Can Cloud Computing Be Secure? Essay

2283 words - 10 pages

Table of Contents
Task 1 3
Cloud computing services 3
Cloud computing deployment models 3
Conclusion 4
Task 2 4
Abuse and Nefarious Use of Cloud Computing 4
Insecure Interfaces and APIs 5
Malicious Insiders 5
Shared Technology Vulnerabilities 5
Data Loss/Leakage 5
Task 3 6
Task 4 6
Task 5 7
Bibliography 9
Task 1 9
Task 2 - 3 9
Task 4 9
Task 5 9


Task 1
Cloud computing is an ever-important concept in web development and services. Cloud computing is often referred to as “the cloud”, simply for its non-physical interaction with the user. The idea of the cloud is not new, it is simply computing offered as a service over the Internet. Since the early days of Internet, users rely on the cloud, such as email services like Hotmail.com.
Cloud computing services
Nowadays the cloud has more to offer and businesses innovate many on-demand computing resources for various target groups, from applications to data centres on pay-as-you-use basis. Often small and medium size businesses rely on cloud IT services, as it allows them to focus on their business and save resources on what would need IT expertise and expensive equipment. The services that are offered come in three forms; SaaS (software as a service), PaaS (platform as a service and IaaS (infrastructure as a service). SaaS allows users to run an application on any of their computers anywhere in the world by accessing the application using a web browser. An example of SaaS is hassle.com, an online platform for cleaners and buyers to connect and make bookings. Trendsetters very recently include Parse, Heroku and AWS, which offer services and hardware to companies that simply do not have the means to setup their own infrastructure and need automated tools to bring their products to the market. The cloud services run on a pay-per-use basis and give businesses peace of mind, because cloud service vendors are experts in their field and provide excellent service that could only be replaced by expensive staff.

Cloud computing deployment models
The cloud can be deployed in various forms. Public cloud is a very common deployment model, whereby the vendors owns and operate the cloud service allowing users to use the service without purchasing equipment, software or supporting infrastructure. A single company to provide virtualised resources to all lines of business owns a private cloud; the private cloud is managed by the company and does not rely on a vendor. This allows the company to have more control and ensure security without seeking accountability with a vendor, which may not be trustworthy. Hybrid clouds use the private cloud foundation, but rely on public cloud services as well. A private cloud cannot exist by itself and a company cannot provide all IT resources. Hence, it is believed that hybrid clouds provide the best solution for large companies to take advantage of public cloud services.

Conclusion
Cloud computing is changing business since 2009 and providers are...

Find Another Essay On Can Cloud Computing Be Secure?

Cloud computing software Essay

2192 words - 9 pages report to summarise main points discussed. 2. Introduction "Like or loathe it, cloud computing is already starting to have a significant impact on the personal and corporate it computing landscape. Within a decade it is also likely to be the only computing show in town. None of us can therefore ignore cloud computing. Our only real choice is whether we want to be part of the steamroller or part of the road". (Barnatt, 2010,p.xii) The idea behind

Cloud Computing Essay

1666 words - 7 pages a secure network, a prevalent weakness in network penetration, packet analysis, and SSL configuration can have serious repercussions. Secure networking is an important component of cloud computing because communication from the cloud environment to the client is done through a network connection. Furthermore, location of the infrastructure that houses the cloud and the data is also a concern. Particular countries do not allow data to be moved

Cloud Computing Security

1573 words - 6 pages private data through encryption. Powerful encryption and flexible key management Vormetric offered for Amazon ensures that both structured and unstructured data in Amazon cloud is secure (Vormetric, 2011). As such, clients using Amazon cloud computing can confidently store and search for files and database in the cloud. Establishment and maintenance of physical security at data storage centers is also important to ensure that data stored in the

towards privacy preserving

1073 words - 5 pages Cloud computing is a virtual storage which is used to store the data and information in secure manner. This project which gives a trustworthy to the cloud user from Admin without knowing the infrastructure and its properties of cloud system. Cloud scheduled safety-critical data processing needs are beginning to push back strongly against using cloud computing, users will find that cloud scheduling will be maintained by the user to store

