StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cloud Computing: Overview and Risk Analysis - Literature review Example

Cite this document
Summary
The paper "Cloud Computing: Overview and Risk Analysis" outlines that cloud computing develops a crucial keyword in accelerating information technology businesses, but it possesses a distributed architecture established on unfixed nodes and safety issues outlined in services based on cloud computing…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful

Extract of sample "Cloud Computing: Overview and Risk Analysis"

Cloud Computing By Name Course Instructor Institution City/State Date Table of Contents Cloud Computing 1 Table of Contents 2 Cloud Computing 2 1.0 Introduction 2 2.0 Benefits of Cloud Computing to Present Businesses 4 3.0 Cloud Computing Security Threats 6 3.1 Threats Security Identification 7 3.2 Integrity 8 3.3 Secrecy and Privacy 9 4.0 Incorporating Entrusted Third Party 10 5.0 Conclusion 11 6.0 References 12 Cloud Computing 1.0 Introduction Cloud computing develops a crucial keyword in accelerating information technology businesses, but it possess a distributed architecture established on unfixed nodes, and safety issues outlined in services based on cloud computing (Zissis & Lekkas, 2012, p. 584). Essentially, emergence of cloud computing has rapidly changed everyone’s intuition of infrastructure structure, development paradigms, and software delivery. According to Fernando, et al. (2013), pursuing the transformation from mainframe computers to server deployment paradigms, cloud computing contains elements from automatic, utility, and grid computing into an inventive deployment architecture. Presently, cloud computing is achieving heightened popularity, worry are being raised about the security challenges introduced after adopting the novel paradigm (Fernando, et al., 2013, p. 84). Consequently, Cloud computing, which is a recent development in the IT sector, allows organizations to run application online in what is otherwise referred to as a cloud. The “cloud” promotes sharing of resources within and outside the business setting (Thomas, 2011, p. 216). In addition, cloud acts like a server where an organization can stockpile resources required by the company (Lin & Chen, 2012, p. 533). However, the main difference between cloud computing and server based technology is that cloud computing permits users to run applications online without the need to download or install them in their computers. Therefore, this makes it appropriate for both users and the service industries to benefit from the high connection speed promoted by cloud computing (Alali & Yeh, 2012, p. 29). Fig 1: Cloud Computing (source: en.wikipedia.org) 2.0 Benefits of Cloud Computing to Present Businesses Business experts hold the opinion that businesses should start using cloud computing since using cloud computing ensures that the business is utilizing the latest technological advancements; thus, ensuring its performance is boosted (Zissis & Lekkas, 2012, p. 588). In addition, the business can manage to change with changing times more efficiently bearing in mind the fact that almost everything in the modern world has pursued the digital and electronic track. According to Yoo (2011), businesses that utilize cloud-computing technology are well positioned to handle technological tasks contrary to businesses using the old system, which are regarded as out dated or obsolete. In this regard, businesses using cloud computing can cope more efficiently to competition in the global platform as compared to their obsolete counterparts. Fig 2: Cloud computing benefits (source: shebytes.com) Cloud computing also ensures that an organization is updated with the latest developments in terms of technology, considering that it is a technology by itself, it opens many more avenues for the company (Garrison et al., 2012, p. 62). Furthermore, cloud computing also heightens flexibility in that employees from an organization can work from any location, even from the comfort of their houses. For instance, the company can recruit staff from other companies without having to travel to the country, and if used along with other technology forms, the company can conduct interviews using webcams and can hire workers who can work from mother countries: thus. Saving additional cost that could be incurred if the interview was conducted manually (Zissis & Lekkas, 2012, p. 591). Fig 3: Benefits of Cloud Computing (source: talkcloudcomputing.com) 3.0 Cloud Computing Security Threats Critically, cloud implementation frequently contains progressive safety technologies, mostly available because of information centralization and universal structure. In its quintessence, cloud computing can address numerous shortcomings endured by traditional architectures due to its unique attributes (Lin & Chen, 2012, p. 533). Fig 4: Categorization of threats (Zissis & Lekkas, 2012) 3.1 Threats Security Identification Fundamentally, safeguarding an information system (IS), entails recognizing unique threats and problems, which require to be addressed by incorporating suitable countermeasures. Eventually, the recognized security needs and chosen security controls are incorporated to the standard engineering process, to connect the security measures with information system operational and functional needs (Thomas, 2011, p. 220). Cloud computing based on its architectural attributes and design imposes several security advantages, such as security centralization process and information segmentation, and redundancy availability. Yoo, (2011) posit that cloud computing has unique characteristics that need risk assessment in issues such as reliability and availability, auditing and privacy, integrity, and recovery. According to Zissis and Lekkas (2012), security is associated to the crucial aspects of availability, confidentiality, and integrity; therefore, they become building blocks to be utilized in developing security systems. In addition, these crucial aspects of security, enforce to the three wide categories of assets, which are vital to be safeguarded, 3.2 Integrity Integrity is the fundamental aspect of information security, and it posits that assets can be altered only through authorized channels based on data, hardware, and software. According to Alali and Yeh (2012), data integrity refers to safeguarding information from unauthorized obliteration, fabrication, or modification. Administering an entity’s rights and admittance to certain business resources, guarantees that valuable information and services are not stolen, abused or misappropriated. Lin and Chen (2012) believe