Preview

Cloud Computing

Better Essays
Open Document
Open Document
1194 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cloud Computing
Cloud Computing
Name of student
Name of institution

Cloud Computing
Infrastructure security challenges in cloud computing
Introduction
Over the last few years, cloud computing has been evolving leading to many customers utilizing the cloud computing technology. Basically cloud computing is based on delivering varied resources through the internet (also called the cloud) that depends on complex architecture that enables providers to make use of different models and be able to deliver on different services. Although cloud computing features are meant to entice the customers to use its services, however, a cloud security concern has become the pertinent issue to cloud computing. Security concerns emanating from cloud computing have hindered IT experts to move to cloud computing.
Network security architecture is the design and planning of the campus network that are aimed at reducing security risks in accordance with the institution’s risk and analysis policies. The traditional network design focused on creating a secure network perimeter and strategically places a firewall at the point where the network is connected to the internet. However, the traditional design is problematic and there is concern about security threats from inside the perimeter that is protected by the firewall.
Security architecture is the design artifacts that describe how the security controls are positioned and how they relate to the overall information technology architecture. The controls are meant to serve the system’s quality attributes like accountability, assurances, integrity and availability. There is quite a number of security issues associated with cloud computing: 1) security issues faced by cloud computing providers and 2) those that are faced by the customers. End user security issues include a browser security, security-as-a-service and authentication.
Cloud computing and traditional computer security system is faced by several challenges that need to be addressed.



References: Security and high availability in cloud computing environments (June, 2011). IBM Global Technology Services Technical White Paper Perspectives on cloud computing, n.d.). Cloud Service Models: Comparing SaaS PaaS and IaaS. Retrieved on 16th February, 2013 from http://cloud-computing.learningtree.com/2011/11/09/cloud-service-models-comparing-saas-paas-and-iaas/ Almathami, M. (2012). Service Level Agreement (SLA) Based Risk: Analysis in Cloud Computing Environments Server Intellect Service Level Agreement (SLA). (n.d.). Server Intellect. Retrieved February 17, 2013, from http://www.serverintellect.com/terms/sla.aspx

You May Also Find These Documents Helpful

  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    Swanson, M., & Guttman, B. (1996). Technology Administration, NIST. Generally Accepted Principles and Practices for Securing Information Technology System, retrieved March 11, 2012, from http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Better Essays

    Bibliography: Craig-Wood, K. (2010). Retrieved from http://www.katescomment.com/iaas-paas-saasdefinition/ VMware and Intel. (2010). New Power for Data Center Virtualization. Retrieved from http://ra.techtarget.com/leads/magnifierResponded.do?email=lmoyo@bhiretirement.org& resourceId=1285800393_587&leadFollowupPathId=3969819&site=bpmd&asrc=EM_R MU_20101214 Jo Maitland, Executive Editor of SearchCloudComputing.com. (2010). Infrastructure as a Service: How to maintain control. Retrieved from SearchCloudComputing.com: http://searchcloudcomputing.techtarget.com/generic/0,295582,sid201_gci1378172,00.ht ml Sudip Chahal, J. H.-S. (2010). An Enterprise Private Cloud Architecture and Implementation Roadmap. Retrieved from www.intel.com/IT Wilkins, G. (2010). A marketing foray into Cloud Computing - Part 1 - What 's it all about? Retrieved from http://rocketfuelmarketing.co.uk…

    • 920 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Business Trend Memo

    • 1299 Words
    • 6 Pages

    Nowadays, all types of organizations are trending toward cloud computing. It reflects the ability of having access to information, software, and computing resource infrastructure without necessarily having to own them. By deploying cloud computing, it will allow students to personalize their environments in which they learn, help cut down our expense on IT management cost, and provide greater flexibility in maintaining security, reliability and compliance. Overall, the cloud computing can be a strong tool in enhancing our teaching and learning.…

    • 1299 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Cloud Computing Security Threats and Responses Farzad Sabahi Faculty of Computer Engineering Azad University Iran fsabahi@ieee.org Abstract-Cloud Hybrid clouds. A public cloud is standard model which providers make several resources, such as applications and storage, available to the public.…

    • 3527 Words
    • 15 Pages
    Best Essays
  • Best Essays

    Cloud computing is one of the most recent revolutionary technologies in the world. The applications of Cloud computing is rapidly increasing in day to day life. Today the application of Cloud computing is so widespread that it is being used even in the health care industry. Although healthcare was once considered an industry that would not adopt cloud computing due to systemic security, legal, and privacy issues, that no longer seems to be the case. Those in healthcare IT are moving even farther into the world of cloud computing. As the evolution of cloud computing in health care is occurring at a rapid rate in recent times, we can expect a major part of the healthcare industry to move onto the cloud and thereby more focus is laid on providing a cost Effective and efficient healthcare service to the people all around the globe. Despite the common belief that certain boundaries and security issues of the cloud would hinder the shift, the healthcare industry is taking an initiative to move to these cloud based platforms. Cloud computing can transform the way healthcare is practiced by empowering professionals to deliver better healthcare services to their patients.…

