Sunday, June 9, 2019

CLOUD COMPUTING Essay Example | Topics and Well Written Essays - 1250 words - 1

CLOUD COMPUTING - Essay ExampleHowever, the issue of overcast security is the principal(prenominal) focus for the divers(a) sully reckoning potential customers and it is also considered the major bar to most of its widespread drills (Patrick, 2013). This look for paper will focus on current research done on blur security. The main focus of the paper will be to survey the popular cloud computing security feigns as swell up as the diverse parameters of cloud security which will involve virtualization, compliance, framework, risk management, dynamic access security, internet access security and access management.IntroductionThe biggest conundrum facing network computing and distributed systems is security. Cloud computing refers to internet computing and it is the latest concept that has the capability to increase an organizations service speech communication efficiency. The security models of cloud computing that argon cloud multiple tenancy model of NIST, cloud risk accum ulation model of CSA, Jerico forums cloud cube model and the mapping model of cloud, compliance and security are supported by the three cloud services models. Resources for cloud computing are scalable and dynamic .The representation of cloud computing is elaborated through three cloud computing service models which are platform as a service (PaaS), Infrastructure as a Service (IaaS) and Software as a Service (SaaS) (Patrick, 2013). The main aim of these cloud computing service models is to be able to provide the IT departments with focus on the various strategic projects as well as cutting down on the operational costs (Ritesh, Anantwar& Swati, 2012). The cloud computing models are considered to have a variety of dimensions that are used to further worsen the security problem. The cloud computing model comprises of two main features which are elasticity and multi-tenancy. Elasticity depends on the presence of secure placement strategies andsecures service migration while multi-tena ncy feature results to virtualization and thus the boundaries among different host services deprivation to be improved. At present the available security strategies are only for the single cloud user and single cloud provider but if cloud computing in the future moves to a multiple provider environment security there will be a greater challenge in addressing the issue of security (Patrick, 2013). Users of cloud computing are able to access their database resources from the internet regardless of their location. It is quite clear that the use of cloud services is of the essence(predicate) and offers a lot of benefits to the user or the enterprise that has adapted the new technology. Cloud computing can thus be regarded as a model that enables convenience on the demand network access to the shared computing resources. As express by Amarnath et. al.2010 virtualization technology is used to optimize the performance of the application in a cost effective way but this technology can in troduce some security risks. Therefore, cloud computing security plays a major role because the customers outsource computation tasks and data on cloud computing servers which are managed by cloud providers who cannot be trusted (Amarnath, 2010). Cloud computing has become popular as a result of many enterprise applications moving to the cloud platforms. However, the issue of security has become a major barrier point for cloud computing adoption. Based on a recent survey research conducted by the International Data Corporation almost 87.5% of the IT executives stated that security is a major challenge that must be dealt with in each cloud service. Therefore, there is need to come up with applications that will be used to curb the threats brought about by security by using some security

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.