Security in The Cloud

1724 words - 7 pages server that gives people an option to store an extensive amount of data on there server and retreat at any given time through any device that can be connected to the internet. Another important factor to consider when discussing cloud computing is understanding its advantages and disadvantages. One of the biggest advantage when data is stored on the cloud is that it can be accessed on all devices at any given time and the user can edit that data

Security: Cloud Computing

1554 words - 6 pages : 1) Using single cloud service provider. 2) Using multiple cloud service providers. The drawback of single cloud service provider is that it can be easily hacked by any attacker. In multiple cloud service provider model gives better security and availability of user private data. Fig 1: Cloud Computing Architecture Example Data integrity and privacy of the data are the most critical issues in cloud storage. For that reason

The Advantages and Disadvantages of using Cloud computing Service

830 words - 3 pages and 3 Tera.Another type of provider is deployment model of cloud computing, where consumer chooses a unique is based on their specific requirements. There are four primary cloud deployment model private cloud, community cloud, public cloud and hybrid cloud. Private cloud is operated only by one organization, it can also be managed by the organization or third party and externally. Community clouds are shared by many organizations, and support a

Cloud Computing and The Future

1040 words - 4 pages Cloud Computing and The Future Introduction Our future in computing is moving into a whole new direction called Cloud Computing. Many questions and issues have arisen from this new adventure in computing. For us to understand cloud computing we must first learn what it is. Once we have established that knowledge we can then venture out to the advantages and disadvantages, types of models, and finally services in cloud environments. We will

Cloud and Its Effect on Businesses

2619 words - 11 pages Deploying a private cloud model also gives the company more room to customize its services because it is deployed and maintained within the company. A private cloud, although more secure, can be more expensive than a public cloud model. The cost of a private cloud can be determined from the hardware needed to create a pool of resources for the network as well as the maintenance personnel expenses. When housing the computing resources the company

Cloud Computing and Internal Controls

920 words - 4 pages be very costly depending on a company’s IT needs, cloud computing “offers the promise of massive cost savings combined with increased IT agility” (NIST, 2011). According to Vehlow and Golkowsky (2011, 20), as companies transform their IT systems over to a cloud computing system they no longer can use their internal controls to monitor the system. This writer believes this to be true because when comparing companies that utilize cloud computing

Using Data Encryption for Security in Cloud Computing

2098 words - 8 pages will analyze cloud computing and the issues it faces from a security standpoint. The main focus for this paper will be on how data encryption can help safeguard information being stored in the cloud. Data encryption is a key component in security for cloud computing and is often used when secure information is being transmitted. Keywords: cloud, security, data encryption Using Data Encryption for Security in Cloud Computing Today

Similar Essays

What´S Cloud Computing? Essay

840 words - 4 pages system which can saves you time and money. The cloud can accommodate and store more data than a personal computer, in a way offers you almost unlimited storage capacity. Protecting the data and system is important part of business continuity planning. If the worst dose comes to pass your data will be secure on the cloud computing so that it can be recovered quickly. Cloud computing providers offer reliable and flexible backup/recovery solutions

What Is Cloud Computing? Essay

1335 words - 6 pages companies, cloud computing finally became a term used by the public. 3. Comparative Review of Cloud-Based Services at iCloud, Google, and IBM iCloud, Google, and IBM have recently developed cloud-based services for the public. iCloud is a cloud-based service that Apple offers, which allow users of Apple products to save any file onto one of their Apple products. Afterwards, that file can be accessed from any Apple product that they own. iCloud has

Case Study: Razorfish And Cloud Computing

512 words - 2 pages are many methods can be used to improve network performance: 1. Overlay Network: where providers use edge servers and optimization schemas to improve the performance. 2. Managed IP Network Service: where providers give private IP connection. So the connection is direct between the organization and the cloud company provider. 3. FASP (Fast And Secure Protocol): which ranges from a few times to hundreds of times faster than standard TCP

Analysis Of Cloud Computing Security

1549 words - 7 pages clouds to provide Virtual IT solutions. It provides more secure control of applications and information, allows various parties to access information over the internet. Software qualities of Cloud Computing Security: 1. Maintainability: It is the ease with which a product can be maintained in order to change defects or their cause correct defects or their cause to meet new requirements make future maintainability easier, and cope with