You can download the solution Decision Types – Assignment Collaboration With Google Drive for free. For further assistance in Information Technology Assignments please check our offerings in Information Technology assignment solutions. Our subject-matter experts provide online assignment help to Information Technology students from across the world and deliver plagiarism free solution with free Turnitin report with every solution.
(ExpertAssignmentHelp does not recommend anyone to use this sample as their own work.)
Question
Write an essay on Security of cloud computing
Solution
Cloud computing is considered as the cutting-edge design of information technology implemented by organisations. It offers incredible potential to enhance profitability and lessen costs. As opposed to conventional solutions in which IT resources are controlled physically, logically and by human resources, cloud computing transfers the application programming and databases to huge data centres, where the information management may not be completely reliable (Zunnurhain & Vrbsky, 2011). This interesting trait posts numerous new security challenges. According to Gartner Research, cloud computing has “unique attributes that require risk assessment in areas such as data integrity, recovery, and privacy, and an evaluation of legal issues in areas such as e-discovery, regulatory compliance, and auditing” (Brodkin, 2008).The major examples of cloud computing frameworks are Amazon’s EC2 service and Google’s Google App, which are defined “massively scalable IT-enabled capabilities are delivered ‘as a service’ to external customers using Internet technologies” (Brodkin, 2008).
Cloud Computing is currently an emerging framework which serves as a computation instrument and additionally filling in as a capacity framework for assets. Clouds enable clients to reimburse for assets they utilize and allows them to increase or reduce assets required. Cloud servers can be utilized to boost a business and reduce its budgetary constraints related to capital and operational expenses (Deloitte, 2017). Cloud computing provides an expansive structure that is valuable for customers who utilize it entirely or a part of it. The term cloud computing was coined in October 2007 when IBM and Google announced their collaborative effort in the development of web computing application and the subsequent announcement from IBM about its work on the 'Blue Cloud' (Scholfield, 2007).
Security issues arising on cloud networks are both external and internal (Sen, 2013). The external issues are comparable to the issues arising in data centers. Security concerns in cloud computing are equally divided among its users, vendors and the third-party service providers due to the sensitivity of the information and software configurations. The application-level security is the responsibility of the cloud user whereas the service provider is responsible for the physical security of the infrastructure and setting up firewall. Apart from external threats, the cloud is subject to internal security issues. Cloud providers have to protect customers and safeguard data stored from theft and manage denial-of-service attacks by users.
To resolve security issues, clouds have implemented virtualization as a measure to defend and protect against users attacking each other in the cloud infrastructure (Kumar & Vajpayee, 2016). However, due to a limited level of resource virtualization and the existence of bugs in programming, a completely secured solution is highly unlikely to be present. Further, the cloud is to be secured from the provider. The cloud provider has control over the bottom layer of the software component which has the ability to outrun any security techniques. One of the exceptions is the unavoidable data loss. The major reasons for cloud failures arise due to hardware malfunction which is present in the Infrastructure as a Service (IaaS) layer of the cloud, the presence of malware in software applications located in the Software as a Service (SaaS) layer of the cloud, the customer's application with a malicious code, system malfunctioning and third-party attacks on client data storage or applications. Any such failure gives rise to a conflict between the cloud user and provider (Lukan, 2014). Some of the examples of attacks in cloud are wrapping attack, malware-injection attack and flooding attack. These attacks require accountability of the cloud to be checked (Kumar P. , 2016).
For complete solution please download from the link below
(Some parts of the solution has been blurred due to privacy protection policy)