Ask a question from expert

Ask now

System Analysis 8 System Analysis Name Affiliate Institution Name

11 Pages2890 Words169 Views
   

Added on  2020-03-16

About This Document

System analysis 8 System analysis Name Affiliate Institution Introduction 3 Data Ownership 3 Data Security 4 Data Integrity 4 Data Confidentiality 4 Data Availability 5 Data Privacy 5 Non-Functional Requirements of Cloud Based Solution 5 Functionality 5 Usability 6 Reliability 6 Performance 6 Security 6 Strengths of Cloud based solution 7 Disadvantages of cloud-based solutions 7 SDLC Approaches 8 Predictive Approach 8 Adaptive Approach 8 Conclusion 9 Recommendation 9 References 10 Introduction Cloud computing has been structured to utilize the advantages of economies of scale by using resources that

System Analysis 8 System Analysis Name Affiliate Institution Name

   Added on 2020-03-16

BookmarkShareRelated Documents
Running head: System analysis1System analysisNameAffiliate Institution
System Analysis 8 System Analysis Name Affiliate Institution Name_1
Running head: System analysis2Table of ContentsIntroduction......................................................................................................................................3Data Ownership...............................................................................................................................3Data Security...................................................................................................................................4Data Integrity...............................................................................................................................4Data Confidentiality.....................................................................................................................4Data Availability..........................................................................................................................5Data Privacy.................................................................................................................................5Non-Functional Requirements of Cloud Based Solution................................................................5Functionality................................................................................................................................5Usability.......................................................................................................................................6Reliability.....................................................................................................................................6Performance.................................................................................................................................6Security........................................................................................................................................6Strengths of Cloud based solution...................................................................................................7Disadvantages of cloud-based solutions..........................................................................................7SDLC Approaches...........................................................................................................................8Predictive Approach.....................................................................................................................8Adaptive Approach......................................................................................................................8Conclusion.......................................................................................................................................9Recommendation.............................................................................................................................9References......................................................................................................................................10
System Analysis 8 System Analysis Name Affiliate Institution Name_2
Running head: System analysis3IntroductionCloud computing has been structured to utilize the advantages of economies of scale by usingresources that are shared. This technology has made it possible resource sharing and hasenhanced security and availability. For this case the clients pay for the services that they want.Either to act as their storage, application server or any other service that is provided by the cloudvendor. Cloud based refers to the services such as data, applications, servers, or other resourcesthat are accessed by clients over the internet. Governments, institution, businesses andcompanies have implemented cloud based solution strategies so as to increase their servicedelivery, enhance resource availability, improve data security, enhance functionalities amongother benefits. Data OwnershipData ownership in cloud computing has brought about dilemma around the health sector. It isstill a complex matter and its solution cannot be determined any time soon. The aspect of dataownership is still one of the factors that is discouraging companies and businesses from shiftingto cloud based solutions. Headspace hold a lot of sensitive data and transferring to cloud needsassurance that such data will remain theirs, control by them at all times without any other thirdparty getting hold of these information. Cloud vendor have been working extra hard to resolvethis problem that is with them, but until now there is no absolute answer to it. (Antonopoulos &Gillam, 2017).When Headspace decides to implement cloud based solutions they are basically transferring theirdata to be by a third party individual. The biggest riddle that comes up after this is who actuallyowns the data in the cloud? Generally, the client, for this case Headspace have the thought thatbecause the data originally came from them then it is them who owns it, but also they have toaccept the fact that a third party, for this case cloud vendor have some possession of it. but it isimportant to note that it is the responsibility of the cloud vendor to ensure security of the data atall cost, because that one of the key objective that they have to meet without compromise.(Ruparelia, 2016).
System Analysis 8 System Analysis Name Affiliate Institution Name_3
Running head: System analysis4Making this issue more complicated is the fact that many countries are still using laws that areoutdated regarding data ownership. It is a fact that data ownership laws are catching up with theevolving technology, that is, technology is always advancing while laws remain the same for along period. The essential take away fact is that this issue is addressed by the agreement betweenthe client and the cloud vendor, this is where it all boils down to. Several contracts states andclearly outlines who is the data owner. For instance, Amazon web services have stipulated thatthe client reserves the right of data ownership within its terms and conditions.Data SecurityData security is a very important aspect when it comes to headspace. The Institution holds verysensitive data about their patients and is important that the cloud vendor that they are selectingstipulate clearly what they plan to do about the security of the data. Headspace will need clearinformation on the data security. Data security revolves around data integrity, availability,confidentiality and privacy. (Tilley & Rosenblatt, 2016).Data IntegrityIntegrity of data is a very crucial factor that has to be critically considered. The cloud vendorshould ensure that headspace data is not fabricated, deleted or modified by unauthorized party.This element can be attained by implementing database constraints and transactions which arenormally managed by the database management system. To ensure data integrity any access ortransaction by Headspace should depict the ACID properties of a transaction, that is, Atomicity,consistency, isolation and durability. It is the responsibility of the cloud vendor to ensure thatdata integrity is kept and maintained at all times and no unauthorized party is accessing the dataand information. Implementing different level of data by the different levels of Headspacemanagement ensures control access which is key to data integrity. (Fox & Riemann, 2012).Data ConfidentialityHeadspace is an institution that deals with special people with special needs thus specialinformation that needs high level of confidentiality. To ensure confidentiality of data, the cloudvendor should implement access control and authentication features. Also cloud vendor should
System Analysis 8 System Analysis Name Affiliate Institution Name_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Aspects of Cloud Based Solution
|10
|2418
|130

System Analysis: Commonwealths “My health Record”
|12
|2475
|188

System Analysis & Design | Assignment
|12
|2693
|215

System Design and Analysis Assignment
|11
|2251
|76

Advanced System and Network Security | Assignment
|18
|4395
|360

Security Threats in cloud Computing PDF
|5
|3296
|46