VIRTUAL AND CLOUD COMPUTING 3
vulnerability in this technology is that a failure in the hypervisor would mean that all the
associated virtual machines (guests) would be affected. Similarly, if the link to the virtual
machine is broken, data transmission fails. Since all the guests run on the same hardware, the
operating systems in the guests compete for resources such as random access memory and
data packets. In the long run, a poorly maintained hypervisor may lead to delays or total
failure in data storage or retrieval (Li et al., 2013); which may have a disastrous effect
especially in a clinical setting.
Developers have come up with several tools mitigate the vulnerabilities associated
with implementation of virtual and cloud computing. These include antimalware software,
network security tools, device to device connection capabilities and test management tools
(Rodrigues et al., 2013; Sultan, 2014). Antimalware service ensures that malicious software
does not install in the host or guests, which enhances data security and privacy. On the other
hand, network security tools prevent wiretapping and data loss during transmission. With
device to device capabilities, firms can connect directly to their service providers which
improves efficiency. Test management tools are used to continually appraise cloud
computing services. Such an evaluation ensures that the service can perform as required
without compromising the security and privacy expectations.
Realizing the benefits of cloud storage and the associated vulnerabilities, healthcare
facilities must find ways to reap the merits while ensuring that patient data is not put at risk.
In a small medical clinic as Dr. Nelson’s, protecting patient data would involve identifying a
reputable service provider who will offer secure, affordable service while respecting the
small size of the clinic. Besides, the selected SaaS provider must meet international standards
(Li et al., 2013). Further, the clinic must have state-of the-art devices, an efficient anti-
malware service and a reliable connection to facilitate proper operation and data transmission
(Sultan, 2014). Last, all businesses, including small clinics should have a continuity of