Cloud Computing Essays (Examples)

Filter results by:

 

View Full Essay

Cloud Lit Rev Insider Threats

Words: 1418 Length: 5 Pages Document Type: Essay Paper #: 40334801

By implementing some fairly basic security protocols and trusting cloud computing service providers to utilize available resources to ensure proper encryption and access control on their end, companies can greatly minimize their exposure to insider risks (Durkee, 2010). This trust is in and of itself a risk, however, and the lack of direct control presents an unavoidable risk in cloud computing.

A recent case that is both highly unique and highly extreme in many of its details highlights many of the specific problems that are encountered with cloud computing networks and their inherent dependence on off-site and external systems, equipment, and personnel. Last year's flooding in Thailand forced many companies to move to cloud computing options for their data storage and communication needs as well as for many ongoing operations, as on-site data centers and other hardware become inoperable due to rising water levels and power interruptions/other infrastructure problems (Sambandaraska,…… [Read More]

References

Durkee, D. (2010). Why cloud computing will never be free. Communications of the ACM 53(5): 62-9.

Gold, J. (2012). Protection in the cloud. Internet Law 15(12): 23-8.

Qaisar, S. & Khawaja, K. (2012). Cloud Computing: Network/security threats and countermeasures. Interdisciplinary Journal of Contemporary Research in Business 3(9): 1323-9.

Reddy, V. & Reddy, L. (2011). Security architecture of cloud computing. International Journal of Engineering Science and Technology 3(9): 7149-55.
View Full Essay

Cloud Based Solutions for Business

Words: 1992 Length: 6 Pages Document Type: Essay Paper #: 15486565

Cloud computing continues to proliferate most of the worlds largest companies, governments, and organization. Its benefits create a compelling value proposition for nearly all stakeholder groups in the form of higher efficiencies, better access to data, and better reliability. Unfortunately these benefits result in a corresponding increase in security vulnerabilities. This document will address these vulnerabilities and how they impact organizations utilizing cloud computing. Emphasis will be place on the more common vulnerabilities and possible solutions to rectify them.

Cloud Computing is increasing becoming a very contentious issue for businesses, governments, and communities around the world. A study initiated by Gartner found that cloud computing is considered one of the top 10 most influential technologies in the world (Gartner 2011). The prospects for the cloud are endless as adaptations can create enhancements in all industries. Industries typically use cloud computing to enhance efficiencies, reduce costs, reduce overall head, and increase…… [Read More]

References

1) Cloud Security Alliance (2011). Security Guidance for Critical Areas of Focus in Cloud Computing Version 3.0. http://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf This document provides an actionable, practical road map to managers wanting to adopt the cloud paradigm safely and securely.

2) Gartner Inc. Gartner identifies the Top 10 strategic technologies for 2011. Online. Available: http://www.gartner.com/it/page.jsp?id=1454221. Accessed: 15-Jul-2011

3) Kaufman, L. M. (2009). Data Security in the World of Cloud Computing. IEEE Security & Privacy, Vol 7, Issue 4, pp. 61-64, July-August 2009.

4) Hashizume et al.: An analysis of security issues for cloud computing. Journal of Internet Services and Applications 2013 4:5.
View Full Essay

Cloud Database Service on User

Words: 3860 Length: 15 Pages Document Type: Essay Paper #: 65997805

This research proposal looks to determine how the selection of a given cloud platform impacts user intention, satisfaction and long-term adoption.

In order to evaluate the contributions of each of these platforms, each is briefly reviewed within the context of this literature review. First, the most commonly used one in start-up cloud database service providers, Amazon Web Services (AWS), is analyzed. AWS is comprised of the following components: Amazon DynamoDB and SimpleDB Services, Amazon Elastic Cloud Service (EC2), Amazon Elastic Block Store (EBS), Amazon Simple Storage Service (S3), Amazon elational Database Service (DS) and Amazon SQS. Amazon has also developed a cloud-based content sharing service that capitalizes on the depth of database expertise and support in this platform. Called Amazon CloudFront, this specific Web Service is designed to allow for Amazon ElastiCache configuration and use of a secured Cloud DNS service called oute 53. All of these technologies are combined…… [Read More]

References

Arias-Cabarcos, P., Almenarez-Mendoza, F., Marin-Lopez, a., Diaz-Sanchez, D., & Sanchez-Guerrero, R. (2012). A metric-based approach to assess risk for "on cloud" federated identity management. Journal of Network and Systems Management, 20(4), 513-533.

