Cloud Computing and Information System Management Security
VerifiedAdded on 2021/04/24
|5
|1244
|186
Report
AI Summary
This report delves into the critical role of cloud computing in managing and enhancing the security of information systems within organizations. It explores various strategies employed by cloud services to ensure data protection, including data encryption using algorithms like Cipher text policy, which secures data with private keys accessible only to authorized recipients. The report highlights the importance of user authentication to restrict access to secured data, preventing unauthorized access and enhancing organizational efficiency. It also examines the use of cloud-based backup and disaster recovery systems, ensuring data availability even in the event of system failures or data loss. The report references cloud architecture and its layered approach to maintaining data security at multiple levels. The research aims to provide insights into how cloud computing is a key component of Management Information Systems, maintaining the security of data stored in the cloud.

Running head: CLOUD COMPUTING AND INFORMATION SYSTEM MANAGEMENT
Cloud Computing and Information System Management
Name of the Student:
Name of the University:
Author note
Cloud Computing and Information System Management
Name of the Student:
Name of the University:
Author note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1CLOUD COMPOUTING AND INFORMATION SYSTEM MANAGEMENT
The Management Information System is a process in which the hardware and software of
the computer collaborates in the processing of the information such to as to manage and take
decisions within an organization.
Topic: How does Cloud Computing helps in managing the security in an organization
Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and Security
for Cloud Computing (pp. 3-42). Springer, London.
According to the author, Cloud Computing refers to the storage of data in the cloud and
the main advantage of storing potential data in the cloud is that it can store the data remotely. It
can also maintain the privacy of the data. As per the research, the authors also stated that the
infrastructure of the cloud storage also leads to the secure storage of data as it is stored in an
encrypted format. Moreover, the data can also be secured by storing the data in dispersed
location such that if data is damaged at one location, it can be retrieved from other location.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud
computing using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
According to the authors, the data in the cloud infrastructure are stored in an encrypted
format using various encryption algorithms such as Cipher text policy. Encryption is a process in
which the data is altered by the sender such that the data could not be attacked by a third party.
As per the research, the data stored in encrypted format becomes difficult for the attackers to
decode the information as it is secured with a private key which is only available to the receiver.
It is public key encryption process.
The Management Information System is a process in which the hardware and software of
the computer collaborates in the processing of the information such to as to manage and take
decisions within an organization.
Topic: How does Cloud Computing helps in managing the security in an organization
Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and Security
for Cloud Computing (pp. 3-42). Springer, London.
According to the author, Cloud Computing refers to the storage of data in the cloud and
the main advantage of storing potential data in the cloud is that it can store the data remotely. It
can also maintain the privacy of the data. As per the research, the authors also stated that the
infrastructure of the cloud storage also leads to the secure storage of data as it is stored in an
encrypted format. Moreover, the data can also be secured by storing the data in dispersed
location such that if data is damaged at one location, it can be retrieved from other location.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud
computing using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
According to the authors, the data in the cloud infrastructure are stored in an encrypted
format using various encryption algorithms such as Cipher text policy. Encryption is a process in
which the data is altered by the sender such that the data could not be attacked by a third party.
As per the research, the data stored in encrypted format becomes difficult for the attackers to
decode the information as it is secured with a private key which is only available to the receiver.
It is public key encryption process.

2CLOUD COMPOUTING AND INFORMATION SYSTEM MANAGEMENT
Ruj, S., Stojmenovic, M., & Nayak, A. (2014). Decentralized access control with anonymous
authentication of data stored in clouds. IEEE transactions on parallel and distributed
systems, 25(2), 384-394.
According to the authors, the adoption of Cloud Computing enhances the data storage
and data security maintenance of the organization. The research states that the cloud services
offer access controllability such that the data is not made available to unauthorized users. Thus,
the illegal access of data by the intruders is blocked that can help to enhance the working of the
organization as well as secure storage of the data.
Nafi, K. W., Kar, T. S., Hoque, S. A., & Hashem, M. M. A. (2013). A newer user
authentication, file encryption and distributed server based cloud computing security
architecture. arXiv preprint arXiv:1303.0598.
As per the authors, the cloud computing services adopted by the company helps to
maintain the secured storage of the potential data as authentication of the users are done prior to
establishing connection between the database and the user. The new user authentication is done
so as to restrict the access of secured data by unauthenticated users.
Chang, V. (2015). Towards a Big Data system disaster recovery in a Private Cloud. Ad Hoc
Networks, 35, 65-82.
According to the research, small as well as large scale industries are adopting the cloud
based services as it provides the backup strategy and disaster recovery system. It aims to obtain
zero loss of data. The backup and recovery system of the cloud provides the required data even if
data has been lost from the system as it stores the data efficiently and periodically backs up the
entire data. Thus, this adds to the benefits gained to the organization dealing with large amount
of data as in case of any breaches the original data can be obtained using the recovery strategy of
Ruj, S., Stojmenovic, M., & Nayak, A. (2014). Decentralized access control with anonymous
authentication of data stored in clouds. IEEE transactions on parallel and distributed
systems, 25(2), 384-394.
According to the authors, the adoption of Cloud Computing enhances the data storage
and data security maintenance of the organization. The research states that the cloud services
offer access controllability such that the data is not made available to unauthorized users. Thus,
the illegal access of data by the intruders is blocked that can help to enhance the working of the
organization as well as secure storage of the data.
