StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cloud Computing and Cloud Security - Article Example

Summary
The paper "Cloud Computing and Cloud Security" highlights that every piece of data within the system is usually safe and no unauthorized individuals can get its access. Safety is ensured by the availability of a special application that in network enabled. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful

Extract of sample "Cloud Computing and Cloud Security"

Name Professor Course Date Cloud Computing Blog 1: What is cloud Computing Cloud computing is computing that allows users to share resources instead of every user utilizes shared resources instead of every user having personal devices or local servers to handle their applications. The word cloud, which is commonly phrased as the cloud, metaphorically connotes the internet. In this regard, cloud computing is understood as internet based computing that relies on applications, servers and storage devices availed to an organisation over the Internet (What is cloud computing?). Cloud computing is analogous to grid computing. Grid computing harnesses unused process cycles of networked computers to handle tasks that are extremely intensive for a single stand-alone machine. However, cloud computing is far more advantageous than Grid Computing since it allows an organisation to use computer resources as utilities the same way they use electricity. The organizations no longer need to acquire and maintain in-house computing infrastructure. Many organisations are shifting from the traditional software models and adopting internet shared models. The shift has steadily grown over the past ten year. The future holds greater promises for cloud computing since new devices, applications and collaborative approaches keep emerging consistently (Rouse). Tradition models are expensive and complicated. They require heavy hardware and software investment. They also need the service of expert teams to install, configure, run test, protect it and frequently update it. Cloud computing is simple and eliminates all these costs. Blog 2: Cloud Management Cloud management comprises of technologies and software developed to handle and operationalize the applications and data installed on the cloud. Management involves overseeing the operational activates of the cloud. It encompasses tools and equipment that facilitate optimal functioning of cloud based assets to ensure productivity and proper collaboration between users. It is not entire distinct from contemporary data centre management. However, cloud management is entirely a new frontier for a new environment and institutions for cloud users and vendors to adopt so as to keep a watchful eye on their data and applications (Mann). Management is a critical process for all man-made systems that seeks to control performance, costs and functionality. Cloud management employs a number of strategies to realise its objectives. The strategies take into account all the tasks involved in running the cloud. The tasks include security, performance monitoring, management and compliance auditing, establishing and overseeing disaster contingency and recovery plans (Marinescu). It is important for organisations to establish and use a collection of flexible cloud management tools. The tools should also be scalable alongside its cloud computing strategies. Blog 3: Cloud Security Although cloud security issues and risk as not yet properly understood, they are one of the greatest obstacles slowing down the adoption of cloud computing. Cloud Manager must consistently assess security risk using new information of cloud security standards, cloud data security management, data privacy and regulatory and compliance models. Security lapses slow down the uptake of cloud service. This influence of security lapses was evident following the exposure of classified documents detailing the US spy agency NSA data collection activities in 2013. NSA activities scared people and business from hosting service due to concern that US government would access their data. Converse, the leaks also encouraged renewed push to improve data security on the cloud (Vijayan). It security official focuses on several key areas that have now been embraced to improve cloud data security. Data encryption is very effective and has gained considerable popularity among many cloud service providers such as Yahoo, Microsoft and Google (Vijayan). The use of data encryption at various point of data access has also expanded. Key management has also been adopted to improve the encryption efficiency while regionalisation of the other hand has enabled cloud users to store data in regions they feel safe. Major cloud service providers are now insisting on transparency to ensure that government agencies do not access cloud users information without the users consent. Blog 4: Cloud Computing Development When developing cloud computing solutions, there are a number of considerations that should be taken into consideration. Most of the variables to consider depend on the intended use. Some organisation such as government departments