offered as services while providing virtual data back-up and storage. There is never a need to question the specific ownership of the data, since it is all onsite and very obviously the property of a particular enterprise. The measures of security to reinforce such information are all in-house as well. The primary distinction between onsite and hosted cloud computing is that the former requires a greater emphasis on a company's information technology team to upgrade, repair, and propagate the efficient running of the cloud, which is still accessed by employees and even by an enterprise's...
2009. Cloud Security Front and Center. Retrieved from http://blogs.forrester.com/security_and_risk/2009/11/cloud-security-front-and-center.htmlOur semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now