Security Considerations for Cloud Computing

In: Computers and Technology

Submitted By referencestoread
Words 1965
Pages 8
Security Considerations for Cloud Computing
Carlos Chandler

Abstract
Cloud computing is an emerging Information Technology (IT) model whereby a company utilizes a pay-per-use service for it computing needs rather than maintain a local data center run by its in-house IT department. By treating computing resources as a commodity or operating expense, it allows firms to focus less on IT and more on the core elements of the operations strategy. Because of advantages like this, its popularity has grown exponentially in recent years. However, cloud computing also has certain inherent risks in its present form. This paper seeks to understand the key advantages driving businesses to adopt this computing model in ever increasing numbers, while at the same time understanding what risks they are taking in doing so. To gain insight into these risks, this paper incorporates statistical research into what experts in the field believe to be the greatest down-sides to converting to this increasingly common IT model.

Security Considerations for Cloud Computing
What is Cloud Computing, Anyway?
To begin, let us illustrate what cloud computing is. Imagine you run a cookie baking business that takes orders from around the country via an online store. To handle the orders, would your business buy a fleet of trucks and deliver its own shipments, or would you simply contract with UPS or FedEx to ship the orders on your behalf? Clearly the cost efficiencies in contracting the shipping service outweigh any possible benefit of taking on the shipping process yourself. Moreover, outsourcing the delivery part of the business allows your cookie company to focus on its core competencies: baking cookies. Now, let’s return to that online store. At first you might have built at data center, bought computers, then hired an IT team to create and maintain data center—all this to…...

Similar Documents

Cloud Computing

...How Cloud Computing Improve Resource Management Hajar Bte Ahmedy Master of Business Administration: Faculty of Business Management BM 7702CF UiTM Shah Alam hajarahmedy@gmail.com Abstract— The emergence of cloud computing has changed the perception of how a resource management can be properly managed. Cloud computing is crucial in resource management. Without the improper implementation of cloud computing, applications or CPU might experience network congestion, long time wait, waist in CPU, overused CPU and memory, and security problems. In order for the resource management properly maintain, a good usage of cloud computing infrastructure utilization needs to be maximized. Keywords-component; Resource Management, Cloud Computing, Types of cloud computing Introduction The emergence of cloud computing has changed the perception of how a resource management can be properly managed. Cloud computing has been integrated with the business processes and it refers to the applications and services offered over the internet. These services are offered from data centers all over the world, which are collectively referred to as the “cloud”. The idea of cloud can be represent many network connections and computer systems involved in online services. It shows that the cloud computing is crucial in a resource management. On the other side, many network diagrams use the image of cloud computing to represent the internet. It can actually represent the internet’s broad...

Words: 2603 - Pages: 11

Cloud Computing

... – Pay for what you use – Leverage others’ core competencies – Turn fixed cost into variable cost TYPES OF CLOUD COMPUTING Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. Community cloud. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting). Cloud Computing Security Security is the major issue for cloud computing Analyzing Cloud Security • Some key issues: – trust, multi-tenancy, encryption, compliance • Clouds are massively complex systems can be reduced to simple primitives that are......

Words: 1760 - Pages: 8

Cloud Computing

...White Paper Cloud Computing in Higher Education: A Guide to Evaluation and Adoption Executive Summary Public cloud computing—delivering infrastructure, services, and software on demand through the network—offers attractive advantages to higher education. For example, it has the potential to reduce information and communications technology (IT) costs by virtualizing capital assets such as disk storage and processing cycles into a readily available, affordable operating expense. Sometimes selecting a public cloud offering can create risk around security, privacy, interoperability, or performance. When it does, universities should consider private cloud deployment models to realize scale on demand, rapid platform deployment, and lower costs and carbon emissions while minimizing risk. Introduction The cloud-computing market is projected to grow from $40.7B in 2011 to $240B in 2020 (“Sizing the Cloud” by Stefan Ried and Holger Kisker, Forrester Research, April 21, 2011). , Such rapid market growth is a clarion call to all chief information officers (CIOs) to explore the possibilities offered by cloud and to assess the risks. Most are familiar with the cloud concept because many already use some aspect of cloud applications—software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS); for example, Google’s Gmail, iTunes University, and Amazon’s infrastructure, respectively. The cloud space is rapidly adopting a plethora of new...

