We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Back
Get Offer

Security and privacy challenges in cloud computing

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

This is achieved by breaking down the physical barrier inherent in isolated systems, automating the management of the group of the systems as a single entity. Cloud Computing can also be described as ultimately brutalized system and a natural evolution for data centers which offer automated systems management [3, up]. Enterprises need to consider the benefits, drawbacks and the effects of Cloud Computing on their organizations and usage practices, to make decision about the adoption and use.

In the enterprise, the “adoption of Cloud Computing is as much pendent on the maturity of organizational and cultural (including legislative) processes as the technology, per SE” [7].

Don't use plagiarized sources. Get Your Custom Essay on
Security and privacy challenges in cloud computing
Just from $13,9/Page
Get custom paper

Many companies have invested in Cloud Computing technology by building their public clouds, which include Amazon, Google and Microsoft. These companies are often releasing new features and updates of their services. For instance Amazon Web Services (SAWS) released a Security and Economics center on their website to have academic and community advice regarding these issues [12].

This shows that there are still lots of doubts about the costs and security for enterprises to adopt Cloud Computing.

Hence, the issues of economics and security in Cloud Computing for enterprises must be researched. As large organizations are inherently complex hence, it is very important for Cloud Computing to deliver the real value rather than Just be a platform for simple tasks migrating application systems to the cloud and satisfying the needs of key stakeholders should be explored.

The stakeholders include technical, project, operations and financial managers as well as the engineers who are going to be developing and supporting the individual systems. For enterprises economics or cost actor is important but at the same time customer relationships, public image, flexibility, business continuity and compliance are of same importance. 2. Types of Cloud Providers Cloud services are usually divided in the three main types, Software-as-a-Service AAAS), Platform-as-a-Service (Pas) and Infrastructure-as-a-Service (alas).

Software as a Service (AAAS) Salesrooms. The applications are typically offered to the clients via the Internet and are managed completely by the Cloud provider. That means that the administration of these services such as updating and patching are in the provider”s responsibility. One big benefit of AAAS is that all clients are running the same software version and new functionality can be easily integrated by the provider and is therefore available to all clients.

Platform as a Service (Pas) Pas Cloud providers offer an application platform as a service, for example Google App Engine. This enables clients to deploy custom software using the tools and programming languages offered by the provider. Clients have control over the deployed applications and environment-related settings. As with AAAS, the management of the underlying infrastructure lies within the responsibility of the reviver. Infrastructure as a Service (alas) alas delivers hardware resources such as CAP], disk space or network components as service.

These resources are usually delivered as a fertilization platform by the Cloud provider and can be accessed across the Internet by the client. The client has full control of the brutalized platform and is not responsible for managing the underlying infrastructure. Figure 1: A layered model of Cloud Computing Source: IQ Ghana et al. , Cloud computing: state-of-the-art and research challenges,] Internet Serve Apple (2010) up. 7-18) Security issues and challenges Heightened security threats must be overcome in order to benefit fully from this new MN. . Crisp. Org International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 SINS 2250-3153 Figure 2: Security is the Major Issue Source: http://www. ISRC. NIST. Groups/SONS/cloud-computing/cloud-computing- 426. PPTP at slide 17) Security concern #1 : With the cloud model control physical security is lost because of sharing computing resources with other companies. No knowledge or control of Inhere the resources run. B. Security concern #2: Company has violated the law (risk of data seizure by (foreign) overspent).

Security concern #3: Storage services provided by one cloud vendor may be incompatible with another vendor’s services if user decides to move from one to the other (e. G. Microsoft cloud is incompatible with Google cloud). (Pearson et al. 2003) Security concern #4: Who controls the encryption/decryption keys? Logically it should be the customer. Security concern #5: Ensuring the integrity of the data (transfer, storage, and retrieval) really means that it changes only in response to authorized transactions. A common standard to ensure data integrity does not yet exist. Security concern #6: In case of Payment Card Industry Data Security Standard (EPIC ADS) data logs must be provided to security managers and regulators. [9][10][11] Security concern #7: Users must keep up to date with application improvements to be sure they are protected. Security concern #8: Some government regulations have strict limits on what data about its citizens can be stored and for how long, and some banking regulators require that customer’s financial data remain in their home country. I. Security concern #9: The dynamic and fluid nature of virtual machines will make it scores.

Cite this Security and privacy challenges in cloud computing

Security and privacy challenges in cloud computing. (2018, Feb 28). Retrieved from https://graduateway.com/security-and-privacy-challenges-in-cloud-computing/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page