The Impact of Improper Cloud Security on Infrastructure Costing
VerifiedAdded on 2023/03/31
|21
|5368
|384
Report
AI Summary
This report explores the critical relationship between cloud security and infrastructure costs, emphasizing how inadequate security measures can lead to unnecessary expenses. It reviews literature on resource allocation, cloud security at different layers (IaaS, SaaS, PaaS), and the impact of security breaches on infrastructure costs. The report highlights common cloud information security threats, such as data leaks, compromised accounts, and API hacking, and discusses the importance of addressing these issues to improve efficiency and reduce costs. It also examines the security concerns associated with PaaS, including architectural issues and the compromise of configuration options. Ultimately, the report underscores the importance of proactive security planning to mitigate risks and optimize infrastructure spending in cloud computing environments. Desklib provides a platform to explore this document along with other solved assignments and past papers to aid students in their studies.

Running head: IMPROPER CLOUD SECURITY CAN LEAD TO INFRASTRUCTURE COSTING
Improper Cloud Security can lead to unnecessary infrastructure costing
Name of the Student
Name of the University
Author Note
Improper Cloud Security can lead to unnecessary infrastructure costing
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1IMPROPER CLOUD SECURITY CAN LEAD TO INFRASTRUCTURE COSTING
Table of Contents
Introduction..........................................................................................................................2
Literature review..................................................................................................................2
Research Gap.....................................................................................................................15
Conclusion.........................................................................................................................15
References..........................................................................................................................16
Table of Contents
Introduction..........................................................................................................................2
Literature review..................................................................................................................2
Research Gap.....................................................................................................................15
Conclusion.........................................................................................................................15
References..........................................................................................................................16

2IMPROPER CLOUD SECURITY CAN LEAD TO INFRASTRUCTURE COSTING
Introduction
The foremost determination of this paper is to focus on the different aspects of
cloud computing, which increases the infrastructure costing of this service. Secondary
data collection procedure will be considered in this paper, where researchers will state
their opinion about the usability and the challenges of using cloud computing services in
commercial establishments. This paper will be providing detailed analysis of the topic
from peer-reviewed sources.
Literature review
Finding of resource allocation
As mentioned by Raza, Rashid and Awan (2017), resource allocation can be very
much important for most of the commercial establishment as it helps in the virtualization
of the resources. The investigator of the paper stated that the both the hardware as well as
software resources must be aligned with the need of the service. The paper highlighted
the importance of task scheduling in the cloud computing environments as the effective
planning is required before the implementation of the cloud services. The investigator of
the paper stated that scheduling of the task scheduling is very much important in a cloud
computing environment as it can help to manage the business data which are stored the
cloud servers (Islam, Manivannan and Zeadally 2016). The different scheduling
techniques which are useful to improve the security of the data stored in the cloud are
mentioned by the investigators. The complexities of the cloud computing were presented
in the paper in an organized manner, at the same time the usability of the task scheduling
algorithms can be understood from the paper as well. The paper is very much very
important to understand the importance which are needed to be given by the commercial
Introduction
The foremost determination of this paper is to focus on the different aspects of
cloud computing, which increases the infrastructure costing of this service. Secondary
data collection procedure will be considered in this paper, where researchers will state
their opinion about the usability and the challenges of using cloud computing services in
commercial establishments. This paper will be providing detailed analysis of the topic
from peer-reviewed sources.