Words: 2347 - Pages: 10

Cloud Computing

...  cloud computing research paper 06  research paper on cloud computing 13  cloud computing research paper 05  cloud computing research paper 04  cloud computing research paper 03  linear programming in cloud computing  free research papers and projects on cloud computing recent  free research paper computer science cloud computing 2011  cluster based services in the cloud  cloud acquisition from a mobile platform  recent paper on cloud computing  video communication in the cloud  revenues from cloud computing  deliberating cloud computing  cloud computing on emerging markets thesis  cloud computing for e learning  green cloud computing  regulatory issues in cloud computing  search via cloud computing  ontological view of cloud computing  cloud computing networks  cloud computing in education  user oriented for cloud computing  cloud computing security  cloud computing infrastructure  security issues in cloud computing  security issues in cloud computing 02  security for cloud computing  intrusion tolerance in cloud computing  mobile cloud computing thesis  cloud computing applications  mobile cloud computing  cloud computing based gaming  the economics of cloud computing  cloud computing security 02  cloud computing markets  cloud computing security 03  cloud computing security 04  energy efficiency in cloud computing  cloud computing in education 02  cloud computing system management  cloud computing based it solutions  cloud...

Words: 2157 - Pages: 9

Cloud Computing

... docs. Educational usage of cloud computing Cloud computing as an exciting development is a significant alternative today’s educational perspective. Students and administrative personnel have the opportunity to quickly and economically access various application platforms and resources through the web pages on-demand. This automatically reduces the cost of organizational expenses and offers more powerful functional capabilities. There will be an online survey to collect the required data for the use of cloud computing in the universities and other governmental or private institutions in the region. This will help us review the current status and probable considerations to adopt the cloud technology. Beginning with the outsourcing of email service seems attractive. The gradually removal of software license costs, hardware costs and maintenance costs respectively provides great flexibility to the university/corporate management. From the points of advantages provided by cloud, there is a great advantage for university IT staff to take them away the responsibility of the maintenance burden in the university. Cloud provides instant global platforms, elimination of H/S capacities and licenses, reduced cost, simplified scalability. Adopting cloud network redundancy eliminates disaster recovery risks and its high costs. There can always be new tools and applications to improve IT features. There are of course some disadvantages too. The cloud computing services needed to......

Words: 1392 - Pages: 6

Cloud Computing

..., standardize API’s, Compatible SW to enable surge on hybrid cloud computing, and to deploy encryption, VLANS, and firewalls. The author’s of this article suggest that with the use of multiple cloud providers is the best chance for independent software stacks is to be provided by different companies. They say that the use of multiple network providers by large Internet services for the use of not being taken off air, they feel the only way for cloud computing to be at high availability is to use and have multiple cloud computing providers. Another advantage would be to standardize API’s in a way that a Saas (Software as a Service) developer could deploy services and data across multiple cloud computing providers. So if a single company failed it would not take all the customer data with it. The standardization of API’s would enable a new usage model where the same software can be used in an internal data center and also a public cloud. This option would also enable the hybrid cloud computing where the public cloud would catch the extras that cannot be easily run in the private cloud due to heavy overloads. The hybrid cloud is also something the future holds for cloud computing. Lastly the article discusses the advantage of deploying encryption and firewalls. Of course when engaging in computer activities we all worry about being safe. The author’s state that the cloud users face many security threats both inside and outside the cloud. The responsibility of security is divided......

Words: 1540 - Pages: 7

Cloud Computing

... several years. Looking back further to the time-sharing era, many of these problems already received attention. On the other hand, we argue that two facets are to some degree new and fundamental to cloud computing: the complexities of multi-party trust considerations, and the ensuing need for mutual auditability. ernment organizations [29, 3]. For many business-critical computations, today’s cloud computing appears inadvisable due to issues such as service availability, data confidentiality, reputation fatesharing, and others. To add to the confusion, some have critized the term “cloud computing” as too broad [21]. Indeed, cloud computing does include established business models such as Software as a Service, and the underlying concept of on-demand computing utilities goes back as far as early time-sharing systems [17]. At the same time, the lack of consistent terminology for cloud computing has hampered discussions about cloud computing security. Thus, security criticisms of cloud computing have included a murky mix of ongoing and new issues. This context frames the genesis of our paper. We recognize that security poses major issues for the widespread adoption of cloud computing. However, secure or not, cloud computing appears here to stay. Thus, our ambition is to get past terminology isuses (Section 2) and attempt to sort out what are actually new security issues for cloud computing, versus broader and more general security challenges that inevitably arise in the......

