StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Professional Issues in Information Technology - Cloud Computing - Essay Example

Cite this document
Summary
The paper "Professional Issues in Information Technology - Cloud Computing" states that the proliferation of cloud computing has changed the information technology landscape. Never before have business entities and users shared data on the cloud-like what is happening today…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful

Extract of sample "Professional Issues in Information Technology - Cloud Computing"

Contents 1.0 Introduction 2 1.1 Cloud computing model 2 1.1.1 Fig 1: Layered design of cloud computing model 3 2.0 Opportunities of cloud computing 4 3.0 Threats to Cloud Computing: Privacy and Security 5 4.0 Conclusion 7 4.0 References 8 1.0 Introduction The proliferation of cloud computing has changed the information technology landscape. Never before have business entities and users shared data on the cloud like what is happening today. The introduction of cloud computing has changed how people collaborate save data and implement various business models. In fact, small and medium business, as well enterprises are now tapping into the power of cloud computing. The roll out of cloud computing has created a disruptive wave of changes in the information technology sector. Whyman (2008, p. 11) define cloud computing as the use of scalable IT capabilities that cloud providers deliver ‘as a service’. The main thrust behind widespread growth of cloud computing stems from the opportunities of the technology. Unlike other traditional information technologies, cloud-computing offers a promise of lower investment, lower energy use, scalability, and delivery of new applications (Marston, 2011, p. 178). While cloud computing has significant potential to changing the use of information technology, there are several threats to the success. The issue of privacy and security are the leading threats to widespread adoption of cloud computing. Consequently, resolving these challenges remains a critical milestone in creating a surge in demand for more cloud computing services than before. With the availability of robust solution to privacy and security issues, cloud computing is likely to become an IT solution of choice for the provisioning of re-usable, cost saving, efficient, and customizable services and products. 1.1 Cloud computing model The cloud-computing model is a novel strategy of sharing data and programs, in the cloud, which allows users to access them anywhere, anytime and through a number of devices. According to Ryan (2013, p. 2263), cloud computing is a new model which allow cloud providers to buttress their infrastructure while allowing users to pay for the service while enjoying improved security and information technology. Indeed, the architecture of cloud computing is the main force behind the potential benefits of the technology. With users and business enterprises sharing hardware, providers have the advantage of offering their services to a massive number of users. However, the model pose a great challenge arising from lack of control and existence of security and privacy concerns. The concerns of cloud computing arise from the layered architecture of the technology, which will enhancing use and service delivery do contribute to an array of vulnerabilities. 1.1.1 Fig 1: Layered design of cloud computing model The transformation characteristic of cloud computing is also a fundamental reason why there are some security and privacy concerns in cloud computing. Kshetri (2012, p. 373) argue that cloud providers and users hold varying views on matters such as security and privacy of cloud computing services. While the variation in views underscore the impact of new and emerging technologies, security and privacy remain a critical threat to widespread use of cloud computing. This does not mean that cloud computing does not suit the needs of business and individual users. Rather, it gives information technology experts a platform to appreciate the robust benefits of cloud computing, as well as the challenges emanating from this new technology. A review of literature on the opportunities and threats of cloud computing is essential to situate some of the challenges that characterize the new technology. Beforehand, it would be important to note that the challenges of cloud computing—control and security, appear anchored on the disruptive nature of cloud computing. 2.0 Opportunities of cloud computing A wealth of research point at cloud computing as a profound enabler of business opportunities. Before the introduction of cloud computing, data and collaboration efforts required users to interact through tradition avenues like meetings and local networks. However, cheap and increase proliferation of the internet has increased adoption of new services such as cloud computing. Subashini and Kavitha (2010, p. 1) posits that cloud technology offer users the opportunity to deploy services faster than they would by setting up their infrastructure. This benefit adds to the list of characteristics such as rapid provisioning, cost saving, and increased collaboration, which underline the appeal of cloud computing to users. In business, implementing a business tact is an essential part of winning where agile businesses overcome competition and stifle competitors. As a result, achieving fast deployment of business via IT solutions could benefit from cloud computing. Collaboration is a great opportunity cloud computing exploits more than other technologies do. Xu (2011, p. 75) identifies cloud computing as the main enabler of seamless collaboration between users, situated anywhere in the world. Using cloud computing, companies can deploy novel services that allow users to share files and communicate with other users, possibly in remote areas. The ease of collaboration via cloud services has marked the success of manufacturing industries and other business sectors that rely on collaboration to boost innovativeness. Xu (2011, p. 75) overemphasis the opportunity of cloud computing in manufacturing sector and other areas such as research and innovation. As a critical component of cloud computing, virtualization has enabled low investment in information technology infrastructure, while boosting customization and adaptability. Rather than operating a traditional data centers, cloud providers rely on virtualization to provide users with necessary cloud computing. Sun et al (2011, p. 2852) argue that virtual computing resources is what offers cloud providers with the opportunity to scale their services. Subashini and Kavitha (2010, p. 1) posit that cloud computing ease the work of clients because it takes a significant part of the computing workload. This is evident because user if cloud service do not a robust IT personnel to manager their systems. Without doubt, the ability to customize cloud services as companies grow remain an essential opportunity that adds to the advantages of cloud computing. 