Literature review
Finding of resource allocation
As mentioned by Raza, Rashid and Awan (2017), resource allocation can be very
much important for most of the commercial establishment as it helps in the virtualization
of the resources. The investigator of the paper stated that the both the hardware as well as
software resources must be aligned with the need of the service. The paper highlighted
the importance of task scheduling in the cloud computing environments as the effective
planning is required before the implementation of the cloud services. The investigator of
the paper stated that scheduling of the task scheduling is very much important in a cloud
computing environment as it can help to manage the business data which are stored the
cloud servers (Islam, Manivannan and Zeadally 2016). The different scheduling
techniques which are useful to improve the security of the data stored in the cloud are
mentioned by the investigators. The complexities of the cloud computing were presented
in the paper in an organized manner, at the same time the usability of the task scheduling
algorithms can be understood from the paper as well. The paper is very much very
important to understand the importance which are needed to be given by the commercial
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3IMPROPER CLOUD SECURITY CAN LEAD TO INFRASTRUCTURE COSTING
establishments to improve the systems performance as there are lots of infrastructure cost
during the planning and implementation of the cloud services. This paper was very much
important to understand the usability of the different porting applications which can be
used in different cloud servers (Akinrolabu, New and Martin 2018). The main benefits of
the paper is it helps in identifying the benefits of the cloud computing services in terms of
the enhanced productivity. The investigator of the paper stated that the flexibility of the
business can also be improved using planned cloud computing services. The investigator
of the paper described about that the complexity of the business functions which can be
categorically addressed using the cloud computing. The prime advantage of the paper is
the detailed description of the benefits of using cloud computing for business purposes.
The main limitation of the paper is the lack of critical analysis of the cloud computing
services as it would have helped the commercial establishments to understand the exact
cloud computing options.
However, Rao (2016), load balancing and storage environment are the main
specifications of cloud computing. The investigator of the paper also stated that the
security of the business data and the financial data can be maintained using the effiecient
cloud computing services. The investigator of the paper also explained the challenges of
using cloud services in terms of the cyber security threats coming from outside the
business environment. The researcher of the paper also helped in understanding the
security issues coming from inside the organization as some of the commercial
establishments have huge amount of threat coming from the vendors who have the access
of the organizational network which has to be resolved by proper planning (Jena and
Mohanty 2017). The main advantage of the paper is the detailed description of the
resource allocation in terms of resource contention, scarcity of resources, resource
establishments to improve the systems performance as there are lots of infrastructure cost
during the planning and implementation of the cloud services. This paper was very much
important to understand the usability of the different porting applications which can be
used in different cloud servers (Akinrolabu, New and Martin 2018). The main benefits of
the paper is it helps in identifying the benefits of the cloud computing services in terms of
the enhanced productivity. The investigator of the paper stated that the flexibility of the
business can also be improved using planned cloud computing services. The investigator
of the paper described about that the complexity of the business functions which can be
categorically addressed using the cloud computing. The prime advantage of the paper is
the detailed description of the benefits of using cloud computing for business purposes.
The main limitation of the paper is the lack of critical analysis of the cloud computing
services as it would have helped the commercial establishments to understand the exact
cloud computing options.
However, Rao (2016), load balancing and storage environment are the main
specifications of cloud computing. The investigator of the paper also stated that the
security of the business data and the financial data can be maintained using the effiecient
cloud computing services. The investigator of the paper also explained the challenges of
using cloud services in terms of the cyber security threats coming from outside the
business environment. The researcher of the paper also helped in understanding the
security issues coming from inside the organization as some of the commercial
establishments have huge amount of threat coming from the vendors who have the access
of the organizational network which has to be resolved by proper planning (Jena and
Mohanty 2017). The main advantage of the paper is the detailed description of the
resource allocation in terms of resource contention, scarcity of resources, resource
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4IMPROPER CLOUD SECURITY CAN LEAD TO INFRASTRUCTURE COSTING
fragmentation, over provisioning of the resources as well as the under provisioning of the
resources. The input parameters of resources allocation is stated in a detailed manner in
this paper in terms of the provider of the cloud computing services and the customers of
the industries who are using the cloud computing services. However, this paper also have
some limitations as well as it does not discusses the resource allocation strategies in a
detailed manner. Thus, it can be said the importance of resource allocation can be
understood from this paper.
