Cloud Computing Security Risks and Mitigation Strategies
VerifiedAdded on 2019/10/30
|23
|6153
|314
Report
AI Summary
Cloud computing is revolutionizing the finance industry by providing a platform for exchanging data and accessing services remotely. The assignment content highlights various security challenges and issues in cloud computing, including key challenges such as risk assessment, security threats, and solutions. It also covers topics like virtualization, heterogeneity in mobile cloud computing, elastic business process management, and fog computing. The summary aims to provide a concise overview of the assignment content.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: MIGRATION OF BUSINESS APPLICATION TO Cloud COMPUTING
Migration of Business Application to Cloud Computing
Name of the Student
Name of the University
Author Note
Migration of Business Application to Cloud Computing
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Executive Summary
In this new digital world cloud computing has been a buzzword in technology circles.
Cloud computing has been gradually being adopted by the Australian Finance industries but it is
yet not mature enough to be implemented within each firm. A very large majority of the finance
industries has been still dependent on the in-house IT infrastructure for the storage and transfer
of data related to the business.
Finance sector supervisory and the institutions are now well aware of the benefits that the
cloud computing implementation can offer and lead towards better technical and finance
benefits. Bothe the deployment models, Private Cloud and Public Cloud could be helpful in
achieving these benefits. There are uncountable benefits of the implementation of Cloud
Computing within the Finance industries but these could lead to several issues that could affect
the proper functioning and business of the organization. For mitigating and eliminating the issues
that raised in this implementation a better and effective risk assessment management is
necessary.
This report focuses on the cloud adoption and related legal policies that should be
undertaken while implementing Cloud Computing in the Australian Finance Industries. This
report can be helpful in depicting the issues that may occur due this implementation and related
challenges. However, these issues have some pre and later measures that could lead towards
secure information security for the data and information. A risk assessment matrix has been also
proposed in this report to show the severity of the threats, issues, and vulnerabilities into the data
security. This could be helpful in prioritizing the risks and take decisions based on that in manner
to improve the decision-making by heads of the Aztec.
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Executive Summary
In this new digital world cloud computing has been a buzzword in technology circles.
Cloud computing has been gradually being adopted by the Australian Finance industries but it is
yet not mature enough to be implemented within each firm. A very large majority of the finance
industries has been still dependent on the in-house IT infrastructure for the storage and transfer
of data related to the business.
Finance sector supervisory and the institutions are now well aware of the benefits that the
cloud computing implementation can offer and lead towards better technical and finance
benefits. Bothe the deployment models, Private Cloud and Public Cloud could be helpful in
achieving these benefits. There are uncountable benefits of the implementation of Cloud
Computing within the Finance industries but these could lead to several issues that could affect
the proper functioning and business of the organization. For mitigating and eliminating the issues
that raised in this implementation a better and effective risk assessment management is
necessary.
This report focuses on the cloud adoption and related legal policies that should be
undertaken while implementing Cloud Computing in the Australian Finance Industries. This
report can be helpful in depicting the issues that may occur due this implementation and related
challenges. However, these issues have some pre and later measures that could lead towards
secure information security for the data and information. A risk assessment matrix has been also
proposed in this report to show the severity of the threats, issues, and vulnerabilities into the data
security. This could be helpful in prioritizing the risks and take decisions based on that in manner
to improve the decision-making by heads of the Aztec.
2
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Table of Contents
Introduction......................................................................................................................................3
Cloud Computing.........................................................................................................................3
Cloud adoption in Australian Finance Sectors................................................................................3
Current state and approach to Cloud computing.........................................................................3
Cloud adoption Example (Finance Industries)............................................................................4
Challenges........................................................................................................................................5
Security Issues.................................................................................................................................6
Risk Assessment..............................................................................................................................9
Threats, Assets, Vulnerabilities, and Risks.................................................................................9
Risk Assessment Matrix............................................................................................................17
Measures to Mitigate Security Issues............................................................................................18
Conclusion.....................................................................................................................................19
References:....................................................................................................................................19
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Table of Contents
Introduction......................................................................................................................................3
Cloud Computing.........................................................................................................................3
Cloud adoption in Australian Finance Sectors................................................................................3
Current state and approach to Cloud computing.........................................................................3
Cloud adoption Example (Finance Industries)............................................................................4
Challenges........................................................................................................................................5
Security Issues.................................................................................................................................6
Risk Assessment..............................................................................................................................9
Threats, Assets, Vulnerabilities, and Risks.................................................................................9
Risk Assessment Matrix............................................................................................................17
Measures to Mitigate Security Issues............................................................................................18
Conclusion.....................................................................................................................................19
References:....................................................................................................................................19
3
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Introduction
In this new world of technology, Cloud computing has been offering solution for the
problems those have been taxed IT departments for years and plagued the organizations.
Managing and Maintaining IT in-house has been resulting in heavy burden for the organizations
that have been implementing IT infrastructure for the smaller and big organizations. This has
been also resulting in beneficial manner for the SMEs (Small and Medium Sized Enterprises) in
both managing and securing those data properly and in efficient budget. Cloud computing is
availing the consumers with data access at anywhere via connecting to the internet and managing
them to keep safe while transferring to its stakeholders for operational activities. One side this is
providing facilities and security at low budget but also raising creation security issues that might
affect the organization.
Cloud computing performs on basically three platforms that are: IaaS (Information-as-a-
service), PaaS (Platform-as-a-service), SaaS (Sofytware-as-a-Service) that are enhancing the
performance of the Cloud computing services. These are being delivered through deployment of
following models: Community Cloud, Public Cloud and private cloud.
Cloud Adoption in Australian Finance Sectors
Current State and Approach to Cloud computing
Australian finance industry is in its very early stage of Cloud adoption as many of the
financial industries are using a limited range of Cloud based services. The approach of using
Cloud based services has not been strategically placed and for some of the cases the consumers
would not be aware of the services that could be provided by the Cloud computing. Based on the
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Introduction
In this new world of technology, Cloud computing has been offering solution for the
problems those have been taxed IT departments for years and plagued the organizations.
