Cloud Computing Security

200 views 5 pages ~ 1360 words
Get a Custom Essay Writer Just For You!

Experts in this subject field are ready to write an original essay following your instructions to the dot!

Hire a Writer

In-depth Evaluation of Cloud Security

In this article, the authors present an in-depth evaluation concerning the issues in cloud security. They inspected the challenge from the perspective in cloud architecture; the cloud presented features standpoint, the stakeholder's cloud viewpoint, and the delivery model perspective of the cloud service. Based on the evaluation, the authors present a comprehensive specification regarding the cloud security issue along with basic attributes which need to be covered by any recommended security option. The paper is credible since the authors have vast expertise in the field of IT and it additionally evaluates existing difficulties as well as concerns associated with the cloud computing security concerns. The article will provide a better comprehension of the problem and the ethical implications related to security issues. It will also help the researcher to be aware of the current challenge gaps and dimensions.

Secure User Data in Cloud Computing Using Encryption Algorithms

Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.

This paper examines the challenges, mechanisms and security complications in cloud computing in which the service provider experience in the course of cloud engineering and display the metaphoric analysis of different security algorithms. The authors are well versed in designing alternatives which satisfy various prerequisites such as big scheme performance, stateless validation, and unrestrained utilization of queries and retrievability of information thereby making the paper credible for research. This article will be used in presenting the positive aspects associated with the adoption of cloud computing and discussing the data security issues and its ethical perspective.

Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective

Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.

In this article, the authors examine the aspects which have to be deemed by an organization whenever deciding on utilizing cloud computing from a business's perspective. Most companies are moving towards the adoption of cloud computing as a result of it being the most recent trend within the IT sector. The article is credible since it is one of the many articles published by the authors concerning the field of information technology and it has been reviewed by different researchers as well. The paper assesses the negative and positive aspects of the following elements: incorporation with existing software and infrastructure in IT, expenses, return on investment, efficiencies, and data security. Furthermore, it correlates all these aspects with the size of an organization to be able to determine if or the kind of cloud computing option is appropriate for the requirements. It will be helpful in discussing the pros and cons of cloud computing and the threats involved.

Cloudrise: Exploring Cloud Computing Adoption and Governance within the TOE Framework

Borgman, H. P., Bahli, B., Heier, H., & Schewski, F. (2013). Cloudrise: exploring cloud computing adoption and governance within the TOE framework. In System Sciences (HICSS), 2013 46th Hawaii International Conference on (pp. 4425-4435). IEEE.

The authors of this article have used the framework of the TOE (Technology Organization Environment) to assess the issues affecting the adoption of cloud computing. Furthermore, the paper conceptualizes and presents an understanding of the way the structures and processes in IT governance curb the factors highlighted. The findings reveal that the technological innovation, as well as organization perspective, influence the decisions in the implementation phase. The source is credible since it is peer-reviewed. The study will be used to enhance the comprehension of organizational context aspects fostering or curbing the adoption of cloud computing since the paper sets out to shape the argument concerning the ethical implications and link it to results from existing analysis.

A Framework for Ranking of Cloud Computing Services

Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012-1023.

In this research, the authors recommend a system as well as a mechanism which evaluates the quality and prioritizes the services provided by the cloud. The authors propose that this type of framework makes a considerable impact and generates healthy levels of competition between the providers to gratify their Service Level Agreement (SLA) as well as enhance their quality of services. Furthermore, the paper addresses several critical issues through the design of metrics for every quantifiable quality of service aspect for computing precisely the level of service of every provider. This article is helpful in identifying cloud services provided that may be substandard thus bringing about ethical concerns.

An Exploratory Study to Understand the Critical Factors Affecting the Decision to Adopt Cloud Computing in Taiwan Hospital

Lian, J. W., Yen, D. C., & Wang, Y. T. (2014). An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital. International Journal of Information Management, 34(1), 28-36.

In this article, the authors examine the critical elements that are going to influence the choice of adopting cloud computing in developing nations, particularly in the healthcare sector of Taiwan. The paper primarily combines the framework of TOE (Technology Organization Environment) and HOT fit (Human Organization Technology fit) to be familiar with data security concerns. The findings in the article indicate that considerable disparities are present in data securities, compatibility, CIO innovativeness, top administrator support, suitable resource, as well as the identified business pressure throughout distinct adopting categories. The study is a useful reference for the research since the authors have provided an in-depth analysis and evaluation of the challenges linked to cloud computing.

Cloud Computing: Implementation, Management, and Security

Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.

This book discusses the advancement of cloud computing from a historical point of view, centering mainly on improvements which resulted in the development of the technology. The source is credible since authors have surveyed a number of the critical and ethical factors which are essential in making the paradigm of cloud computing achievable. Furthermore, they additionally present various criteria based on the employment as well as adoption concerns encircling cloud computing and explain the infrastructure administration which is managed by the service providers. The book will be essential in researching the crucial legal as well as philosophical concerns associated with cloud computing.

Security and Privacy in Cloud Computing

Xiao, Z., & Xiao, Y. (2013). Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials, 15(2), 843-859.

In this article, the authors have identified several most representative privacies along with data security features (such as privacy-preservability, ethics, accessibility, liability, and confidentiality). Starting with these qualities, the paper highlights the associations including, the weaknesses that could be taken advantage of by hackers, the risk models, along with current defense approaches within the cloud adoption. The source is credible since it is a peer-reviewed journal and the authors are IT, consultants. Throughout this article, the authors have systematically analyzed the privacy and security concerns in cloud computing influenced by a feature-driven system.

References

Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.

Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.

Borgman, H. P., Bahli, B., Heier, H., & Schewski, F. (2013). Cloudrise: exploring cloud computing adoption and governance within the TOE framework. In System Sciences (HICSS), 2013 46th Hawaii International Conference on (pp. 4425-4435). IEEE.

Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012-1023.

Lian, J. W., Yen, D. C., & Wang, Y. T. (2014). An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital. International Journal of Information Management, 34(1), 28-36.

Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.

Timmermans, J., Stahl, B. C., Ikonen, V., & Bozdag, E. (2010, November). The ethics of cloud computing: A conceptual review. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on (pp. 614-620). IEEE.

September 11, 2023
Subcategory:

Corporations

Subject area:

Computer Cloud Computing

Number of pages

5

Number of words

1360

Downloads:

25

Writer #

Rate:

4.7

Expertise Cloud Computing
Verified writer

Richard is the best writer for Data Science tasks, even if you have something really complex. I needed to do tasks on security matters and already had a draft. Sharing my ideas with Richard ended up in a perfect paper!

Hire Writer

This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Eliminate the stress of Research and Writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro