Cloud Computing Security
Research papers on cloud computing security are custom written at Paper Masters and guaranteed to contain the most up to date information on the technology behind cloud computing security. Because we custom write all our papers, your research can be written with today's most relevant information on any computer or internet related topic.
Cloud computing security is an emerging field in computer security, designed to protect data and information within the infrastructure of cloud computing, which involved remotely networked servers. Cloud computing is proving to be a popular form of data storage. Rather than taking up space on a hard drive, photographs, documents, and other data can be stored in the "cloud."
If you are having trouble putting together a structure for your research paper on cloud computing, Paper Masters suggests the following introduction:
Cloud computing is defined by Cearly and Phifer in their case study titled Case Studies in Cloud Computing as a style of computing in which scalable and elastic IT-related capabilities are provided as a service to customers using Internet technologies. Cloud computing services had been provided by major vendors such as Google, Amazon, Microsoft, IBM, Hewlett-Packard, and others for business computing until recently when Apple Corporation announced iCloud for consumers. Therefore, cloud computing is now available for businesses as well as consumers.
Discuss the following in your research paper:
- Examine Amazon Web Services (AWS) in terms of cost reduction, automated software updates, remote access, and on-demand availability.
- Evaluate the scalability, dependability, manageability, and adaptability of Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Services (Amazon S3), and RightScale.
- Examine the security concerns for cloud-based services and make suggestions to cope with these concerns.
- Assess possible scalability, reliability, and cost issues associated with cloud computing, and make suggestions to overcome each of these issues.
- Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
The specific course learning outcomes associated with this assignment are:
- Compare and contrast the strategic and operational use of data management systems.
- Outline the strategic implications of information assurance and security in an information technology environment.
- Use technology and information resources to research issues in information systems and technology.
- Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.
Security Issues With Cloud Storage
However, there are serious security issues involved with cloud storage. In 2014, there were several instances of hackers gaining access to the private cloud storage of several female celebrities, leaking private photographs of these women across the Internet. It is the extensive use of virtualization in the implementation of cloud infrastructure that raises unique security issues. Virtualization is an additional layer that must be managed and secured.
Efficient cloud architecture will recognize that security is a vital concern. Security controls must be put in place in any cloud environment, including:
- Deterrence controls
- Preventative controls
- Detective controls
- Corrective controls
Additionally, cloud providers must provide for liability issues with their customers, including how issues of data loss or compromise will be resolved. While there are specific compliance laws, cloud customers must be responsible for ensuring the companies offering cloud computing provide adequate security.
About Internet Security Technologies
Exploring the specific technologies that are used for security on the user interface, it is evident that the SSL (Secure Sockets Layer) is the most common security feature utilized in the industry. As a standard feature of all Web browsers, SSL represents the most widely used security feature for both the Internet and the World Wide Web.
While SSL is the central method of securing information passed over the Internet, researchers have noted that this protocol is far from perfect. Although the SSL ensures that the information is secure as it is being passed over the network, it does not ensure that the information is secure once it arrives at the Web site. With this in mind, most Web sites incorporate firewalls to detect traffic coming into and out of a specific site. With a firewall in place, the owner of the Web site can ensure that the data is protected once it arrives at the site. As such, while SSL serves as the primary basis for security on the Internet and between sites on the World Wide Web, different security technologies are needed to ensure security on specific Web sites.
Reviewing what has been written about the specific technologies that can be utilized to create a high performance system, it becomes clear that the specific architecture used by the Web browser typically serves as the basis for how fast the overall system will run. Among the most important components in the architecture is the kernel. For instance the kernel-mode HTTP driver (HTTP.sys) that is used in Microsoft's Web browsers serves to keep the TCP/IP connection running even if there are disruptions in the system. As such, the speed of the connection is enhanced through the performance of the Web browser's architecture.
Even though Web browsers can be developed and configured for higher performance, Karagounis notes that there are limitations to the speed that can be achieved. Various problems that occur on the Internet can be overcome with specific protocols; however, when several issues arise concurrently, even the most well designed architecture can falter. For this reason, the development of high performance systems is still a process that is evolving the context of new computer technologies. As the issues of TCP/IP connectivity are further refined, the current Web browser architectures will be better able to improve the overall performance of the system.