Managing and Maintaining IT in-house has been resulting in heavy burden for the organizations
that have been implementing IT infrastructure for the smaller and big organizations. This has
been also resulting in beneficial manner for the SMEs (Small and Medium Sized Enterprises) in
both managing and securing those data properly and in efficient budget. Cloud computing is
availing the consumers with data access at anywhere via connecting to the internet and managing
them to keep safe while transferring to its stakeholders for operational activities. One side this is
providing facilities and security at low budget but also raising creation security issues that might
affect the organization.
Cloud computing performs on basically three platforms that are: IaaS (Information-as-a-
service), PaaS (Platform-as-a-service), SaaS (Sofytware-as-a-Service) that are enhancing the
performance of the Cloud computing services. These are being delivered through deployment of
following models: Community Cloud, Public Cloud and private cloud.
Cloud Adoption in Australian Finance Sectors
Current State and Approach to Cloud computing
Australian finance industry is in its very early stage of Cloud adoption as many of the
financial industries are using a limited range of Cloud based services. The approach of using
Cloud based services has not been strategically placed and for some of the cases the consumers
would not be aware of the services that could be provided by the Cloud computing. Based on the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
survey made by (Chang, Walters & Wills, 2014) almost 88% of the financial industries are using
cloud-based services and implementation of Cloud computing is rapid manner and among them
81% of the industries were aware with the services offered by Cloud computing.
The survey resulted that about 50% of the Australian Finance industries are using hybrid
of Private Cloud and Public Cloud as this is a common approach for financial industries. Other
than this 42% of the industries are practicing in-house IT and moving non-critical services like
collaboration, content management tools, and email management to the Cloud based services
(Schulte et al., 2015). Some of the financial industries are using Cloud services as a testing
environment in manner to plead the development of use cases that could be better option for
assessing the hybrid of Public Cloud and on premises, in-house hosting of the Cloud services. It
is also being used by the financial industries as test beds for new and innovative applications and
among all the industries only 8% of the industries are using strict Private Cloud only policy.
Main objectives are compliance and privacy concerns including the confidence that the Private
Cloud can satisfy the business requirements of the organization (Gai, 2014). The strength that are
using Cloud based services among them 92% of the industries have an already developed
strategy that is based on hybrid of Private and Public Cloud hosted both in-house and externally
IT services. Based on this it can be stated that the confidence among the financial industries have
been increasing towards adopting Cloud Computing services within the system of the
organization. On the other hand it can be noted a certain level of prudency on the context of
migration towards Cloud computing. Some of the consumers are avoiding migration of data to
the Cloud and instead of that they are choosing it to use for the digital transformation of the
business.
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
survey made by (Chang, Walters & Wills, 2014) almost 88% of the financial industries are using
cloud-based services and implementation of Cloud computing is rapid manner and among them
81% of the industries were aware with the services offered by Cloud computing.
The survey resulted that about 50% of the Australian Finance industries are using hybrid
of Private Cloud and Public Cloud as this is a common approach for financial industries. Other
than this 42% of the industries are practicing in-house IT and moving non-critical services like
collaboration, content management tools, and email management to the Cloud based services
(Schulte et al., 2015). Some of the financial industries are using Cloud services as a testing
environment in manner to plead the development of use cases that could be better option for
assessing the hybrid of Public Cloud and on premises, in-house hosting of the Cloud services. It
is also being used by the financial industries as test beds for new and innovative applications and
among all the industries only 8% of the industries are using strict Private Cloud only policy.
Main objectives are compliance and privacy concerns including the confidence that the Private
Cloud can satisfy the business requirements of the organization (Gai, 2014). The strength that are
using Cloud based services among them 92% of the industries have an already developed
strategy that is based on hybrid of Private and Public Cloud hosted both in-house and externally
IT services. Based on this it can be stated that the confidence among the financial industries have
been increasing towards adopting Cloud Computing services within the system of the
organization. On the other hand it can be noted a certain level of prudency on the context of
migration towards Cloud computing. Some of the consumers are avoiding migration of data to
the Cloud and instead of that they are choosing it to use for the digital transformation of the
business.
5
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Cloud adoption Example (Finance Industries)
NASDAQ OMX Data on-demand: It is a Software-as-a-service (SaaS) Cloud service that
provides flexible and easy access to the massive amounts of historical dataand is produced in the
market with the support of Xignite. It can be accessed through API (Application programming
interface) and is a web application that can be helpful in managing users to purchase data online.
It can also be used as plain texts (Mahmood et al., 2014).
CME Clearport OTC Data on-demand: It is an on-demand Software-as-a-services (SaaS)
web service that has the same Xignite platform and can be helpful in offering accesses to end-of-
day OTC volume, open interest, and settlement data in manner to provide support to the markets
that are available through CME Clearport® (Pattnaik, Prusty & Dash, 2016).
Australian Banks using Cloud for risk analysis and non-core processes: There has been
use of IBM iDataPlex servers in various banks of Australia as a part of an Infrastructure-as-a-
service (IaaS) strategy in manner to evaluate and build programs related to risk analysis. More
than one separate computer can be turned into a pool of shared resource that can be referred as
cloud.PaaS Cloud vendor Force.com has been being used by Morgan Stanley for its recruiting
applications that is providing many benefits in extensive Cloud penetration in strategy and
analytics (Asatiani et al., 2014).
Gridglo real-time energy apps: The startup, Gridglo, is developing SaaS services for their
startup in manner to sell information to utilities in Australia. It can be described as a mining
energy consumption data from smart meters and thereafter the combination of these data with
data from other sources like data related to demographic and weather, real estate, energy credit
scoring and demand response analytics in manner to categorize different types of consumers for
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Cloud adoption Example (Finance Industries)
NASDAQ OMX Data on-demand: It is a Software-as-a-service (SaaS) Cloud service that
provides flexible and easy access to the massive amounts of historical dataand is produced in the
market with the support of Xignite. It can be accessed through API (Application programming
interface) and is a web application that can be helpful in managing users to purchase data online.
