Literature Review: Cloud Systems, Security, and Applications - COM7008

Verified

Added on  2022/08/14

|8
|2987
|14
Report
AI Summary
This report presents a literature review on cloud systems and applications, addressing key aspects of cloud computing. It begins by defining cloud computing and its characteristics, exploring its advantages for businesses, particularly SMEs, and examining the current trends in cloud adoption. The report then delves into the challenges associated with cloud computing, including security threats, legal frameworks, and the need for specialized IT skills. Furthermore, it discusses cloud computing security measures such as multi-factor authentication, strong passwords, and the use of VPNs to mitigate risks. The review also highlights the importance of aligning security architecture with business goals and implementing regular software updates. Overall, the report provides a comprehensive overview of cloud computing, its applications, benefits, challenges, and security considerations, offering valuable insights for understanding and implementing cloud solutions.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
RUNING HEAD: CLOUD SYSTEMS AND APPLICATIONS 0
2020
Cloud System and Applications
Student’s Details-
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CLOUD SYSTEMS AND APPLICATIONS 1
Question 1
Cloud computing is the concept that described as the central data centres over the internet
that avail that information to many users. Specifically, it allows the users to store computer
system services, data, networking, analytics or internet over the internet. According to
Hashem, et al. (2015) cloud computing is a massive platform that specifically stores and
manages the big data in an effective way. Cloud computing therefore be used for the handling
the huge capacity of data in which cloud computing avails the flexible and techniques which
it can be used for the tackling of magnificent amount of data (Hashem, et al., 2015). Further,
from the perspective of Rittinghouse & Ransome (2017) cloud computing is effectively be
implemented by the scalable architecture that has temporary and permanent that depends
upon the organization’s needs. Critically, cloud implementation allows the data to be
accessed in real-time. Furthermore, these have security concerns in which the cloud
implementation has sole ownership of the system which allow the user to independently
access the centralized server (Rittinghouse & Ransome, 2017).
National Institute of Standards and Technology (NIST) has given the definition of cloud
computing in the special publication of NSIT. According to Mell & Grance (2011) cloud
computing is regarded as the new business model that contains on demand access of the
networks and configurated systems that provides the computing resources (Mell & Grance,
2011). As per NSIT, cloud computing has essential characteristics that can include that it is a
on demand self-service that allows the user for the network storage without human
interactions. Further it is a broad network access that provides the standard mechanism
through the client platforms. Additionally, it has the capability to resource pooling in which it
serves the multiple consumers through the resources which are dynamically assigned and
reassigned through the interdependency of location. Furthermore, it has the characteristic of
rapidly elastic in which the capabilities are scaled automatically with the commensurate with
the demand. Also, the systems or servers are automatically controlled and managed that
specifically provides the transparency to the provider and consumer. However, Alex &
Kishore (2017) have explained the cloud computing forensic framework and is the scientific
application of the technological techniques and reconstruction of past events. Moreover, it is
done through the systematically determination and interpretation of digital evidence through
the technical tools, organizational aspects and legal aspects (Alex & Kishore, 2017).
Document Page
CLOUD SYSTEMS AND APPLICATIONS 2
Furthermore, in NSIT Mell & Grance (2011) have elaborated the deployment or service
models through the Software as a Service (SaaS) which provide the consumer the access to
use the provider’s content which are maintained on the cloud infrastructure (Mell & Grance,
2011). It is specifically used through the client-based devices that are accessible from client
databased or from a web browser. Platform as a service (PaaS) is another service model
which are consumer created supported by the provider through the programming languages
and the service tools. Moreover, there are community clouds which are available for a group
of community, public cloud which are to be owned and managed by the general public and
also the private cloud which is specifically used by the single organization. Critically, …
have stated that there are numerous security issues which are being hampered through the use
of cloud (Kumar, 2017). Also, this required the dependency on the network and can lead to
downtime when the server is lost. Also, there is lack of control over the data when on host
services. Cloud computing needs a technical support to handle various activities that seek
technical support from outside.
Question 2
As cloud computing provides huge accessibility and is a on demand access to the user
network through a shared pool, it has been hugely used by the IT business for various
business needs and also for the reduction in the entry barriers. According to Kumar, et al.
(2017) cloud computing provides the specific advantage to the SMEs (Small and Medium
Enterprises) for not only improving the business performance but also for the protection of
infrastructure, freedom of information through more advanced technology called cloud
computing (Kumar, et al., 2017). Besides, the author has stated that cloud is associated with
the security threats that can affect the business of SMEs. However, Cajamarca-Palomo, et al.
(2019) describes that the adoption of cloud computing by SMEs is majorly due to the
increased competition as the business enterprises strive to survive into the market by being
competitive and adopting innovations (Cajamarca-Palomo, et al., 2019). Particularly, SMEs
can save their time, efforts and money by running host services and adopting the cloud
computing. Moreover, this brings efficiency into the business and economy and makes it
productive. Cloud computing provides the benefit of reduction of data centres which in turn
reduces the energy cost for the business through the use of cloud services.
