Cloud computing is basically a computer science that implies using the internet and servers in order to maintain and secure data and its applications.The technology of cloud computing allows consumers and business owners admission to all types of applications …
As a result of this technology, computing efficiency has been increased by offering centralized storage of data. On the whole, cloud computing security is thus the application of all the sets of policies and controls in order to protect data and this should not be confused with the available security software’s that are cloud based. Without cloud computing the web server will run as a single computer or a group of owned computers hence they will be powerful enough to serve a given amount of request per minute and with a certain amount of latency per request. This paper critically presents an elaborate discussion on cloud security and privacy issues from a wide perspective. Security and Privacy With the intention to make sure that data is secure and that its privacy is well maintained, cloud providers focus on the following areas. The first area is data protection. In order to be considered protected, data from one client are correctly separated from that of the other (Brandau & Tempest, 189). In that sense; data must be securely stored, and must be capable to move steadily from one point to the other. Identity management is the other area of consideration. Every business is entitled to a private system of identity management in order to manage access to computing resources and information. Companies like Google, Amazon, and Microsoft are the pioneer in using cloud computing technology. Just like any form of technology, cloud security contains reasonable share of confronts ranging from government intervention in foreign countries and attacks from hackers and they have been able to rise up from these challenges by securing and encrypting their servers through the SLL technologies and upgrading of their firewalls. With the support of stable operating systems like UNIX Google has been able to secure its E-mail system. With the flexibility and fixing of the security loopholes, cloud computing technology has proven to be a great success. Discussion: Cloud Security and Privacy Issues In the event when an organization adapts to cloud computing technology, it implies that the organization users will be using one server power. In one way or the other, this greatly helps in conserving the computer power and diverse applications can be offered for the users and managed under the cloud server (Chakraborty, Remireddy, Raghu & Rao, 10). This is a clear implication that the client does not require going to the extent of downloading and installing the application on the computer system, but all the procedures will be stored and managed under the cloud server. With reference to different statistics, cloud computing model guarantees ease and on require network entree to a distributed pool of resources that are configurable (Brandau & Tempest, 184). For example; servers, networks, storage device application, and service can swiftly process with negligible management effort. By means of cloud computing, all this work is accomplished without the awareness of the end user on the physical location of the system that is delivering him with the service (John & Grier, 2). For this reason the phrase cloud computing is related with processing work from an identified static place. The Cloud Computing Architecture A more detailed module of the computing architecture is known as the back end and the front end. While the front end is the section that the customers or computer users can observe and it comprises the nodes and applications on the system. These are the elements which allow the user to achieve access to the internet through the end user interface from his personal system. ...
Cite this document
(“Cloud Security and Privacy Issues Research Paper - 1”, n.d.)
Retrieved from https://studentshare.net/information-technology/8077-cloud-security-and-privacy-issues
(Cloud Security and Privacy Issues Research Paper - 1)
“Cloud Security and Privacy Issues Research Paper - 1”, n.d. https://studentshare.net/information-technology/8077-cloud-security-and-privacy-issues.
Schauland (2011) states, “Surfacing in late 2007, cloud computing is used to allow services used in everyday practice to be moved onto the Internet rather than stored on a local computer”. Cloud computing helps people perform business related activities by eliminating the need of any specific place or a particular computer system.
1.1 Research Background
Cloud computing is a new and emerging trend in the IT industry that is set to revolutionize the way people approach and use computing. There has been an exponential growth in new technologies that have converged to develop cloud computing services.
This research is aimed at presenting a detailed analysis of cloud computing, its security issues and other aspects. In this scenario, the researcher will present a comprehensive assessment of some of the main security issues and aspects of cloud computing structure which are still hindering in the successful application of this technology based arrangement.
It is indeed one more milestone achieved by the field of Information Technology and has added to the modernization and advancements in the business organizations and service sectors. Cloud Computing The term Cloud Computing is utilized by the IT professionals for delivering the computing and technology requirements as an IT service to a community comprising heterogeneous end-recipients.
Companies need to expand their IT infrastructure to meet the amplifying needs of the customers; however, the increased infrastructure might only be useful for a limited time period. The expansion in IT infrastructure costs hefty amounts for the companies.
Using cloud computing, users do not need to install the desired software applications in their computer systems because they can access them through the cloud. As Schauland (2011) states, “surfacing in late 2007, cloud computing is used to allow services used in everyday practice to be moved onto the Internet rather than stored on a local computer”.
Cloud computing offers new way of storing, indexing, and the sharing of information. It delivers the software and the hardware over the internet thus ensuring the delivery of information at a high speed. Consequently, cloud system posses a challenge to privacy, confidentiality, and security of information.
For an organization that is adopting cloud computing for the first time, I would recommend that they take the following steps into consideration. The first step should be infrastructure evaluation, which involves looking at things like data transmission and storage, legal activities, authorization, auditing and monitoring capabilities, and disaster recovery issues among others.
These include webmail, online business applications, social networking websites and file storage among others. This allows for accessibility of information anywhere network connection could be accessed. Thus, the cloud provides a pool of shared resources such as computer processing power, networks, storage space and specialized user and corporate applications.
ensures a cost–effective transformation of utility computing principle that allows users and providers a convenient access to resources in a self-service and ‘pay as you go fashion’. Consequently, cloud computing has reduced the cost associated with system administration
14 Pages(3500 words)Research Paper
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Research Paper on topic Cloud Security and Privacy Issues for FREE!