require highly specialised solutions (Malik). However, on a general scale, there are a few areas that mast bet considered to ensure that the cloud functions appropriately. These include mobility, platform adoption, collaboration, interoperability among other development considerations. Mobility management entails proper accessibility of the cloud. Users of cloud have varied expectations in regard to ways trough which they intend to access that database. They may intend to access it through laptops, desktop PCs, phones or laptops (Malik). The platform used is also critical. Provision of proper user interphase is critical since it determines the platforms for which users can access the cloud, the applications they can use and the functions the users can perform. It is important to determine whether the cloud should support collaboration among users. It is important to optimise the cloud and its operations to ensure seamless integrations between various functions and SharePoints to improve predictability. Other considerations include data model, workflows, UI, and security among others. On the other hand, interoperability ensures that the system has ability to integrate with other systems. Blog 5: Cloud Computing Applications The applications for cloud computing are limitless. With a proper middleware or intermediate interphase, the cloud system can support all applications and programs that run on a normal computer. The applications include everything from word processors and other programs modified to run on the cloud platform. Cloud computing applications ensure that the cloud users draw the maximum possible benefits from the cloud services and also enable cloud computing managers to manage the cloud. Different organisations make different uses of their cloud services. The activities these organisation conduct influence the type of application they. The applications improve functionality and optimise the users’ experience (Oracle). They also ensure consistency while facilitating information and reporting integration. Different types of clouds such as public, private or hybrid clouds require different application to facilitate flexibility and adaptability to the shifting business environment. There are various firms that provide cloud computing applications. However, most of the applications are provided by Application service providers (ASPs) (Murphy). Managed service providers (MSPs) have emerged as important brokers of cloud services (Clayman). They understand the application help users on choosing and using them. Blog 6: Private Cloud A private cloud is cloud computing platform is established within an organisations firewall and is managed by the organisation’s IT department. Although it has some features and benefits present in public clouds, private clouds limit the quantity of objections to the model such consumer and enterprise data, security scares and issues linked to regulatory and compliance. Organisations invest in private clouds to improve the adaptability of their IT infrastructure. This way the firms can keep up with the evolving business needs. However, the main aim of implementation of private cloud is to negate all that challenges associated with cloud computing security (What is a Private Cloud?). Private cloud achieves improved security compared to a public cloud because it is established within the corporate firewall. The private cloud provides organisation greater control over their data and also improves the data security against all forms of threats apart from natural disasters. In addition, private cloud has an additional cost that the users must incur. The firms that establish private cloud must purchase and manage their own IT infrastructure and resources. The makes private cloud expensive compared to the public cloud where all costs pass on to a third party the cloud provider. Blog 7: Public Cloud A public cloud is a cloud where companies depend on third-party cloud service provider like data storage, servers and applications that are delivered to the company through the internet. Such services save the companies literally from expensive costs of purchasing, managing and maintenance of on-premises hardware and software infrastructure. Cloud computing is a free service or one can pay as they use, of which most users often small-scale enterprises or individuals are. However, from the Governments point of view, using this service means, any organization can use similar services without assurance about where data would be located and stored (What is a Public Cloud). Provision of public cloud service is a multimillion business that attracts competition from large global firms such as IBM and Amazon web services. Public clouds offer a number of benefits over private clouds. They have scalability options and can be scaled on demand. Public clouds have seamless response to fluctuations and user activities. Public clouds are cost effective since they are easy to manage and maintain. It employs a utility costing model, mainly pay-as-you go. Firms only pay for the resources they need hence there is no wastage. It is also location dependent and