Cloud computing outline

Assignment Help JAVA Programming
Reference no: EM131053933

Cloud Computing Outline

ABSTRACT

Cloud computing is one of the biggest catchphrases in the Information Technology world. Virtualization is the core technology behind cloud resource sharing. The deployment strategy involved in a cloud environment includes the components of grid computing, parallel computing, and utility computing. This rapid transitioning into cloud computing has concerns over secure communication in information systems. Most IT people share different points of view on cloud computing (Marks & Lozano, 2010). Cloud computing vendors try to ensure the security of their product. This paper will investigate possible security issues, with cloud computing and solutions to those security challenges.

CHALLENGES

Whereas Cloud Computing has numerous benefits, it also has significant challenges regarding its adoption. Firstly, its adoption comes with security loopholes. Compliance is another issue. Privacy and legal considerations are bottlenecks as well. Since Cloud Computing is a comparatively novel computer model, considerable uncertainty exists at all levels such as its hosting, networking, data levels, and application (Tajts, 2012). Consequently, there is a need to address these issues too before or during the deployment of the Cloud Computing. The repercussion has been many company executives addressing data security as their foremost priority.

The fact that the valuable enterprise data will reside outside the corporate firewall raises serious concerns. Hacking and various attacks to cloud infrastructure would affect multiple clients even if only one site is attacked. These risks can be mitigated by using security applications, encrypted file systems, data loss software, and buying security hardware to track unusual behavior across servers. Phishing, fraud, and software exploits are still successful, and cloud services add a new dimension to the threat because attackers can eavesdrop on activities, manipulate transactions, and modify data. Attackers may also be able to use the cloud application to launch other attacks (Rashid, 2016).

Data breaches and other attacks frequently result from lax authentication, weak passwords, and poor key or certificate management. Organizations often struggle with identity management as they try to allocate permissions appropriate to the user's job role. More important, they sometimes forget to remove user access when a job function changes or a user leaves the organization (Rashid, 2016).

Safety aspects entail risk avenues comprising reliance on the "universal internet", external data storage, integration with local security, ineffective control, and multi-tenancy. In contrast to conventional technologies, the cloud has distinct features involving its large scale and the fact that resources within the cloud completely virtualized and heterogeneous (Tajts, 2012). With the evolution of clouds, security issues such as authentication, identity, and authorization are insufficient.  The security Cloud Computing security's controls are quite similar to security checks in any other IT environment. Due to different cloud models used such as technologies and operational models to make cloud services useful, Cloud Computing represent various risks to firms than the conventional IT solutions (Marks & Lozano, 2010). Regrettably, augmenting security into such solutions is always viewed as aggravating an already bad situation.

Transferring critical applications and sensitive data to universal cloud environments is of grave concern to firms that are going past data centers within their jurisdictions. To alleviate the concerns, cloud solution providers have to ensure that clients will always have the same privacy and security controls over their services and applications. Moreover, the providers must prove to the clientele that theirs is a secure organization and that they can fulfill their service level contracts and that they can offer proof to their auditors.

Another challenge to cloud computing is service quality. It is difficult to assess the costs involved due to the on-demand nature of the services. Budgeting and assessment of the cost will be very difficult unless the provider has some good and comparable benchmarks to offer. The service-level agreements (SLAs) of the provider are not adequate to guarantee the availability and scalability. Businesses will be reluctant to switch to cloud without a strong service quality guarantee. To ensure that companies can meet their SLAs, it's imperative to ask the right questions. Here are a few questions that should be asked about service quality (Casey, 2015):

  1. What are your minimum service levels?
  2. What remedies are in place when a failure occurs?
  3. What disaster recovery and business continuity procedures are in place?
  4. How quickly do you identify and solve problems?
  5. What is your escalation process?
  6. What is your exit strategy?
  7. What is your termination process?

Reliability and Availability Cloud providers still lack round-the-clock service; this results in frequent outages. It is important to monitor the service being provided using internal or third-party tools. It is vital to have plans to supervise usage, SLAs, performance, robustness, and business dependency of these services. The challenge with the cloud is that the data is accessed via an internet connection rather than a local connection. So when the network or internet connection is down, it also means that cloud services are also down; thus data cannot be accessed.

Businesses can save money on hardware but they have to spend more for the bandwidth. This can be a low cost for smaller applications but can be significantly high for the data-intensive applications. Delivering intensive and complex data over the network requires sufficient bandwidth.  Because of this, many businesses are waiting for a reduced cost before switching to the cloud.

