StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cloud Computing Voting Architecture Diagram - Assignment Example

Cite this document
Summary
The "Cloud Computing Voting Architecture Diagram" paper examines cloud computing systems that are always under the supervision and maintenance of a third party. Hence the security and confidentiality measures are found to be less secure. Also, in cloud computing environment data cannot be segregated…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful

Extract of sample "Cloud Computing Voting Architecture Diagram"

ssеssmеnt 2 Student Name: Student ID: Instructor Name: Date of Submission: Question 1 Cloud computing voting architecture diagram Question two Infrasture as a service (laaS) deliver computer infraxtures as a service (Tadayoshi and Adam, 2003). Rather than buying software, servers, network equipment and datacenter space, client will instead purchase those resources as a fully outsourced service on demand (Raouaf, 2009). In term of drawbacks for laaS, the IaaS model is seen to depend on a specific provider. As a result it is important that the provider of the cloud computing services should reamin an ongoing concern. Resources allocations is also required to ensure the system is there when needed (Raouaf, 2009). It will be important for the designer to consider what data will be sent to the system in order to prevent any security related risk. Another concern with Infrasture as a service (laaS) is that the infrastructure capability combined with the increasing usage of mobile technology devices have brought with them many challenges that are associated with disbursement of resources (Haibo and Mary, 2009). These challenges have been found to include lack of ability to prievent workers from circumventing the electrol body procedures and policies to use. Cloud computing system are always under the supervision and maintenance of a third party. Hence the security and confidentiality measures is found to be less secured. Also, in cloud computing environment data cannot be segregated (Raouaf, 2009). Data is found to be distributed throughout the cloud computing network and this may cause a lot of problems when specific data or information is needed to be segregated. We live in an environment where there is an internet connectivity, but there are many occasions where internet connectivity may disappear, leaving people cut off from the internet world (Haibo and Mary, 2009). In suation where an organization used cloud computing, the end result may be a nightmare (Feras, 2008). If the network in an organization goes offline, for example, employees can be left twiddling their thumbs unable to read or retrived important data or files (Raouaf, 2009). Or, if an employee in an organization want to access information in a different location. A lack of internet connectivity can be render this benefit of cloud computing to be redundant. One major drawback for cloud computing is the problem of data ownership which can be a major obstacle, especially if there is a lot of data that is involved (Raouaf, 2009). At the moment there is no a straightforward answer to a simple question shuch as “who owns the data that is maintained by a cloud storage services, the storage provider or the uploader. As a result, providers of cloud computing have created their own conditions and terms, which at times may seem arbitrary (Haibo and Mary, 2009). Therefore, reading the small print is necessary when you deal with cloud computing, and especially with cloud hosting. Also note that at times you may not be allowed to upload a certain type of data into the cloud computing system (Feras, 2008). For some organisations the lack of hard drive is an advantage. As this is seen to reduce overhead costs. For those organisations that used programs that need an attached hard drive, this may cause a problem.Still, an increasing number of companies eliminate the need for a hard drive, in an effort to make data management easier. Although the cloud computing security is generally good there still some serious security concerns. For example, the interconnection of computer servers in the cloud system can lead to a situation in which computer hackers can breach one system them make their way into other linked systems (Raouaf, 2009). Many of the disadvantages of cloud computing are due to the fact that the technology is still relatively new. In other words, they will be addressed in time, as more and more users adopt cloud computing. Although some of the cloud computing services provider promise that the cloud computing system will be flexible to integrate and use, switching cloud computing services. Sometimes organisations may find it difficult to migrate their operationat from one provider to another. Integrating and hosting current cloud computing application another platform may throw up interoperability and support issues (Haibo and Mary, 2009). For example, an application that has been developed on Linux platform might not work properly on Microsoft Development Framework (.Net). Since the cloud computing infrastructure is entirely owned, managed and monitored by another party, it transfers minimal control over to the end user or customer (Tadayoshi and Adam, 2003). The customer or end user can only manage and control the data, application and services operated on top of that, not the backed cloud infrastructure itself. Important administrative tasks such as updating, server shell acces and firmware management may not be passed to the end user or customer. To some degree cloud computing system end users have limited control over certain execution and functions of their hosting infrastructure. Cloud computing providers and management policies might impose some limits on what the end users can do with their deployments. End users are also limited to the management and control of their data, applications and services, but not the backend infrastructure. There is lack of support in cloud computing infrastructures as compared with most custom-built software or packaged. Cloud computing based services have been found not to have best customer care support system. It may be difficult to get support staff by email or on the phone, and they often do not provide user manuals. Instead, many of these providers usually ask their end user or customers to rely on online community support or FAQ pages, which may not be always very transparent. Lastly, integrating latency and peripherals. Most organisations using cloud computing may be faced with difficulties while connecting their wireless devices, especially when it comes to such devices such as printers to the cloud computing network. The issues of software or application incompatibilities may arise as most cloud computing devices have been designed to connect specifically to desktop PCs. Question 3 Cloud computing will help the Australia’s electrol commission to be able to analyse large amount of data and through this they will be able to detect any discrepancy that may follow. In addition, Cloud computing system will provide mechanism that will enhance the realibility and security of data. The most significant benefit about clould computing systesm is cost savings. Organisations, no mater what their size or type, exists to provide better services while keeping operational costs or expenses to a mimimum (Raouaf, 2009). By Australia Electoral commission investing in cloud computing system in their operations, they will be able to save substantial costw with zero application requirements and in house servers storage (Tadayoshi and Adam, 2003). The lack of an on premises infrascructure also removes the associated operational costs such as air conditioning, power and administration costs. The Australia electoral commission will only pay for what they used and disengage whenever they like- there is no invested IT capital to worry about. With a managed platform, cloud computing platform is consistent and much more reliable than in house information technology infrastructure (Raouaf, 2009). Most cloud computing providers have been found to offer Service Level Agreement which guarantees their customers 99.99 percent and 24/7/365 availabiity. Australia electoral commission can benefit from pool of redundant IT resources, as well as quick failover mechanism (Tadayoshi and Adam, 2003). For example, if the storage server fails, hosted services and applications can be translated to any of the available servers. Cloud computing systems provides simplified and enhanced Information technology maintenance and management capabilities of resourses through a centralised administration, Also SLA backed agreements and vendor managed infrastructures (Feras, 2008). IT infrastructures maintenances and updates are eliminated, as all the IT resources are maintained by the cloud computing service provider (Haibo and Mary, 2009). For example, Australia electoral commission will be able to enjoy a simple web based end user interface for software, accessing, application and services witout the need for installation- and an SLA will guarantee and ensure timely delivery, maintenance and management of their IT services. The ever increasing computing resources will give Australia electoral commission a competitive edge, as the time they will require for the IT procurement will be virtually be nil (Raouaf, 2009). Australia electoral commission can be able to deploy critical application that deliver benefits at mimal provisioning time and without upfront costs (Tadayoshi and Adam, 2003). Cloud computing systems will allow the organisation to forget about technology and focus on their objectives and key activities (Raouaf, 2009). In addition, it will help them reduce time that is needed to market newer services and applications. Lastly, cloud computing will help in improving security (Tadayoshi and Adam, 2003). Usually the security in e-voting debate is about how to keep computers from making security too much worse than it was before (Haibo and Mary, 2009). Given the design of today’s cloud computing systems , this is appropriate – just bringing these systems up to the level of security and reliability in (say) the Xbox and Wii game consoles would be nice. References Tadayoshi kohno and Adam stubblefied,“Analysis of an Electronic Voting System”,IEEE computer society press, July 2003. Haibo Yang and Mary Tate,”Where are we at with cloud computing?:A Descriptive Literature Review”,AIS Electronic Library(AISeL), Dec 2009. Raouaf Boutaba,”Cloud computing: state of the art and research challenges”,J Internet Serv Appl, April 2009 Feras a. haziemeh,”new applied e-voting system”, Publication of little lion scientific R&D, Islamabad, vol.25.no.2, March 2008. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Assessment 2 Example | Topics and Well Written Essays - 1577 words, n.d.)
Assessment 2 Example | Topics and Well Written Essays - 1577 words. https://studentshare.org/logic-programming/2054339-assessment-2
(Assessment 2 Example | Topics and Well Written Essays - 1577 Words)
Assessment 2 Example | Topics and Well Written Essays - 1577 Words. https://studentshare.org/logic-programming/2054339-assessment-2.
“Assessment 2 Example | Topics and Well Written Essays - 1577 Words”. https://studentshare.org/logic-programming/2054339-assessment-2.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cloud Computing Voting Architecture Diagram