The current situation of adoption of cloud computing is significant as it provides the various
benefits to SMEs in Germany. According to Hentschel, et al. (2018) SMEs in Germany
Document Page
CLOUD SYSTEMS AND APPLICATIONS 3
specifically use cloud computing for data storage and cutting the cost of the operations for the
business and provides the flexibility. A survey of KPMG has stated that in 2016 two of three
companies have successfully used cloud services which are 65% and the additional 18% are
planning to invest in cloud technology in Germany (Hentschel, et al., 2018).
In comparing it with the perspective of Retana, et al. (2018) cloud computing has substantial
effect on the German IT market and is significantly adopted by the large organizations and it
has become the everyday phenomenon. Also, cloud services are extremely important for the
larger organizations in which the organizations such as Microsoft, Amazon and Salesforce
provide cloud services smaller organizations and make cooperation in a complimentary way
(Retana, et al., 2018). Besides, Tehrani & Shirazi (2014) has stated that SMEs adopt cloud
computing to be influenced by various factors such as external competition, innovativeness,
compatibility and the security and privacy of the systems (Tehrani & Shirazi, 2014). Also, the
amount of knowledge possessed by the employee is the main factor behind the adoption of
cloud technologies by SMEs.
Also, Hentschel, et al. (2018) has stated that the current adoption of cloud technology by
SME is developed as it allows the business enterprises to make the digitalization and make
the required changes in IT (Information Technology) department of the company. Also, one
more study conducted by PricewaterhouseCoopers (PwC) in association with ISACA
(Information Systems Audit and Control Association) have determined that 69% of
companies in Germany have been using cloud computing (Hentschel, et al., 2018). Also, due
to the high adoption rates of cloud technology in German market, the rates of risks have also
been increased. Fear of data protection and heavy dependence on the cloud service providers,
it has discouraged the companies to use cloud solutions for their business. Moreover, from
the perspective of Al-Somali & Baghabra (2019) when comparing the use of cloud service by
larger organizations, it has been noted that the organizations have a much higher risk of data
protection and security (Al-Somali & Baghabra, 2019). Due to internationalization and
technological development, large organizations face the security concerns which is the
obstacle in the use of cloud technology.
Question 3
No matter cloud computing provides various benefits to the SMEs in improving their
business operations and also making their systems reliable and centred, it has underpinned
several challenges or threats in the use of cloud services Khan & Al-Yasiri (2016) has
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CLOUD SYSTEMS AND APPLICATIONS 4
explained that there are security threats for SMEs as due to the loss of networks or any other
interference can lead to the destruction of the entire system and thereby leading to downfall
of business (Khan & Al-Yasiri, 2016). On the contrary, Lin, et al. (2017) describes that cloud
computing requires the adherence to the legal framework through third parties. Moreover,
when SMEs adopt the cloud technology, there are certain government policies and the
expansion of the cloud services which are the challenges for the companies that are being
faced for making transitive cloud-based solutions (Lin, et al., 2017).
As per Rittinghouse & Ransome (2017) use of cloud computing for the business requires the
required knowledge and skills. According to it, SMEs face the threat of lack of IT specialist
(Rittinghouse & Ransome, 2017). For example, PaaS and IaaS are considered as complex and
requires the skilled personnel as the minor error can cause potential losses for the company.
Subsequently, the implementation of wrong infrastructure by SMEs can cause the risks of
cyber-attacks that can cause hacking of the confidential data in two countries. From the point
of view of Widyastuti & Irwansyah (2018) there are developmental and operational risk of
cloud computing in which SMEs face the issues such as uncontrolled backup system and the
lack of security of the data interchanges which are concerned to be the major risks which are
operational (Widyastuti & Irwansyah, 2018). Also, SMEs face the financial risks in the
implementation of the SaaS and IaaS platforms that are used by the companies as per their
business needs.
Question 5
As there are risk involved in the implementation of cloud services within the system, cloud
computing security is one of the significant factors which can be used to avoid the various
risk associated with the data and information security. According to Kalaiprasath, et al.
(2017) the employment of the cloud computing security measures is necessary for keeping
the data secured and safe (Kalaiprasath, et al., 2017). Particularly, the companies can adopt
the multifactor authentication for keeping the data safe. This is being done through the code
verification which is sent to the phone number which acts as a single use password. This
process is time consuming, but it can avoid the security threats. Further, Elankavi, et al.
(2017) has stated that use strong passwords and sharing it securely within the company can
be the security measure for the company. Also, allocating of the permissions in the cloud
computing security is an important measure which allows the business to run on the
permissions and sharing of the credentials and the updating of the system can be the measure
Document Page
CLOUD SYSTEMS AND APPLICATIONS 5
for avoiding the threats. Also, use of Virtual Private Network (VPN) for encrypting the
passing data through the third-party encryption tools which can encrypt the files prior to
uploading to the server (Elankavi, et al., 2017).
