StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cloud Computing in Virtualization - Research Paper Example

Cite this document
Summary
The paper "Cloud Computing in Virtualization" describes that the client will have less control over who has access to their information and little knowledge of where it is stored. One should also be aware of the security risks of having data stored on the cloud…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Cloud Computing in Virtualization
Read Text Preview

Extract of sample "Cloud Computing in Virtualization"

? Cloud Computing Table of Contents Introduction Literature review Research Question Hypothesis Theoretical Framework QuantitativeResearch Methods Qualitative Research Methods Discussion Conclusion Introduction Cloud computing deals with research in virtualization,services related to software and the web,networking,information and technology services,on demand services and greater flexibility among others. Cloud computing is a service where an individual can acquire computer resources and networked storage space. One can access information from anywhere at anytime through a cloud. A cloud consists of both the software and hardware which is important for running applications. For a cloud to work efficiently, one must have an internet connection. If one is looking for a particular document that is stored in the cloud, there must be an internet connection either through a mobile broad brand connection or wireless internet (Lewis et al, 2009). The advantage of cloud computing is that the same document can be accessed by any device as long as there is internet availability. These devices can be a phone, laptop.tablet or a desktop. This helps an organization to work more with ease because a cloud can access software and store data. There are several types of clouds that can be subscribed depending on ones needs. One of them is a private cloud, which is established for a specific organization or group and access is limited. A public cloud can be accessed by any user with an internet connection. On the other hand, community cloud is usually shared among two or more organizations that have similar cloud requirements. A hybrid cloud is a combination of two clouds in which the clouds in particular are a mixture of community,private and public (Jansen, 2011). Literature review Rittinghouse,J.W., & Ransome,J.F. (2010). Cloud Computing Implementation, Management, and Security. New York: Taylor and Francis Group. claim that each provider serves a role and it gives users more or less control over their cloud depending on the type. When choosing a provider, one has to compare needs to the cloud services which are available. The cloud needs usually vary depending on how one intends to use the resources and the storage space associated with the specific cloud. A cloud provider becomes more expensive depending on an individual's technological needs. There are three types of cloud providers that one can subscribe to : infrastructure as a service, platform as a service and software as a service. Software as a service gives subscribers an opportunity to access both applications and resources. It makes it unnecessary for one to have a physical copy of softwares to install on the devices. This type of cloud provider makes it possible to have the same software to all devices at once by accessing it via the cloud. Under a platform as a service,this system goes a level above the software as a service setup. This provider gives its subscribers access to the components that they require to operate and develop over the internet. Fatih Erkoc, Serhat Bahadir Kert (2010). Cloud Computing For Distributed University Campus: A Prototype Suggestion, by Mehmet indicate that infrastructure as a service deals with computational infrastructure. In his system, a provider completely outsources storage and resources, such as software and hardware. By subscribing to this type of service cloud,one would be able to maintain his or her business with a larger computational capability. One has to spend more resources on the operation and development of applications. Most information stored on the cloud is often seen as a treasure to individuals with mean intent. There is a lot of confidential and private information that individuals store on their computers and this information is now being transferred to the cloud (Strowd, 2010). One has to be careful with the cloud provider he or she chooses. This is because security measures usually vary from one provider to the other. Research Question / Hypothesis One of the ways that service providers are addressing security concerns is with a private cloud that seems to operate behind a company’s the existing firewall. How does this work? Theoretical Framework More often than not people, people tend to be binary about the way they assess the private cloud which is known to be more secure as opposed to the public cloud which is not. However, this should not be the case. Most of the enterprises that operate behind the existing firewall can reduce the risk of security issues, but it does not completely eliminate or mitigate all these issues. A highly virtualized cloud or environment within the firewalls require a new set of security test. It is important to note that it is not possible to physically contain the system application and the data behind the virtual LAN or the manual separation of devices (Lewis $ Grace 2011) . The private cloud is known to provide a greater sense of security due to the fact they operate behind the firewall, however it is not a panacea. Generally, security is a real concern as it closely relates to the public available cloud service. In addition, the service providers seem to be responding to the innovative approaches like the virtual private cloud and client partitions that are within the public cloud environment. Nonetheless, security is still the single issue that is precluding more rapid adoption of clouding service. Quantitative Research Methods The qualitative research methodology that has been chosen in this context as the main aim of this research that is to evaluate the role of cloud computing of software organization and understand the perspective of choosing the different cloud technologies against the data security (Behrend rt al , 2011). There are lots of issues with regards to cloud computing data security of the clients that seems to be having doubts regarding their data security and most of the clients prefer a third party service providers to make sure that their data security. This approach works fine for large organizations and most of the small organizations will not effort a third party for the data security across cloud computing . Qualitative Research Methods Security concerns about cloud computing seems to be heightened by misconceptions that are related to security and compliance risks. Unfortunately, these security concerns are seldom expressed quantifiable. To clarify the issue of cloud computing security, compliance and business risk, qualitative research that focused on the risk vectors was drawn from interviews with top IT leaders (Peter J. & Kent B., 2010). The qualitative aspect of this research was used to separate facts from suspicions that would create a framework that would help align the perceived risk of cloud computing. The qualitative research method conducted a survey about the perception of cloud computing using the Likert Scale. Discussion The information housed on the cloud is more often seen as valuable to the individuals that have malicious intent. There is a lot of personal information and personal security data that people tend to store in their computer and this information is currently being