Thursday, April 18, 2019

CLOUD COMPUTING Essay Example | Topics and Well Written Essays - 1250 words - 1

CLOUD COMPUTING - Essay ExampleHowever, the rationalize of buy gage is the main focus for the motley confuse cipher potential customers and it is also considered the major breastwork to most of its widespread applications (Patrick, 2013). This explore paper go out focus on current research done on grease ones palms security. The main focus of the paper will be to survey the fashionable cloud computing security baby-sits as well as the diverse parameters of cloud security which will involve virtualization, compliance, framework, risk management, dynamic access security, internet access security and access management.IntroductionThe biggest worry facing network computing and distributed systems is security. Cloud computing refers to internet computing and it is the latest concept that has the might to increase an organizations service delivery efficiency. The security models of cloud computing that are cloud six-fold tenancy model of NIST, cloud risk accumulation model of CSA, Jerico forums cloud cube model and the mapping model of cloud, compliance and security are supported by the 3 cloud services models. Resources for cloud computing are scalable and dynamic .The representation of cloud computing is elaborated through three cloud computing service models which are platform as a service (PaaS), Infrastructure as a Service (IaaS) and Software as a Service (SaaS) (Patrick, 2013). The main aim of these cloud computing service models is to be able to provide the IT departments with focus on the various strategic projects as well as cutting down on the operational costs (Ritesh, Anantwar& Swati, 2012). The cloud computing models are considered to have a variety of dimensions that are used to further worsen the security problem. The cloud computing model comprises of two main features which are elasticity and multi-tenancy. Elasticity depends on the nominal head of secure placement strategies andsecures service migration while multi-tenancy feature leave behinds to virtualization and thus the boundaries among different host services take up to be improved. At present the available security strategies are only for the single cloud drug user and single cloud provider but if cloud computing in the future moves to a multiple provider environment security there will be a greater challenge in addressing the issue of security (Patrick, 2013). Users of cloud computing are able to access their database resources from the internet regardless of their location. It is instead clear that the use of cloud services is important and offers a lot of benefits to the user or the endeavor that has adapted the new technology. Cloud computing can thus be regarded as a model that enables convenience on the demand network access to the shared computing resources. As stated by Amarnath et. al.2010 virtualization technology is used to optimize the performance of the application in a cost effective modal value but this technology can introduce som e security risks. Therefore, cloud computing security plays a major role because the customers outsource computation tasks and data on cloud computing servers which are managed by cloud providers who cannot be trusted (Amarnath, 2010). Cloud computing has become popular as a result of many enterprise applications moving to the cloud platforms. However, the issue of security has become a major barrier point for cloud computing adoption. Based on a recent survey research conducted by the International Data Corporation almost 87.5% of the IT executives stated that security is a major challenge that moldiness be dealt with in each cloud service. Therefore, there is need to come up with applications that will be used to curb the threats brought about by security by using some security

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.