Arinze, B., & Anandarajan, M. (2010). Factors that determine the adoption of cloud computing: A global perspective. International Journal of Enterprise Information Systems, 6(4), 55.

Becker, J.U., Greve, G., & Albers, S. (2010). Left behind expectations: HOW to PREVENT CRM IMPLEMENTATIONS FROM FAILING. GfK Marketing Intelligence Review, 2(2), 34-41,64.

Armbrust, M., Fox, a., Griffith, R., Joseph, a.D., Katz, R., Konwinski, a., Zaharia, M. (2010). A view of cloud computing. Association for Computing Machinery.Communications of the ACM, 53(4), 50.
View Full Essay

Cloud Architecture

Words: 531 Length: 2 Pages Document Type: Essay Paper #: 91188148

Multitenancy Architecture and Integration Architecture

Compare-Contrast Essay

Multitenancy and integration are both important concepts when considering cloud computing in the contemporary society. Depending on their position and their interests, individuals can use either one of these concepts with the purpose of improving their cloud experience. Cloud computing in general is recognized for having changed the way that users and programs interact, making it possible for individuals from all around the world to have access to programs that were traditionally associated with much larger enterprises.

Multitenancy is one of the first ideas that a user comes across when dealing with cloud computing. People using this concept in cloud computing practically cooperate in making it possible for the program to exist in the first place. They bring their resources together similar to how individuals living in a building collaborate with the purpose of making building-related processes less expensive. This makes it possible…… [Read More]

Bibliography:

"The Force.com Multitenant Architecture," Retrieved May 9, 2015, fromhttps://developer.salesforce.com/page/Multi_Tenant_Architecture

"The 4 Cloud Integration Dimensions: The Architects Guide to Avoiding Silos," Retrieved May 9, 2015 from https://www.centurylinkcloud.com/blog/post/the-4-cloud-integration-dimensions-the-architects-guide-to-avoiding-silos/
View Full Essay

What Organizations Should Be Aware of Regarding Cloud Technology

Words: 1089 Length: 3 Pages Document Type: Essay Paper #: 66229597

Cloud Computing Security

Security flaws and risks in cloud computing are numerous. Current security issues range from data breaches to broken authentication, hacked interfaces, advanced persistent threats (APTs), permanent data loss, malicious insiders, DOS attacks, and cloud service abuses (Prashanth, ao, 2015; Khan et al., 2016). This paper will discuss the current security issues, what organizations look for when implementing cloud systems, and whether security is the main factor for an organization when implementing cloud systems or whether there are other factors involved in the decision.

As Singh and Malhotra (2015) show, organizations are not just primarily interested in cloud computing because of security issues -- in fact, the main reasons they are interested in cloud computing are that the cloud system can help them to "expand their infrastructure at cheaper rates" and grow their organizational framework (p. 41). In other words, cloud computing allows firms to expand to new…… [Read More]

References

Amit, K., Lizmary, C. (2015). Cloud computing: vulnerabilities, privacy and legislation. IITM Journal of Management and IT, 6(1): 152-156.

Callender, C. (2015). Obstacles to the adoption of cloud computing: best practices in technology and communication. Issues in Information Systems, 16(2): 133-139.

Chou, D. (2015). Cloud computing risk and audit issues. Computer Standards & Interfaces, 42: 137-142.

Haimes, Y. et al. (2015). Assessing systemic risk to cloud computing technology as complex interconnected systems of systems. Systems Engineering, 18(3): 284-299.
View Full Essay

Migrating ERP Systems to the Cloud Migrating

Words: 895 Length: 3 Pages Document Type: Essay Paper #: 83384734

Migrating EP Systems to the Cloud

Migrating Standardized EP Systems to the Cloud

The compelling economics of cloud computing are leading enterprises to question their long-held assumptions that the annual maintenance fees they are paying for on-premise editions of their EP are justified. In addition, these same economics of cloud computing are making it possible for entire divisions of an enterprise to be up and running within weeks instead of months or years, on cloud-based EP platforms (Banerjea, 2011). The economics of cloud computing are also re-ordering the financial landscape of enterprise software, putting line-of-business leaders in a more direct and influential role relative to the purchase of enterprise software (Gill, 2011). All of these factors taken together form the catalyst of how migrating to standardized EP systems delivered via cloud computing are changing how enterprises evaluate, implement and value software.

Migrating Standardized EP Systems To A Cloud Computing Environment…… [Read More]

References

Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., . . . Zaharia, M. (2010). A view of cloud computing. Association for Computing Machinery.Communications of the ACM, 53(4), 50.