It can also be used as plain texts (Mahmood et al., 2014).
CME Clearport OTC Data on-demand: It is an on-demand Software-as-a-services (SaaS)
web service that has the same Xignite platform and can be helpful in offering accesses to end-of-
day OTC volume, open interest, and settlement data in manner to provide support to the markets
that are available through CME Clearport® (Pattnaik, Prusty & Dash, 2016).
Australian Banks using Cloud for risk analysis and non-core processes: There has been
use of IBM iDataPlex servers in various banks of Australia as a part of an Infrastructure-as-a-
service (IaaS) strategy in manner to evaluate and build programs related to risk analysis. More
than one separate computer can be turned into a pool of shared resource that can be referred as
cloud.PaaS Cloud vendor Force.com has been being used by Morgan Stanley for its recruiting
applications that is providing many benefits in extensive Cloud penetration in strategy and
analytics (Asatiani et al., 2014).
Gridglo real-time energy apps: The startup, Gridglo, is developing SaaS services for their
startup in manner to sell information to utilities in Australia. It can be described as a mining
energy consumption data from smart meters and thereafter the combination of these data with
data from other sources like data related to demographic and weather, real estate, energy credit
scoring and demand response analytics in manner to categorize different types of consumers for
6
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
providing tools that can be helpful in energy forecasting, including an energy tool for financial
risk (McConky et al., 2015).
Microsoft Azure DataMarket for the Energy Industry: Cloud services offered by
Microsoft DataMarket SaaS can be a helpful in enabling the exploration, discovery and
consumption of data from the commercial data sources and trusted public domains for example,
health, demographics, weather, real estates, navigation, transportation, and location- based
services, and many more. Analytics for enabling insight from that data and visualization is also
included in it (Coleman et al., 2016). A common API can also be used for incorporating these
data into software applications for any of the devices. Many of the energy industries have been
using these platforms in manner to create analytic applications and energy forecasting.
Challenges
There are certain challenges in implementation of Cloud computing which can be listed
as: data security, data privacy, vendor lock-in (Absence of standards), availability, and
compliance into the existing system of the financial industries (Sanei et al., 2014). Following are
the ways in which these challenges may impact the Australian finance industries:
Financial organizations are apprehensive about the data might get compromised on a
public Cloud or monetization of the data related to the customers may happen by Cloud vendors.
An example can be a better explainer such as traders in a firm might be worrying about
migrating their proprietary strategies related to trading in a Cloud because there are chances that
the competitor might be using the same Cloud and get access to the saved data (Moreno-
Vozmediano, Monentro & Liorente, 2013). This implies that risk analyst and portfolio managers
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
providing tools that can be helpful in energy forecasting, including an energy tool for financial
risk (McConky et al., 2015).
Microsoft Azure DataMarket for the Energy Industry: Cloud services offered by
Microsoft DataMarket SaaS can be a helpful in enabling the exploration, discovery and
consumption of data from the commercial data sources and trusted public domains for example,
health, demographics, weather, real estates, navigation, transportation, and location- based
services, and many more. Analytics for enabling insight from that data and visualization is also
included in it (Coleman et al., 2016). A common API can also be used for incorporating these
data into software applications for any of the devices. Many of the energy industries have been
using these platforms in manner to create analytic applications and energy forecasting.
Challenges
There are certain challenges in implementation of Cloud computing which can be listed
as: data security, data privacy, vendor lock-in (Absence of standards), availability, and
compliance into the existing system of the financial industries (Sanei et al., 2014). Following are
the ways in which these challenges may impact the Australian finance industries:
Financial organizations are apprehensive about the data might get compromised on a
public Cloud or monetization of the data related to the customers may happen by Cloud vendors.
An example can be a better explainer such as traders in a firm might be worrying about
migrating their proprietary strategies related to trading in a Cloud because there are chances that
the competitor might be using the same Cloud and get access to the saved data (Moreno-
Vozmediano, Monentro & Liorente, 2013). This implies that risk analyst and portfolio managers
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
are much apprehensive about the location for the assets as it may lead to barrage of lawsuits or
have reputational implication on the firms.
Vendor lock-in is another concern in the implementation of Cloud computing as most of
the service providers’ access to their resources through APIs to their resources. Shifting from one
vendor to another might cost a lot for the organization which will neglect the first priority of
using Cloud hosted application which was low cost (Avram, 2014). Compliance risks which
includes providing enough evidence for care taking of the data and proving risk management
processes are the another challenges in the clod hosting application adoption for finance
industries.
Loss of governance and Isolation Failures are the challenges that could put the challenge
to control sufficiently resources in the Cloud affecting the security and an unauthorized Cloud
computer has the capability to influence the systems on which the Cloud application has been
adopting (Tossi, Colheiros & Buyya, 2014).
Security Issues
Isolation Failure: Shared resources and multi-tenancy have been defining the Cloud
computing which put this in the category of risk covering the failure of mechanism related to the
memory, storage, and reputation between different tenants and routing among them such as
guest-hopping attacks (Hashizume et al., 2013). Attacks on resource isolation mechanism can be
considered very less numerous and much difficult for an intruder to gain access to it than on
traditional operating systems.
Management Interface compromise: Public Cloud service provider provides customer
management interfaces that can be accessible through the mediate access and internet to the large
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
are much apprehensive about the location for the assets as it may lead to barrage of lawsuits or
have reputational implication on the firms.
Vendor lock-in is another concern in the implementation of Cloud computing as most of
the service providers’ access to their resources through APIs to their resources. Shifting from one
vendor to another might cost a lot for the organization which will neglect the first priority of
using Cloud hosted application which was low cost (Avram, 2014). Compliance risks which
includes providing enough evidence for care taking of the data and proving risk management
processes are the another challenges in the clod hosting application adoption for finance
industries.
Loss of governance and Isolation Failures are the challenges that could put the challenge
to control sufficiently resources in the Cloud affecting the security and an unauthorized Cloud
computer has the capability to influence the systems on which the Cloud application has been
adopting (Tossi, Colheiros & Buyya, 2014).