From the point of view of Dastjerdi, et al. (2016) cloud computing security can be undertaken
as the application needs in which there are preventive, deterrent, detective and corrective
measures are being undertaken for the reduction in the security attacks (Dastjerdi, et al.,
2016). These security measures have the tendency of making the cloud security architecture
for the recognition of the problem and addressing it effectively. On the contrary,
Kalaiprasath, et al. (2017) states that the needs of the applications are supplementary to the
installation of the anti-virus software which is concerned to be the major security option for
the protection against various hackers and malicious software (Kalaiprasath, et al., 2017).
Further, Anwar, et al. (2016) describes that the threats of cloud computing and avoiding the
infrastructure weaknesses can be avoided through the security architecture that allows the
companies to align their architecture with business goals (Anwar, et al., 2016). Also, this
should ensure the storing of data and transferring of data more significantly for preventing
and avoiding the high value data for by complying with the industry standards. Further,
Elankavi, et al. (2017) explained that the security measures should be undertaken for
avoiding the infrastructure weaknesses that are being used through the security model that
includes the efforts of the company for the regular software update and also using
vulnerability control for the reduction in security risk specifically for the IaaS provider
(Elankavi, et al., 2017). Further, the monitoring and auditing of the cloud are specifically
done for the improvement of infrastructural performance and the preventive solutions for the
detection of attacks and anomalies.
Document Page
CLOUD SYSTEMS AND APPLICATIONS 6
References
Alex, M. & Kishore, R., 2017. Forensics framework for cloud computing. Computers &
Electrical Engineering, Volume 60, pp. 193-205.
Al-Somali, S. & Baghabra, H., 2019. Investigating the Determinants of IT Professionals'
Intention to Use Cloud-Based Applications and Solutions: An Extension of the Technology
Acceptance. In: Cloud Security: Concepts, Methodologies, Tools, and Applications. s.l.:IGI
Global, pp. 2039-2058.
Anwar, Z. et al., 2016. A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-
as-a-Service Clouds. IEEE Transactions on Cloud Computing, 6(4), pp. 942-954.
Cajamarca-Palomo, G., Quisimalin-Santamaría, M. & Medina-Chicaiza, P., 2019. Current
Status of the Use of Cloud Computing in SMEs in the City of Latacunga, Ecuador. Open
Journal of Business and Management, 7(2), pp. 633-649.
Dastjerdi, A. et al., 2016. Fog computing: Principles, architectures, and applications. In:
Internet of things . s.l.:Morgan Kaufmann, pp. 61-75.
Elankavi, R., Kalaiprasath, R. & Udayakumar, R., 2017. Cloud Computing Security towards
end to end terminology. International Journal of Pure and Applied Mathematics, 116(24), pp.
205-209.
Hashem, I. et al., 2015. The rise of “big data” on cloud computing: Review and open research
issues. Information systems, Volume 47, pp. 98-115.
Hentschel, R., Leyh, C. & Petznick, A., 2018. Current cloud challenges in Germany: the
perspective of cloud service providers. Journal of Cloud Computing, 7(1), p. 5.
Kalaiprasath, R., Elankavi, R. & Udayakumar, D., 2017. Cloud. security and compliance-A
semantic approach in end to end security. International Journal Of Mechanical Engineering
And Technology (Ijmet), 8(5), pp. 987-994.
Khan, N. & Al-Yasiri, A., 2016. Identifying cloud security threats to strengthen cloud
computing adoption framework. Procedia Computer Science, Volume 94, pp. 485-490.
Kumar, D., Samalia, H. & Verma, P., 2017. Exploring suitability of cloud computing for
small and medium-sized enterprises in India. Journal of Small Business and Enterprise
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CLOUD SYSTEMS AND APPLICATIONS 7
Development.
Kumar, R., 2017. Applications of Cloud Computing in Academic Libraries. Library Waves-A
Biannual Peer Reviewed Journal, 3(1), pp. 80-85.
Lin, F. et al., 2017. Cloud computing system risk estimation and service selection approach
based on cloud focus theory. Neural Computing and Applications, 28(7), pp. 1863-1876.
Mell, P. & Grance, T., 2011. The NIST definition of cloud computing.
Retana, G. et al., 2018. Technology support and post-adoption IT service use: Evidence from
the cloud. MIS Quarterly, 42(3), pp. 961-978.
Rittinghouse, J. & Ransome, J., 2017. Cloud computing: implementation, management, and
security. s.l.:CRC Press.
Tehrani, S. & Shirazi, F., 2014. Factors influencing the adoption of cloud computing by small
and medium size enterprises (SMEs). In: International Conference on Human Interface and
the Management of Information. s.l.:Springer, pp. 631-642.
Widyastuti, D. & Irwansyah, I., 2018. Benefits and challenges of cloud computing
technology adoption in small and medium enterprises (SMEs). Bandung Creative Movement
(BCM) Journal, 4(1).
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]