Arinze, B., & Anandarajan, M. (2010). Factors that determine the adoption of cloud computing: A global perspective. International Journal of Enterprise Information Systems, 6(4), 55.

Banerjea, D. (2011). Calibrations in the cloud. Quality, 50(3), 40-45.

Creeger, M. (2009). CTO roundtable: Cloud computing. Association for Computing Machinery.Communications of the ACM, 52(8), 50. R
View Full Essay

Control and Ownership in Cloud

Words: 678 Length: 2 Pages Document Type: Essay Paper #: 2650664



The greatest degree of security in cloud computing, however, is not found within the hosted, on-demand variety but rather within on-site cloud computing products and servers. Despite the oxymoronic nature of this concept, such products actually exist and allow a degree of security and data ownership far surpassing hosted cloud computing services, since the need for any third party intervention is eliminated by the server, supporting infrastructure and all applicable hardware being contained, managed, and accessed on an enterprises' own grounds. On-site cloud computing utilizes the same architecture that the hosted kind does, meaning it allows software and platforms to be offered as services while providing virtual data back-up and storage. There is never a need to question the specific ownership of the data, since it is all onsite and very obviously the property of a particular enterprise. The measures of security to reinforce such information are all in-house as…… [Read More]

References

Wang, Chenxi. 2009. Cloud Security Front and Center. Retrieved from  http://blogs.forrester.com/security_and_risk/2009/11/cloud-security-front-and-center.html 

Kamath, Dilip. 2009. Data Ownership in the Cloud. Retrieved from   http://cloudcomputing-rainmaker.blogspot.com/2009/09/data-ownership-in-cloud.html  

Robbins, David. 2009. Cloud Computing Explained. Retrieved from http://www.pcworld.com/businesscenter/article/164933/cloud_computing_explained.html

Yasin, Rutrell. 2009. Security and Data Ownership: Old Issues in a New Wineskin. Retrieved from http://fcw.com/articles/2010/09/17/data-center-consolidation-security.aspx
View Full Essay

Terrorist Groups Use of Cloud Technology

Words: 4606 Length: 15 Pages Document Type: Essay Paper #: 34264283

Terrorist Group's Use Of Cloud Technology

After the 1980s there have been changes on a global scale that included post cold war developments. The changes in Eastern Europe and the Soviet Union coupled with the technological change on the nations of the East caused structural and perceptional changes that were needed to make them competitive in high technology; which included everything from military to the service sector. There was advance of science and technology in the context of world affairs, however lopsided development led to religious fundamentalism and also the terrorist ethos.

The world was for a long time in dread of nuclear weapons, but these too have taken a different dimension. Nations, even rogue nations with nuclear power are not the threat but a fanatic group that succeeds in hijacking a nuclear missile, for example, is. Though science and technology have been blamed for environmental disasters, the proliferation of…… [Read More]

Bibliography

Baker, John C, et al. Mapping the Risks: Assessing Homeland Security Implications of Publicly Available Geospatial Information. Rand: Santa Monica, CA, 2004.

Costigan, Sean S; Gold, David. Terrornomics.

Ashgate Publishing, Ltd., 2007.

Furht, Borko; Escalante, Armando. Handbook of Cloud Computing.
View Full Essay

Analytics Interfaces & Cloud Technology

Words: 2203 Length: 8 Pages Document Type: Essay Paper #: 54905385

Analytics, Interfaces, & Cloud Technology

The use of analytics and cloud technology is a new advance in computing which allows data collection and analytics to be done using higher processing speeds. It allows organizations to take full advantage of the huge amount of data that is collected through web analytics services. Miller Inc. collects a huge amount of data which is difficult to process. It also takes a very long time to process the data since the data is dynamic in nature. There is also a challenge in keeping data secure since the company needs to ensure its business and competitive advantage is protected. Through providing analytics services through cloud technology, Miller Inc. will be able to leverage the data driven frontier of cloud analytics. Basically, the company will be able to leverage the use of technological and analytical tools and techniques which it will design for its clients. These…… [Read More]

References

Antonopoulos, N., & Gillam, L. (2010). Cloud Computing: Principles, Systems and Applications. London: Springer London.

Buyya, R., Broberg, J., & Goscinski, A.M. (2010). Cloud Computing: Principles and Paradigms. New York: Wiley.

Jamsa, K.A. (2011). Cloud Computing. Burlington, Massachusetts: Jones & Bartlett Learning.

Appendix