Security Issues
Isolation Failure: Shared resources and multi-tenancy have been defining the Cloud
computing which put this in the category of risk covering the failure of mechanism related to the
memory, storage, and reputation between different tenants and routing among them such as
guest-hopping attacks (Hashizume et al., 2013). Attacks on resource isolation mechanism can be
considered very less numerous and much difficult for an intruder to gain access to it than on
traditional operating systems.
Management Interface compromise: Public Cloud service provider provides customer
management interfaces that can be accessible through the mediate access and internet to the large
8
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
resources this implies in possessing higher rate of risk, mainly in the circumstances when it is
being accessed remotely and web browser vulnerabilities (Almorsy, Grundy & Muller, 2016).
Data breaches: One of most concerning and debating topic for any technology that is
being used in this century for all the technologies that are connected to the internet or using
internet as a medium. Data that are being saved in the Cloud or being transferred using internet
are vulnerable to cyber-attacks. If proper security is not provided to the network an unauthorized
user can get access to the data that is being saved in the Cloud and could cause severe damage to
the organization in all the way. Modi et al. (2013) stated recent example can be the JP Morgan
Chase &m Co data breach in which millions of people were affected and this causes damage to
the reputation of JP Morgan Corporation and also its share markets were down for some time.
Incomplete or insecure data deletion: Request made to the Cloud vendors for the deletion
of data could result in incompletely wiping those data. Timely or adequate data deletion might be
not possible or may be not desired by the customers at all and this happens because of the
unavailability of the extra copies of data or other case may be that the disk that is about to
destroyed might stores the data from other clients (Ahmed & Hossain, 2014). This mainly
happens in the case of multi-tenancy services and reusing the hardware resources which could
raises higher risk than the customer who is using the same dedicated hardware resource.
Expectation of the customer’s security: The customers’ perception on the data security
might be different from the data security being provided by the Cloud Providers and the
availability of the data security that is being offered by them. In real the actual temptation for the
Cloud service provider is to reduce costs without concerning the data security of the individuals
(Stojmenovic & Wen, 2014).
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
resources this implies in possessing higher rate of risk, mainly in the circumstances when it is
being accessed remotely and web browser vulnerabilities (Almorsy, Grundy & Muller, 2016).
Data breaches: One of most concerning and debating topic for any technology that is
being used in this century for all the technologies that are connected to the internet or using
internet as a medium. Data that are being saved in the Cloud or being transferred using internet
are vulnerable to cyber-attacks. If proper security is not provided to the network an unauthorized
user can get access to the data that is being saved in the Cloud and could cause severe damage to
the organization in all the way. Modi et al. (2013) stated recent example can be the JP Morgan
Chase &m Co data breach in which millions of people were affected and this causes damage to
the reputation of JP Morgan Corporation and also its share markets were down for some time.
Incomplete or insecure data deletion: Request made to the Cloud vendors for the deletion
of data could result in incompletely wiping those data. Timely or adequate data deletion might be
not possible or may be not desired by the customers at all and this happens because of the
unavailability of the extra copies of data or other case may be that the disk that is about to
destroyed might stores the data from other clients (Ahmed & Hossain, 2014). This mainly
happens in the case of multi-tenancy services and reusing the hardware resources which could
raises higher risk than the customer who is using the same dedicated hardware resource.
Expectation of the customer’s security: The customers’ perception on the data security
might be different from the data security being provided by the Cloud Providers and the
availability of the data security that is being offered by them. In real the actual temptation for the
Cloud service provider is to reduce costs without concerning the data security of the individuals
(Stojmenovic & Wen, 2014).
9
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Malicious insider: This is an unusual risk but probably happen to the organization in
which the damage might be caused by the individual who have credentials and access to the
network of the firm and had been retired or been a formal employee of the organization. He or
she might get access to the network and harm the organizational data and information for
personal benefits through selling it to the organization or expose those data to an unwilling
individual for personal revenge. These are the extremely high risk for the firm and might cause
severe damage to the proper functioning of the organization.
Availability chain: There could be the creation of single point of failures in many cases
because of the reliance on internet connectivity at the end of the customer.
Loss Governance: Using Cloud services or Cloud hosted application for managing the
data and in formation of the customer, there is the possibility that the client necessarily cedes
control to the CP (cloud provider) on various issues as stated above that could be the reason of
security issues to those data. At the same moment the Service Legal Agreements (SLAs) might
be insufficient to provide any of such promise to provide these services from the side of the
Cloud service provider, which creates a gap between the security defenses of the services that are
being offered by them. Loss of governance includes compliance issues as the investment made in
achieving the agreement or certification might put the process of migration to the Cloud at risk
for example regulatory requirements or the industry standards that can be stated as: firstly, The
Cloud Service provider does not allows the permission to audit by the Cloud Customers and
secondly, there are the chances that Cloud Provider would not be able to provide the evidence of
their proposed compliance with the relevant requirements of the Cloud customers (Khetri, 2013).
There are many such cases in which the implementation of Cloud computing results specific kind
of compliance cannot be achieved for example PCI DSS etc.
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Malicious insider: This is an unusual risk but probably happen to the organization in
which the damage might be caused by the individual who have credentials and access to the
network of the firm and had been retired or been a formal employee of the organization. He or
she might get access to the network and harm the organizational data and information for
personal benefits through selling it to the organization or expose those data to an unwilling
individual for personal revenge. These are the extremely high risk for the firm and might cause
severe damage to the proper functioning of the organization.
Availability chain: There could be the creation of single point of failures in many cases
because of the reliance on internet connectivity at the end of the customer.