that by preventing unlicensed access, companies can attain enormous confidence in the system and information integrity. Furthermore, such mechanisms provide enormous visibility into deciding who or what may have changed system or data information, possibly influencing their accountability. In this regard, a cloud-computing provider is entrusted to sustain data integrity and precision, but the cloud paradigm on its part presents several threats entailing complicated insider attacks on these data characteristics (Fernando et al., 2013, p. 589). On the other hand, software integrity refers to safeguarding software from unlicensed obliteration, fabrication, or theft, which can be either intentional or unintentional. In this regard, cloud-computing providers incorporate a set of application programming interface (APIs) that customers utilize to administer and communicate with cloud services. Based on this perspective, Garrison et al. (2012) assert that the security of cloud services relies heavily on interfaces security as unlicensed user gaining access to them could fabricate or alters them. Furthermore, in cloud computing, accountability for software’s integrity protection is conveyed to the owner of the software. Hardware integrity is a supplemental challenge that requires the cloud provider to address since he is weighed down with protecting hardware from fabrication, theft, or modification (Zissis & Lekkas, 2012, p. 100). 3.3 Secrecy and Privacy Fernando et al. (2013) defines confidentiality as permission to authorized parties to gain access to protected information/data. However, cloud provides a platform for infringement of data due to heightened number of devices, parties, and applications, which will lead to an increased number of access points. Arguably, Lin and Chen (2012) claim that authorizing data control to the cloud, conversely leads to a rise in the risk based on data infringement as the data becomes attainable to an increased number of parties, which give rise to issues such as multi-tenancy, application privacy and security, and data remanence. On its part, multi-tenancy refers to cloud attributes of resource sharing such as programs, memory, and data. Essentially, cloud computing is established on business paradigm in which resources are divided at the host level, network level, and application level (Thomas, 2011, p. 223). On the other hand, multi-tenancy refers to an operating system multitasking, which is a technique through which diverse processes or tasks share similar processing resources such as system unit. According to Zissis and Lekkas (2012), multi-tasking presents numerous confidentiality and privacy threats such as object reusability, which is a vital attribute in cloud infrastructure, and can generate a serious vulnerability. Data remanence refers to the sediments presentation of information that has been erased because of lack of hardware separation amid several users on a single infrastructure (Zissis & Lekkas, 2012, p. 591). Fig 5: Cloud Computing Threats (source: cloud-basedlms-etec522.weebly.com) 4.0 Incorporating Entrusted Third Party According to Yoo (2011), employing trusted third party in the cloud computing, will help to establish the required trust level and offer ideal resolution to maintain the integrity, confidentiality, and authenticity of information and communication. In addition, trusted third party promotes secure communication between two parties that trust the third party. Zissis and Lekkas (2012) assert that trusted third party supplies legally and technically dependable ways of conducting, promoting, and creating independent evidence concerning arbitration on electronic services. In addition, trusted third party can be trusted for low and high level confidentiality, generation of security domains, certificate –founded authorization, client and server authentication, and information cryptographic separation (Zissis & Lekkas, 2012, p. 586). 5.0 Conclusion Conclusively, Cloud computing is one of the latest technological developments in the IT field and has revolutionized many businesses in the twenty first century cloud computing brace information systems as the advantages outnumber its deficiency. In addition, cloud computing provides deployment architecture that can address shortcoming identified in traditional information system, but its dynamic attributes can prevent the effectiveness of traditional measures. Consequently, employing trusted third party in the cloud computing assists to establish the required trust level and offer ideal resolution to maintain the integrity, confidentiality, and authenticity of information systems. Cloud computing improves predictability, optimizes operations by minimizing manual work, and improves cross discipline collaboration and communication. Going by the arguments put forward, cloud computing is undoubtedly the future for businesses in the 21st century, and in the technology world cloud computing is changing rapidly changing. In this regard, cloud computing may seem to be the feature at the current technology. 6.0 References Fernando, N., Loke, S. W. & Rahayu, W., 2013. Mobile cloud computing: A survey. Future Generation Computer Systems, 29(1), pp. 84-106. Zissis, D. & Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), p. 583–592. Alali, F. A. & Yeh, C.-L., 2012. Cloud Computing: Overview and Risk Analysis. Journal of Information Systems, 26(2), pp. 13-33. Garrison, G., Kim, S. & Wakefield, R. L., 2012. Success Factors for Deploying Cloud Computing. Association for Computing Machinery. Communications of the ACM, 55(9), p. 62. Lin, A. & Chen, N.-C., 2012. Cloud computing as an innovation: Percepetion, attitude, and adoption. International Journal of Information Management, 32(6), p. 533. Thomas, P. Y., 2011. Cloud computing. The Electronic Library, 29(2), pp. 214-224. Yoo, C. S., 2011. Cloud Computing: Architectural and Policy Implications. Review of Industrial Organization, 38(4), pp. 405-421. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Cloud Computing: Overview and Risk Analysis Literature review, n.d.)
Cloud Computing: Overview and Risk Analysis Literature review. https://studentshare.org/information-technology/2061413-cloud-computing
(Cloud Computing: Overview and Risk Analysis Literature Review)
Cloud Computing: Overview and Risk Analysis Literature Review. https://studentshare.org/information-technology/2061413-cloud-computing.
“Cloud Computing: Overview and Risk Analysis Literature Review”. https://studentshare.org/information-technology/2061413-cloud-computing.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cloud Computing: Overview and Risk Analysis