flexible. Blog 8: Hybrid Cloud A hybrid cloud comprises of integrated cloud services which use both public and private clouds to undertake specific functions within firms. Specific efficiencies of the different clouds are combined and function to varying degrees to provide more cost efficient as well as scalable services. Organisation using hybrid clouds have the ability to maximise their efficiency through using public clouds to handle no sensitive issues and data. They can only revert to private clouds to handle sensitive data. To function properly, the two clouds must integrate seamlessly. There are several ways through which to implement a hybrid cloud. The first approach involves distinct providers of private and public services team up to provide integrated services. Second, distinct service provider develop and offer integrated cloud service packages. Third, organisations that have their own private clouds purchase public cloud services and integrate the public cloud to their private cloud. In practice, organisations can implement hybrid cloud hosting where by their database or ecommerce websites lie in the private cloud where it is scalable and safe. The organisations can then have their access interphases and brochures accessible on the public cloud since it more cost effective to do it this way. Blog 9: Cloud Servers Cloud servers are a piece of Information Technology hard wares with a special configuration to act as Mail or Web Host Servers. These servers are usually under the control of an external Application Service Provider who controls it on behalf of a business entity. The business has to pay for the service on an hourly basis while considering the available work load. Different businesses can opt to use the same cloud server in conducting their normal operations (What are Cloud Servers?). This option is very economical since the amount of charges per service is less. The flow of data may be too slow due to the fact that the system is straining to transmit more information than it can handle within any given period. In conclusion, efficiency in data transmission improves whenever businesses get full control of cloud servers. They can either purchase or lease at a higher cost in order to avoid incidences of high traffic. Blog 10: Scalable Storage Scalable storage is a cloud computing application which offers an opportunity to save large amounts of electronic data. The application saves businesses from the stress of making any purchases of physical data storage machines which are usually expensive and difficult to maintain (Scalable Storage). The use of Scalable storage facilitates easy management of all business assets while at the same time enhancing proper administrative decision making. Every pierce of data within the system is usually safe and no unauthorized individuals can get its access. Safety is ensured by the availability of a special application that in network enabled. The system has an added advantage of recovering any lost data or applications. Scalable storage is best known for its ability to coordinate with other cloud computing applications in improving the efficiency in business marketing. The Scalable service is also available from various parts of Europe and this makes it easily accessible. Works Cited Blog 1: Work Cited “What is cloud computing?” Sales Force. 2015. Web. 15 Mar 2015 Rouse, Margaret. “What is cloud computing? To understand cloud computing, examine public, private and hybrid cloud, as well as PaaS, SaaS and IaaS cloud models.”What Is.Web. 15 Mar. 2015. Blog 2: Works Cited Mann, Andi. “Cloud computing management overview.”Tech Target.Web. 15 Mar. 2015. < http://searchcloudcomputing.techtarget.com/podcast/Cloud-computing-management-overview> Marinescu, Dan. “Cloud Computing: Manage your resources.”TechNet Magazine. 2013. Web. 15 Mar. 2015 < https://technet.microsoft.com/en-us/magazine/dn456533.aspx> Blog 3: Work Cited Vijayan, Jaikuma. Cloud computing 2014: Moving to a zero-trust security model. Computer World.31 Dec. 2013. Web. 15 Mar. 2015. < http://www.computerworld.com/article/2487123/data-privacy/cloud-computing-2014--moving-to-a-zero-trust-security-model.html> Blog 4: Works Cited Malik, Niten. “Cloud Computing: Developing unique cloud solutions.” TechNet Magazine. October 2012. Web. 15 Mar. 2015 Blog 5: .Work Cited Murphy, Lincoln. ASP vsSaaS – What’s the difference?Web. 14 Mar. 2015< http://sixteenventures.com/difference-between-asp-and-saas> Clayman, Mark. Managed Application Service Providers emerge as Cloud Service Brokers. 29 Jan. 2014. Web. 14 Mar. 2015 Blog 6: Work Cited “What is a Private Cloud?” 2015. Web. 15 Mar. 2015. Blog 7: Work Cited “What is a Public Cloud?” Interoute. 2015. Web. 15 Mar. 2015.http://www.interoute.com/cloud-article/what-public-cloud “Public Cloud Computing” 2015. Web. 15 Mar. 2015 http://www.gartner.com/it-glossary/public-cloud-computing Blog 8: Work Cited “What is a Hybrid Cloud?” Interoute. 2015. Web. 15 Mar. 2015 Blog 9: Work Cited “What are Cloud Servers?” Interoute. 2015. Web. 15 Mar. 2015 Blog 10: Work cited “Scalable Storage” Interoute. 2015. Web. 15 Mar. 2015 Read More

