Verified Document

Cloud Computing Assessing The Risks Of Cloud Essay

Cloud Computing Assessing the Risks of Cloud Computing

Despite the many economic advantages of cloud computing, there are just as many risks, both at the information technologies (IT) and strategic level for any enterprise looking to integrate them into their operations. The intent of this analysis is to evaluate three of the top risks of cloud computing and provide prescriptive analysis and insight into how best to manage each. Despite widespread skepticism of cloud computing with many Chief Information Officers (CIOs) and senior executives, its value continues to re-define the enterprise software industry with projections of between 17% to 22% growth through 2015, becoming a $15B segment of the software industry (Blumenthal, 2011). The three top risks of cloud computing include data security and access, data segregation, and regulatory auditing and compliance (Blumenthal, 2011). As many cloud computing platforms are on open source-based operating systems including Linux, security is exacerbated by the reliance on low-cost, often highly egalitarian-designed platforms (Aslam, Ullah, Ansari, 2010).

Analysis of Cloud Computing Risks

The three top risks of data security and access, data segregation and regulatory auditing and compliance of a cloud computing partner taken together form the majority of risks enterprises face when moving to a cloud computing platform. Data security and access refers to the entire spectrum of security, from the physical access to the servers, stability from harm or destruction as a result of environmental factors including earthquakes and severe weather, and the physical security of the server room sand locations. Even more important is the software-based security that must begin at the infrastructure layer of cloud computing platforms, often called the Platform-as-a-Service (PaaS) functions of the overall cloud computing model (Vaquero, Rodero-merino, Moran, 2011). The PaaS component of...

This type of security can be achieved by a very thorough analysis of inbound and outbound ports of servers, the definition of authentication keys and pervasive use of firewalls and other deterrents to unauthorized access (Rodero-Merino, Vaquero, Caron, Muresan, Desprez, 2012). Data security and access must also be managed to the role level of any organization to be effective (Walters, 2010). This translates into the need for managing each and every account that has access to the cloud-based systems and resources on a role-based profile that delineates which items they have access to or not (Walters, 2010). Data security and access strategies must be also enterprise-wide, ensuring systems integrated to the cloud architecture are also protected from a systems- and role-based access to ensure the highest level of security possible. All of these considerations are often defined in an enterprise security management plan or strategy (Walters, 2010).
The second significant risk is data segregation, or the lack of data orthogonality in the inherent structure of cloud computing platforms. Many CIOs and senior management teams are very concerned about this risk, given the early failures of the Amazon Web Services (AWS) architecture to support true multitenancy and lock down specific memory and disk locations to protect one accounts' data from another (Rodero-Merino, Vaquero, Caron, Muresan, Desprez, 2012). Amazon Web Services customers at one point were able to see each others' data, even though they were assured their individual accounts had multitenancy included. Amazon promptly redesigned their entire Web Services architecture to make sure that level of security error would never happen again (Newcombe, 2009). Just the exposure of other account data across the Amazon Web Services complex however made many CIOs and senior…

Sources used in this document:
References

Aslam, U., Ullah, I., & Ansari, S. (2010). Open source private cloud computing. Interdisciplinary Journal of Contemporary Research in Business, 2(7), 399-407.

Blumenthal, M.S. (2011). Is security lost in the clouds? (*). Communications & Strategies, (81), 69-86.

Newcombe, L. (2009). Enabling confidence in the cloud. Computer Weekly, (00104787), 10-10.

Nicolaou, C.A., Nicolaou, A.I., & Nicolaou, G.D. (2012). Auditing in the cloud:
Cite this Document:
Copy Bibliography Citation

Related Documents

Cloud Computing
Words: 804 Length: 2 Document Type: Case Study

Cloud computing is defined by Cearly and Phifer in their case study titled "Case Studies in Cloud Computing" as "a style of computing in which scalable and elastic it-related capabilities are provided ' as a service' to customers using Internet technologies." Cloud computing services had been provided by major vendors such as Google, Amazon, Microsoft, IBM, Hewlett-Packard, and others for business computing until recently when Apple Corporation announced iCloud for

Cloud Computing Will Be Discussed to Show
Words: 9986 Length: 26 Document Type: Research Proposal

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.

Cloud Database Service on User
Words: 3860 Length: 15 Document Type: Research Proposal

This research proposal looks to determine how the selection of a given cloud platform impacts user intention, satisfaction and long-term adoption. In order to evaluate the contributions of each of these platforms, each is briefly reviewed within the context of this literature review. First, the most commonly used one in start-up cloud database service providers, Amazon Web Services (AWS), is analyzed. AWS is comprised of the following components: Amazon DynamoDB

Risk Assessment Program
Words: 3310 Length: 13 Document Type: Term Paper

Risk Assessment Program Over the last several years, many small and medium sized businesses have been turning to cloud computing as a way of storing, retrieving and accessing vital information. This is when a third party provider will offer firms with these services at a fraction of the cost of traditional IT departments. Moreover, there is unlimited storage capacity and firms can readily protect themselves against vulnerabilities at a particular site.

Cloud Computing and the Insider
Words: 1595 Length: 5 Document Type: Literature Review

There is a difference in the approach to this challenge considering the two platforms, and the fact that they may be based on different configurations. Therefore, it is essential that proper techniques are instituted counter this. Evidently, insider threats are a menace in the cloud computing environment, just as is the case in a normal organizational set up. Most of the threats posed by such individuals are detrimental to the

Cloud Computing and Data Security
Words: 5196 Length: 18 Document Type: Term Paper

It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now