transferred to the cloud. (Escalante, 2010) Therefore, this makes it critical for one to understand the security measures that your cloud provider has in place and it is equally imperative to take some personal precautions to be able to secure personal data. The most important thing that one must look into is the security measures that the cloud provider has put in place. This will vary from one provider to the next and also the types of clouds that are being provided. The encryption methods that the cloud computing methods should also be explained. The methods of protection that they have to protect the actual hardware is also important to determine (Zhang Tao 2011). In case of a break in or loss of data, they should have a back up for personal data. In case you have chosen a community cloud, the barriers that will help to keep your information separate from other companies is imperative. No matter how careful you are with your personal data, by subscribing to the cloud you will be giving up some control to an external source. Conclusion In summary, the cloud provides many options for the everyday computer user as well as small and big businesses. It opens up the world of computing to a much broader range of uses and increases the ease of use by giving access through any internet connection. However, cloud computing has some of its drawbacks. The client will have less control over who has access to your information and little knowledge of where it is stored. One should also be aware of the security risks of having data stored on the cloud. This can be a target for malicious individual and may have disadvantages as people can assess it through an unsecured internet connection. If you are considering to use the cloud, be certian that you identify what information that you will be putting out on the cloud, who will have access to that information and a guarantee that it is protected.The type of cloud and the service provider are also important things hat you should factored in. References Lewis, Grace.(2009) Cloud Computing: Finding the Silver Lining, Not the Silver Bullet. http://www.sei.cmu.edu/newsitems/cloudcomputing.cfm This book provides detailed research about cloud computing. The author explains the importance of cloud computing. This book is highly recommended for people who want to get a better understanding of cloud computing. Lewis, Grace. (2010) Basics About Cloud Computing. http://www.sei.cmu.edu/library/abstracts/whitepapers/cloudcomputingbasics.cfm This book explains the risks that are involved in cloud computing. The author illustrates the risks and how they can be handled. This book helps people to understand the risks that are associated with cloud computing. Jansen, Wayne & Grance, Timothy. (2011) Guidelines on Security and Privacy in Public Cloud Computing. National Institute of Standards and Technology This article discusses the issues that relate to the privacy and security with regards to cloud computing. The authors give a detailed guidelines that can be followed to check on the security offered by in public computing. Strowd, Harrison & Lewis, Grace. (2010)T-Check in System-of-Systems Technologies: Cloud Computing (CMU/SEI-2010-TN-009). Software Engineering Institute, Carnegie Mellon University, . http://www.sei.cmu.edu/library/abstracts/reports/10tn009.cfm This article provides a detailed research of of the check in system of systems that is associated with cloud computing. The author discusses the importance of developing a good cloud that cannot be hacked into. Rittinghouse,J.W., & Ransome,J.F. (2010). Cloud Computing Implementation, Management, and Security. New York: Taylor and Francis Group. http://www.cmlab.csie.ntu.edu.tw/~jimmychad/CN2011/Readings/CloudComputingNewWine.pdf This article explains how different types are formed and how they operate. The authors explain how this different types of clouds can be used to store different types of information for single users or companies. Furht,B., and Escalante,A. (2010). Handbook of Cloud Computing. New York: Springer http://searchcloudcomputing.techtarget.com/definition/private-cloud This book provides the readers with a detailed research on how cloud computing can help people to save important information. The authors show how you can store important information with cloud computing. This book provides general research for people who want to understand the importance of cloud computing. The authors give a general view of cloud computing and its importance. http://www.channelinsider.com/c/a/Cloud-Computing/Top-5-Cloud-Applications-for-2010-319995/?kc=EWWHNEMNL02262010STR2Cloud computing. Cloud_computinghttp://www.google.com/a/help/intl/en/admins/pdf/forrester_cloud_email_cost_analysis.pdf This article provides detailed research about cloud computing. The author explains the importance of cloud computing. This book is highly recommended for people who want to get a better understanding of cloud computing. Khmelevsky,Y., and Voytenko,V. (2010). Cloud Computing Infrastructure Prototype for University Education and Research. Proceedings of the 15th Western Canadian Conference on Computing Education. Kelowna, Canada: ACM. This book explains the technological aspect that is involved in cloud computing. The author illustrates the h putting is set up and how they can be handled. This book helps people to understand how cloud computing operated Peter J & Kent B (2010) personalized and self regulated learning in the Web 2.0 era: International exemplars of innovative pedagogy using social software, Australasian Journal of Educational Technology, 26(1), 28-43 This article provides the readers with a detailed research on how cloud computing can help people in case your information is stolen or has gotten lost. The authors show how you can store important information with cloud computing. http://code.google.com/appengine/docs/whatisgoogleappengine.html Zhang Tao and Jiao Long (2011) The Research and Application of Network Teaching Platform Based on Cloud Computing, , International Journal of Information and Education Technology, Vol. 1, No. 3, August The book gives a detailed explanation of of the network application that can be set up when establishing a cloud in cloud computing. The authors explain how different cloud can be set up depending on the network platform. Erkoc, Serhat Bahadir Kert (2010) Cloud Computing For Distributed University Campus: A Prototype Suggestion, Mehmet Fatih, http://www.pixel-online.net/edu_future/common/download/Paper_pdf/ENT30-Erkoc.pdf This article provides detailed research about cloud computing. The author explains the importance of cloud computing. This book is highly recommended for people who want to get a better understanding of cloud computing. Behrend,T.S., Wiebe,E.N., London,J.E., and Johnson,E.C. (2011). Cloud computing adoption and usage in community colleges. Behavior & Information Technology, 30 (2), 231–240. This book explains the usage of cloud computing. The authors illustrate the university and collage use cloud computing. This book helps people to understand how institution use cloud computing. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The outline for the complete academic research paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1473386-the-outline-for-the-complete-academic-research
(The Outline for the Complete Academic Research Paper)
https://studentshare.org/information-technology/1473386-the-outline-for-the-complete-academic-research.
“The Outline for the Complete Academic Research Paper”, n.d. https://studentshare.org/information-technology/1473386-the-outline-for-the-complete-academic-research.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cloud Computing in Virtualization