Science Research Proposal

This paper ''Science Research Proposal'' tells us that In reducing the physiological need for 'heroin' as a treatment for heroin abuse.... It is necessary to determine the role of opioid receptors in the establishment since this information will enable forensic toxicologists to interpret blood drug concentrations of morphine....
8 Pages (2000 words) Essay

Business Intelligence Information Systems

Finance companies use Spotfire to maintain and keep a check on compliance and risk, manage various selection tasks and maintain attribution analysis (TIBCO, 2011).... The software manufactured by TIBCO is used on-premise and or as cloud computing setting.... There are a number of different areas business intelligence systems cater to for a corporation; for example, they cater to customers support, analysis of products, product placement, marketing segmentation, cost, profitability of the products or products, distribution of the product, inventory of the product, test marketing, customer profiling, and statistical analysis, etc....
3 Pages (750 words) Essay

Solve the questions

1)Session hijacking can be mitigated by making changes to the server – client credential process.... Describe one of the methods.... Session hijacking can be conducted in means of turning the source-routine off.... In this scenario, the attacker is allowed to have access at point A on the network....
3 Pages (750 words) Assignment

Relevance of Current UK IT Law to Cloud Computing

Title of Project: Is current UK IT law relevant when applied to cloud computing?... Examination of the nature of cloud computing by copying out a structured serving of current practice and offerings.... Identification of aspect of cloud computing that do not comply with or avoid current UK IT law.... The Main Deliverable(s): A critique of current IT law when it applies to cloud computing.... A review of how cloud computing or will change the legal context for IT operations management....
3 Pages (750 words) Dissertation

Abacus Business Solutions

The industry for POS systems for restaurant management is highly competitive industries with a multiple number of companies are in competition for the market share.... The industry involves the sale, implementation, servicing, and repair of point of sale equipment that are used for… The customers in the industry are other businesses, making transactions between sellers and buyers....
7 Pages (1750 words) Essay

Understanding Geospatial Data in Development

This can be done using the End point Rate technique in the Digital Shoreline analysis System in ArcGIS.... The coastline of Bangladesh is endowed with a confluence of sediments in the low altitude alluvial and delta plains from the Ganges and Brahmaputra rivers.... This area has a large population of over 140 million people and has recently been identified as the most risky place in the… Even though parts of the coastline experience massive sediments deposition, others experience massive erosion....
4 Pages (1000 words) Assignment

Operations and Project Management

Furthermore, a suitable risk Matrix and Work Breakdown Structure will be provided in order to underpin the success of the project and thereby create a better experience for the customers with respect to the proposed relocation of the factory.... It is therefore very essential for every organization to implement an effective operations management that would help in controlling its… Operations management is therefore the process of organizing, planning, controlling and leading the production or services starting from the manufacturing of products throughout the activities of Similar to any other departments in an organization, the operations management department of the organization plays the most important role in determining the overall organizational success (Slack & et....
10 Pages (2500 words) Essay

What I Already Knew and Wanted to Know

The National Institutes of Health website provided an overview of the extent of mobile technology use in the United States and globally.... This work called "What I Already Knew and Wanted to Know" describes the author's personal research, the knowledge of time management, organization, and communication skills....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us