3.0 Threats to Cloud Computing: Privacy and Security While cloud computing offer significant benefits the surpass those of traditional data centers, security issues and privacy remain are fundamental constraints. The security issues inherent in cloud computing anchor on the service delivery model, which creates a tradeoff between benefits and challenge of cloud computing. As the cloud computing architecture, describe, providers of cloud computing provide clients with a virtual environment to run their application and store data (Subashini & Kavitha, 2011, p.3). However, the placing of data and situation of the application environment in the cloud is a source of security vulnerability user of cloud computing contend every day. Marston et al. (2010, p. 180) believes that cloud computing has diverse risks primary because of limited privacy and security of data. A robust perspective of data security is evident in some notable research work, as well. Ryan (2013, p. 2263) presents an argument that data security is an enormous task because data is becoming a challenge to protect. He further argues that security of data in the cloud revolves an array of issue that deserve attention. For instance, Ryan (2013, p. 2263) point at cloud security as involving several issues such as access control, attack surfaces, malware threats and security. In cloud computing, client’s data reside in the cloud where several entities can access. The accessibility of data in the cloud describes the single most security threat of cloud infrastructure. Chen et al. (2010, p.8) argues that provides could modify data in the cloud bringing about issues of integrity and accountability. Issue of security and privacy of cloud computing are not only complex, but also lacking a robust framework of support. To exemplify the complexity of this issue, some scholars argue that security of data rests on the hands of cloud providers (Zielinski, 2009, p. 64). The possibility of cloud vendors modifying data is a security issue because it affects the confidentiality and integrity of data. Sun et al. (2011, p. 2285) lists breach of confidentiality as a security risk inherent in a cloud environment. The cloud servers while offering users how to store their data expose the same data to actors who may access the data and view privileged information. With the cloud being a choice for many business entities for running their business applications, security of data in cloud servers remain a bottleneck to widespread acceptance and use of cloud services. With cloud computing offering virtual resource, users may share similar hardware infrastructure creating more security challenges. Unlike the traditional on-premise storage of data, users of cloud computing have to share data servers, which is often outside the enterprise boundary, but could create security breaches with serious ramifications. 4.0 Conclusion Security and privacy breaches pose a significant challenge to the use of cloud services among small and medium businesses, not to mention enterprise players too. The gains business firms have realized from cloud computing are immense, but there is need to finding lasting solutions to security issues of among enterprise users. There is no doubt cloud-computing offers an array of opportunities for business to grow. As literature on cloud computing evidence, cloud computing reduce cost and time of deployment, increase scalability and allow seamless collaboration among enterprise players. However, much focus is necessary on security issue facing users of cloud computing. More than before, cloud security is making inroads in much business, but security and privacy remain a challenge limiting growth of this field. There is no single solution that can provide an answer to all security challenges facing users of cloud computing. However, several approaches to improving security are worth exploring. Xu (2011, p. 78) argues that compressing data and provide encryption service could help reduce security breaches in cloud environment. This solution aligns with the fact that virtualization gives cloud vendors control over data and employees can could access such data maliciously. Most important, malware attack could exploit vulnerabilities and create serious data breaches. Thus, encryption of data could help secure the privacy and integrity of data. Connected to data security is accountability, which while important for auditing, open data to users who can comprise on user privacy. Lombardi and Petro (2009, p. 1115) propose that cloud vendors to implement privacy protection techniques. Such techniques help reduce possibility of cloud servers to expose user information outside the boundary of the virtual machines. The issue of confidentiality could remain a problem of less significance if vendors develop such approaches. Even with security risks being a threat to cloud computing, a new approach to quantifying such risks is necessary as it can streamline how business make decisions. Rabai et al. (2012, p. 75) propose a cloud computing business model where cloud vendors improve security and charge a price for each security upgrade. Such decisions to charge customers for security upgrade is likely to boost the use of cloud services. In addition, users of cloud resources will have a chance to pay for security service derive benefit. While these efforts are incomplete, continued research is vital to improve security of cloud users. Until this is done, uptake of cloud computing is likely to slow down. 4.0 References Kshetri, N. 2013. Privacy and security issues in cloud computing: The role of institutions and institutional evolution, Telecommunications Policy, 37.pp.372-386 Lombardi, F. & Pietro, R. 2011. Secure virtualization for cloud computing. Journal of Network and Computer Applications, 34, pp.1084-8045 Marston, S. Li, Z., Bandyopdhyay, S., Zhang, J., and Ghalsasi, A. 2011. Cloud computing—The business perspective, Decision Support Systems, 51. Pp. 176-189. Rabai, L. B. A., Jouni, M., Aissa, B. A. & Mili, A. 2013. A cybersecurity model in cloud computing environments. Journal of King Saud University – Computer and Information Sciences. 25. pp. 63-67 Ryan, D. M. 2013. Cloud computing security: The scientific challenge, and a survey of solutions, The Journal of Systems and Software, 86 pp. 2263-2268. Subashini, S. & Kavitha, V. 2011. A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34, pp. 1-11 Sun, D. Chang, G. Sun, L., & Wang, X. 2011. Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments. Advanced in Control Engineering and Information Science. 15.pp. 2852 – 2856 Whyman, B. 2008. Cloud computing. Information Security and Privacy Advisory Board; pp. 11- 13 Xu, X. 2011. From cloud computing to cloud manufacturing. Robotics and Computer-Integrated Manufacturing, 28.pp. 75-86. Zielinski, D. 2009. Be clear on cloud computing contracts. HRMagazine, 54(11), 63–65. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Professional Issues in Information Technology - Cloud Computing Essay, n.d.)
Professional Issues in Information Technology - Cloud Computing Essay. https://studentshare.org/information-technology/2062473-professional-issues-in-information-technology
(Professional Issues in Information Technology - Cloud Computing Essay)
Professional Issues in Information Technology - Cloud Computing Essay. https://studentshare.org/information-technology/2062473-professional-issues-in-information-technology.
“Professional Issues in Information Technology - Cloud Computing Essay”. https://studentshare.org/information-technology/2062473-professional-issues-in-information-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF Professional Issues in Information Technology - Cloud Computing