Relationship Between Virtualization, Cloud Computing, and Green IT

The assignment "Relationship Between Virtualization, cloud computing, and Green IT" focuses on the critical analysis of how the technology of virtualization is adopted by the organizations and how organizations get benefits by adopting this technology.... virtualization is a newly emerging idea.... virtualization could be very supportive to the organizations to take benefit of two or more virtual computing frameworks, having diverse operating systems, tools, and software on one of hardware logically and inexpensively....
9 Pages (2250 words) Assignment

Cloud Computing

In the paper 'cloud computing' the author analyzes a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.... The author states that 'cloud computing' matches a perception of an imaginary cloud that illustrates the Internet or most likely a corporate network environment that is represented by a cloud....
12 Pages (3000 words) Research Proposal

Computer Systems and Virtualization

The paper "Computer Systems and virtualization" highlights that the Virtual Directory is a separate register including a website that connects to an additional directory.... The Midrange virtualization includes Solaris containers and zones and the commodity virtualization consists of VM ware, Oracle VM and Xen.... The desktop virtualization is categorized in two PC / MAC and Virtual desktop infrastructure (VDI).... VDI consists of Oracle VDI and desktop virtualization by Citrix....
13 Pages (3250 words) Assignment

Cloud Computing Virtualisation Security Threats

There exists a set of crucial security concerns to be addresses if considering virtualization in a cloud computing environment.... The purpose of this paper is to present an overview of the various virtualization security vulnerabilities plus threats that are particular to hypervisors.... virtualization makes the concept complicated but never makes security better or worse.... The purpose of this paper is to present an overview of the various virtualization security vulnerabilities plus threats that are particular to hypervisors....
6 Pages (1500 words) Literature review

Virtualization and Cloud Computing

This report "Virtualization and cloud computing" sheds some light on virtualization and cloud computing that are two different terms with different meanings.... Virtualization and cloud computing are two different terms with different meanings.... Virtualization in computing means the creation of the virtual version of a resource or device that includes the server, network components, computing environments, storage device, or even the operating system, while cloud computing is a type of computing that is internet-based where different services like the servers, applications, storage are delivered and shared among different users simultaneously....
12 Pages (3000 words) Report

The Concept of Cloud Computing and Virtualization

This paper "The Concept of cloud computing and Virtualization" analyzes the concept of cloud computing, the anatomy characteristics, definition, and core technology.... cloud computing is a computing platform that allows computer users to access information share resources.... The emergence of cloud computing has led to a paradigm shift in how people are delivering and managing services over the internet.... cloud computing is the development based on the internet and the use of computer technology....
6 Pages (1500 words) Assignment

Cloud Computing and Virtualisation

This assignment "cloud computing and Virtualisation" presents multi-tenancy that refers to the allocation of a single cloud service or application to two or more clients without considering the underlying resources of the clients with the economic gain objective (AlJahdali et al.... In essence, multi-tenancy entails the implementation of resource-sharing and virtualization in the cloud computing environment.... Virtualization suffices to be the enabler of several cloud computing properties....
7 Pages (1750 words) Assignment

Cloud Computing and Virtualization

This essay "cloud computing and Virtualization" discusses cloud computing as the newest major shift in computing.... The widespread cloud computing is enhanced by the Internet which plays the integral role of being the most appropriate channel for accessing cloud resources.... The main reasons why GP-Clinics should use cloud solutions is that cloud computing will help it is a national company that owns and runs medical clinics of general practitioners throughout major cities of Australia to improve their health care services, effectively conduct health care research as well as change their current face or develop health information technology....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us