Loss Governance: Using Cloud services or Cloud hosted application for managing the
data and in formation of the customer, there is the possibility that the client necessarily cedes
control to the CP (cloud provider) on various issues as stated above that could be the reason of
security issues to those data. At the same moment the Service Legal Agreements (SLAs) might
be insufficient to provide any of such promise to provide these services from the side of the
Cloud service provider, which creates a gap between the security defenses of the services that are
being offered by them. Loss of governance includes compliance issues as the investment made in
achieving the agreement or certification might put the process of migration to the Cloud at risk
for example regulatory requirements or the industry standards that can be stated as: firstly, The
Cloud Service provider does not allows the permission to audit by the Cloud Customers and
secondly, there are the chances that Cloud Provider would not be able to provide the evidence of
their proposed compliance with the relevant requirements of the Cloud customers (Khetri, 2013).
There are many such cases in which the implementation of Cloud computing results specific kind
of compliance cannot be achieved for example PCI DSS etc.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Lock-in: The guarantees assured by the Cloud service provider towards application, data
and service portability is not yet completely achieved as there is still not much flexibility in the
tools, standard data formats or procedures that are being offered (Hashem et al., 2015). This
could create problem and raise various types of risks (sometimes even impossible) in migrating
the data and information related to the customer to another Cloud service provider and back to an
in-house infrastructure. This results in complete dependency on the Cloud service providers for
the Cloud customers especially for data portability, service provision because most of the
fundamentals aspects have not been enabled yet (Ryan, 2013).
Risk Assessment
Threats, Assets, Vulnerabilities, and Risks
Risk can be defined as the combination of vulnerabilities and risks those have the
capability to affect the assets. For the risk assessment following are the list of risk and
vulnerabilities including their impact probability and risk rates with a risk priority matrix have
been plotted. VL- Very Low, L-Low, M- medium, H-High, VH-Very high
Sl. No. Risk/Vulnerabilities Description Likelihood Impact Priority
R1. Lock-in Depending strongly on single service
provider for their services could lead
to several difficulties in moving to
different service provider and may
cause serious issues. This could even
lead to an impossible attempt to
move to another Cloud service
H M H
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Lock-in: The guarantees assured by the Cloud service provider towards application, data
and service portability is not yet completely achieved as there is still not much flexibility in the
tools, standard data formats or procedures that are being offered (Hashem et al., 2015). This
could create problem and raise various types of risks (sometimes even impossible) in migrating
the data and information related to the customer to another Cloud service provider and back to an
in-house infrastructure. This results in complete dependency on the Cloud service providers for
the Cloud customers especially for data portability, service provision because most of the
fundamentals aspects have not been enabled yet (Ryan, 2013).
Risk Assessment
Threats, Assets, Vulnerabilities, and Risks
Risk can be defined as the combination of vulnerabilities and risks those have the
capability to affect the assets. For the risk assessment following are the list of risk and
vulnerabilities including their impact probability and risk rates with a risk priority matrix have
been plotted. VL- Very Low, L-Low, M- medium, H-High, VH-Very high
Sl. No. Risk/Vulnerabilities Description Likelihood Impact Priority
R1. Lock-in Depending strongly on single service
provider for their services could lead
to several difficulties in moving to
different service provider and may
cause serious issues. This could even
lead to an impossible attempt to
move to another Cloud service
H M H
11
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
provider (Chou, 2015).
R2. Loss of Governance Availing Cloud services need a
‘must’ factor that is a third party
involvement that results in Cloud
customers necessarily cedes control
to the Cloud provider on various
issues that will probably affect the
security of the system and the data
that is being migrated to the cloud.
VH VH VH
R3. Supply Chain Failure The Cloud Providers might
outsourced a part of their production
chain to third parties too and could
even use another Cloud service
providers as a part of their services
that might results in the possibilities
of cascade failures.
L M M
R4. Conflicts between
the Cloud
environment and
customer hardening
procedures
The Cloud Service providers might
not be able to provide compliance
according to the need of the Cloud
customer’s security measures those
results in making their
implementation impossible (Pearson,
2013).
M M M
R5. Social Engineering
Attacks (Phishing)
It can be refereed as the technique of
manipulating individuals into
divulging confidential information
M H M
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
provider (Chou, 2015).
R2. Loss of Governance Availing Cloud services need a
‘must’ factor that is a third party
involvement that results in Cloud
customers necessarily cedes control
to the Cloud provider on various
issues that will probably affect the
security of the system and the data
that is being migrated to the cloud.
VH VH VH
R3. Supply Chain Failure The Cloud Providers might
outsourced a part of their production
chain to third parties too and could
even use another Cloud service
providers as a part of their services
that might results in the possibilities
of cascade failures.
L M M
R4. Conflicts between
the Cloud
environment and
customer hardening
procedures
The Cloud Service providers might
not be able to provide compliance
according to the need of the Cloud
customer’s security measures those
results in making their
implementation impossible (Pearson,
2013).
M M M
R5. Social Engineering
Attacks (Phishing)
It can be refereed as the technique of
manipulating individuals into
divulging confidential information
M H M
12
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
or performing actions. It can be
categorized as the simple fraud or
confidence trick and can also be
referred as the trickery of the
information for the purpose of fraud,
information gathering, or access to
the systems sensitive information.
Most of the case the attackers does
not come face-to-face of the victims.
R6. Technical risks Cloud services are on-demand
service (IaaS, PaaS, SaaS) there are
the possibilities that Cloud providers
will not be able to maintain the
service level that has been promised
and he might also not be able to
meet the demands that is being
increased in a certain shared
resources (Drissio, Houmani &
Medromi, 2013).
M Ms M
Failing in maintaining the
services level
L H M
Failing in meeting increased
demand
R7. Isolation Failure In the environment like this where
data
R8. Malicious Insider
(Cloud Provider)
The damage to the data information
related to the operational activities
of the organization of the Cloud
Customer’s assets because of the
malicious insider at the Cloud
M VH H
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
or performing actions. It can be
categorized as the simple fraud or
confidence trick and can also be
referred as the trickery of the
information for the purpose of fraud,
information gathering, or access to
the systems sensitive information.
Most of the case the attackers does
not come face-to-face of the victims.
R6. Technical risks Cloud services are on-demand
service (IaaS, PaaS, SaaS) there are
the possibilities that Cloud providers
will not be able to maintain the
service level that has been promised
and he might also not be able to
meet the demands that is being
increased in a certain shared
resources (Drissio, Houmani &
Medromi, 2013).
