ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Cloud Computing in Universities: Case Study Analysis

Verified

Added on  2023/06/03

|33
|9514
|186
AI Summary
This case study analysis reflects on the topic of cloud computing in the organization. The organizations chosen for this paper are the University of Notre Dame and the CQ University. The paper discusses regarding the cloud computing practices used by both the organizations, including interviews with the CEOs about their practices, advantages, and issues faced. The main problems identified include security issues, cost issues, data privacy, and service provider reliability.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: CLOUD COMPUTING
CLOUD COMPUTING
Name of the Student
Name of the University
Author’s Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CLOUD COMPUTING
IT Manager Interviews for the University of Notre Dame and CQ University
Abstract
This case study analysis reflects on the topic of cloud computing in the organization. The
organizations chosen for this paper are the University of Notre Dame and the CQ University
(Blanton 2016).The paper discusses regarding the cloud computing practices used by both the
organizations. The CEO of both the businesses has been interviewed about the practices followed
by them in order to maintain proper functioning of the organization (Blanton 2016). They have
also been interviewed about the ways by which they have migrated their traditional business
practices in cloud and advantages obtained by them (Tommaso, Floden and Chatzou 2017). They
were also asked about the issues faced by them due to cloud computing and the ways by which
they tackle their issues. The purpose of the company is to serve their customers in an
uninterrupted manner with the help of the advantages provided by cloud computing (Gide and
Sandu 2015). The main problems identified in the usage of cloud computing include the security
issues, the issue faced due to the cost incurred in migrating the business in cloud computing, data
privacy and service provider reliability (Tommaso, Floden and Chatzou 2017). These issues are
one of the major problems faced by organizations in implementing cloud computing in their
businesses (Judson, McGrath and Peuchen 2017). The opportunities in case of these
organizations are that they must have taken numerous measures in order to keep their data
secured.
Document Page
2CLOUD COMPUTING
Table of Contents
Introduction......................................................................................................................................3
Organization background.................................................................................................................3
Notre Dame University:...............................................................................................................3
Central Queensland University....................................................................................................5
Issues studied...................................................................................................................................6
Issue 1- Security issue.................................................................................................................7
Literature analysis....................................................................................................................7
Issue 2- Cost issues......................................................................................................................9
Literature analysis..................................................................................................................10
Opportunities.................................................................................................................................18
Opportunity 1- Creation of a strong user account with a strong password...............................18
Literature analysis..................................................................................................................18
Opportunity 2- Prevent sharing of personal data.......................................................................19
Literature analysis..................................................................................................................19
Opportunity 3- data access should not be provided to everyone...............................................20
Literature analysis..................................................................................................................20
Opportunity 4- Updated system.................................................................................................21
Literature analysis..................................................................................................................21
References......................................................................................................................................25
Document Page
3CLOUD COMPUTING
Introduction
Cloud computing can be defined as the delivery of various computing services, storages,
servers, networking, database, analytics, software, intelligence and many more with the help of
internet (Judson, McGrath and Peuchen 2017). Cloud computing offers faster innovation,
economies of scale and avails flexible resources. The organizations pay for the number of
services utilized by them. This helps in reducing the operating costs incurred in the process
(Malawski, Juve and Deelman 2015). This also helps the organizations to run their infrastructure
even more effectively as well as scale it according to the changes required by the This paper is
about the usage of cloud computing in organizations
Organization background
In this part of the paper, the background of the selected university will be discussed. The
first selected organization is the Notre Dame University and the second organization is the
Central Queensland University.
Notre Dame University:
The first selected organization is the Notre Dame University which is an educational institute
based in the United States (Malawski, Juve and Deelman 2015). This institute founded in the
year of the 1842 and it was established by Father Edward Sorin. The head campus of the
university is located in the states of Indiana near the South Bend city in the United States
(Tommaso, Floden and Chatzou 2017). To gather more information about the selected

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4CLOUD COMPUTING
university, in this case, the president of the university is interviewed who is the John I. Jenkins.
John I. Jenkins selected as a president of the university on April 30, 2004, by the Notre Dame
Board of Trustees (Dingler and Bui 2018). The IT department of the Notre Dame University is
huge. Various types of services are given by the University of the Notre Dame. This IT related
services include accounts and identity, technologies for audio and the video, file storage
technology, digital media, networking solutions, management of university website and campus
portal, smart class technology, security, enterprise content management and many more (Dingler
and Bui 2018). In the following section the URL of the organization will be provided, and with
that, the name and the title of the interviewed person will be shared.
URL of the University: https://www.nd.edu/
Name of the Person who is interviewed in this case: John Ignatius Jenkins
(Figure 1: Homepage of the Notre Dame University)
(Source: https://www.nd.edu/)
Document Page
5CLOUD COMPUTING
Central Queensland University
The Central Queensland University established in the year 1967 (Zhang, Zheng and Wang
2017). This is also like the Notre Dame University which is an educational institute. This Central
Queensland University is based on the Queensland, Australia. This university is a dual sector
university of Australia (Zhang, Zheng and Wang 2017).The main headquarters or the campus is
located in the Norman Gardens in the Rockhampton. With the main campus in the Rockhampton
city, the other campuses of the Central Queensland University are available at the Adelaide,
Melbourne, Sydney, Gladstone and in many more other cities of Australia (Schonberger,
Radenovic and Chum 2015). In this case of the Central Queensland University to gather more
information about the university the vice-chancellor of the university is interviewed who is the
Scott Bowman (Tommaso, Floden and Chatzou 2017). The location of the Scott Bowman is
currently now in Australia. The IT department size of the university is huge (Wei and Blake
2016). This IT department is used for providing technical solutions to the whole activity of the
teaching, learning and research. The IT technology of the university is combined with the
professional expertise to support the growing application of knowledge (Cong, Zhou and Wei
2018). Also, the university uses the IT services to continuously review and benchmark the
performance of them to improve the planning, service delivery and customer engagement. In the
following section, the website of the selected institute will be shared, and the name and the title
of the interviewed person will be shared (Juve and Da Silva 2015).
URL of the University: https://www.cqu.edu.au/
Name of the person interviewed: Scott Bowman
Document Page
6CLOUD COMPUTING
(Figure 2: Homepage of the Central Queensland University)
(Source: https://www.cqu.edu.au/)
Issues studied
Utilization of cloud computing in organizations has been very common nowadays (Balis,
Figiela and Jopek 2017). Along with numerous advantages, cloud computing also provides
various disadvantages which can prove dangerous for the organizations. The issues studied in
this paper are security issues, the issues regarding costs, issues of data privacy and issues of
service provider reliability (Nahar, Kumar and Prasad 2016).
Security issues refer to the issues faced in securing the data that has been saved in the
cloud (Wen, Chakareski and Frossard 2017). These issues are considered as major because they
can prove to be dangerous for the organizations. If the data is not secured well, they might get in
the hands of hackers or people who can misuse the data (Wibowo and Deng 2016). The issue

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7CLOUD COMPUTING
regarding costs can be referred to as the cost that is invested in implementing cloud computing or
to migrate the business in cloud computing platform (Wibowo, Grandhi and Wells 2016).
Though migrating to cloud proves to be cost effective but the overall process has numerous
hidden costs that are very expensive. Some hidden costs include perennial costs, not being
flexible enough, migration cost and many more (Wen, Chakareski and Frossard 2017). Data
privacy issues are the ones faced for securing the data. Confidential or sensitive data should be
saved in a private place in order to keep it safe from unauthorized users (Tommaso, Floden and
Chatzou 2017). The data regarding operations and personal details of staffs are very confidential;
they should be saved in a private place. Service provider reliability is one of the major concerns
of organizations (Malawski, Juve and Deelman 2015). Organizations must carry out proper
research on the service providers before hiring cloud computing services. The reliability of cloud
service providers is an important factor which can help the organization to keep their data safe
(McGrath, Short and Ennis 2016). Every service provider ensures that they would keep the
organizational data safer that the organization itself, but if there is any loss in the data, the
organization will suffer the most as a result before hiring cloud services from any provider, an
organization should assure that the provider has a good history regarding its services provided to
other organizations (Fox, Ishakian and Muthusamy 2017). The issues are described below in
details along with their individual literature analysis and the issues faced by both the
organizations.
Issue 1- Security issue
Literature analysis
From the issue that has been discussed in this part of the paper, it can be said that the
security issue faced by these organizations that uses cloud computing as a vital part of their
Document Page
8CLOUD COMPUTING
business (Sanabria, Benedetto and Neyem 2018). Cloud computing allows access to the
resources of data storage and computing which can be used in order to meet the unique
requirements of the clients (Blanton 2016). The increasing need of computing, as well as storage
accounts in order to maintain steady growth, has led the matter of security in a serious mode Di
(Tommaso, Floden and Chatzou 2017). The data saved in the cloud might be at risk because
hackers would look for single mistake or loophole in the system in order to steal the data and use
it for ill purposes.
Organization 1
The University of Notre Dame has implemented cloud computing for numerous
reasons. This implementation has helped them in various operations, but there have been some
problems faced by the organization due to security issues in cloud computing (Wang, Lee and
Chen 2015). This university has helped students and researchers to create their own login
account and get access to the resources available for their academic purposes (Tommaso, Floden
and Chatzou 2017). The organization faces this issue because there are more than 2,000 students
and staffs, all of them have their own accounts along with their personal details saved in it (Meng
and Thain 2015). These details whether professional or personal are saved in the cloud. There are
high chances that they might get stolen by hackers with bad intentions.
Organization 2
CQ University has also enjoyed the services of cloud computing, but the security issue in
this environment has been a barrier to the success of the organization (Ahmad and Ranka 2016).
According to a survey it has been found that more than 70% of students and staffs said that they
do not intend to use cloud computing in order to save their data because of the security issues
Document Page
9CLOUD COMPUTING
(Alwabel, Walters and Wills 2015). One more reason for users to not use cloud computing is the
increasing number of security breaches that had occurred in previous years (Aguiar, Zhang and
Blanton 2014). The issues like protection of data from hackers, preventing data loss while
transferring data, ensuring that the data is accessible to the members have prevented people to
agree on using cloud computing (Sempolinski, Thain and Kareem 2015).