Words: 5878 - Pages: 24

Cloud Computing

... cloud that business people can use to work on their files on the go. Another example of a cloud computing based business is Amazon Cloud and Apple Inc.’s cloud storage feature iCloud. 4.In which situation would one use a private cloud service, as opposed to public cloud service? The most likely reason for one to use a private cloud service is when they require increased security and control. Private cloud services offer better security than public loud services hence are the obvious choices for businesses as their data and applications are extremely important and crucial to the general welfare of the company. However the companies have to purchase and maintain all the software and infrastructure in exchange for increased security. 5. Are there any benefits and drawbacks to cloud computing? How about the impact it has on the carbon footprint on Planet Earth? The benefits of cloud computing are you save office or room space as you can store data on online servers instead of large servers and hard drives. You can access this data from anywhere and at anytime as long as you have an Internet connection. Most cloud services are cross compatible so that reduces the problem of having a hard drive that only works on a Mac or Windows computer. You can save costs with cloud computing as you can purchase the specific services you require and you have the choices of upgrading or changing these services at any time. You don’t have to install software on each......

Words: 1450 - Pages: 6

Cloud Computing and Erp Security

... organisation specific based on massive data Security. However, there are some common issues that push organisations towards the adoption of such a system. These comprise of cost savings, fault tolerance, on demand service, scalability and flexibility, massive data storage, reliance and compliance of data formats. Concerns regarding a cloud based system include security, scalability, ease of migration and licensing issues. There are some notable disadvantages that need to be overcome. A very pertinent issue is regarding the security of the organizational data. Since the data is stored in the cloud, an organization does not have a direct control over it. The security of the organizational data is the responsibility of the service provider and this throws up a lot of issues for an organization to consider before and after migrating to a cloud based Systems. Another important issue is of a possible vendor lock in that might disallow the organisation to migrate to another service provider when it desires it. 1.1 GENERAL OBJECTIVE OF THE STUDY: To investigate the possible long and short term advantages and the disadvantages that an organisation can derive from the adoption of a cloud based Systems and/or Cloud based ERP and the potential security and confidentiality threats associated with the cloud computing. 1.2 SPECIFIC OBJECTIVES: • To analyse if a cloud systems and ERP could prove to be a suitable alternative to the traditional on-premise ERP and for......

Words: 6240 - Pages: 25

Cloud Computing

... as a service on which developers can build and deploy usage applications. Microsoft's Windows platform services are often referred as PaaS solutions. IaaS (Infrastructure as a Service): It encloses the hardware and technology for computing power, storage, OS or other infrastructure. Example: Amazon Simple Storage Service (Amazon S3) Benefits of Cloud: Cloud computing provides opportunities for companies to become more productive, cost-effective and flexible to deliver new tasks fast. Benefits to name a few are Availability, Flexibility, Faster Application delivery, Reduction in cost and time. Risks in Cloud computing: In spite of cloud's many benefits, the major risks which IT professionals are worried about are security and privacy. Usual security and privacy examples include data storage and protection, application security and data privacy. Companies that are worried about privacy and security, may opt for a private cloud. Conclusion: As Cloud computing is used by many organizations and rapidly heading in the IT sector, my research on this topic will help me a lot both academically and professionally to know more about the Cloud features, architecture, models and implementations....

Words: 415 - Pages: 2

Cloud Computing

...) 11 4.1.3 Software as a Service (SaaS) 11 4.2 Deployment Models 4.2.1 Private Clouds 12 4.2.2 Public Clouds 12 4.2.3 Community Clouds 13 4.2.4 Hybrid Clouds 13 5. Issues 5.1 Security 14 5.2 Privacy 14 6. Conclusion 15 7. Recommendations 16 8. References 17-18 9. Appendices 19-20 i. Abstract This research report has answered the question “What is Cloud Computing?” The research report highlights the characteristic of clouds and provides a range of information by which clouds can be defined. The characteristic of clouds includes an in-depth analysis of the technology in which they are performed on various infrastructure models. The advent of cloud computing is found to be flexible, effective and convenient for various users through different groups such as government organisations, education facilities, and business organisations. Cloud computing also provides creative business framework for organisations to adopt technological services without payment in advance. Despite the potential benefits achieved from Cloud computing, there are many deterrents of cloud computing such as availability, reliability and security issues which impede the widespread use of cloud. ii. Justification The above questions are the basic fundamental principles in the study of Information Technology. All first year......