Cloud Security (PaaS)
According to Akinrolabu, New, and Martin (2018), there are security concerns in
each of the layers of cloud computing which has to be resolved by the users so that the
purpose behind using of the cloud services is maintained. The researcher of the paper
highlighted about the security concerns of each of the layers of cloud computing such as
IaaS, SaaS, and PaaS. The investigator of this paper added that most of the IaaS refers to
the cloud network, hardware, website and application hosting servers. The paper stated
that the role of the network architects is very much important to address the privacy
concerns of the cloud services (Ali et al. 2015). The paper was also very much useful to
identify the security concerns of the PaaS as well. The investigator of the paper added
that security concerns come also from the developers and the designers of the software
and application which uses the cloud servers. The investigator of the paper stated that
granularity can be the other significant limitation of PaaS. The investigator of the paper
stated about the security concerns of the developers tools such as the Apache, MySQL,
Ruby, Dokku and Gitlab. Detailed description of the security issues of SaaS was also
discussed in this paper as well, the paper successfully highlighted the security issues
coming from numerous software which are incorporated in the SaaS. The investigator of
fragmentation, over provisioning of the resources as well as the under provisioning of the
resources. The input parameters of resources allocation is stated in a detailed manner in
this paper in terms of the provider of the cloud computing services and the customers of
the industries who are using the cloud computing services. However, this paper also have
some limitations as well as it does not discusses the resource allocation strategies in a
detailed manner. Thus, it can be said the importance of resource allocation can be
understood from this paper.
Cloud Security (PaaS)
According to Akinrolabu, New, and Martin (2018), there are security concerns in
each of the layers of cloud computing which has to be resolved by the users so that the
purpose behind using of the cloud services is maintained. The researcher of the paper
highlighted about the security concerns of each of the layers of cloud computing such as
IaaS, SaaS, and PaaS. The investigator of this paper added that most of the IaaS refers to
the cloud network, hardware, website and application hosting servers. The paper stated
that the role of the network architects is very much important to address the privacy
concerns of the cloud services (Ali et al. 2015). The paper was also very much useful to
identify the security concerns of the PaaS as well. The investigator of the paper added
that security concerns come also from the developers and the designers of the software
and application which uses the cloud servers. The investigator of the paper stated that
granularity can be the other significant limitation of PaaS. The investigator of the paper
stated about the security concerns of the developers tools such as the Apache, MySQL,
Ruby, Dokku and Gitlab. Detailed description of the security issues of SaaS was also
discussed in this paper as well, the paper successfully highlighted the security issues
coming from numerous software which are incorporated in the SaaS. The investigator of

5IMPROPER CLOUD SECURITY CAN LEAD TO INFRASTRUCTURE COSTING
the paper also highlighted the importance of the privacy concerns of the TCP/IP protocol
for the users of the cloud security devices. One of the prime advantages of this paper is
the detailed description of the security concerns of the developers tools which are
increasing used in most of for commercial establishments all around the world. The
prime limitation of the paper is that it does not provide a detailed description of the
security concerns of the TCP/IP protocol as it increase the infrastructural cost of the
cloud computing services. Thus, the paper is very much important for the commercial
establishments to understand that there are privacy concerns in each layer of computing,
these privacy concerns must be addressed so that the infrastructure of cloud computing is
reduced.
