Cloud computing risks & security concerns - Essay Example

Comments (0) Cite this document
This terminology has been defined in numerous ways but the US National Institute of Standards and Testing, NIST definition has received worldwide recognition:…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Cloud computing risks & security concerns
Read TextPreview

Extract of sample "Cloud computing risks & security concerns"

Download file to see previous pages They could be deployed as private, solely for an organisation; public, accessible by the public; community, shared by organisation; hybrid, bringing together multiple clouds between which application and data portability could occur; and partner, offered to a limited and definite number of parties (Pearson & Yee 2013). With cloud computing, organisations do not have to invest in physical infrastructure. Instead, they contract computing services based on demand. This therefore presents immense benefits and cost savings to organisations. For this reason, over 33% of UK companies compute in the cloud (Buyya, Broberg & Goscinski 2011). However, the technology has aroused numerous risk and security concerns in organisations across the world. This paper reviews the risks associated with cloud computing and based on the three service models of this technology, the security concerns would be evaluated. This would inform the recommendations put forth to foster data, network and infrastructure security.
There are three layers of cloud services referring to the varied types of service models with each providing discrete capabilities. According to Pearson and Yee (2013), consumer capabilities involve the use of the applications in the cloud infrastructure of the provider in the Software as a Service, SaaS model. Clients access the applications through a thin interface like a web browser using their devices as per their demand and pay as per use. In Platform as a Service, PaaS, the consumer would be given the capability to deploy individual applications onto the cloud infrastructure without the installation of tools or any platform on their machines. It provides platform layer resources that could be used in building higher-level services. Finally, the Infrastructure as a Service, IaaS model provides consumers with the capability to provision storage, networks, processing and other basic computing resources but would not control or ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Cloud computing risks & security concerns Essay”, n.d.)
Retrieved from
(Cloud Computing Risks & Security Concerns Essay)
“Cloud Computing Risks & Security Concerns Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cloud computing risks & security concerns

Cloud Computing and Security Issues

...of the target server (Kaufman, 2009). Responding quickly to the threats would also solve the problem. For any software or technology, it takes time to break the encryption. If the owner of the data keeps on changing the encryptions, it would mitigate the risk of losing the data. 2.11 Customer Complaints and Feedback At the onset of cloud computing, the end users appeared not to be happy with the cloud environments because of various issues. The major problems were related to price and security concerns of the cloud environment (Kaufman, 2009). A recent survey found that nearly sixty percent of users who used Software as...
51 Pages(12750 words)Dissertation

Cloud computing

...multiple file copies in multiple geographic locations, providing unparalleled data availability for developers, businesses and enterprises. 3. Google big table data store. The Data Storage offered by Google enables it to become capable of handling numerous users on an on-demand basis. Its database is petabytes in size and spans thousands of servers. 4. mobileme It is an apple application that delivers email, contacts, and calendars from mobileme service in cloud to applications on iPhone, iPadmac and PC. CLOUD SECUTIRY Cloud computing security is increasingly important as more and more information on individuals and companies is placed in the...
4 Pages(1000 words)Thesis

Cloud Computing

...comprehensively discussed all the contemporary features of cloud computing in his book “The Challenge of the Computer Utility” (Banerjee, 2011). Hurdles in the development and implementation include but are not limited to flawed predictions of cost savings, increase in the cost of operation, lack of ability to comply with the requirements of growing capacity, chargeback, bandwidth, and scarcity of trained professionals in cloud computing. Another major hurdle is the security concern; the available offerings of cloud are public networks and hence increase the vulnerability of the system to the attacks....
10 Pages(2500 words)Research Paper

Cloud Computing and Security

...applications and considerably enhance their communications resources, and can get all the facilities and technology based solutions at minor outlay. On the other hand, when more critical information of corporations and individuals is stored on corporate cloud framework, fears are starting to elevate regarding just how protected an arrangement it could be considered. In addition, storing a large amount of data creates a circumstance similar to keeping massive funds, which means drawing additional normal attacks from increasingly experienced and extremely provoked invaders in computing environment. Accordingly, communication security is a particular concern which users...
7 Pages(1750 words)Term Paper

Security Concerns in Cloud Computing

...consume more time that is always a critical success factor. Therefore, compliance of cloud computing vendors and implementing security controls as per the governmental information security requirements is the major concern of organizations associated with services on clouds. Moreover, organizations have also concerns on assessment of security controls and independent audit and limitations of the vendor because data of many organizations is located at the vendor site that may increase risks of the CIA (Wilshusen, 2011). Therefore, an agreement is in process for establishing an independent...
5 Pages(1250 words)Research Paper

Cloud Computing Security

..., there are several security issues associated with cloud computing. The purpose of this paper is to outline some of the important security aspects which are discussed in other researches. Cloud Computing Concerns Cloud computing is the latest IT trend that a lot of business organizations are adopting due to its environmental aspects, money savings, mobility, scalability and energy effectiveness. In fact, the cloud computing facilitates business organizations or individuals to access all their important applications, tools and files from anyplace on the...
5 Pages(1250 words)Dissertation

Cloud Computing Security

...the security concerns associated with cloud computing technology in an organization such as the threat, vulnerability and risks in their journal article titled, “An Overview of the Security Concerns in Enterprise Cloud Computing” Qaisar and Khawaja (2012) through a journal article titled, “Cloud Computing: Network/Security Threats and Countermeasure”s agree with the view expressed by Bisong and Rahman (2011) that many companies today are looking forward to adopting the cloud computing concept since it is...
4 Pages(1000 words)Essay

Cloud computing (Opportunities and concerns (security))

...have stored your data in your desktop and there is a technical problem, you will not be able to easily access the data. On the other hand, if you have stored your data on a cloud based system you can easily access it at any time anywhere (Abbadi and Martin 2011). Cloud computing from the above may seem very beneficial, but before any company makes a decision to invest in cloud computing they must also look at the security concerns. 1.2 Security Concerns 1.2.1 Privileged User Access The cloud computing platform faces a challenge of privileged user access....
8 Pages(2000 words)Essay

Cloud based computing security

...Table of Contents: Introduction: Security Overview: Computing Resources and Cloud Computing: How Security Issues Impact upon Cloud Computing: CurrentTrends: Security Concerns: Using the Cloud Safely: Data Storage: Conclusion: Name Date Professor’s Name Course Section/# Cloud Based Computing Security Introduction: Many enterprises rely on database systems for day-to-day operations and decision making; as such, the security of data managed by these systems becomes critical. Misuse or damage of data can...
8 Pages(2000 words)Essay

Cloud Computing Security Policy

...Cloud Computing Security Policy for SNPO-MC Cloud Computing Security Policy for SNPO-MC Purpose The policy outlines the security practices and processes for using cloud services in the daily operations, data manipulation and storage and use of applications at SNPO-MC organization. Scope The policy will be used by managers, executive, staff and as a guide to negotiating terms with cloud providers. Definitions Employees of the organization are people who work in the organization. Executives who are on the loan are referred to as loaned staff members, and they usually telework for the...
5 Pages(1250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Cloud computing risks & security concerns for FREE!

Contact Us