Words: 3381 - Pages: 14

Cloud Hooks: Security and Privacy Issues in Cloud Computing

...Proceedings of the 44th Hawaii International Conference on System Sciences - 2011 Cloud Hooks: Security and Privacy Issues in Cloud Computing Wayne A. Jansen, NIST Abstract In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the hook. The cloud hook formation provides a useful analogy for cloud computing, in which the most acute obstacles with outsourced services (i.e., the cloud hook) are security and privacy issues. This paper identifies key issues, which are believed to have long-term significance in cloud computing security and privacy, based on documented problems and exhibited weaknesses. • applications can be developed upon and deployed. It can reduce the cost and complexity of buying, housing, and managing hardware and software components of the platform. Infrastructure-as-a-Service (IaaS) enables a software deployment model in which the basic computing infrastructure of servers, software, and network equipment is provided as an on-demand service upon which a platform to develop and execute applications can be founded. It can be used to avoid buying, housing, and managing the basic hardware and software infrastructure components. 1. Introduction Cloud computing has been defined by NIST as a model for enabling convenient...

Words: 7808 - Pages: 32

Cloud Computing Security

... their expertise to craft the final 2013 report. The survey methodology validated that the threat listing reflects the most current concerns of the industry. In this most recent edition of this report, experts identified the following nine critical threats to cloud security (ranked in order of severity): [2] 1.0 Top Threat: Data Breaches It’s every CIO’s worst nightmare: the organization’s sensitive internal data falls into the hands of their competitors. While this scenario has kept executives awake at night long before the advent of computing, cloud computing introduces significant new avenues of attack. In November 2012, researchers from the University of North Carolina, the University of Wisconsin and RSA Corporation released a paper describing how a virtual machine could use side channel timing information to extract private cryptographic keys being used in other virtual machines on the same physical server. However, in many cases an attacker wouldn’t even need to go to such lengths. If a multitenant cloud service database 2.0 Top Threat: Data Loss For both consumers and businesses, the prospect of permanently losing one’s data is terrifying. Just ask Mat Honan, writer for Wired magazine: in the summer of 2012, attackers broke into Mat’s Apple, Gmail and Twitter accounts. They then used that access to erase all of his personal data in those accounts, including all of the baby pictures Mat had taken of his 18-month-old daughter. Of course, data stored in the cloud can...

Words: 4691 - Pages: 19

Cloud Computing and Information Security

...Cloud Computing and Information Security Krystal Hagi Daytona State College Student Khagi1@yahoo.com Abstract In order to discuss the security of information in cloud computing, we must first cover what is Cloud Computing. There are many types of cloud computing services, such as, SaaS, PaaS, IaaS, public clouds, private clouds, and hybrid clouds Examples. They all work similarly but have not only different tools, but varying levels of security for various needs. These differing types of clouds and networks as a service offer off site data storage in a secured location, which in essence frees up space and virtual infrastructure for personal and/or business networks, and devices. There are advantages and disadvantages to cloud computing, just like any other product or service. The advantages being, storage for data, accessibility from virtually anywhere there is a network connection, automated management, security, apps, tools, etc. The disadvantages include monthly costs for space on the offsite network, security, involvement of a third party, no access to the physical structure - which means if the cloud server goes down, your data may not be accessible, etc. There is one instance with cloud computing that is both an advantage and a disadvantage, and that is the security. While a cloud may be more secure than your own network How?, personal or business, using cloud services puts the security out of your hands in both the physical and logical sense. Using a cloud, means...

Words: 4955 - Pages: 20

Cloud Computing

... ............................................................................................................................................... 6 Future Trends ......................................................................................................................................... 6 1. Cloud is the Innovation Driver of the Future ................................................................................ 6 2. The Rise and Rise of Hybrid Computing ..................................................................................... 6 3. IT will Lose Cloud Discomfort .................................................................................................... 7 4. Cloud Battles will move Beyond Price ......................................................................................... 7 5. Cloud Managed Services Will be Big .......................................................................................... 7 6. A Home for Small Businesses in the Cloud ................................................................................. 8 7. Beat Expectations ......................................................................................................................... 8 Conclusion.............................................................................................................................................. 9 1 Introduction of Cloud Computing The term “cloud”, as used......

Words: 2367 - Pages: 10