Comparative analysis
In the first organization, the members have been using cloud computing services for
decreasing the workloads and saving their data (Ghouila, Siwo and Entfellner 2018). They do not
need to use any storage devices in order to keep their data regarding all the operations and
students as well as staffs safe. They have utilized these services by undertaking some measures
for the better security of the data (Kołodziej, Pop and Dobre 2018). They have a backup plan for
their data so that in case the information in the cloud is affected. The organization would not
suffer. In the second organization, they did implement cloud computing, but the members do not
agree with relying on its services (Nwanganga, Saebi and Madey 2017). This is because of the
privacy and security issues to the data saved in the cloud. The first organization has been more
confident in using cloud computing than CQ University. The University of Notre Dame has
utilized cloud computing to save their academic data as well as data related to the details of
students and staff and many more reasons (Peng 2018). Cloud computing has actually been
useful for the organization and helped them in maintaining the quality of services provided to the
students. It also decreases their workloads because they do not need to concentrate on securing
their data and can make strategies to make the organization grow more (Rathod, Rathod and
Sheregar 2016).

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10CLOUD COMPUTING
Issue 2- Cost issues
Every organization irrespective of small or big owns a huge amount of data. This requires
a large number of storage devices, and it makes the organizations spend a lot in it (Gesing,
Wilkins-Diehr and Barker 2015). The migration of the entire system, as well as its infrastructure
to a cloud environment, save the overall cost incurred in storage devices (Spjuth, Capuccini and
Carone 2018). Though storing data in the cloud environment saves the overall cost but the initial
process requires a lump sum amount of cost to be invested (Cui, Thompson and Taniguchi
2016). Migration of the business from its traditional environment to a cloud environment is quite
a tough task which gives a cost-effective outcome. Growing or struggling organizations might
have to face difficulty in migrating their business to the cloud environment because the initial
cost of the implementation would be more than expected (Tommaso, Floden and Chatzou 2017).
This is because; the process has numerous hidden costs such as charges for installing the process,
software requirements for it and many more.
Literature analysis
According to various researches, it has been found that there are several fields where an
organization has to invest in the process of installing cloud computing services (Tommaso,
Floden and Chatzou 2017).But moving to the cloud can also mean added costs, some of which
are unexpected, according to IT executives whose organizations have implemented or are
considering cloud services.
Organization 1
The first organization has invested enough on the processes that are required for
installing cloud computing services; they have invested in this because they have planned to save
Document Page
11CLOUD COMPUTING
the overall cost (Tommaso, Floden and Chatzou 2017). This has resulted in them to cost much
more than expected and it created an issue for the organization (Tommaso, Floden and Chatzou
2017). They had to incur cost in various processes like moving as well as storing data.
Organization 2
The organization did spend the initial costs required to implement cloud computing
services (Tommaso, Floden and Chatzou 2017). They did not succeed in this because most of the
users did not agree with using the services due to the fear of security and privacy issues. The
organization had to implement cloud computing services in order to save their data in a secured
place but investing a lump sum of money just to secure data is not worth it (Tommaso, Floden
and Chatzou 2017). As a result, the organization faced an issue due to this.
Comparative analysis
In case of both the organizations, the first organization investigated in cloud computing
services and was successful because students as well as staffs used the services to its fullest but
still the organization felt that the money invested in the process was more than it was needed
(Tommaso, Floden and Chatzou 2017). The second organization also spent a lot of money on
implementing cloud computing, but they did not find it worth it because they could use it only
for saving a part of their data.
Issue 3- Data Privacy
Literature analysis
The entire business management setup will process the data which ought to be present in
the database of the association, and this will assist in the better projection of the statistics
Document Page
12CLOUD COMPUTING
organization (Ali, Khan and Vasilakos 2015). This makes the information that is existing in the
database of the project will be achieved with the assistance of the poaching of statistics that are
kept in the database of the organization (Tommaso, Floden and Chatzou 2017). The openness of
the database will guarantee the fact that the management of the data access can be accessed by
anyone (Avram 2014). This is the leading cause that the updating of the processing system is
necessary. This indicates the terminology that the information that is deposited in the database
will not be performed with the efficient propagation of the data management (Bettig 2018). This
ensures that the projection of the statistics that are deposited in the database of the Central
Queensland University. After the prognosis of the information that are stored induces the fact
that the data will stay protected, and the imposters cannot harm the projection of data and this is
the foremost prospect of the data organization and this is the main reason that the projection of
the statistics commencement of the data management is processed in a positive way (Bettig
2018).
Organization 1
The main issue that is existing in the processing of the university regarding the statistics
organization will include the fact that the data management of the processing of the data
administration of the whole University of Notre Dame is not very high (Chen 2015). This is
because the entire website that is present includes the fact that it is not concerned with the
storage of data (Dan, International project management 2015). This incurs the fact that the
statistics administration of the university is not achieved with maximum robustness. This ensures
the datum that it gets easy for the frauds to gain access to the data case of the organization and
fetch data from the dispensation of the data centre (Draho 2016). The datum that the data will be
stored in the database is not of much use for the hackers. It gets less activation in the processing

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
13CLOUD COMPUTING
of the data center, and this is the central processing of the data prosecution. This ensures the
terminology that the interest of imposters on the statistics that are present in the database is low,
and this provides the terminology that the figures managing of the complete business processing
get easier (Etro 2015). The accessing system of the database is set as public this is the main
reason that the projection of the data management will lead to improved transcription of the
information administration system
Organization 2
In case of the Central Queensland University, the main probation that is present is that the
figures that are extant in the database of the organization is not public in nature and the records
that are kept in the database are protected from the outsiders (He, Yan and Da Xu 2014). The
data that are stored in the database of the Central Queensland University includes information
that is private in nature (Laukkanen 2015). Personal details of the employees are also stored in
the database of the Central Queensland University. This is what makes the database of Central
Queensland University feel the urgency of proper protection from the imposters (Lee and Lee
2015). In case the imposters want to gain data they can crack the code of conduct of the Central
Queensland University (Lian, Yen and Wang 2014). This is the primary purpose that the
projection of the business viability can be proclaimed with the assistance of the records
prosecution, and this is the solitary motive that the processing of the data administration can be
achieved with the aid of the different techniques that are contemporary in the curse of hacking of
the database system (Madakam, Ramaswamy and Tripathi 2015). The data about the meting out
of the data management in terms of the prosecution of the projection of the entire website of the
orga1nization is stated in this case the prediction of the figures supervision is affected as the
propagation of the data is terminated in terms of the screening of the data packaging (Oliveira,
Document Page
14CLOUD COMPUTING
Thomas and Espadanal 2014). The statistics that are deposited in the database of the organization
are affected negatively. The screening of the data that are present in the database includes the
processing of the data that are present in the database (Porterfield 2015). The primary technique
that is implemented in the processing of the database includes the updating of the, and this is the
objective in the projection of the data management is not very robust in nature.
Comparative analysis
From the above report, it can be stated that the prognostication of the documents that are
existent in the database of the Notre Dame University is single of the main motive that projects
the statistics organization (Raisch 2016). The fact that the platform that is used by the Notre
Dame University can be processed in general terms. In case the projection of the terminology
insists the fact that the data considering of the commenced database that will be performed with
the help of the procurement of the analysis that has been performed with the help of the gathered
information (Rittinghouse J.W. and Ransome 2016). This ensures that the functioning of the data
security is not very high and these lefts to the detail that the figures that are existing in the
database of the organization can be functioned with the help of the database which will affect the
data management of the data transaction (Sen 2014). The imposters can easily get the data that
are present in the database. In case the terminology that is selected in the projection of the data
(Sookhak, Gani and Khan 2017). In case of the Central Queensland University, information that
is saved in the database is protected .This is the only reason that affects the functioning during
the projection of the saving of the statistics in the database. In case the data that are stored in the
database of the Central Queensland University is targeted, the data will ensure the fact that the
processing of the data management can be personified with the help of data management (Wu,
Garg and Buyya 2015). This is the main motive behind the proper storage of the organization
Document Page
15CLOUD COMPUTING
will be prosecuted with utmost efficiency am this leads to the fact that the data stays e protected
and this helps in understanding the projection of the data that are in process. For getting the data
that are stored in the platform of the database, the main prosecution that is to be performed is that
the imposters need to crack the security wall of the database (Martin-Flatin 2014). This ensures
the terminology that accessing the data that are important for the commencing business in an
efficient will not be an easy way out. After the completion of the data analysis, business
processing can be achieved with the help of the data projection that ensures that the data that are
present in the database stayed safe and secured (Zhang, Yao and Guan 2017). After completion
of the entire analysis, it can be stated that the imposters cannot use the data that are present in the
database. This is the reason that the data protection will be performed with the highest integrity
and the security of the data that are present in the database can be accomplished with ease
(Rittinghouse and Ransom 2016). In case the terminology that is used in the process of data
storage is maintained with the highest security, and this is the primary process by which the data
security is achieved.
Issue 4- Service provider reliability
Literature analysis
The main fact that the data will get modulated will lose the destination address, and the
data will not reach to its destination, and this affects the processing of the data procurement in a
negative way (Chinneck, Litoiu and Woodside 2014). The main aspiring fact that is taken in the
projection of the data correlation will lead to transcription of data management system, and this
will create problems for the users as the data that are to be transacted gets unsuccessful and the
users of the data-centric organization will be affected the most (Elster, Tzovaras and Petcu

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
16CLOUD COMPUTING
2016). This is the reason that the functioning of the Amazon web services for the University of
Notre Dame is very important. This includes the terminology regarding the processing of data in
the functioning of the business organization includes that no data will reach to the clients
(Martin-Flatin 2014). The Central Queensland University has an additional segment. Keeping a
back up of the data is considered as one of the major reason for the data manipulation of the data
prosecution (Zhang, Yao and Guan 2017). This is one of the most compelling circumstances that
will procure the availability of data despite the processing of the data poaching. Even though the
data that is stored in the database is accessed by the imposter, it can be stated that the Central
Queensland University will have a separate set of data as the management of the data will be
performed with high accuracy
Organization 1
The Notre Dame University uses the platform of the Amazon web services. This includes
the element that the projection of the data controlling can be procured with the benefit of
infrastructure that is created by Amazon (Rittinghouse and Ransome 2016). The brand loyalty of
the Amazon web services has been increasing, and this helps in trusting the data procurement
will be performed with the assistance of the platform of could computing. This helps in
understanding the fact that the projection of the data center will be performed with the highest
efficiency (Schonberger, Radenovic and Chum 2015). In case the terminology that is processed
in the terminology will be performed with the benefit of the obtaining of the data security. In
case the implementation of the Amazon web services, the data that are processed with the help of
the data management can be achieved with the help of the data transaction (Schonberger,
Radenovic and Chum 2015). In case the proposition of the data, that is to be transferred through
this platform ensures that the projection of the data terminology. This is the main reason that the
Document Page
17CLOUD COMPUTING
projection of the data projection can be proclaimed and the transaction of the data will be done
successfully. This will affect the functioning of the University in a better way. This proposed the
fact that better and proficient functioning can be performed with the highest data projection
(Wen, Chakareski and Frossard 2017). This is one of the main reasons that the projection of the
data transfer will be performed with the highest priority. The data that is to be sent by the
University of Notre Dame will be performed with the help of the data prosecution. In case the
data that is being sent by the University of Notre Dame is not well modulated, the main problem
that it will face is that the projection of the data handling cannot be performed with high
efficiency (Wen, Chakareski and Frossard 2017). The imposters can use the processing of the
data that are being sent as the data manipulation. In case the platforms of the data that are being
transacted are accessed by the imposters they can change the data that are being transacted.