SOLUTIONS

Since cloud computing issues are mainly centered on preserving privacy and confidentiality of data, it necessary to protect the integrity of data and ensure that information does not get into the wrong hands. As such, data encryption and other protective measures have to be taken to ensure that authorized institutions and media do not have access to such data and information. The meaningful solutions for to the issues comprise tokenization and encryption of data that is the cloud stores. Due to technological advances, novel solutions have emerged to enhance data security and protect sensitive information and classified applications. Cloud Encryption Gateway is one such solution (Tajts, 2012). It enables enterprises to tackle security issues associated with cloud. The portal serves act as proxy "entry" to any applications compatible with the cloud. Because the sensitive information is still und corporate custody every time, firms can move to cloud confidently without worrying about security, privacy and regulatory issues of submitting sensitive data alongside external service providers.

CONCLUSION

With the advances in technology, considerable gains have been made regarding reducing the cost of communication between firms, employers, and employees. Cloud computing has been the greatest technological advancement. Whereas it has numerous benefits including lower cost and improved data accessibility, it also poses challenges to data security, privacy, and integrity.  This paper has looked at the loopholes the cloud creates such as the "universality" of data. It has looked at the tradeoffs between the benefits and challenges. Finally, it has suggested solutions such as cloud encryption to safeguard data privacy. 

Reference no: EM131053933

Questions Cloud

Why is accessing a disk block expensive : Why is accessing a disk block expensive?
What you have learned in past emergency management : Write a memorandum of 800-1,000 words addressed to the mayor of Coldtown City - Describe your organizations role and activities during the train accident or ice storm response.
Calculate the beta for your company using excel : Using the data collected, calculate the beta for your company using Excel. Compare your results with the published beta for your company on Reuters or Morningstar. Explain any differences between the published result and your calculated result
What are the reasons for having variable-length records : What are the reasons for having variable-length records?
Cloud computing outline : Cloud computing is one of the biggest catchphrases in the Information Technology world. Virtualization is the core technology behind cloud resource sharing. The deployment strategy involved in a cloud environment includes the components of grid co..
Multiple healthcare plans important for fedex : Why is having multiple healthcare plans important for FedEx in slowing down increases in the cost of benefits?(Delivering Benefits)Dec 07  Get this Quest
Discuss whether you think governmental regulatory agencies : Discuss whether you think governmental regulatory agencies such as OSHA should be involved in promoting safety and health management systems. After all, the agency's original mandate was to promulgate and enforce standards.
Quarterly costs for labor and materials for these appliances : 1. A manufacturer of small kitchen appliances has the following unit costs for labor and materials for three of its products: a blender, a mixer, and a food processor.
Which of these depend on the current file record : Which of these depend on the current file record?

Reviews

Write a Review

JAVA Programming Questions & Answers

  Create a new project in your ide named animalinfo

Create a new project in your IDE named "AnimalInfo." Create a class called "AnimalInfo" as the main class for the program.

  Write javascript code to perform the validation of your form

With HTML5 forms there are some attributes that you can declaratively add to the various form elements to help with required fields, etc. What are some reasons that you can think of why you would want to write your own JavaScript code to perform t..

  Develop a gui based java program

Designing and developing a College Registration program

  Define application using java in the eclipse environment

Within this project create a package called task01. Within this package you will be required to author (write, develop) some classes. These classes are described below

  Create a new json view

Add code to your controller to check which view to display.  For this assignment, there will be a URL parameter named "format".  When the value of the "format" parameter is "json" display the JSON view, otherwise display the regular HTML JSP view.

  What is difference between if statement and switch statement

What are the problems faced by Java programmers who don't use layout managers? What is the difference between an if statement and a switch statement?

  Programming exercises

Programming Exercises 1. Write an application named BadSubscriptCaught in which you declare an array of 10 first names. Write a try block in which you prompt the user for an integer and display the name in the requested position.

  Numerical solution of a two-point boundary-value problem

How to combine both Secant and Runge-Kutta methods and make it to the two-point boundary-value - Numerical Solution of a Two-Point Boundary

  Write a program that prompts the user to input an integer

Write a program that prompts the user to input an integer and then outputs both the individual digits of the number and the sum of the digits.

  How are data structures managed and organized in language

How are data structures managed and organized in this language. How does the management or syntax of data structures in this language differ from how data structures are handled in other language

  When the user presses a button

When the user presses a button, get the text from text field. Now extract the words from the text one at a time and find the largest word of length 4 or more. Let's call this largest word X for now. In response, create a question based on the length ..

  Write a java program that inputs a string

Write a program that inputs a string similar to: 3 + 4 * 2 / ( 1 - 5 ) ^ 2 ^ 3. Your program should apply the Shunting-yard algorithm to this string to ultimately produce a mathematical result.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd