Management Of Security In Cloud Computing

Read Complete Research Material



Management of Security in Cloud Computing

Abstract

This paper presents a brief background of the cloud computing technology, its employment in various fields, industries and organizations. How cloud started and where it is today, along with the stages it covered it the way to its emergence as a novel, contemporary, and a successful technology will also be discussed in detail. The next section of the paper discusses the various benefits imparted by the cloud technology to various fields and industries due to which it is employed therein. This section is accompanied by the section demonstrating the negative aspects of the cloud technology, most important if which are related to the management of security in cloud computing, which make the technology not so feasible and viable to be adopted by the organizations. The remainder of the paper discusses the essence of the research, that is, the management of security in cloud computing.

Management of Security in Cloud Computing

Introduction

Cloud computing refers to the custom of contracting out some portion of the technology of a company to a common mediator setup. The term cloud computing is novel however the notion is not new. Comparable contributions in history have been familiarized with the term “Application server provider”. The cloud in the term cloud computing generally denotes the internet and the entirety of the term comes to pass form this correspondence.

Cloud computing may be described as the active and dynamic stipulation of the potentials of information technology such as services form the mediators allied to the network, hardware and software. As stated by McKinsey, Clouds are actually the services supported by hardware that offer storage capacity, computation, and network where the administration of hardware is exceedingly meditative from the user; buyers acquire costs of communications and infrastructures being variables driving the expenses; and the capability of infrastructure is tremendously resilient.

There are very robust ties between cloud computing and the omnipresent computing, wherein there is an availability of numerous resources for employment through the internet. It is deep rooted in the systems of search and reclamation which evolved in the 1990s. Such systems of search and reclamation were initially founded on the concept of cluster computing however they ultimately wandered to the concept of grid computing which is geographically dispersed (Winkler, 2011).

In cutting down the potential issues of security to the minimum and also to following the issues of governance that face the cloud technology, a prerequisite control measure is adopted for ensuring that a tangible service level agreement SLA for cloud computing is implemented and maintained while managing the specialized cloud vendors and the outsourced providers of cloud computing. Because of the demand and nature of the emerging cloud technologies, there is a specific degree of inexperience while managing the security issues in cloud computing. the clients of cloud computing are currently required to trust the mediating cloud security providers on several matters, specifically on the accessibility of the data security and the cloud service. For this reason, the service level agreement serves as a critical part of the ...
Related Ads