Cloud Computing Assignment

Requirement

Write a report on Cloud Computing.

Solution

Abstract 

Cloud computing changes the way information technology are managed, accelerated innovation, promising improved cost efficiencies, ability to scale applications on demand, and faster time-to-market. In this paper, we discuss the security issues and challenges of Cloud Computing. Based on these issues and challenges we found that the management should implement appropriate mechanisms for controlling the effects of cloud computing issues. Proposed technologies can be the best solution for management to prevent their impacts. We also illustrated applications of proposed technologies which help in selecting the best technology for resolving a specific problem. The shape of cloud computing is developing and emerging rapidly, both in reality and conceptually. Therefore, cloud computing research has attracted the interest of different authors in recent years. In this study, we have discussed the three different research papers of cloud computing written by different authors. This will allow us in highlighting the recent era of cloud computing for cloud research and development.

Allassignmenthelp.com is the internet's best and fastest instant assignment help service. We have information technology assignment helpers who specialize in topics and provide the students with high-quality assignment writings. Our website allows you to Buy college term papers within your budget and get the best grades in academics.

Security and privacy issue in cloud computing

Cloud Computing has provided various benefit to different activities related to public and private organizations. But the adoption of cloud computing world wide is still far away. Due to emerging technologies that have been developed in the recent years, the use of could as a platform has been possible. Some of the benefits of cloud computing include quick market time, reduction in the implementation costs, etc. However, there are some issues which exist with the security and privacy aspects of Cloud Computing, namely: 

  • Loss of control over data: There is probability of compromising of data by the cloud computing provider as the data are stored with outside Cloud Computing provider (Puthal, 2015). Furthermore, with cloud computing, there is a complete lack of transparency of the data processing.

  • Dependence on the Cloud Computing provider: One of the major concerns regarding the dependence on Cloud Computing provider is the availability of service. The data of the customer will be affected in case the cloud computing providers are going bankrupt, thereby hampering the continuity of the business. Additionally, it is seen that few of the Cloud Computing services which are used widely like GoogleDocs are not seen to have any contract between the Cloud Computing provider and the customers. Therefore, in the case of any problem, the customer will not be able to refer to anyone.

  • Security Issues: It plays an important role in cloud computing. SaaS stands for Software as a Service. In SaaS, the client needs to depend on the supplier for establishing safety efforts. The supplier must do the work to keep numerous clients from seeing one another's information. So, it is very difficult for the client to guarantee right efforts towards security establishment.

These issues are capable of leading to various legal as well as security concerns that are related to risk management, infrastructure, access control, auditing and logging, regulatory and legislative compliance, auditing and logging, etc.

Challenges and Problems

According to Kui Ren, Cong Wang, and Qian Wang (2012), cloud computing represents most interesting computing paradigm shift in today's information technology. Privacy and security are known as the primary obstacles to cloud computing adoption. These authors reflected on some critical security challenges which should be considered by everyone during the implementation of cloud computing system. These challenges are following:

  1. Data Service Outsourcing Security:
    As the enterprises and individuals produce data in high quantity that must be utilized and stored (photo albums, personal health records, financial transaction, emails, financial transactions, tax document, and so on), they are encouraged to outsource their effective data management system to the cloud owing to its cost-efficiency and higher flexibility (Ren, 2012). If the data is not managed efficiently, it produces risks in front of the management. These risks may be related to the integration and confidentiality of the system. The efficiency of data can be managed through data encryption before outsourcing. Encryption of data helps the management to combat unsolicited access.

  2. Computation Outsourcing Security:
    Another important challenge faced within the cloud computing paradigm is computation outsourcing. From workloads of outsourcing to the cloud computing, client’s computational power is no longer restricted by their resource-constrained instruments. Current computation outsourcing work in plaintext that is, it discloses both computation and data outcomes to the commercial public cloud. All these can be the largest big security threat. It is because computation outsourcing contains sensitive information, such as personally identifiable health information, proprietor research data, or financial records of a business organization. For preventing this issue, the management should build a mechanism which should be practically feasible as per complexity of computational outsourcing. 

  3. Access Control
    In most of the application scenarios, like those in organizations or enterprises, the user's access to data is usually highly differentiated and selective. All users appreciate different access privileges regarding the usage of data. Outsourcing of data is not suggested to the clients because it could not enforce efficient, reliable, and secure data access. It is necessary for system experts to build a secure data computing network. However, to control the dissemination of privacy-sensitive data, the user's should formulate a trusted server to store data efficiently and then control the server to analyze it's functioning.

Current Technology for Cloud Computing

Current technology refers to the type of computer resources offered to different consumers. Deepak Puthal, Sambit Mishra and Satybrata Swain (2015), states that there is five main type of cloud technologies offered to different clients in the form of  platform (PaaS), infrastructure (IaaS), human (HuaaS), software (SaaS), and everything (XaaS). Use of these technologies is increasing day by day.

  • Infrastructure-as-a-Service (IaaS): A security analyst provides a virtual infrastructure where computing resourcing includes storage, processing units, and the network could be provisioned in order to establish a safe environment for a software system. A customer has full flexibility to control and manage a software stack, deployed ranging from a middleware, operating system, and applications. Some examples of usage of IaaS are Eucalyptus, Amazon Elastic Compute Cloud, OpenNebula, and OpenStack.

  • Platform-as-a-Service (PaaS): PaaS build the capability of customers to deploy and develop applications based on programming languages and different tools reinforced by providers. This hosted platform is considered as a configurable and depends on a provided set of APIs (Carlin, 2012). Some examples of PaaS are Google App Engine, Rackspace, Force.com, and Windows Azure Platform.

  • Software-as-a-Service (SaaS): SaaS builds the capability of users to utilize the applications which run on cloud infrastructure. All these applications are accessible to customers through formulating standard interfaces like an email client or web browser. SaaS provides customers the experience of getting work done through different software applications and data from anywhere in particular time by utilizing various equipment's and device (Phaphoom, 2013). Some examples of widely used SaaS are customer relationship management, accounting, enterprise resource planning, and content management.

  • Human-as-a-Service (HuaaS): HuaaS basically depends on information aggregation methods and prediction from massive-scale data or draw necessary information. The services utilize all necessary information provided by different cyber communities like Digg, whose motive is to be the first source of news regarding any topic. A concept of Crowdservicing and Crowdsourcing, which enables a group of people to resolve critical problems or provide creative ideas, belong to this technology. Some examples of Crowdsourcing are human-based computation and community-based design.

  • Everything-as-a-Service: A computing paradigm is changing toward a XaaS concept in which most things can be acquired as a service. Aforementioned service and cloud computing models are in support of XaaS (Othman, 2014). It implies technologies of dynamic environments which allow clients full control over the computing environment to best fit their different demands by integrating varieties of cloud-based services. One example of fairly well-known cloud services is Open Crowd taxonomy which is known as a collection of different cloud computing services.

Application of Technologies

  1. Application of SaaS
    SaaS is a fast growing technology of conducting efficient cloud computing. Its applications are following:
    It is mostly utilized during “Vanilla offerings” where the solution of problems is highly undifferentiated. One example of Vanilla offering would contain email where most of the time customers use the same software for a specific purpose.
    It is mostly utilized where there is an important interplay between the outside world and the organization.
    It is utilized for specific areas where there is a significant demand for mobile access and the web.

  2. Application of PaaS
    It is especially utilized in some specific situations where numerous developers will be working on an expansion project or where the other external clients want to interact with the expansion process. Finally, it is useful where developers want deployment services and automates testing. Agile software development plays a vital role in the growth of PaaS applications (Erl, 2013). It is also used in following areas:
    Creation of web-based interface which is utilized for modifying, creating and testing different UI scenarios.
    Establishment of integration between databases and web services through building common standards.

  3. Application of IaaS
    IaaS is utilized in various areas. Applications of IaaS have been enhanced as per the growth of information technology system. Its applications are following:
    It is mostly used in those areas where demand is volatile- changes occur in demand on the infrastructure frequently.
    For newly developed organizations without the capital to devote in hardware.
    Where the organizations are growing speedily and scaling hardware would be difficult.
    Where the organizations are feeling under pressure to move to operating expenditure and limit capital expenditure (Jadeja, 2012).
    For particular line of business organizations, temporary and trial infrastructure need.

Conclusion and Recommendation

After studying the different security issues and challenges of cloud computing, it can be concluded that management of any organization should take efficient initiatives to minimize the impact of security issues. Risk management and legal compliance issues should be well defined in the contract between customer and cloud computing provider and should formulate transparency with regard to the storage of data and its processing. Management of an organization should protect the communication line between the customer and cloud computing provider to ensure integrity, confidentiality, and denial-of-service attacks.

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order

References

  • Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015, January). Cloud computing features, issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015 International Conference on (pp. 116-123). IEEE.

  • Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1), 69.

  • Phaphoom, N., Wang, X., & Abrahamsson, P. (2013). Foundations and technological landscape of cloud computing. ISRN Software Engineering,2013.

  • Carlin, S., & Curran, K. (2012). Cloud computing technologies. International Journal of Cloud Computing and Services Science, 1(2), 59.

  • Othman, M., Madani, S. A., & Khan, S. U. (2014). A survey of mobile cloud computing application models. IEEE Communications Surveys & Tutorials,16(1), 393-413.

  • Erl, T., Puttini, R., & Mahmood, Z. (2013). Cloud computing: concepts, technology, & architecture. Pearson Education.

  • Jadeja, Y., & Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 877-880). IEEE.

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order