Database Management in Cloud Computing Environment

The paper "Database Management in cloud computing Environment" describes that generally, as far as performance is concerned, the DATABASE MANAGEMENT SYSTEMS in the cloud computing environment presents an efficient means to make use of data in the database.... The DATABASE MANAGEMENT SYSTEMS in the cloud computing environment also enables storing SQL commands which are used regularly, thus extinguishing the requirement for the long and delayed compilation of the data (Gelogo & Lee, 2012)....
12 Pages (3000 words) Coursework

The Concept of Cloud Computing

This research proposal "The Concept of cloud computing" finds out the risk factors for cloud computing.... The topic to be examined would be the risk factor associated with cloud computing.... It also explores the history, the global concern and the compliance of cloud computing, among other key areas of concern of cloud computing.... The first objective of the study entails providing qualitative answers to the influence of the development of cloud computing on modern technology, and secondly, the study seeks to illustrate the potential of utilizing cloud computing alongside highlighting the risk factors for cloud computing....
17 Pages (4250 words) Research Proposal

Data Migration Between Clouds

The study's statement of the problem argues that the banking sector has not realized the full benefits for cloud computing technology because of the inefficiency of the Amazon cloud models that have faced frequent failures.... cloud computing regards to a model of computing through which flexible scalable and virtualized data is provided as a service via the Internet.... According to Shroff (2010), cloud computing is a web service that offers dynamic computing capacity in the cloud....
18 Pages (4500 words) Thesis

Internet of Things - Features, Challenges, and Weaknesses

It was found that, in the distributed form of architecture in IoT, attackers could hijack unsecured network devices, converting them into bots to attack third parties.... The perceptual layer in distributed IoT architecture was also found to be vulnerable to node capture attacks, including physical capture, brute force attack, DDoS attacks, and node privacy leaks.... This paper is about the computing concept Internet of Things refers to a future where every day physical objects are connected by the internet in one form or the other, but outside the traditional desktop realm....
24 Pages (6000 words) Research Paper

The Successful Emergence of the Internet of Things

We found that in the distributed form of architecture in IoT, attackers could hijack unsecured network devices converting them into bots to attack third parties.... Finally, the perceptual layer in distributed IoT architecture is also found to be vulnerable to node capture attacks, including physical capture, brute force attack, DDoS attacks, and node privacy leaks.... The successful emergence of the IoT vision, however, will require computing to extend past traditional scenarios involving portables and smart-phones to the connection of everyday physical objects and the integration of intelligence with the environment....
23 Pages (5750 words) Research Paper

Services and Types of Cloud Computing

The paper "Services and Types of cloud computing" highlights variants of the open cloud systems beneficial for companies looking for an edge in today's economy.... The excessive value is provided by the broad network access and it boosts the capacity of the advantages provided by cloud computing.... cloud computing is all about making effective use of the computing assets i.... We refer to it as 'cloud computing' because it holds the symbol of Cloud which usually symbolizes huge networks particularly the 'Internet'....
19 Pages (4750 words) Case Study

Advantages, Disadvantages, and Critical Analysis of Cloud Computing System

"Advantages, Disadvantages, and Critical Analysis of cloud computing System" paper focused on the different characteristics of various cloud services in existence.... The project aimed at understanding the theories and practicalities of migrating to a cloud computing system.... Most organizations that currently have control of their computer infrastructure are considering exploiting the broad advantages offered by the cloud computing system.... he cloud computing system has leveraged widespread internet usage....
31 Pages (7750 words) Research Paper

Open Stack System and Cloud Computing

The author of this coursework "Open Stack System and cloud computing" describes key features of cloud computing.... This paper outlines Self –Servicing, Network Access, Resource Pooling services, and Types of cloud computing and OpenStack Components.... cloud computing utilizes the inaccessible services to handle customer's data, software, and working out for the requirements and mitigates the user in managing these prerequisites (O'Brien, J....
20 Pages (5000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us