Gartner's Value Proposition to Clients

The company has been involved in information technology research and consultancy for over three decades thus it can boast of having a broader view of the issues that impact IT industry professionals at every level.... The current hot topic in IT Supply Management today is how to relocate IT applications from Client-Server model to the new paradigm of cloud computing model.... Gartner proposes five ways through which organisations can migrate to the cloud: re-hosting on Infrastructure as a Service (IaaS), refactoring for Platform as a Service (PaaS), revising for IaaS or PaaS, rebuilding on PaaS or replacing with Software as a Service (SaaS) (staff reporter 1)....
4 Pages (1000 words) Coursework

Analysis of Implementation of New Technology in Servue Corporation

From the paper "Analysis of Implementation of New technology in Servue Corporation" it is clear that from the technology capabilities point of view the solution offered by the Kwikfix business is most excellent.... The same simple and automated business technology is now required at the Servue business.... In this scenario, this report will discuss some of the important aspects regarding the implementation of this new technology....
7 Pages (1750 words) Research Paper

Social, Regulatory, and Technology Changes in Business

Name: Instructor: Task: Date: Challenges Facing Businesses Social, regulatory, and technology changes influence business operations, and transform conditions of the market both internally and globally.... Presently, technology has granted businesses conference and email-hosting capacities.... Uncertainty regarding global economy, credit markets, and ways through which innovative technology will influence businesses, pose numerous challenges.... technology The pace of technological advancement is exponential making capital investments beneficial to businesses....
3 Pages (750 words) Essay

How Will Astronomy Archives Survive the Data Tsunami

However, cloud computing has its own challenges as well.... In order to make systems available on cloud the whole time, third parties usually create redundant data on different virtual machines.... The astronomical data can be set on cloud to make it readily available.... Such challenges include vulnerability of data attacks as the cloud is shared through a network and makes the data available through internet.... The companies might lose down or merge with other companies resulting is partial or complete loss of data or other similar issues hence decreasing reliability of data on the cloud....
5 Pages (1250 words) Case Study

The Worlds Largest IT Company

The paper "The Worlds Largest IT Company" states that IBM has been making good moves in the area of SOA and cloud computing – but, one cannot say how the market will evolve for these new areas and IBM should be to pull out quickly if the expected market fails to emerge.... hellip; IBM should get its 'Storage Business' model right, this has always been dicey and has not taken off the way IBM wanted it long ago – The storage market is going to become fiercely competitive especially after the recent acquisition of Sun Microsystems by Oracle....
8 Pages (2000 words) Case Study

Selection of an Information Technology Platform

The third option was cloud computing.... Due to Case Study: Selection of an information technology Platform Question The assignment which was given to Browning was notan easy one.... information technology Strategy and Management: Best Practices: Best Practices.... Cases on information technology and Business Process Reengineering.... Strategic information technology: Opportunities for Competitive Advantage.... The first one was the centralized computing....
2 Pages (500 words) Case Study

The Legal Issues and Potential Privacy Implications of This IT System

Gellman (2009) states that the legal system badly trails technology and the application of old laws to newer technology can at times be unpredictable, therefore the company handling the sensitive data of its loyal customers will have accord top priority to the concern of citizens even if there are grey areas in the legal system.... In such cases, personal information might be used by the company officials to sift through the gullibility of the customer....
7 Pages (1750 words) Assignment

Cloud Computing System for Anglia Cloud

cloud computing system for Anglia CloudIntroductionThis paper is a report for the board of Anglia Cloud explaining the idea, benefits and dangers of cloud computing as well as recommendations of computers, printers, broadband internet connection, cloud computing system for Anglia CloudIntroductionThis paper is a report for the board of Anglia Cloud explaining the idea, benefits and dangers of cloud computing as well as recommendations of computers, printers, broadband internet connection, network hardware, and network topology suitable for the system....
5 Pages (1250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us