Organization 2
The webs service that is used by the Central Queensland University takes into
consideration the terminology of the supervision of data transcription is performed by the
AARNET Cloud store (Wen, Chakareski and Frossard 2017). This acts as a vital reason that the
prognosis of the data management will be achieved with the help of proper modulating
technology. In case the data that is being transferred the information in it is kept protected with
the help of the data modulation (Wen, Chakareski and Frossard 2017). The data that is to be
deposited in the database of the association will embrace the fact that the prediction of the data
scheme of data commencement will be achieved with the utmost effectiveness. In the instance,
the terminology that is present in the projection of data structuring as the data that is sent in the
processing of the modulation technique is hampered and the imposters cannot gain access to the
data.
Document Page
18CLOUD COMPUTING
Comparative analysis
The projection of the data that is to be compiled will take into consideration the data that
are stored in the database of the Central Queensland University. It is having better security and
reliance as the data are provided with proper backup and this information to the instance that the
data that are administered with the prediction of the data will be performed with the highest
vocabulary (Wen, Chakareski and Frossard 2017). In the case of Notre Dame University, proper
security is provided by the platform, but no proper backup system is present in the projection of
the data commencement.
Opportunities
Opportunity 1- Creation of a strong user account with a strong password
Literature analysis
Organizations have numerous members, and every member has their own user login id
and password (Wen, Chakareski and Frossard 2017). This log in id and passwords should be kept
secure and strong. A strong password is a must while creating a good profile.
Organization 1
The first organization has educated people on ways to create a strong password and
maintaining it (Wen, Chakareski and Frossard 2017). The user id might have the name of the
user, but the password must not contain any name, date of births and credentials that are easy to
guess (Wen, Chakareski and Frossard 2017). The students, as well as staffs, follow the rules or
steps that are necessary to create a strong profile. The users are told to update or change their
passwords once in a while.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
19CLOUD COMPUTING
Organization 2
The second organization used cloud computing services and also assured that the users
create their account as well as maintain it regularly (Wen, Chakareski and Frossard 2017). The
users who did not agree in using cloud computing services were practically shown through
examples that a secured profile could be kept safe room unauthorized users and hackers. They
were convinced on the fact that the usage of cloud computing does not always create security or
privacy issues, they can be avoided to a great extent with the help of some effort taken by the
users (Wen, Chakareski and Frossard 2017).
Opportunity 2- Prevent sharing of personal data
Literature analysis
Many times, people share their personal data through online transactions or other ways
like social media (Wen, Chakareski and Frossard 2017). The users should be educated on the fact
that the organizational data such as information regarding operations of the organization, their
strategies and many more are very confidential and should be secured on highest priority (Wen,
Chakareski and Frossard 2017). The users must not share this data with anyone by any means.
Most of the times, users’ share it with someone close or through social media by posting them in
such platform. This might prove to be very dangerous for the organization because unauthorized
users or hackers wait for these situations and attack the website when they get access to some
important data (Wen, Chakareski and Frossard 2017).
Organization 1
The University of Notre Dame have implemented cloud computing services and provided
proper training to students as well as staffs regarding the ways by which they can keep their data
Document Page
20CLOUD COMPUTING
safe and prevent them from getting in the hands of hackers (Sanabria, Benedetto and Neyem
2018). They are educated about the fact that any data regarding the organization or their personal
data should not be shared with anyone through social media or conversation.
Organization 2
CQ University has provided knowledge to the students and staffs regarding the fact that
the data should not be shared with anyone (Sanabria, Benedetto and Neyem 2018). They are
taught various ways by which they can secure their data from getting into unsafe who can use it
for ill purposes.
Opportunity 3- data access should not be provided to everyone
Literature analysis
Data regarding the students and employees should not be allowed access to everyone
(Sanabria, Benedetto and Neyem 2018). The data related to whereabouts if the staffs should not
be accessed by the students because this might cause internal threat where students might use the
data for wrong intentions (Sanabria, Benedetto and Neyem 2018). For example, if a student gets
to know where a professor keeps their test papers, he might have the wrong intention to steal
question paper before the tests and do well without working hard. These sorts of thoughts are
very common among students.
Organization 1
This organization makes sure that students or teachers are not allowed to access each
other’s profile or id (Sanabria, Benedetto and Neyem 2018). The passwords staffs' id is kept
secret, and no one other than the staff members know their passwords. This keeps the data secret
Document Page
21CLOUD COMPUTING
and prevents any wrong plans to be executed. The organization has also created different portals
for students and staffs which leaves no chances for anyone to peek into others’ portal and enter
assumed passwords in order to get access to the data (Sanabria, Benedetto and Neyem 2018).