Infrastructure Costing
As mentioned by However Yu et al. (2015), there are numerous privacy concerns
associated the use of the cloud based services which has to be planned before the
implementation of the cloud services. The researcher of this paper also stated about the
privacy concerns of the traditional cloud models. The investigator of the paper also
highlighted the threats coming from both or outside the cloud services as these threat can
have an undesirable impact on the data which are stored, edited and managed from the
cloud servers (Aljawarneh, Alawneh and Jaradat 2017). The data breaching possibilities
of IaaS was also mentioned by the paper as it may have a direct impact on the
infrastructural cost of cloud computing. The researcher of this paper also highlighted that
the data breaching activities can have a significant impact on the cloud computing
business. The investigator added that lots of virtual machines are increasingly being
added to the cloud services. The investigator of the paper mentioned that the
authentication issues can have a significant impact on the security of the data which are
the paper also highlighted the importance of the privacy concerns of the TCP/IP protocol
for the users of the cloud security devices. One of the prime advantages of this paper is
the detailed description of the security concerns of the developers tools which are
increasing used in most of for commercial establishments all around the world. The
prime limitation of the paper is that it does not provide a detailed description of the
security concerns of the TCP/IP protocol as it increase the infrastructural cost of the
cloud computing services. Thus, the paper is very much important for the commercial
establishments to understand that there are privacy concerns in each layer of computing,
these privacy concerns must be addressed so that the infrastructure of cloud computing is
reduced.
Infrastructure Costing
As mentioned by However Yu et al. (2015), there are numerous privacy concerns
associated the use of the cloud based services which has to be planned before the
implementation of the cloud services. The researcher of this paper also stated about the
privacy concerns of the traditional cloud models. The investigator of the paper also
highlighted the threats coming from both or outside the cloud services as these threat can
have an undesirable impact on the data which are stored, edited and managed from the
cloud servers (Aljawarneh, Alawneh and Jaradat 2017). The data breaching possibilities
of IaaS was also mentioned by the paper as it may have a direct impact on the
infrastructural cost of cloud computing. The researcher of this paper also highlighted that
the data breaching activities can have a significant impact on the cloud computing
business. The investigator added that lots of virtual machines are increasingly being
added to the cloud services. The investigator of the paper mentioned that the
authentication issues can have a significant impact on the security of the data which are
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6IMPROPER CLOUD SECURITY CAN LEAD TO INFRASTRUCTURE COSTING
stored in the cloud servers. The API issues of the cloud servers was discussed in this
paper as well. The importance of maintaining security and safety in the cloud based
services was also presented in the paper as well. Wu et al. (2018), added that data
encapsulation as well as data encryption can be very much significant to enhance the
security of the data which are stored in the cloud servers. The investigator of this paper
also added that most of the privacy concerns of the cloud based services is mainly due to
the compromise of the CA certificate. The investigator of the paper also suggested the
importance of maintaining the root level certificates which are very much useful during
the implementation of cloud services to address the API issues. This paper has lots of
advantages as well as constraints, associated with them which can be very much
beneficial for the management team of the commercial establishment to manage and plan
their infrastructural costing. The prime limitation of this paper is it does not discuss the
impact of the data breaching activities on the cloud computing services.
Cloud security and its impact on infrastructure costing
As stated by Tang et al. (2016), cloud information security threats as data leaks,
compromising of the accounts and authentication issue are the major security threats of
the cloud computing services. The API hacking of the cloud services must be resolved by
proper planning in the first place so that in order to improve the efficiency of the cloud
services. The researcher of the paper also suggested the security threats such as the
threats coming from threats such as ransomware and Denial of Service (DoS) can have a
huge negative impact on the service provided by the cloud security. The investigator of
the paper stated that the issues of the cloud services usually have a negative impact on
both the commercial establishments as well as in our society (Aljawarneh, Alawneh and
Jaradat 2017). The investigator of the paper added that the lack of awareness can be the
stored in the cloud servers. The API issues of the cloud servers was discussed in this
paper as well. The importance of maintaining security and safety in the cloud based
services was also presented in the paper as well. Wu et al. (2018), added that data
encapsulation as well as data encryption can be very much significant to enhance the
security of the data which are stored in the cloud servers. The investigator of this paper
also added that most of the privacy concerns of the cloud based services is mainly due to
the compromise of the CA certificate. The investigator of the paper also suggested the
importance of maintaining the root level certificates which are very much useful during
the implementation of cloud services to address the API issues. This paper has lots of
advantages as well as constraints, associated with them which can be very much
beneficial for the management team of the commercial establishment to manage and plan
their infrastructural costing. The prime limitation of this paper is it does not discuss the
impact of the data breaching activities on the cloud computing services.
Cloud security and its impact on infrastructure costing
As stated by Tang et al. (2016), cloud information security threats as data leaks,
compromising of the accounts and authentication issue are the major security threats of
the cloud computing services. The API hacking of the cloud services must be resolved by
proper planning in the first place so that in order to improve the efficiency of the cloud
services. The researcher of the paper also suggested the security threats such as the
threats coming from threats such as ransomware and Denial of Service (DoS) can have a
huge negative impact on the service provided by the cloud security. The investigator of
the paper stated that the issues of the cloud services usually have a negative impact on
both the commercial establishments as well as in our society (Aljawarneh, Alawneh and
Jaradat 2017). The investigator of the paper added that the lack of awareness can be the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7IMPROPER CLOUD SECURITY CAN LEAD TO INFRASTRUCTURE COSTING
other significant issues of the cloud based services, the researchers of the paper also
added that the security of the applications which are managed from the cloud based
solutions has to be maintained in the first place as it can help commercial establishment
to reduce the infrastructural costs of maintaining the cloud services.
However, as mentioned by Singh, Jeong and Park (2016), there are a lots of
security issue associated with PaaS which are needed to mitigated using professional IT
project governance plan. The researcher of the paper stated that the privacy concerns of
the PaaS arises mostly from the architectural issues of the software developers. The
investigator of this paper has described most of the security issues of the PaaS in terms of
the management of the applications and the compromise of the configuration options
(Chen et al. 2015). The investigator of the paper stated that the compromise of the PaaS
software can have a significant impact on the data which are stored in the cloud servers.
The infrastructural complexities of PaaS can have a significant impact on the commercial
establishments where data is considered as an asset. Breaking out of the sandbox is the
other security concern associated with PaaS as stated by the investigator of this resource
which are needed to be resolved in a planner manner. The complexities as well as the
concerns of the java virtual environment was also stated by the investigator in this
resource. This paper have both benefits as well as limitations, the prime benefits of this
paper is the detailed description of the security concerns of PaaS which can be mitigated
with proper planning (Dey, Islam, and Arif 2019). The main limitation of the paper is it
does not discuss the infrastructural complexities of PaaS which could have helped the
commercial establishments to address the security issue of PaaS. Thus, this paper is very
much important to understand the numerous security issues of cloud computing services
which can raise the infrastructural cost of using cloud services.
other significant issues of the cloud based services, the researchers of the paper also
added that the security of the applications which are managed from the cloud based
solutions has to be maintained in the first place as it can help commercial establishment
to reduce the infrastructural costs of maintaining the cloud services.
However, as mentioned by Singh, Jeong and Park (2016), there are a lots of
security issue associated with PaaS which are needed to mitigated using professional IT
project governance plan. The researcher of the paper stated that the privacy concerns of
the PaaS arises mostly from the architectural issues of the software developers. The
investigator of this paper has described most of the security issues of the PaaS in terms of
the management of the applications and the compromise of the configuration options
(Chen et al. 2015). The investigator of the paper stated that the compromise of the PaaS
software can have a significant impact on the data which are stored in the cloud servers.
The infrastructural complexities of PaaS can have a significant impact on the commercial
establishments where data is considered as an asset. Breaking out of the sandbox is the
other security concern associated with PaaS as stated by the investigator of this resource
which are needed to be resolved in a planner manner. The complexities as well as the
concerns of the java virtual environment was also stated by the investigator in this
resource. This paper have both benefits as well as limitations, the prime benefits of this
paper is the detailed description of the security concerns of PaaS which can be mitigated
with proper planning (Dey, Islam, and Arif 2019). The main limitation of the paper is it
does not discuss the infrastructural complexities of PaaS which could have helped the
commercial establishments to address the security issue of PaaS. Thus, this paper is very
much important to understand the numerous security issues of cloud computing services
which can raise the infrastructural cost of using cloud services.

8IMPROPER CLOUD SECURITY CAN LEAD TO INFRASTRUCTURE COSTING
Cloud security Issues of cloud computing
As argued by Tang et al. (2016), there are lots of security and privacy concerns
associated with the use of the cloud computing services in most of commercial
establishments all over the world which are needed to be addressed with professional IT
plan. The researcher of the paper stated that most of the commercial establishment must
be maintaining IT risk management team who will be working dedicatedly to address the
computing issues faced by both the external stakeholders of the business as well as the
internal stakeholders of the business such as the employees and the operational heads.
The latency issues of the cloud service services providers was highlighted in a descriptive
manner in this paper. Uptime of the resources have a huge negative impact on the cloud
computing services (Di Giulio et al. 2017). The main advantage of the paper is the
detailed description of the cloud computing issues which are faced by most of the
corporate establishments all over the world. The importance of the IT risk management
plan in the commercial establishment can also be considered in the paper. At the same
time, it can also be said that the factors responsible for the security issues can also be
identified from this paper. The main limitation of the paper is that it does not describes
the way through which the security issues of cloud computing can be avoided.
However, Singh, Jeong, and Park (2016), stated that application level security
plan can be every much important to address the security issues of the cloud services for
which the infrastructural cost of this service increases. Data backup and data recovery are
the two prime aspects of cloud security. The business challenges of the cloud computing
services must be understood by the management as well as the IT department of this
Cloud security Issues of cloud computing
As argued by Tang et al. (2016), there are lots of security and privacy concerns
associated with the use of the cloud computing services in most of commercial
establishments all over the world which are needed to be addressed with professional IT
plan. The researcher of the paper stated that most of the commercial establishment must
be maintaining IT risk management team who will be working dedicatedly to address the
computing issues faced by both the external stakeholders of the business as well as the
internal stakeholders of the business such as the employees and the operational heads.
The latency issues of the cloud service services providers was highlighted in a descriptive
manner in this paper. Uptime of the resources have a huge negative impact on the cloud
computing services (Di Giulio et al. 2017). The main advantage of the paper is the
detailed description of the cloud computing issues which are faced by most of the
corporate establishments all over the world. The importance of the IT risk management
plan in the commercial establishment can also be considered in the paper. At the same
time, it can also be said that the factors responsible for the security issues can also be
identified from this paper. The main limitation of the paper is that it does not describes
the way through which the security issues of cloud computing can be avoided.
However, Singh, Jeong, and Park (2016), stated that application level security
plan can be every much important to address the security issues of the cloud services for
which the infrastructural cost of this service increases. Data backup and data recovery are
the two prime aspects of cloud security. The business challenges of the cloud computing
services must be understood by the management as well as the IT department of this
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9IMPROPER CLOUD SECURITY CAN LEAD TO INFRASTRUCTURE COSTING
organization (Elsayed and Zulkernine 2016). The investigator of this resource helps in
identification of the cloud computing solutions in terms of the inability of the commercial
establishments to stitch vendors as security threat can also come from vendors and third
party vendors. The internal resistance to process change is the other significant business
challenge of cloud computing services. The investigator of the paper highlighted that the
loss of control over the IT operations can be one of the most significant reason behind the
infrastructural cost issues in cloud security. The investigator of the paper suggested that
the environmental challenges of the cloud computing services also have to be addressed
in a professional manner by the IT risk management team to reduce the infrastructural
cost (Garrison, Rebman and Kim 2018.). The importance of maintaining the value
proposition was stated by the researcher in an organized manner as well. The investigator
of this paper stated that most of the security concerns associated with the use of the cloud
computing services has to be minimized using IT governance team. The limitation of the
cloud computing platforms was stated in this paper in an organized manner. Thus, this
paper is very much important to understand the ways to mitigate the security issues of
cloud computing services which is increasingly used by most of the commercial
establishments all over the world.
Effective algorithm in cloud computing
As mentioned by Rahman, Daud and Mohamad (2016), cost-effective algorithm
can be very much important to manage the workflow scheduling in cloud computing. The
investigator of the paper stated that the deadlines issues of the commercial establishments
can be successfully addressed using the cost-effective algorithm. The investigator of the
paper suggested that the cost effective algorithm can be very much useful to schedule
strategies of resource management, financial management in most of the corporate
organization (Elsayed and Zulkernine 2016). The investigator of this resource helps in
identification of the cloud computing solutions in terms of the inability of the commercial
establishments to stitch vendors as security threat can also come from vendors and third
party vendors. The internal resistance to process change is the other significant business
challenge of cloud computing services. The investigator of the paper highlighted that the
loss of control over the IT operations can be one of the most significant reason behind the
infrastructural cost issues in cloud security. The investigator of the paper suggested that
the environmental challenges of the cloud computing services also have to be addressed
in a professional manner by the IT risk management team to reduce the infrastructural
cost (Garrison, Rebman and Kim 2018.). The importance of maintaining the value
proposition was stated by the researcher in an organized manner as well. The investigator
of this paper stated that most of the security concerns associated with the use of the cloud
computing services has to be minimized using IT governance team. The limitation of the
cloud computing platforms was stated in this paper in an organized manner. Thus, this
paper is very much important to understand the ways to mitigate the security issues of
cloud computing services which is increasingly used by most of the commercial
establishments all over the world.
Effective algorithm in cloud computing
As mentioned by Rahman, Daud and Mohamad (2016), cost-effective algorithm
can be very much important to manage the workflow scheduling in cloud computing. The
investigator of the paper stated that the deadlines issues of the commercial establishments
can be successfully addressed using the cost-effective algorithm. The investigator of the
paper suggested that the cost effective algorithm can be very much useful to schedule
strategies of resource management, financial management in most of the corporate
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10IMPROPER CLOUD SECURITY CAN LEAD TO INFRASTRUCTURE COSTING
establishments. The investigator of this paper suggested that the use of the Ant Colony
Optimization (ACO) and Chemical Reaction Optimization (CRO) is very much important
to address the work flow scheduling issues of the cloud computing environment. The
significance of the cloud sim tool kit was also presented in the paper in a professional
manner (Gou,Yamaguchi and Gupta 2017). This resource us very much useful to
understand the role of cloud computing services in the across numerous industries. The
paper also proved in-depth discussion about the use of the cloud computing service. The
main advantage of this paper is the detailed description of the work flow scheduling
algorithms which can be very much important to address the dynamic priorities of the
major commercial establishments. The paper also have significant limitations as well as it
did not describe the limitations of the of the security algorithms for cloud computing
services.
As discussed by Yu et al. (2018), lack of secure cloud security plan process is one
of the most significant issues of the increasing the infrastructural cost of cloud computing
services as well. The researcher of the paper stated that most of the business
organizations does not consider the use of cloud service implementation plan which can
lead to sever complexities in PaaS. The papers help in the identification of the security
concerns of PaaS in an organized manner. The other issues of PaaS which can be found is
the absence of the security plan is the protection methodology against the threats coming
from outside the business organization such as the regular updating of the software
patches. The importance of monitoring the software patches is also highlighted in this
paper, at the same time the paper also highlighted the audit requirements which can be
very much important to address the security issues of PaaS. The significance of network
encryption, data encryption, access control, cloud access security broker, vulnerability
establishments. The investigator of this paper suggested that the use of the Ant Colony
Optimization (ACO) and Chemical Reaction Optimization (CRO) is very much important
to address the work flow scheduling issues of the cloud computing environment. The
significance of the cloud sim tool kit was also presented in the paper in a professional
manner (Gou,Yamaguchi and Gupta 2017). This resource us very much useful to
understand the role of cloud computing services in the across numerous industries. The
paper also proved in-depth discussion about the use of the cloud computing service. The
main advantage of this paper is the detailed description of the work flow scheduling
algorithms which can be very much important to address the dynamic priorities of the
major commercial establishments. The paper also have significant limitations as well as it
did not describe the limitations of the of the security algorithms for cloud computing
services.
