DOC PREVIEW
CSUN IS 655 - Cloud computing

This preview shows page 1-2-3-4-5-6 out of 19 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Running head: CHALLENGES IN CLOUD COMPUTING 1Challenges in Cloud Computing Name InstitutionCHALLENGES IN CLOUD COMPUTING 2Challenges in Cloud Computing Abstract Cloud computing is an upcoming solution for personal and business fronts that is seeing wide adoption. It derives computing resources and processing power from thousands or millions of computer devices that are linked up via an Internet connection. In particular, it is a solution to some constraints. For example, with its adoption, a business does not need to invest in new hardware because the backbone of cloud computing phases out the necessity of an infrastructuraloverhaul to meet its functionality. All that is required is a reliable Internet connection and a browser with a partial outsource for hardware and software tools. However, cloud computing hassetbacks as viewed from several facets, one of them being security related. This research paper aims to look into these challenges empirically and formulate a model that hypothesizes the problem with a research-based approach. This method is meant to acknowledge that challenges facing cloud computing are critical and call for a thorough investigation with concrete remedies that ultimately eliminate them. Partly, the approach is motivated by popular belief from scientistsand ordinary users that cloud computing is the ultimate future and will one day revolutionize the entire ICT industry.CHALLENGES IN CLOUD COMPUTING 3IntroductionBackground Cloud computing can be defined as a group of information, communication, and technology services provided to civilians or companies by a third party business entity as a measure to boost productivity. In most cases, third parties own the infrastructural components of cloud services, and those who adopt it gain business mileage in terms of efficiency, flexibility, and scalability, just to mention but a few. Also, users are able to access numerous a multitude of applications and services without upfront investment in new hardware, software, or licenses (Dillon et al., 2010). This definition is complete in the sense that it encompasses primary elements used in cloud computing such as cloud architectures, security, and deployment methodologies. For the past few years, cloud computing, as mentioned above, has been expanding rapidly, a feat that has also necessitated massive improvements in its infrastructure (Turab et al., 2013). It is clear that cloud computing offers affordable, scalable computing services to in-house services from the software and hardware front (Harfoushi et al., 2014). Shifting back to the definition of cloud computing, it can be deduced that this system purposely provides hardware and software as services. In particular, the cloud provides three service layers, namely Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Software as a Service (SaaS) (Harfoushi et al., 2014). While skipping on expecting any compensation in adopting modern technologies, companies and individuals have been keen on taking software over the cloud as a measure to minimize expenditure. Consequently, the adoptionof cloud computing has come along with several challenges, where security, performance, and availability are at the top of the list (Harfoushi et al., 2014).CHALLENGES IN CLOUD COMPUTING 4It is not easy to approve the moving of sensitive data over a network for companies. Clients must be assured of excellent performance, storage, and security in addition to a guaranteethat this data will always be available when needed. For these reasons, some companies have been known to be hesitant to transmit data over a cloud computing network if infrastructure provisions, expenditure, security, and other vital concerns are not tabled upfront (Harfoushi et al.,2014). These setbacks act as a foundation for this research program in cloud computing and help in highlighting other challenges as well, with conclusive discussions that can lead to remedies and conclusions (Harfoushi et al., 2014). Some facets manifest themselves as security risks. These risks must be thoroughly analyzed before a business enterprise embarks on adopting cloud computing solutions (Choo, 2010). First is the concern about unauthorized users access, where private and sensitive companydata can be disclosed because logical, personal, and physical controls are stripped down within an organization’s powers. Secondly, it is hard to comply to set regulations since data is mostly processed outside a company, which makes it difficult to for auditors to file accountability reports. Furthermore, there exists the issue of storage space where clients have no knowledge of the exact location of their data (So, 2011). Privacy compliance is restricted to the service providers only. In addition, data separation has to be done because servers hold different data from several clients, meaning that data is not arranged sequentially (Choo, 2010). Therefore, fool-proof and reliable encryption programs are needed to eliminate issues that may arise from shared servers. Service providers have the mandate to spell out how they can manage disasters or failuresas a step toward data recovery. It is also their duty to investigate malicious activities by intruders, and this is mostly involved because such actions need excellent skills to identify in theCHALLENGES IN CLOUD COMPUTING 5cloud because data and resources are dispersed. In fact, it can be impossible to see some of the most sophisticated intrusions. Lastly, it is inevitable for some cloud service providers to go out ofbusiness because of bankruptcy. Some of them transform into a different business entity, while others are absorbed or acquired by other businesses. Whichever way it takes, a service provider must assure its clients of long-term data availability. Loss of valuable data can, therefore, be avoided in the long-run.Aim and Objectives One of the principal purposes of this research paper is to define primary research issues, as well as articulate current and incoming individual and business-based challenges and routes for cloud computing. To tackle this, the approach to this study adopts an empirical, short, and doable technique to address challenges in cloud computing. First and foremost, an understandingof essential characteristics exhibited by cloud applications must be provided. Secondly, it is equally important to comprehend how cloud computing, service-oriented, computing as well as high-performance or grid


View Full Document

CSUN IS 655 - Cloud computing

Download Cloud computing
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Cloud computing and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Cloud computing 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?