M Ms M
Failing in maintaining the
services level
L H M
Failing in meeting increased
demand
R7. Isolation Failure In the environment like this where
data
R8. Malicious Insider
(Cloud Provider)
The damage to the data information
related to the operational activities
of the organization of the Cloud
Customer’s assets because of the
malicious insider at the Cloud
M VH H
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
service provider
R9. Interface
compromises
(availability of
infrastructure,
manipulation)
When combined with web browser
vulnerabilities and remote access
there are chances of risk to the data
security. This is because the
customer management interfaces of
the public Cloud service providers
are mediate access and accessible to
the internet to the applications that
have been hosting traditionally by
the service providers.
M VH H
R10. Intercepting data in
transit
During the transfers of the data
between the different clouds or the
computers using a network, there is
the probability that there transfer
gets blocked or intercepted by an
unwanted or unauthorized user. This
generally happens during the transfer
of data between the service provider
and the customers (Theoharidou,
Tsalis & Gritzalis, 2013).
M H M
R11. Ineffective deletion
of data or Insecure
Deletion of data from the Cloud on
the call of the customers does not in
real deletes all the data from the
Cloud rather than that data are being
transferred to the eventual backup
M VH H
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
service provider
R9. Interface
compromises
(availability of
infrastructure,
manipulation)
When combined with web browser
vulnerabilities and remote access
there are chances of risk to the data
security. This is because the
customer management interfaces of
the public Cloud service providers
are mediate access and accessible to
the internet to the applications that
have been hosting traditionally by
the service providers.
M VH H
R10. Intercepting data in
transit
During the transfers of the data
between the different clouds or the
computers using a network, there is
the probability that there transfer
gets blocked or intercepted by an
unwanted or unauthorized user. This
generally happens during the transfer
of data between the service provider
and the customers (Theoharidou,
Tsalis & Gritzalis, 2013).
M H M
R11. Ineffective deletion
of data or Insecure
Deletion of data from the Cloud on
the call of the customers does not in
real deletes all the data from the
Cloud rather than that data are being
transferred to the eventual backup
M VH H
14
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
media or removed from the storage.
During this if the storage had been
not encrypted properly, this data
could be accessed by other users that
might harm the data and misuse it
for their personal benefits.
R12. DDOS (Distributed
Denial of Service)
The particular aim of such attacks is
to overload a resource, service
interface, or network by flooding the
network with continuous request
from more than one source that are
being distributed across a wide
topological or geographical area.
This implies that the legitimate users
will not be able to use the resources
as intended (Juliadotter & Choo,
2015).
M H M
R13. EDOS (Economic
Denial of Service)
Attacks may result in the poor-
configuration or budget planning
might be altered that will result in
the increase of the cost for this
implementation into the system and
thus it might becomes unaffordable
for the consumers willing to take the
services.
L H M
R14. Service Engine It is one of the most important L VH H
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
media or removed from the storage.
During this if the storage had been
not encrypted properly, this data
could be accessed by other users that
might harm the data and misuse it
for their personal benefits.
R12. DDOS (Distributed
Denial of Service)
The particular aim of such attacks is
to overload a resource, service
interface, or network by flooding the
network with continuous request
from more than one source that are
being distributed across a wide
topological or geographical area.
This implies that the legitimate users
will not be able to use the resources
as intended (Juliadotter & Choo,
2015).
M H M
R13. EDOS (Economic
Denial of Service)
Attacks may result in the poor-
configuration or budget planning
might be altered that will result in
the increase of the cost for this
implementation into the system and
thus it might becomes unaffordable
for the consumers willing to take the
services.
L H M
R14. Service Engine It is one of the most important L VH H
15
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Compromised fundamental part f a Cloud service
and compromising this could let an
unauthorized user or intruder to
access al the related to the customer
that has been saved into the cloud
(Albakri et al., 2014).
R15. Loss of
Cryptographic keys
Compromising or losing
cryptographic keys that have been
used for the digital scanners,
authentication, or encryption could
affect the data by compromising
with an unauthorized users and it
could lead to financial damages,
denial of services, an loss of data
(Furuncu & Sogukpinar, 2015).
L H M
R16. Cloud-specific
network related
technical attacks or
failures
Such type of attacks and failures
could affect the Cloud services that
might also occurred in the classic IT
settings. This could cause loss of the
internet connectivity because of the
failures or attacks on the site of the
customers. Or the internet service
provider of the customer because of
the temporarily reduced in the
network bandwidth on the bath that
connects the service provider and the
M M M
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Compromised fundamental part f a Cloud service
and compromising this could let an
unauthorized user or intruder to
access al the related to the customer
that has been saved into the cloud
(Albakri et al., 2014).
R15. Loss of
Cryptographic keys
Compromising or losing
cryptographic keys that have been
used for the digital scanners,
authentication, or encryption could
affect the data by compromising
with an unauthorized users and it
could lead to financial damages,
denial of services, an loss of data
(Furuncu & Sogukpinar, 2015).
L H M
R16. Cloud-specific
network related
technical attacks or
failures
Such type of attacks and failures
could affect the Cloud services that
might also occurred in the classic IT
settings. This could cause loss of the
internet connectivity because of the
failures or attacks on the site of the
customers. Or the internet service
provider of the customer because of
the temporarily reduced in the
network bandwidth on the bath that
connects the service provider and the
M M M
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
customers. Another cause is the
global internet conjunction, and the
failures in the connectivity path
between the service provider and the
consumer.
R17. Loss of Backups There is the probability that the
backup of the data kept by the
service provider about the
costumer’s data could get lost or
might get damaged or ob the
physical medium there has been data
saved.
L H M
R18. Natural Disasters Calamities like earthquakes,
flooding, tsunamis and many others
could affect the infrastructure of the
service provider and will
alternatively affect the Customers as
most of the service providers have
different and far locations (Latif et
al., 2014).