Organization 2
This organization helps the students as well as staffs to keep their data secured by using a
strong password (Sanabria, Benedetto and Neyem 2018). They provide proper training to staffs
and students individually regarding the ways by which they can prevent their data from getting
accessed by others (Sanabria, Benedetto and Neyem 2018). They are also suggested not to share
their passwords with any other students or staffs.
Opportunity 4- Updated system
Literature analysis
Updating the system is one of the most important parts of securing data in the database
and preventing the hackers or cybercriminals to get access to the data (Tommaso, Floden and
Chatzou 2017). The updating of the operating system improves the security policies of the
system and helps the user to make their profile more secured.
Organization 1
The first organization has trained the students as well as staffs to update their systems as
well as portals regularly (Tommaso, Floden and Chatzou 2017). The updating of systems
provides better security to the system, and when the portal is updated, it provides added features
to the portal along with better security.
Organization 2

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
22CLOUD COMPUTING
The second organization did not work much in updating the system (Tommaso, Floden
and Chatzou 2017). This is because most of the members do not use the services of cloud
computing. They do update the systems used by students as well as staffs (Tommaso, Floden and
Chatzou 2017). They also make changes in the services of cloud computing and help them in
encouraging using cloud computing services.
Conclusion
From the analysis, it can be concluded that as two of the organization has a different
organizational principle, they have different viewpoints towards integrating technology with the
organizational working principle and improving the organizational workflow. While the first
organization wants to integrate the technology to inspire students to deal with technology
integration in work environment, while the other organization wants the students to experience
the technology and improve their knowledge about latest technology. As part of the organization
policy both the organization has considered the cloud computing as it is one of the trending
technology in the IT sector. The organization might have different viewpoints about the
technologies; however, in both of the cases, the primary motivation for considering cloud
computing is to increase the efficiency of the organizational database to store various students'
related data and that too with proper security. Cloud computing helps to scale the database as per
the need the data and also comes with improved security tools like data backup, data retrieval,
data encryption and other advanced security features as well. However, the efficiency of the
service depends on the service provider as well as the pricing.
Document Page
23CLOUD COMPUTING
Although the primary motivation for the choice of cloud computing is the same for both
the organization, due to different work policy both the organization is having different evaluation
about the issues of cloud computing. This is evident in the approach taken by two organizations
for choosing the service. The first organization thinks that in order to ensure that the chosen
service is secure all it needs is to decide proper service provider with appropriate research. It is
true that the service provider is responsible for ensuring that the service offered to the customer
is secure and efficient; it is not the only criteria. Apart from that, the organization itself has some
responsibilities, and this view is supported by the second university as they have their data
backup plan apart from what comes with the service. It is, however, a better approach than to
completely depend on the service provider and expect them to treat the organizational assets with
the highest priority, just like the organization itself would have done. Hence depending
completely on the external service provider for internal data security is not a wise choice if the
security of the data is considered as the most valuable assets for the organization.
Instead of a different view about the data security and service provider reliability, both
the organization is having the same view about the cost factor involved in deploying the internal
data server in the cloud framework. According to the CEO of both the organization, one of the
main reason why the cloud computing increase the cost for the service integration is that have
some additional features that are not described in details in the policy document due to technical
complexity and hence charge for those features always makes the customer feels that those costs
should have been properly described to improve the transparency of the service. However, it can
be concluded that cloud computing increases organizational efficiency instead of the initial cost
for integrating the cloud server with the local data server. However, the investment is of worth as
Document Page
24CLOUD COMPUTING
it improves the organizational efficiency as well as the data security which is of the highest
importance to any organization.
Questionnaires for interview
How do you manage security issues in cloud computing?
Have you ever faced information loss through the cloud?
Before hosting it in cloud what does your organization used?
Has your IT team faced more challenged by adopting organization IT resources.
Is your organization one of those, who are adopting cloud computing slowly?
What are the issues that made your organization to adopt cloud slowly?
What are the Security issues of data storage in the Cloud Computing?
What are the risk and potential threat to Cloud computing?
What is the price of cloud computing?

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
25CLOUD COMPUTING
References
Aguiar, E., Zhang, Y. and Blanton, M., 2014. An overview of issues and recent developments in
cloud computing and storage security. In High Performance Cloud Auditing and Applications
(pp. 3-33). Springer, New York, NY.
Ahmad, I. and Ranka, S. eds., 2016. Handbook of Energy-Aware and Green Computing-Two
Volume Set. CRC Press.
Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and
challenges. Information sciences, 305, pp.357-383.
Alwabel, A., Walters, R.J. and Wills, G., 2015. DesktopCloudSim: simulation of node failures in
the cloud.
Avram, M.G., 2014. Advantages and challenges of adopting cloud computing from an enterprise
perspective. Procedia Technology, 12, pp.529-534.
Balis, B., Figiela, K., Jopek, K., Malawski, M. and Pawlik, M., 2017. Porting HPC applications
to the cloud: A multi-frontal solver case study. Journal of Computational Science, 18, pp.106-
116.
Bettig, R.V., 2018. Cloud computing: The political economy of intellectual property. Routledge.
Blanton, M., 2016. A Comprehensive Toolset for General-Purpose Private Computing and
Outsourcing. University of Notre Dame Du Lac Notre Dame United States
Chen, X., 2015. Decentralized computation offloading game for mobile cloud computing. IEEE
Transactions on Parallel and Distributed Systems, 26(4), pp.974-983.
