Cloud Computing - Security

Read Complete Research Material



Cloud Computing - Security

Introduction1

Statement of the Problem2

Purpose of the Study2

Research Questions3

Hypotheses3

Definition of Key Terms5

Cloud bursting5

Cloud Computing5

Community Cloud5

Computer Forensic6

Contingency Plan6

Data Breach6

Disaster Recovery7

Encryption7

Encryption Key7

Hybrid Cloud7

Infrastructure as a Service (IaaS)8

Load Balancing8

Multi-tenant8

Private Cloud9

Public Cloud9

Platform as a Service (PaaS)9

Software as a Service (SaaS)10

User Authentication10

Theoretical Framework11

Information Security Concerns11

Various implementations of Cloud Computing13

Public Cloud13

Private Cloud13

Hybrid Cloud14

Brief Review of the Literature15

Data security and Privacy Including Ownership of the Protection Mechanisms15

Data Storage Location16

Security17

Financial Benefits of Adopting Cloud Services20

Concepts and Characteristics of Cloud Computing and the Diversity of Cloud Computing Services22

Research Method25

Operational Definition of Variables26

Measurement26

Summary28

References29

Cloud Computing - Security

Introduction

Cloud computing is gaining momentum in the world of business and commerce around the world and soon could find its way in every aspect of Information technology (IT) usage. In simplest terms, cloud computing denotes the storage of data and employment of software applications, which are not a part of the IT infrastructure of a particular organization, but are accessible by means of a browser and internet. A number of firms having numerous offices employ a variety of this notion for communication, data storage, and networking. In the same way, online electronic mail services such as Gmail, or utility and email sites such as iCloud by Apple are considered as the cloud applications. The professed benefit is that the individuals employing the facility of cloud may then avail the data and programs from everywhere, employing any personal computer or practically any mobile device. Also, in many cases, it means that the organization does not need to purchase the software, and at all the times, they have the latest version in hand, and are not even required to pay for the order of using it.

A significant trend in the business is to increase its information technology dependence on cloud computing to receive benefits such as faster provisioning, scalability, and lower capital expenditures (Wang, Rashid, & Chuang, 2011). However, not every information security professional is convinced that cloud computing is a viable option for the technology needs of an organization. Some information security professionals are not in favor of cloud computing; their main concern being security of the data and the cloud infrastructure (Katzan, 2010). Third party companies in off shore locations manage the cloud infrastructure or possibly in the same country as the firm. However, ultimate security and control is with someone else. In the course of the research discussed the aforementioned concerns.

Statement of the Problem

The problem to be addressed in this proposed study is the lack of enterprise adaptation of cloud computing services, even though cloud computing and its services are mature enough and have been available for quite some time in Middle East region especially in State of Kuwait. Many organizations are not willing to move their information technology infrastructure and operations to cloud services due to lack of confidence in the maturity level of IT security and protection mechanisms implemented for cloud services (Ren, Wang, & Wang, 2012).

Purpose of the Study

The purpose of this proposed quantitative study is to determine the specific security issues that deter the Middle East region specifically ...
Related Ads