research paper

User Generated


Computer Science

University of the Cumberlands


Question of the Project : Paper should consist of the any Business Disaster description and recovery plan which cover all the above tables of content. (prefer IT related company) minimum 13 pages

Power Point Presentation: Based on the paper create the power point presentation as well.

Table of Contents


Description of the Problem..

Main Research Objective.

General Research Objective.

Specific Objective.

Literature Review..

Research Methodology.

Research Design.

Study Population.

Study Sample.

Data Collection.



Conclusion & Recommendations


User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer



Cloud Computing and Security Implications
Institutional Affiliation


Cloud Computing and Security Implications
Cloud computing is the innovation that has been envisaged as the future generation model in
computation. In the environment related to cloud computing, the resources and applications are
supplied on demand through the internet as services. Cloud encompasses a surrounding of software and
hardware assets in the data warehouses that offers different services through the internet or network to
gratify the needs of the users. Cloud computing may be termed as the latest computing model that
provide services on request at the optimum cost, the three famous and commonly utilized cloud models
are infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). In
SaaS, there is the use of software with correlated information. The service giver does this in the cloud.
This enables different users to utilize it via different web browsers. In PaaS, the provider of the services
allows the user to access various services with a complex of software platforms that can execute
particular tasks. In IaaS, the provider of cloud services enables users to access services with virtual
gadgets and storage to augment the enterprise capacity (Mosher, 2011). Cloud computing is frequently
associated with grid computing. Nevertheless, they are two different concepts. Grid computing
amalgamates various resources collectively and governs the resources by the use of integrated
operating systems to offer augmented performing computing services, whereas cloud computing
amalgamates the storage and computing resources managed by various operating systems to provide
services like augmented performance computing and large-scale data storage to the customers. The
general image of grid computing has been altered by cloud computing. Data distribution is the latest
method of cloud computing paralleling with grid computing. Cloud computing will allow services to be
expended simply upon request. The tool has elements such as transference of peril, universal network
access, usage-based outlay, rapid elasticity in resources, pooling of resources based on location, onrequest self-services. These elements of cloud computing have triggered significant interest from both
the academic and industrial worlds of research. The innovation used in cloud computing is presently
changing the manner in which companies do business globally.
Cloud computing is significantly encouraging for Information Technology purposes. Nevertheless, there
are still issues to be addressed for individual users as well as businesses to stow their information and
install applications in the environment related to cloud computing. The primary obstacles of adopting
this innovation are the security issue, which comes with problems encompassing legal, trust,
confidentiality, and acquiescence matters. The purpose of institutional evolution and institutions is akin
to security and privacy in cloud computing (Agarwal and Agarwal, 2011). Data security has continuously
been a primary challenge in cloud computing. It becomes individually significant in the cloud computing
setting since data are distributed in various storage devices and infrastructures which entail computers,
servers and mobile gadgets like smartphones and wireless sensor networks. In cloud computing, the
issue of data security is more complicated than in a conventional information system. In order for cloud
computing to be embraced by businesses and users, the security issues must be corrected first, to make
cloud setting a stable environment (Ogigau-Neamtiu, 2012). The secured surrounding is the underlying
precondition to winning poise of users to espouse such innovation risks. Therefore, this research paper
aims at discussing different aspects of cloud computing and the safety inferences.

Literature Review
The latest model of cloud computing offers complicated advantages and benefits over the past
computing models and may companies are migrating, customizing and embracing it (Mircea, 2012). In
the last few decades, cloud computing has changed from being assuring logic; corporate is virtualization
idea to one of the quickest developing sections of the IT sector. Today, downturn organizations are
progressively noting that basically by striking into the clod and achieve fast accessibility to best-of-breed
enterprise applications or radically enhance their substructure resources, all at a reduced cost.
Nevertheless, there are still several problems, issues, and insinuations highlighted, which are presently
solved by business intelligence experts, scholars, and researchers.
Classification of Data Security Issues
Data security is a prevalent issue in all types of technologies. Nevertheless, it has turned out to be a
primary problem when used to an unrestrained setting like cloud computing. It is significant to
differentiate between the security issues related to the IT substructures and those depicted by the
utilization of cloud computing (Agarwal and Agarwal, 2011). These perils are basically related to shared,
distributed and open environments. Thus, when assessing perils, it is significant to isolate existing issues
form those depicted by cloud computing. It is apparent that outsourced data from the cloud is more
susceptible than that stored on conventional infrastructures because of three main reasons. Firstly, the
data stowed on the substructures which belong to service providers. Secondly, data of various users of
enterprises use the same fundamental substructure. Lastly, this information can be accessed through
the internet. The data security issues can, therefore, be grouped as data security attributes, Cloud Data
lifecycle, and Single Cloud Characteristics.
Security Issues in Cloud
Cloud computing is accompanied by many prospects and problems instantaneously. Among the
challenges, security is termed as the most significant obstacle form cloud computing on its way to
accomplishment. The safety issues for this tool are somehow vast and vibrant. Data site is an essential
aspect of cloud computing safety. Site plainness is among the protuberant elasticities for cloud
computing, that is a safety risk all together-without the knowledge of the particular site of data stowage,
the proviso of information security Act in some areas might be harshly impacted and sullied. The
personal data of the clod users is, therefore, a significant issue in a cloud computing setting. With regard
to enterprise data safety, the planned guidelines of cloud service givers are of the enormous importance
as the practical security alone is not sufficient to manage the issue (Atayero & Feyisetan, 2011).
Confidence is another issue that depicts security alarms to the utilization of cloud services for the
rationale that it is candidly linked to the authenticity and credibility of cloud services suppliers.
Confidence creation might turn out to be the keynote to inaugurate a fruitful cloud computing setting.
The proviso of the confidence framework is a shared concern area for every shareholder for any
provided cloud computing set-up. Reliance in the cloud may be reliant on several aspects amongst
which some are policies, processes, social factors, automation management. Confidence in the cloud is
not a practical security problem, but it's the most critical element. It is propelled by confidence
challenges intrinsic in cloud computing to a significant degree.
All types of strikes that are relevant to PC network as well as the information are applicable to cloudBaes services- some risks in this group are Man-in-the-Middle attack, sniffing, snooping, phishing and

alike strikes. The DDoS attack is the leading strike for cloud computing substructures. The commonly
identified DDoS strike is a probable challenge for cloud computing, even if not with any exclusion of
having no choice manage this. The security of cybernetic machines will outline the level and integrity of
the protection of cloud settings to a higher degree (Carlin, 2011). Authentication and accounting and
utilizing encryption fall within the exercise of safe computing-they can be reasonably contemplated as a
component of security issues for cloud computing. Nevertheless, it is significant to differentiate
between security and risk issues in this regard. Therefore, in the cloud computing setting, the security
issue is ever some kind of risks, but any peril cannot be dimly mediated to be a security issue. Allotment
of errands among the parties included in cloud computing substructure might lead to experiencing
discrepancy, which might ultimately lead to a condition with security susceptibilities.
As cloud computing typically means utilizing public networks and consequently putting the conveying
data imperilled to the world, a cyberattack in any kind is predicted for cloud computing. The prevailing
current cloud-based services have been associated with susceptibilities problems with the presence of
probable security dodges that could be abused by an attacker. Privacy and security both are issues in
cloud computing because of the makeup of such computing method (Abbadi, and Martin, 2011). The
method through which cloud computing is accomplished has made it disposed to both data security as
well as network security problems. Third-party correlation might come up as a peril for the cloud
environment together with other security risks intrinsic in substructure and virtual structure aspects.
Factors l...

Nice! Really impressed with the quality.

Similar Content
Related Tags