Document Page
26CLOUD COMPUTING
Chinneck, J., Litoiu, M. and Woodside, M., 2014, March. Real-time multi-cloud management
needs application awareness. In Proceedings of the 5th ACM/SPEC international conference on
Performance engineering (pp. 293-296). ACM.
Cong, P., Li, L., Zhou, J., Wei, T., Chen, M. and Hu, S., 2018. Profit-Driven Dynamic Cloud
Pricing for Multiserver Systems Considering User Perceived Value. IEEE Transactions on
Parallel and Distributed Systems.
Cui, S., Thompson, J.S., Taniguchi, T., Ladid, L., Li, J., Eckford, A. and Wong, V.W., 2016.
Guest Editorial Emerging Technologies. IEEE Journal on Selected Areas in Communications,
34(3), pp.457-459.
Dan, A., International project management, 2015. Method and apparatus for leading effective
project execution for new business.
Di Tommaso, P., Floden, E., Chatzou, M. and Notredame, C., 2017. Using the Nextflow
framework for reproducible in-silico omics analyses across clusters and clouds. PeerJ Preprints,
5, p.e2796v1.
Dingler, A. and Bui, P., 2018. Using workqueue to teach distributed computing. Journal of
Computing Sciences in Colleges, 34(1), pp.192-194.
Dingler, A. and Bui, P., 2018. Using workqueue to teach distributed computing. Journal of
Computing Sciences in Colleges, 34(1), pp.192-194.
Drahos, P., 2016. A philosophy of cloud computing. Routledge.
Elster, A.C., Tzovaras, D., Petcu, D. and Morrison, J.P., 2016. CLOUDLIGHTNING: A
Framework for a Self-organising and Self-managing Heterogeneous Cloud.
Document Page
27CLOUD COMPUTING
Etro, F., 2015. The economics of cloud computing. In Cloud Technology: Concepts,
Methodologies, Tools, and Applications (pp. 2135-2148). IGI Global.
Fox, G.C., Ishakian, V., Muthusamy, V. and Slominski, A., 2017. Status of serverless computing
and function-as-a-service (faas) in industry and research. arXiv preprint arXiv:1708.08028.
Gesing, S., Wilkins-Diehr, N., Barker, M. and Pierantoni, G., 2016. Science Gateway Workshops
2015 Special Issue Conference Publications. Journal of Grid Computing, 14(4), pp.495-498.
Ghouila, A., Siwo, G.H., Entfellner, J.B.D., Panji, S., Button-Simons, K.A., Davis, S.Z.,
Fadlelmola, F.M., Ferdig, M.T., Mulder, N., Bensellak, T. and Ghansah, A., 2018. Hackathons as
a means of accelerating scientific discoveries and knowledge transfer. Genome research, 28(5),
pp.759-765.
Gide, E. and Sandu, R., 2015, October. A Study to Explore the Key Factors Impacting on Cloud
Based Service Adoption in Indian SMEs. In e-Business Engineering (ICEBE), 2015 IEEE 12th
International Conference on (pp. 387-392). IEEE.
He, W., Yan, G. and Da Xu, L., 2014. Developing vehicular data cloud services in the IoT
environment. IEEE Transactions on Industrial Informatics, 10(2), pp.1587-1595.
Judson, B., McGrath, G., Peuchen, E.H., Champion, M.M. and Brenner, P., 2017, June. Cloud
IaaS for Mass Spectrometry and Proteomics: On-Demand Coupling of Cloud Computing to
Experimental Facilities. In Proceedings of the 8th Workshop on Scientific Cloud Computing (pp.
17-24). ACM.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
28CLOUD COMPUTING
Juve, G., Tovar, B., Da Silva, R.F., Król, D., Thain, D., Deelman, E., Allcock, W. and Livny, M.,
2015, September. Practical resource monitoring for robust high throughput computing. In Cluster
Computing (CLUSTER), 2015 IEEE International Conference on (pp. 650-657). IEEE.
Kołodziej, J., Pop, F. and Dobre, C. eds., 2018. Modeling and Simulation in HPC and Cloud
Systems (Vol. 36). Springer.
Laukkanen, T., 2015. The definition and scope of the cloud computing. Industrial Marketing
Management, 42, pp.35-46.
Lee, I. and Lee, K., 2015. The Internet of Things (IoT): Applications, investments, and
challenges for enterprises. Business Horizons, 58(4), pp.431-440.
Lian, J.W., Yen, D.C. and Wang, Y.T., 2014. An exploratory study to understand the critical
factors affecting the decision to adopt cloud computing in Taiwan hospital. International Journal
of Information Management, 34(1), pp.28-36.
Madakam, S., Ramaswamy, R. and Tripathi, S., 2015. Internet of Things (IoT): A literature
review. Journal of Computer and Communications, 3(05), p.164.
Malawski, M., Juve, G., Deelman, E. and Nabrzyski, J., 2015. Algorithms for cost-and deadline-
constrained provisioning for scientific workflow ensembles in IaaS clouds. Future Generation
Computer Systems, 48, pp.1-18.
Martin-Flatin, J.P., 2014. Challenges in Cloud Management. IEEE Cloud Computing, 1(1),
pp.66-70.
Document Page
29CLOUD COMPUTING
McGrath, G., Short, J., Ennis, S., Judson, B. and Brenner, P., 2016, June. Cloud event
programming paradigms: Applications and analysis. In Cloud Computing (CLOUD), 2016 IEEE
9th International Conference on (pp. 400-406). IEEE.
