Mitigating Cloud Computing Risks

Running head: CLOUD COMPUTING 1
Mitigating Cloud Computing Risks
Name
Institution
CLOUD COMPUTING 2
Cloud Computing
Cloud computing refers to a framework that allows for on-demand, convenient access to
a set-up of computing resources, including servers, services, networks, applications, and storage,
that can be released or provisioned rapidly without much interaction or management effort by the
service provider. As such, cloud computing involves not only the services that are provided over
the internet in the form of applications, but also the systems software and hardware that deliver
such services in the datacenters (Srinivasan, 2014). However, in as much as cloud computing
provides for increased connectivity in the current global community, there are various risks
associated with public, hybrid, and private clouds that are focused upon in this paper.
Risks associated with cloud computing
While cloud computing has been associated with various advantages, there are some
issues and concerns that ought to be solved prior to the ubiquitous embracement of such
computing. To start with, cloud computing does not provide the user with proper control over the
performance of their applications and data as they may require, or the ability to change or audit
the policies and processes through which they are to work (Jamsa, 2013). The various parts of an
application could be in distinct places within the cloud, an aspect that can adversely affect the
application’s performance. Attaining compliance with the provided regulations as per region
could be highly challenging especially in the case where the cloud involves cross-border
interactions. This is in spite of the increased need for establishment of regulations to ensure the
proper consideration of all cloud computing facets. In addition, maintenance and monitoring is
more difficult than in the case of intranet PCs (Srinivasan, 2014).
Another concern involving cloud computing concerns the increased risk of losing data
due to such data being shut away into proprietary formats (Jamsa, 2013). In the same vein, given
CLOUD COMPUTING 3
that the consumers are not provided with proper tools to monitor the accessibility and usage of
their data, then they are likely to lose control over such data. Thirdly, service-level agreements
(SLAs) may not be easily tailored to the particular business needs. In this case, there is a high
likelihood of inadequate downtime compensation, with concomitant damages being less likely to
be covered by SLAs (Jamsa, 2013).
Fourth, it may not be always possible to leverage cost advantages. In this case,
organizations are more exposed to tax disadvantages as a result of lacking or having little capital
investment (Srinivasan, 2014). Last but not least, the standards are insufficient and immature to
handle the cloud computing technologies that are rapidly evolving and changing. As such, by
placing applications in the cloud, one is not guaranteed of their efficient operation.
Controls to mitigate cloud computing risks
To secure data that is at rest, the best approaches that could be used include cryptographic
encryption mechanisms. Encryption secures the content of data, preventing it from being
wrongfully used by other persons within the cloud as it allows for the use of a coded language
that is not understood by any intermediaries or parties who were not meant to access such
information (Chang, 2015). Another approach that could be used to counter the concerns
involved in cloud computing is authentication. It is mandatory for strong authentication to be
used in any cloud deployment. Such authentication allows for access control. Separation of the
users of the cloud provider is also a highly effective approach that helps in the prevention of
intentional or inadvertent access to information that is deemed sensitive (Chang, 2015). Lastly,
the establishment and implementation of strong practices and policies addressing regulatory and
legal issues is also important in minimizing the risk of data loss and unauthorized data usage.
CLOUD COMPUTING 4
References
Chang, V. (2015). Delivery and Adoption of Cloud Computing Services in Contemporary
Organizations. Hershey, PA: Information Science Reference.
Jamsa, K. (2013). Cloud Computing. Burlington, MA: Jones & Bartlett Learning.
Srinivasan, S. (2014). Cloud Computing Basics. New York: Springer Science + Business Media.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.