Nafi, K. W., Kar, T. S., Hoque, S. A., & Hashem, M. M. A. (2013). A newer user
authentication, file encryption and distributed server based cloud computing security
architecture. arXiv preprint arXiv:1303.0598.
As per the authors, the cloud computing services adopted by the company helps to
maintain the secured storage of the potential data as authentication of the users are done prior to
establishing connection between the database and the user. The new user authentication is done
so as to restrict the access of secured data by unauthenticated users.
Chang, V. (2015). Towards a Big Data system disaster recovery in a Private Cloud. Ad Hoc
Networks, 35, 65-82.
According to the research, small as well as large scale industries are adopting the cloud
based services as it provides the backup strategy and disaster recovery system. It aims to obtain
zero loss of data. The backup and recovery system of the cloud provides the required data even if
data has been lost from the system as it stores the data efficiently and periodically backs up the
entire data. Thus, this adds to the benefits gained to the organization dealing with large amount
of data as in case of any breaches the original data can be obtained using the recovery strategy of
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3CLOUD COMPOUTING AND INFORMATION SYSTEM MANAGEMENT
the cloud. In case of system failure in the organization, data loss may occur, but with the backup
and recovery strategy of the cloud the data’s can be effectively retrieved.
Amanatullah, Y., Lim, C., Ipung, H. P., & Juliandri, A. (2013, June). Toward cloud
computing reference architecture: Cloud service management perspective. In ICT for
Smart Society (ICISS), 2013 International Conference on (pp. 1-4). IEEE.
According to the research, the various layers in the cloud computing architecture helps in
maintaining the security of the data across various levels of the architecture. The research states
that even if the data’s are stored in an encrypted format they would still be subject to damage or
deletion thus, the data stored in the cloud should be stored in dispersed location such that even if
the data is damaged it can be retrieved again from other location. The cloud architecture also
provides various types of services such as IaaS, PaaS, SaaS to the users and hence, proves
beneficial to the organization.
The research aims at briefing how cloud computing one of the major factor of the
Management Information System, maintains the security of the data stored in the cloud. The
research intended to cover the various strategies such as encryption of data using encrypting
algorithms and user authentication, adopted by the cloud services to maintain the security of
data.
the cloud. In case of system failure in the organization, data loss may occur, but with the backup
and recovery strategy of the cloud the data’s can be effectively retrieved.
Amanatullah, Y., Lim, C., Ipung, H. P., & Juliandri, A. (2013, June). Toward cloud
computing reference architecture: Cloud service management perspective. In ICT for
Smart Society (ICISS), 2013 International Conference on (pp. 1-4). IEEE.
According to the research, the various layers in the cloud computing architecture helps in
maintaining the security of the data across various levels of the architecture. The research states
that even if the data’s are stored in an encrypted format they would still be subject to damage or
deletion thus, the data stored in the cloud should be stored in dispersed location such that even if
the data is damaged it can be retrieved again from other location. The cloud architecture also
provides various types of services such as IaaS, PaaS, SaaS to the users and hence, proves
beneficial to the organization.
The research aims at briefing how cloud computing one of the major factor of the
Management Information System, maintains the security of the data stored in the cloud. The
research intended to cover the various strategies such as encryption of data using encrypting
algorithms and user authentication, adopted by the cloud services to maintain the security of
data.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4CLOUD COMPOUTING AND INFORMATION SYSTEM MANAGEMENT
Bibliography
Amanatullah, Y., Lim, C., Ipung, H. P., & Juliandri, A. (2013, June). Toward cloud computing
reference architecture: Cloud service management perspective. In ICT for Smart Society
(ICISS), 2013 International Conference on (pp. 1-4). IEEE.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
Chang, V. (2015). Towards a Big Data system disaster recovery in a Private Cloud. Ad Hoc
Networks, 35, 65-82.
Nafi, K. W., Kar, T. S., Hoque, S. A., & Hashem, M. M. A. (2013). A newer user authentication,
file encryption and distributed server based cloud computing security architecture. arXiv
preprint arXiv:1303.0598.
Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and Security for
Cloud Computing (pp. 3-42). Springer, London.
Ruj, S., Stojmenovic, M., & Nayak, A. (2014). Decentralized access control with anonymous
authentication of data stored in clouds. IEEE transactions on parallel and distributed
systems, 25(2), 384-394.
Bibliography
Amanatullah, Y., Lim, C., Ipung, H. P., & Juliandri, A. (2013, June). Toward cloud computing
reference architecture: Cloud service management perspective. In ICT for Smart Society
(ICISS), 2013 International Conference on (pp. 1-4). IEEE.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
Chang, V. (2015). Towards a Big Data system disaster recovery in a Private Cloud. Ad Hoc
Networks, 35, 65-82.
Nafi, K. W., Kar, T. S., Hoque, S. A., & Hashem, M. M. A. (2013). A newer user authentication,
file encryption and distributed server based cloud computing security architecture. arXiv
preprint arXiv:1303.0598.
Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and Security for
Cloud Computing (pp. 3-42). Springer, London.
Ruj, S., Stojmenovic, M., & Nayak, A. (2014). Decentralized access control with anonymous
authentication of data stored in clouds. IEEE transactions on parallel and distributed
systems, 25(2), 384-394.
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.