Meng, H. and Thain, D., 2015, June. Umbrella: A portable environment creator for reproducible
computing on clusters, clouds, and grids. In Proceedings of the 8th International Workshop on
Virtualization Technologies in Distributed Computing (pp. 23-30). ACM.
Nahar, J., Kumar, K., Prasad, A., Sharma, N., Khan, A., Singh, S., Shania, S., Kumar, A., Singh,
J. and Imam, T., 2016, December. Potentials of Data Mining and Cloud Computing in the Fish
Poisoning and Relevant Economic Contexts: A Conceptual Review. In Computer Science and
Engineering (APWC on CSE), 2016 3rd Asia-Pacific World Congress on (pp. 250-257). IEEE.
Nwanganga, F., Saebi, M., Madey, G. and Chawla, N., 2017, June. A Minimum-Cost Flow
Model for Workload Optimization on Cloud Infrastructure. In Cloud Computing (CLOUD),
2017 IEEE 10th International Conference on (pp. 480-487). IEEE.
Oliveira, T., Thomas, M. and Espadanal, M., 2014. Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information &
Management, 51(5), pp.497-510.
Peng, G., 2018. The Application of Right of Information Network Dissemination in SaaS Mode
of Cloud Computing.
Porterfield, T.E., 2015.project management: an empirical investigation of cloud computing scope
and success. International Journal of information Management, 40(6), pp.435-455.
Document Page
30CLOUD COMPUTING
Raisch, W., 2016. Towards a sufficiency-driven business model: Experiences and opportunities.
Definition of effective project management for cloud service, 18, pp.41-61.
Rathod, N., Rathod, P., Sheregar, R. and Gourshete, G., 2016. Mobile Based Cloud Data
Retrieval System.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Sanabria, P., Benedetto, J.I., Neyem, A., Navon, J. and Poellabauer, C., 2018, May. Code
offloading solutions for audio processing in mobile healthcare applications: a case study. In
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems
(pp. 117-121). ACM.
Schonberger, J.L., Radenovic, F., Chum, O. and Frahm, J.M., 2015. From single image query to
detailed 3d reconstruction. In Proceedings of the IEEE Conference on Computer Vision and
Pattern Recognition (pp. 5126-5134).
Sempolinski, P., Thain, D., Wei, Z. and Kareem, A., 2015. Adapting collaborative software
development techniques to structural engineering. Computing in Science & Engineering, 17(5),
pp.27-34.
Sen, J., 2014. Security and privacy issues in cloud computing. In Architectures and protocols for
secure information technology infrastructures (pp. 1-45). IGI Global.
Sookhak, M., Gani, A., Khan, M.K. and Buyya, R., 2017. Dynamic remote data auditing for
securing big data storage in cloud computing. Information Sciences, 380, pp.101-116.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
31CLOUD COMPUTING
Spjuth, O., Capuccini, M., Carone, M., Larsson, A., Schaal, W., Novella, J., Di Tommaso, P.,
Notredame, C., Moreno, P., Khoonsari, P.E. and Herman, S., 2018. Approaches for containerized
scientific workflows in cloud environments with applications in life science (No. e27141v1).
PeerJ Preprints.
Wang, W., Lee, C.H., Chen, L., Yu, F.R. and Su, H.J., 2015. Ieee access special section editorial:
Emerging cloud-based wireless communications and networks. IEEE Access, 3, pp.3122-3124.
Wei, Y. and Blake, M.B., 2016. Proactive virtualized resource management for service
workflows in the cloud. Computing, 98(5), pp.523-538.
Wen, Y., Chakareski, J., Frossard, P., Wu, D. and Zeng, W., 2017. Guest Editorial Special Issue
on Visual Computing in the Cloud: Mobile Computing. IEEE Transactions on Circuits and
Systems for Video Technology, 27(1), pp.1-5.
Wibowo, S. and Deng, H., 2016, July. Evaluating the performance of Cloud services: A fuzzy
multicriteria group decision making approach. In Computer, Consumer and Control (IS3C), 2016
International Symposium on (pp. 327-332). IEEE.
Wibowo, S., Grandhi, S., Wells, M. and Balasooriya, P., 2016, August. A multicriteria group
decision making procedure for selecting cloud based ERP system providers. In Natural
Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), 2016 12th International
Conference on (pp. 1071-1076). IEEE.
Wu, L., Garg, S.K. and Buyya, R., 2015, December. Service level agreement (SLA) based SaaS
cloud management system. In Parallel and Distributed Systems (ICPADS), 2015 IEEE 21st
International Conference on (pp. 440-447). IEEE.
Document Page
32CLOUD COMPUTING
Yan, Q. and Yu, F.R., 2015. Distributed denial of service attacks in software-defined networking
with cloud computing. IEEE Communications Magazine, 53(4), pp.52-59.
Zhang, D.Y., Zheng, C., Wang, D., Thain, D., Mu, X., Madey, G. and Huang, C., 2017, June.
Towards scalable and dynamic social sensing using a distributed computing framework. In
Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on (pp.
966-976). IEEE.
Zhang, Y., Yao, J. and Guan, H., 2017. Intelligent cloud resource management with deep
reinforcement learning. IEEE Cloud Computing, 4(6), pp.60-69.
1 out of 33
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]