CHECK THESE SAMPLES OF Cloud Computing and Cloud Security

Cloud Computing and Security

This paper ''cloud computing and Security'' tells us that the paradigm of cloud computing has evolved from a talented business idea.... ecurity Risk and cloud Computing ... In the last few years, the paradigm of cloud computing has evolved from a talented business idea to one of the rapidly developing tools of information technology all over the world.... Additionally, its talent to offer users animatedly extendable and collective business resources over web-based technology like internet cloud computing prevents large level business expenses....
7 Pages (1750 words) Term Paper

Security Concerns in Cloud Computing

The paper "Security Concerns in cloud computing" describes that the storage of cloud computing requires a lot of space, in fact, humongous data centers where data is collected and managed.... Likewise, before making any strategy for transferring critical applications to the cloud, it is important to analyze the deployment and service models of cloud computing.... There are three service models for cloud computing i.... Organizations only provide software and platform and infrastructure is provided by a third-party cloud computing vendor....
5 Pages (1250 words) Research Paper

Cloud Computing Security Policy

The purpose of this document is to provide recommendations for cloud computing security policy decision-makers that include the management, executives, and cloud computing security providers.... he mandatory requirement for cloud computing security policy is that the management and executives of an organization must provide a clear direction on information security and cloud computing security.... The paper also seeks to explain the cloud computing technology and security policy around it....
5 Pages (1250 words) Term Paper

Cloud Computing: Legal and Security Issues

"cloud computing: Legal and Security Issues" paper addresses the main legal and security concerns that cloud computing technology brings over traditional on-site computing.... The technology of cloud computing is at its development stage as far as its implementation and usage are concerned.... This is caused by the heavy advancement in the technology that constitutes cloud computing.... The concept of cloud computing emerges from the desire of information technologists to incorporate new content into information processing Although vaguely understood by many people, the concept mainly comprises grid computing, the use of software as a service, storage in virtualization, and/or utility computing....
12 Pages (3000 words) Research Paper

Cloud Computing Security

The author of this paper "Cloud Computing Security" offers a succinct comparison of cloud computing and non-cloud computing highlighting their difference.... Several parameters of security such as governance, compliance, identity and access, data protection, and architecture, continue to pose challenges in Cloud Computing (Global cloud security 3).... cloud computing offers more incentives than what non-cloud computing offer to enterprise and private users....
13 Pages (3250 words) Essay

Cloud Computing Security

his paper in detail gives the quantity of the main security concerns in cloud computing and the associated solutions and pinpoint other related concerns that remained unanswered.... This paper 'cloud computing Security' classifies and identify the cloud computing security concern and solutions and ultimately propose recommendations to breach insecurity after giving an overview of the current security status in the computing technology.... cloud computing services development has speeded up the way in which computational services are sourced by organizations and corporations for better delivery of services....
15 Pages (3750 words) Coursework

Information Security in Cloud Computing

The focus of this paper "Information Security in cloud computing" is on the concept of cloud computing that is based on software as a service (SaaS), for example, Web 2.... In cloud computing, our organization will be allowed to use storage, computing power, or specifically constructed development environments.... Our company will do not have to be worried about how the process of cloud computing works internally.... The process of cloud computing is based on Internet computing (Ertaul et al....
6 Pages (1500 words) Essay

Cloud Computing Security

"cloud computing Security" paper identifies various cloud computing models, security and risk concerns, and methods of addressing the security issues for financial institutions.... Vast possibilities provided by cloud computing should not be ignored due to security issues.... The relationship between users and resources in cloud computing is dynamic and ad hoc.... The disengagement is becoming a reality as many business and academic leaders are moving towards cloud computing....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us