VL H M
R19. Legal Risks Australian Government authorities
might ask the operators that are
providing services to provide
information for any criminal case or
legal lawsuits and could access the
storage media and the hardware
H M H
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
customers. Another cause is the
global internet conjunction, and the
failures in the connectivity path
between the service provider and the
consumer.
R17. Loss of Backups There is the probability that the
backup of the data kept by the
service provider about the
costumer’s data could get lost or
might get damaged or ob the
physical medium there has been data
saved.
L H M
R18. Natural Disasters Calamities like earthquakes,
flooding, tsunamis and many others
could affect the infrastructure of the
service provider and will
alternatively affect the Customers as
most of the service providers have
different and far locations (Latif et
al., 2014).
VL H M
R19. Legal Risks Australian Government authorities
might ask the operators that are
providing services to provide
information for any criminal case or
legal lawsuits and could access the
storage media and the hardware
H M H
17
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
storage devices.
R20. Risks from changing
jurisdictions
When the physical location of the
service provider is situated in the
country other than the customers
change in jurisdiction will affect the
security of the information. For
example: data may be seized in the
name of country security, data may
even get seized because that does not
belong to the same country.
H H H
R21. Data protection
services
Legislations and policies of the
different country could lead to the
issues related with the security of the
data and the information that is
being saved on the Cloud in different
country. Another issue related with it
is the data protection authority from
different government cannot be
accessed.
H H H
R22. Licensing Issues Violating licensing agreements of
the software supplier could result in
financial penalties and several others
like disruption of services and many
more.
M M M
R23. Intellectual property
issues
For both the cases storing data in the
Cloud or using any Cloud hosted
L M M
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
storage devices.
R20. Risks from changing
jurisdictions
When the physical location of the
service provider is situated in the
country other than the customers
change in jurisdiction will affect the
security of the information. For
example: data may be seized in the
name of country security, data may
even get seized because that does not
belong to the same country.
H H H
R21. Data protection
services
Legislations and policies of the
different country could lead to the
issues related with the security of the
data and the information that is
being saved on the Cloud in different
country. Another issue related with it
is the data protection authority from
different government cannot be
accessed.
H H H
R22. Licensing Issues Violating licensing agreements of
the software supplier could result in
financial penalties and several others
like disruption of services and many
more.
M M M
R23. Intellectual property
issues
For both the cases storing data in the
Cloud or using any Cloud hosted
L M M
18
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
application could let to the security
issues related to the information that
is being saved and being executed
during the application of software.
Risk Assessment Matrix
Probability
Very
High R.2
High R.19
R.1
R.7
R.20
R.21
R.8
R.9
Medium R.6
R.16
R.22
R.10
R.6
R.5
R.4
R.12
R.11
Low R.3
R.23
R.13
R.15
R.10
R.14
Very Low R.18
Very Low Low Medium High Very High
Impact
Measures to Mitigate Security Issues
Following are the measures that could be helpful in enhancing the security of the
information and data that are being uploaded on the Cloud and could help in mitigating the issues
that may rise due to this implementation into the system.
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
application could let to the security
issues related to the information that
is being saved and being executed
during the application of software.
Risk Assessment Matrix
Probability
Very
High R.2
High R.19
R.1
R.7
R.20
R.21
R.8
R.9
Medium R.6
R.16
R.22
R.10
R.6
R.5
R.4
R.12
R.11
Low R.3
R.23
R.13
R.15
R.10
R.14
Very Low R.18
Very Low Low Medium High Very High
Impact
Measures to Mitigate Security Issues
Following are the measures that could be helpful in enhancing the security of the
information and data that are being uploaded on the Cloud and could help in mitigating the issues
that may rise due to this implementation into the system.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Two-factor authentication technology can be preferable situation for securing the
information and data including critical protection or even declining to share the credentials to
individual other than company’s head can also be a better option (Smith et al., 2013).
Making thorough research on the service provider and comparing whether the agreement
is matching with the compliance and SLAs or not with the policies of the organization. The
research should be accurate and exact.
Single Sign-on (SSO) utilization in the organization can also help in boosting the security
of the organization. Financial industries use a number of loud applications and services and the
individuals might have different credentials to access those services and the applications (Pearce,
Zeadally & Hunt, 2013). For example OneLogIn provides this facility that could be used for one
login password. Another option related to the password can be the use of automatically generated
password.
End-to-end encryption could also be helpful in ensuring the security of the data and
information that is being saved in the cloud. It should be ensured by the customer that the service
provider is putting encryption on the files or not, it could also help in protecting files in the hand
of hackers. In manner to minimize the risk to the extent level there should be proper encryption
over the files before uploading it to the Cloud and should be encrypted by a single decryption
code (Fernandis et al., 2014). Secured communication protocol like SSL/TLS could be helpful in
protecting the data and information that is travelling in the network.
The hardware and software that are being used to operate these systems and services
should be up-to-date with the new and latest versions that will also help in minimizing the threats
and issues related to the security (Barlow et al., 2013).
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Two-factor authentication technology can be preferable situation for securing the
information and data including critical protection or even declining to share the credentials to
individual other than company’s head can also be a better option (Smith et al., 2013).
Making thorough research on the service provider and comparing whether the agreement
is matching with the compliance and SLAs or not with the policies of the organization. The
research should be accurate and exact.
Single Sign-on (SSO) utilization in the organization can also help in boosting the security
of the organization. Financial industries use a number of loud applications and services and the
individuals might have different credentials to access those services and the applications (Pearce,
Zeadally & Hunt, 2013). For example OneLogIn provides this facility that could be used for one
login password. Another option related to the password can be the use of automatically generated
password.
End-to-end encryption could also be helpful in ensuring the security of the data and
information that is being saved in the cloud. It should be ensured by the customer that the service
provider is putting encryption on the files or not, it could also help in protecting files in the hand
of hackers. In manner to minimize the risk to the extent level there should be proper encryption
over the files before uploading it to the Cloud and should be encrypted by a single decryption
code (Fernandis et al., 2014). Secured communication protocol like SSL/TLS could be helpful in
protecting the data and information that is travelling in the network.
