Security Issues of Cloud Computing Data Analysis Chapter

Pages: 5 (1450 words)  ·  Bibliography Sources: 5  ·  File: .docx  ·  Level: Master's  ·  Topic: Education - Computers

Security Issues in Cloud ComputingDownload full Download Microsoft Word File
paper NOW!

TOPIC: Data Analysis Chapter on Security Issues of Cloud Computing Assignment

The name Cloud computing was coined from the drawings oftentimes employed to illustrate the internet. Cloud computing is an innovative consumption and new delivery approach for IT services. The cloud computing concept illustrate a change in thought, that end users do not need to understand the details of a particular technology since the provider completely handles it. Users can use the services at the rate established by their specific needs. This service can be given at any time. Because this innovation is becoming more popular, new tools and technologies are now appearing to create, to access, operate and sustain the clouds. These tools should handle a huge number of operations in the cloud transparently sans service interruptions. Cloud computing provides costs efficiency, quicker execution, and more flexibility employing various technologies and related tools that are necessary in attaining this. However, despite the advantages that cloud computing offers it currently facing various issues in relation to its security. What has been lacking to this point however in its evolution first as a computing platform and second as a means to streamline business processes have been ontologies to define system security [4] well defined enough to manage the myriad of threats that have emerged to this computing platform overall [3]. Trust in cloud computing is mixed and there are plenty of skeptical, even cynical Chief Information Officers (CIOs) who refuse to believe in cloud computing and hold tightly to their beliefs in mainframe computing and client/sever architectures. Many technologists and industry pundits call these individual Luddites, meaning they are adverse, even aggressively resistant to change. For these firms just moving to Web Services is an act of perceived extreme risk [1]. Yet despite these slow or non-adopters, cloud computing continues to experience a rapid ascent in terms of its adoption both for private cloud platforms, or those systems entirely enabled behind the firewalls of enterprises to hybrid cloud architectures where a proportion of the cloud is external to the company and the remainder is located behind the firewall [2]. What is needed are ontological approaches to defining the relative level of trust in these systems as predicated on their performance [4]. The intention of this analysis is to first discuss the security issues of cloud computing and provide insights into how these system architectures and applications can be more effectively secured and managed to ensure enterprise security performance. Recommendations are also provided with regard to how cloud computing can be made as secure as possible, ensuring the stability and protection of intellectual property within organizations as well.

Cloud Computing: History, Definition and Other Fundamentals

Computing is now shifting to a new model called cloud computing. This model operates data and computation on centralized servers that have often been optimized for performance and data sharing using virtualization architectures and system platform components. The basis of cloud architectures is predicated on the concepts of single- and multi-tenancy. The economics of cloud computing favor multi-tenancy from a cloud service provider standpoint as it allows for a single edition of the application to serve multiple enterprises or organization customers at the same time [3]. The concept of single tenancy is predicated on having a single instance of an application running on a dedicated server partition, with no other application or virtual machine competing for resources [3]. The more confidential the data being shared the more organizations rely on single tenancy as a requirement for security. This is one instance where the economics of cloud computing are overruled by the security considerations, a common occurrence in the cloud computing industry today albeit one not discussed by the analysts covering this area.

During past years, cloud computing has acquired considerable attention of various stakeholders from Computer Science and IT sectors as well as academicians, business enterprises and institutions of all sizes and so forth. Selected vendors and analysis considers cloud computing as the most recent kind of utility computing with unlimited virtual servers across the net. Because of realization of IT needs and services it can provide, cloud computing is now being recognized as a virtual infrastructure with boosting space and capability on the "cloud" that involves minimal costs for utilizing capacity, training new talent or licensing new software. Trust in cloud computing is still nascent however with many enterprises experimenting with this platform and researchers calling for… [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

Which Option Should I Choose?
1.  Download full paper (5 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Cloud Computing Several Organizations Research Paper

Cloud Computing and the Insider Threats' Problems Literature Review

Cloud Computing Service Providers Research Paper

Cloud Computing and Data Security Term Paper

Cloud Computing Term Paper

View 200+ other related papers  >>

How to Cite "Security Issues of Cloud Computing" Data Analysis Chapter in a Bibliography:

APA Style

Security Issues of Cloud Computing.  (2013, March 10).  Retrieved September 17, 2021, from

MLA Format

"Security Issues of Cloud Computing."  10 March 2013.  Web.  17 September 2021. <>.

Chicago Style

"Security Issues of Cloud Computing."  March 10, 2013.  Accessed September 17, 2021.