Celita Y. Ingram
Dr. Maurice Dawson
Alabama Agricultural and Mechanical University
June 23, 2012
Cloud Computers contribute to organizations by providing a useful way for businesses to access instant on-demand networks to the Web, but the companies have less regulation over their information and the important data can be compromised. Thesis: It is of critical importance to find an all-inclusive resolution for strict internet security in order to protect data for businesses and in other areas with access to cloud computing. Background Information
Cloud computing is the preferred way for businesses and institutions to fundamentally change the way they manage their computing needs. Cloud computing is an on-demand network for delivering services that use multiple server computers through a digital network to resources, such as networks, servers, applications, storage capacity and services, as if it was one computer. It is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned. This cloud model promotes availability and is composed of five essential characteristics, and four deployment models. The cloud controls a number of activities, such as back-up, providing power instantly, increased storage capacity, a decrease in hardware and software demands, and the ability to obtain data resources whenever needed. Many organizations rely on the cloud computing networks because they can help the organizations prosper. This is associated with potentially improving the way IT delivers systems and applications, providing a better user experience, easier implementation of solutions, faster time to market, and reduced cost of ownership (Deloitte 2012). Every place or person that you interact with on the internet will be connected. The service is always up-to-date with the latest version software, performs automatically and provides new features for the applications along with performance enhancements. The paradigm is that the computing resources and software are available to the end user, whether organization or individual, using a ‘pay as you go’ approach (Hayes 2009). The service is relatively inexpensive and fully managed by the provider. The smartphone applications, research institutions and the video game industry all use cloud computing to store and access massive amounts of data. Individuals with e-mail accounts like Hotmail, Yahoo! Mail, and Gmail, also experience cloud computing by logging in to a Web e-mail account. Ultimately, there is a place in technology for cloud computing that is specifically for the world of business. The consequences to using the cloud computing services with an organization can be detrimental to the organization. The biggest concerns of cloud computing are security and privacy. The privacy concern arises because the system administrators are custodians of a huge quantity of data, and cloud computing magnifies it. When conference organizers have to install the software from scratch, there was still a risk of breach of confidentiality, but the data was just about one conference. Cloud computing solutions allow data to be aggregated across thousands of conferences over decades, presenting tremendous opportunities for abuse if the data gets into the wrong hands. The data could be deliberately or accidentally disclosed, with unwelcome consequences. Many privacy and confidentiality concerns arise because the service provider has access to all the data, and could accidentally or deliberately disclose it or use it for unauthorized purposes (Ryan 2011). For example, Amazon’s Cloud data center crashed during a severe storm bringing down numerous high profile websites hosted on Amazon, including Netflix, Instagram,...