The hardware and software that are being used to operate these systems and services
should be up-to-date with the new and latest versions that will also help in minimizing the threats
and issues related to the security (Barlow et al., 2013).
20
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Conclusion
Based on the above report it can be concluded that both the firm and vendors needs to
make their contribution in manner to fight back the issues and threats that arises due to the
implementation of cloud computing within the organization. The NYSE Euronext community
Cloud could be helpful in paving the path for such collaborative contribution that will let
multiple firms motivate to have a proportionate stake. Cloud Computing is the most advanced,
innovative, and efficient computing utilities that can be implemented within the existing system
as services. Recommendation can be made for the finance industries for implementing hybrid
cloud system with appropriate differentiating the types of data and information that is about to be
uploaded in the cloud. Cloud computing is playing a vital role in changing the face of the
computing operations in the finance industries and providing facility to exchange data and access
at anywhere. Cloud computing is being contributing in the changes to the provisioning and
licensing and of methodologies and infrastructure for application deployment, delivery, and
development.
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Conclusion
Based on the above report it can be concluded that both the firm and vendors needs to
make their contribution in manner to fight back the issues and threats that arises due to the
implementation of cloud computing within the organization. The NYSE Euronext community
Cloud could be helpful in paving the path for such collaborative contribution that will let
multiple firms motivate to have a proportionate stake. Cloud Computing is the most advanced,
innovative, and efficient computing utilities that can be implemented within the existing system
as services. Recommendation can be made for the finance industries for implementing hybrid
cloud system with appropriate differentiating the types of data and information that is about to be
uploaded in the cloud. Cloud computing is playing a vital role in changing the face of the
computing operations in the finance industries and providing facility to exchange data and access
at anywhere. Cloud computing is being contributing in the changes to the provisioning and
licensing and of methodologies and infrastructure for application deployment, delivery, and
development.
21
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
References:
Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the
cloud. International Journal of Network Security & Its Applications, 6(1), 25.
Albakri, S. H., Shanmugam, B., Samy, G. N., Idris, N. B., & Ahmed, A. (2014). Security risk
assessment framework for cloud computing environments. Security and Communication
Networks, 7(11), 2114-2124.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Asatiani, A., Apte, U., Penttinen, E., Rönkkö, M., & Saarinen, T. (2014, January). Outsourcing
of disaggregated services in cloud-based enterprise information systems. In System
Sciences (HICSS), 2014 47th Hawaii International Conference on (pp. 1268-1277).
IEEE.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Barlow, J. B., Warkentin, M., Ormond, D., & Dennis, A. R. (2013). Don't make excuses!
Discouraging neutralization to reduce IT policy violation. Computers & security, 39, 145-
159.
Chang, V., Walters, R. J., & Wills, G. (2014). Review of Cloud Computing and existing
Frameworks for Cloud adoption.
Chou, D. C. (2015). Cloud computing: A value creation model. Computer Standards
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
References:
Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the
cloud. International Journal of Network Security & Its Applications, 6(1), 25.
Albakri, S. H., Shanmugam, B., Samy, G. N., Idris, N. B., & Ahmed, A. (2014). Security risk
assessment framework for cloud computing environments. Security and Communication
Networks, 7(11), 2114-2124.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Asatiani, A., Apte, U., Penttinen, E., Rönkkö, M., & Saarinen, T. (2014, January). Outsourcing
of disaggregated services in cloud-based enterprise information systems. In System
Sciences (HICSS), 2014 47th Hawaii International Conference on (pp. 1268-1277).
IEEE.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Barlow, J. B., Warkentin, M., Ormond, D., & Dennis, A. R. (2013). Don't make excuses!
Discouraging neutralization to reduce IT policy violation. Computers & security, 39, 145-
159.
Chang, V., Walters, R. J., & Wills, G. (2014). Review of Cloud Computing and existing
Frameworks for Cloud adoption.
Chou, D. C. (2015). Cloud computing: A value creation model. Computer Standards
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
22
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Coleman, S., Gö b, R., Manco, G., Pievatolo, A., Tort‐Martorell, X., & Reis, M. S. (2016). How
can SMEs benefit from big data? Challenges and a path forward. Quality and Reliability
Engineering International, 32(6), 2151-2164.
Drissi, S., Houmani, H., & Medromi, H. (2013). Survey: Risk assessment for cloud
computing. International Journal of Advanced Computer Science and
Applications, 4(12), 2013.
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security
issues in cloud environments: a survey. International Journal of Information
Security, 13(2), 113-170.
Furuncu, E., & Sogukpinar, I. (2015). Scalable risk assessment method for cloud computing
using game theory (CCRAM). Computer Standards & Interfaces, 38, 44-50.
Gai, K. (2014). A review of leveraging private cloud computing in financial service institutions:
Value propositions and current performances. International Journal of Computer
Applications, 95(3).
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of
security issues for cloud computing. Journal of Internet Services and Applications, 4(1),
5.
MIGRATION OF BUSINESS APPLICATION TO CLOUD COMPUTING
Coleman, S., Gö b, R., Manco, G., Pievatolo, A., Tort‐Martorell, X., & Reis, M. S. (2016). How
can SMEs benefit from big data? Challenges and a path forward. Quality and Reliability
Engineering International, 32(6), 2151-2164.
Drissi, S., Houmani, H., & Medromi, H. (2013). Survey: Risk assessment for cloud
computing. International Journal of Advanced Computer Science and
Applications, 4(12), 2013.
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security
issues in cloud environments: a survey. International Journal of Information
Security, 13(2), 113-170.
Furuncu, E., & Sogukpinar, I. (2015). Scalable risk assessment method for cloud computing
using game theory (CCRAM). Computer Standards & Interfaces, 38, 44-50.
Gai, K. (2014). A review of leveraging private cloud computing in financial service institutions:
Value propositions and current performances. International Journal of Computer
Applications, 95(3).
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of
security issues for cloud computing. Journal of Internet Services and Applications, 4(1),
5.
1 out of 23
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.