As discussed by Yu et al. (2018), lack of secure cloud security plan process is one
of the most significant issues of the increasing the infrastructural cost of cloud computing
services as well. The researcher of the paper stated that most of the business
organizations does not consider the use of cloud service implementation plan which can
lead to sever complexities in PaaS. The papers help in the identification of the security
concerns of PaaS in an organized manner. The other issues of PaaS which can be found is
the absence of the security plan is the protection methodology against the threats coming
from outside the business organization such as the regular updating of the software
patches. The importance of monitoring the software patches is also highlighted in this
paper, at the same time the paper also highlighted the audit requirements which can be
very much important to address the security issues of PaaS. The significance of network
encryption, data encryption, access control, cloud access security broker, vulnerability

11IMPROPER CLOUD SECURITY CAN LEAD TO INFRASTRUCTURE COSTING
control, and training of the staffs in the cloud service implementation plan is mentioned
in the paper in an organized manner (Gugnani et al. 2016). The main advantage of the
paper is that it helps in understanding the importance of maintaining software
development life cycle during the designing and the development phase of a software
which are incorporated in the cloud computing solutions. The prime limitation of this
paper is the lack of a detailed description of the techniques which are used to ensure the
safety and the security of the data which are stored in the cloud servers. The paper also
have other drawback as it does not discuss the limitations of the techniques which can be
used to address the cloud computing issues.
However, Wu et al. (2018), stated that most of the security issues of the cloud
computing can be addressed if the employees of the commercial establishment
understand the security concerns of each level of the organizational network and plan
accordingly. The researcher added that the security issues can result in increasing the
infrastructural cost of the cloud computing services (Islam, Manivannan and Zeadally
2016). The investigator of this resources also helps in understanding the importance of
maintain auditing system which can be very much effective to understand as well as
mitigate the security concerns of cloud computing. The investigator of this resource
stated that most of the global corporate establishments must be understanding the
importance of maintaining the security tools which allows the network administrators the
potential data loss risks as it can provide high level protection to the organizational
assets.
The concept of federal cloud was stated by the investigator of the paper in an
organized manner, at the same time the researcher of this paper also stated that stringent
cloud protocols can be very much important to maintain the global standard for the cloud
control, and training of the staffs in the cloud service implementation plan is mentioned
in the paper in an organized manner (Gugnani et al. 2016). The main advantage of the
paper is that it helps in understanding the importance of maintaining software
development life cycle during the designing and the development phase of a software
which are incorporated in the cloud computing solutions. The prime limitation of this
paper is the lack of a detailed description of the techniques which are used to ensure the
safety and the security of the data which are stored in the cloud servers. The paper also
have other drawback as it does not discuss the limitations of the techniques which can be
used to address the cloud computing issues.
However, Wu et al. (2018), stated that most of the security issues of the cloud
computing can be addressed if the employees of the commercial establishment
understand the security concerns of each level of the organizational network and plan
accordingly. The researcher added that the security issues can result in increasing the
infrastructural cost of the cloud computing services (Islam, Manivannan and Zeadally
2016). The investigator of this resources also helps in understanding the importance of
maintain auditing system which can be very much effective to understand as well as
mitigate the security concerns of cloud computing. The investigator of this resource
stated that most of the global corporate establishments must be understanding the
importance of maintaining the security tools which allows the network administrators the
potential data loss risks as it can provide high level protection to the organizational
assets.
The concept of federal cloud was stated by the investigator of the paper in an
organized manner, at the same time the researcher of this paper also stated that stringent
cloud protocols can be very much important to maintain the global standard for the cloud
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 21
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