    • 1553 Words
    • 5 Pages
    Best Essays
  • Best Essays

    Cyber Security

    • 4964 Words
    • 20 Pages

    This research paper tackles the issues that faces Cloud Computing today and gives the experts and industry’s point of view on the matter. The aspects explored are the significant industry questions that have risen about the use of Cloud Computing, business value, organization impact, adaptability, limitations, initial cost of implementation, and the severe business security risks due to centralization of resources. Brian Proffitt will argue in is IT World article [24], there are some serious limitations with cloud computing that is being blithely ignored such as bandwidth limitation, storage, and availability. Interviews conducted with colleagues that are experts in the Enterprise Systems network arena reveals that, the impact is all in planning before implementation, the selected architecture and the security policy. Findings in manuscripts and online libraries reflect that Cloud Computing is a technological revolution that provides computer resources as a service; offering flexible IT usage, computing efficiency through improved utilization and reduced administration and infrastructure costs. Users are not limited to applications confined to a computer, data stored to a hard drive, or bounded by the organization’s network. Also known as the sum of Software as a Service (SaaS) and Utility Computing, Cloud Computing is argued to be more efficient and scalable. My hope is to identify the common issues that face Cloud Computing in organizations that have implemented it, and find the answer or probable solutions.…

    • 4964 Words
    • 20 Pages
    Best Essays
  • Good Essays

    Security Principles

    • 682 Words
    • 3 Pages

    The management issue has concurred with technological innovations that enable information to be used and stored more effectively than previously. Management needs to understand the issues impacting information systems to be effective meet the company goals. A cloud is a powerful arrangement of cloud computing, networking, storage, management solutions, and business applications that facilitate a new generation of IT and consumer services. These services are available on demand and are delivered economically without compromising security or functionality. Solving today 's biggest business and technology challenges requires an approach that fully integrates the three pillars of cloud computing: applications and services, data centers, and networks (Cloud Computing, 2012). There is an issue that should be very important to all of us regarding the internet. Security problems happen on a consistent when we are using our computer to do business online. When we are doing our banking or setting up…

    • 682 Words
    • 3 Pages
    Good Essays
  • Best Essays

    In this paper, we have discussed security issues for web and mobile cloud computing. Cloud computing provides Internet-based services, computing, and storage for users in all markets including financial, healthcare, and government. This new approach to computing allows users to avoid upfront hardware and software investments, gain flexibility, collaborate with others, and take advantage of the sophisticated services that cloud providers offer. However, security is a huge concern for cloud users. Mobile cloud computing could be defined as – the availability of cloud computing services in a mobile ecosystem. This includes many elements like consumer, enterprise, transcending, end to end security, home gateways and mobile broadband enabled services. Also since the terms ‘mobile’ and ‘wireless’ are used interchangeably, now consider here Mobile – ‘anywhere anytime’ and wireless is ‘without wires’. Thus mobile is ‘wireless’. Hence, we are talking of ‘anywhere anytime secure data accesses to analyze the security risks confronted by mobile computing and present the existing security mechanisms. Cloud computing is the next generation of networking, since it can deliver both software and hardware as on demand resources and services over the Internet. Clearly, Security is major issue in cloud computing.…

    • 2039 Words
    • 9 Pages
    Best Essays
  • Better Essays

    Security remains the number one obstacle to adoption of cloud computing for businesses and federal agencies. Public cloud solutions are seen as the most vulnerable options from a security perspective, leaving many federal customers to seek private alternatives to overcome security challenges. Regardless of the deployment model selected—private, public, community, or hybrid—conquering security concerns is required for cloud computing to achieve its full potential as the next generation of IT [information technology] architecture. Recent trends in cloud computing demonstrate the architecture has matured and offers distinct advantages for cyber security defense. Lessons learned continue to emerge with three…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Data theft is the primary and most serious risk of cloud computing. It’s not that cloud-computing providers are sloppy about security. They’re more conscientious about it than many large enterprises and most small users. But as more companies deposit their top-secret data in cloud-computing providers’ castles, more hackers turn their efforts to breaching those high walls. This situation can be seen when it comes to…

    • 668 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Data Security services in cloud computing is still mystery for the customers although service providers have implemented all standard technologies that you can imagine: state ful inspection firewalls, Intrusion Detection and…

    • 667 Words
    • 3 Pages
    Good Essays

Related Topics