Research Paper: Cloud Computing Benefits

Pages: 7 (2532 words)  ·  Bibliography Sources: 5  ·  Level: Master's  ·  Topic: Education - Computers  ·  Buy This Paper


[. . .] Most importantly, as previously mentioned, user information should be safe all the time (Bernstein et al., 2009).

Privacy: Due to the escalation in cloud computing, a large number of data collections could be easily fabricated via applications like advertising. Google is one example for collecting and analyzing consumer data for its advertising network, and leverages its cloud infrastructure. Data collection and analysis is now possible at low costs, even for firms not having Google's resources. Attackers potentially have huge, central databases accessible for analysis because of the cloud. Furthermore, they also have the sensitive computing power to mine for critical data in these databases. For instance, Google is basically carrying out inexpensive data mining every time it shows search results (Voorsluys et al., 2011).

Companies running clouds collecting data have experienced rising pressure to anonymize their data because of privacy concerns. EPIC has called for Google Calendar, Google Docs, Gmail, and the firm's other Web applications to be closed until proper privacy guards are in place. Yahoo! And Google, now have a retention policy of nearly 2 years for their search data. Only after this time period is over, will the data be anonymized. This step has been taken because of pressure from privacy advocates. This implies that some identifying data such as cookie information and IP addresses will be removed. To maintain the sustained evaluation of their algorithms, the anonymized data is kept though. Sharing the data with other 3RD parties is another motive for anonmyzing it (Voorsluys et al., 2011).

Compliance: Lack of transparency is discouraging firms from shifting their data to the cloud as noted by the researchers. Data owners desire to check their data handling at the cloud and in particular, make sure that their data is not being leaked or abused, or if such happens, they, at least have an unalterable audit trail (Voorsluys et al., 2011).

An effective way for solving this issue is based on Trusted Computing. Think of a trusted monitor fixed at the cloud server that can audit or monitor the cloud server operations. "Proofs of compliance" to the data owner can be provided by the trusted monitor, providing that some of the access rules have not been despoiled. Trusted Computing additionally allows safe bootstrapping of the monitor to run along with the applications and the operating system for ensuring reliability of the monitor. The monitor can perform auditing/monitoring tasks and implement access control policies. The code of the monitor is actually signed, along with a "declaration of compliance" generated by the monitor, to yield a "proof of compliance." The data owner can confirm whether the correct monitor code is operated, and also that the cloud server has complied with access control policies after receiving this proof of compliance (Voorsluys et al., 2011).

Security: the industry is likely to observe increasing services performing mergers of data with increased adoption of cloud computing. This development has possible security ramifications, not only in the context of various sources of data a consumer might possess to extract data from - this, consecutively, enhances the need to figure out the best way to gain access and authorize for reasons of usability. In terms of data leaks though, centralized access control may resolve many of these issues but that might be impossible (Voorsluys et al., 2011).

Facebook is one example in this field. Both sensitive and non-sensitive data is uploaded by the users of Facebook. Facebook uses this data to present it to other users, and this data is also used by third party applications that are run using the platform. Facebook usually does not verify these applications. Thus, to steal sensitive data, there is a drive to make malicious software programs that operate within the cloud server of Facebook (Voorsluys et al., 2011).

IT governance: Your IT needs to grow too with your business. The speed of deployment and scalability provided by cloud computing means that you can enhance your IT provision immediately for fulfilling growing needs, and you can also reduce it every time you want. IT services provided through cloud can illustrate that one can respond immediately to the continuously varying professional atmosphere due to significant improvements in security along with flexibility, compliance, and the receptiveness. There is a decline in wastage which permits the user to increase the efficiency while using fewer resources. It offers the user, a meager yet proficient IT model that is accessible on request (Voorsluys et al., 2011).

The adaptation of the cloud computing model greatly aids one's company to endure in the harsh economic environment. This technology provides up-to-date business accessories and offers the company with cost effective equipment whose budget comprises of a small portion of procurement while operating the similar system internally. Initially, one has to enquire from his service provider about the category and quality of the service that is needed and even before one understands it, the rewards and benefits of the cloud computing begin. The suspicions related to the use of cloud arise from the expected perception of misplacing sensitive information. The prevalent regulation techniques are unable to deal with the requirements of third party data storage and handling in cloud computing. Our aim is to recommend the extension of regulation techniques from the enterprise to the cloud via Trusted Computing and Applied Cryptographic procedures. These processes must be able to mitigate the doubts associated with cloud computing. Hence, it is assumed that we have the competency of offering conclusive business intelligence benefits to the membership of cloud (Voorsluys et al., 2011).


Amies, A., Sluiman, H., Tong, Q.G., and Liu, G.N. (2012). Infrastructure as a Service Cloud Concepts. Developing and Hosting Applications on the Cloud. New Jersey, USA: IBM Press.

Bernstein, D., Ludvigson, E., Sankar, K., Diamond, S., and Morrow, M. (2009). Blueprint for the Intercloud -- Protocols and Formats for Cloud Computing Interoperability. Blueprint for the Intercloud -- Protocols and Formats for Cloud Computing Interoperability. Washington, DC: USA: IEEE Computer Society.

Hamdaqa, M. (2012). Cloud Computing Uncovered: A Research Landscape. New York, USA: Elsevier Press.

Voorsluys, W., Broberg, J., and Buyya, R. (2011). Introduction to Cloud Computing. In R. Buyya, J. Broberg, A.Goscinski. Cloud… [END OF PREVIEW]

Four Different Ordering Options:

Which Option Should I Choose?

1.  Buy the full, 7-page paper:  $26.88


2.  Buy & remove for 30 days:  $38.47


3.  Access all 175,000+ papers:  $41.97/mo

(Already a member?  Click to download the paper!)


4.  Let us write a NEW paper for you!

Ask Us to Write a New Paper
Most popular!

Cloud Computing Several Organizations Research Paper

Cloud Computing and Data Security Term Paper

Cloud Computing Term Paper

Cloud Computing Service Providers Research Paper

Cloud Computing it and the Government Case Study

View 174 other related papers  >>

Cite This Research Paper:

APA Format

Cloud Computing Benefits.  (2013, October 6).  Retrieved March 23, 2019, from

MLA Format

"Cloud Computing Benefits."  6 October 2013.  Web.  23 March 2019. <>.

Chicago Format

"Cloud Computing Benefits."  October 6, 2013.  Accessed March 23, 2019.