Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Cloud Computing, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
The world is becoming a global space, and every company would wish to have a perfect connection with the rest of the world. The computer era has made everything possible, and cloud computing has even added weight to the issue of making the world a global village (Aljabre, 2012). Cloud computing is the putting into use of the computing resources, hardware and software. These resources configured to deliver services over a network, through the Internet. There are various advantages associated with cloud computing: it is virtual, flexible, scalable, affordable, and openness. However, one ought to know exactly what happens in cloud computing and how to go about it. This paper discusses about cloud security.
Cloud security
Cloud computing bases its infrastructure in the internet, thus all the activities involved are vulnerable to hack attacks. To minimize the problem of cloud computing, the first thing a company ought to do is to study and critically examine the provider’s security policies. If the policies are suitable enough, then one can go ahead and sign a contract with them.
Providing and implementing security for a cloud environment
A security program provides the structure used for the management of information security. It also offers information on the risks and threats regarding the targeted environment. If anything happens, leading to a security breach, then the security program is responsible for the provision of crucial information regarding the protection of the cloud (Aljabre, 2012). It also offers information regarding the responses to threats, while accounting for the management of events. The considerations in implementing a security program include;
- Evaluation and documentation of the organization’s culture as related to general security
- Evaluation of the current industry and organization requirements in the establishment of best practices for secure infrastructure
- If the company’s competitive advantage bases on trade secrets, the corporate security program specifies the compliance requirements
- If company’s data comprises of export controls it is essential to address to specific compliance methodology for data
- Critical evaluation of each proposed cloud application done to assess its appropriateness. Thereafter, cloud computing safely installed. An evaluation is done to evaluate the workability of the cloud-computing model deploy (Daiva & Zalieckait?, 2012).
Current security models and recommended extensions to protect information stored in cloud environments
There exist three types of security models; public, private and hybrid.
In the private cloud delivery model, there is no sharing of resources with any other company. A single organization owns and operates a private cloud and delivers IT services within a constrained own network perimeter.
In the public cloud-computing model, a billed service provides the IT activities and functions. The services provided on a subscription basis, at a billed on a pay-per-use, or through the internet (Narayanan, 2012).
Hybrid models embrace both public and private cloud computing. Hybrid models help in meeting specific business and technology requirements. In this case, there is the allocation of activities and tasks to traditional IT, external or internal clouds, as appropriate, helping to optimize security and privacy with a minimum investment in fixed IT costs.
While all the three models serve best, there is the need for privatization, where the service providers should make a specific cloud line for every company, more especially in the case of public cloud computing model.
In Conclusion, we could say that cloud computing associated with risks. However, the risks are manageable as it only takes the involvement of the company in making wise decisions. After all, the advantages associated outweigh the limitations. Once the issues of security resolved, the rest of the processes go on smoothly, thereby providing substantial benefits for the company.
References
Aljabre, Abdulaziz. (2012). Cloud Computing for Increased Business Value. International Journal of Business & Social Science. Vol. 3 (1), p234-239. 6p.
Daiva H. & Zalieckait?, Laima. (2012). Cloud Computing Application In Small And Medium-Sized Enterprises. Issues of Business & Law. Vol. 4, p199-130. 12p.
Narayanan, Vineeth.(2012). Harnessing the Cloud: International Law Implications of Cloud-Computing. Chicago Journal of International Law. Vol. 12( 2), p783-809. 27p.
Singh, Karamjit, Kharbanda, Isha, & Kaur, Navdeep. (2012). Security issues occur in Cloud Computing and there Solutions. International Journal on Computer Science & Engineering. May2012, Vol. 4(5), p945-949. 5p.
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee