Cloud Computing

Topics: Cloud computing, Service level agreement, Computer Pages: 4 (1194 words) Published: February 21, 2013
Cloud Computing
Name of student
Name of institution

Cloud Computing
Infrastructure security challenges in cloud computing
Introduction
Over the last few years, cloud computing has been evolving leading to many customers utilizing the cloud computing technology. Basically cloud computing is based on delivering varied resources through the internet (also called the cloud) that depends on complex architecture that enables providers to make use of different models and be able to deliver on different services. Although cloud computing features are meant to entice the customers to use its services, however, a cloud security concern has become the pertinent issue to cloud computing. Security concerns emanating from cloud computing have hindered IT experts to move to cloud computing. Network security architecture is the design and planning of the campus network that are aimed at reducing security risks in accordance with the institution’s risk and analysis policies. The traditional network design focused on creating a secure network perimeter and strategically places a firewall at the point where the network is connected to the internet. However, the traditional design is problematic and there is concern about security threats from inside the perimeter that is protected by the firewall. Security architecture is the design artifacts that describe how the security controls are positioned and how they relate to the overall information technology architecture. The controls are meant to serve the system’s quality attributes like accountability, assurances, integrity and availability. There is quite a number of security issues associated with cloud computing: 1) security issues faced by cloud computing providers and 2) those that are faced by the customers. End user security issues include a browser security, security-as-a-service and authentication. Cloud computing and traditional computer security system is faced by several challenges that need to be addressed....

References: Security and high availability in cloud computing environments (June, 2011). IBM Global Technology Services Technical White Paper
Perspectives on cloud computing, n.d.). Cloud Service Models: Comparing SaaS PaaS and IaaS. Retrieved on 16th February, 2013 from http://cloud-computing.learningtree.com/2011/11/09/cloud-service-models-comparing-saas-paas-and-iaas/
Almathami, M. (2012). Service Level Agreement (SLA) Based Risk: Analysis in Cloud Computing Environments
Server Intellect Service Level Agreement (SLA). (n.d.). Server Intellect. Retrieved February 17, 2013, from http://www.serverintellect.com/terms/sla.aspx
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cloud Computing Essay
  • Essay about Cloud Computing
  • cloud computing Essay
  • Virtualization and Cloud Computing World Essay
  • Cloud Computing in the Hospitality Industry Essay
  • What Is Cloud Computing? Essay
  • The Nist Definition of Cloud Computing Essay
  • threats in security of cloud computing Essay

Become a StudyMode Member

Sign Up - It's Free