Cloud Computing Research Report
‘Towards Transparent and Trustworthy Cloud’
‘Cloud computing’, by definition, is the applying of a network of distant servers that are hosted on the internet and are used for various processes such as to store, manage, and process data, relatively than any local server or a laptop of a Personal Computer (PC) (Carrol, Merwe and Kotze, 2011). It is a vast term that describes the benefits of the connection modern age computers. Cloud computing serves as a storage factor in the organizations due to its requirement to store huge data and is also a very interactive space for the customers. It has numerous advantages such as increase in the efficiency of data and cost flow. It is as well known for its potential to advance the businesses and the IT sector. Even though, cloud computing is widely known for its advantages, it is often a subject of security concern. The consumer usually feels the lack of transparency leading to mistrust. The research paper discusses the uses of cloud computing and the concerns of it. Also, it suggests ways to assure the customer of cloud computing and its certification. In addition, it describes the methods and applications of assurance which seems to be the only solution to the problems of cloud computing.
Visit this site if you need professional help with Cloud Computing from experts!
However not much the customers are assured of the safety in cloud computing as they often feel the lack of transparency. Cloud service providers do not display the actions and measurements taken by them to protect the information of the customer which leaves them vulnerable. They are not entirely assured of their data security. This lack of trust leads to misunderstanding. One must understand the difference between cloud security and cloud security assurance. The former one focuses on providing a safe environment for the users where as the later aims to achieve confidence of the user based on infrastructure and applications used. The concept of security involves mechanisms while assurance involves the collection and evaluation of evidences to support the security properties of the system. There are numerous assurance practices that can be installed such as audit, certification and compliance techniques (Anisetti, Ardagna and Damiani, 2017).
The research of the assurance usually includes collection and validation of the evidence to prove the security reliable. For the research to be effective, it must follow several prerequisites such as that an authority must be involves, the collection of evidences in a standardized manner and must be verified and the evidences must be versatile and reliable in nature. The main objective behind the collection of the evidences is to render transparency. Standardizing of the evidences is usually sustained with the help of Evidence Collection Model (ECM) and Service Under Verification (SUV). Evidences are of three types – test-based, monitoring-based and Trusted Computing-based. Two types of evidence collection models are described in the research paper namely Hybrid evidence collection model (Hybrid ECM) and Incremental evidence collection model (Incremental ECM). Hybrid ECM aims on effectively verifying the evidences where as Incremental ECM aims to develop the resilience of assurance progressions and consequent outcomes to the events of cloud computing. Certification infrastrUcture for MUlti-Layer cloUd Services (CUMULUS) is a technology introduced to approach the proviso of infrastructure. As a project, its main concern is to define models, methodologies and tools required for cloud certification. Its design is based on master – slave concept. It has two counterparts which are Evidence Collection Manager (EM) and Evidence Gathering Agent (EA). The research paper also has a case study to support its research questions. The case study regards a real – world setting which includes an application for the distant running of public lighting (Anisetti, Ardagna and Damiani, 2017). It uses Hybrid ECM and the evidences are collected according to the Certificate Life Cycle (CLC). CLC illustrates the development of the certificate status from its issuing to its revocation, deferment, termination, or revamping (Anisetti, Ardagna and Damiani, 2017).
Assurance of security can take cloud computing to a whole new level. It will attract new businesses and will pave way for the development of new technologies using it as a base. Nevertheless, it is not totally perfect and requires to work through its cons to be financially beneficial. It is necessary for the service providers to evaluate the costs and risks of the cloud computing and should analyze its performance from time to time in order to keep improving. Given the elements of the cloud computing and the need to administer developing evidence, a sound trust model must be defined, accessible whenever and wherever and must be a way to deal with the dynamic age of assurance outcomes. So, cloud computing will be the most productive when it earns the trust of the customer.
This world of technology is ever – changing. It is constantly developing. One of the major aspects of technology is ‘Cloud Computing’. It has turned out to be asset for the organizations. Most of the companies rely on cloud computing for various reasons. Cloud computing is essentially known for storage. People generally use it for its large storage area. We may not know what will happen in the future but we can share our assumptions and ideas regarding it. Cloud computing is the future of the internet – based activities. It has been worth the hard work.
In the coming years, cloud computing will be widely used in business due to its increased storage capacity. It will eventually increase in the storage capacity. Its working will become more advanced and efficient. The majority of the cloud computing service providers believe that cloud computing will become a combination of several cloud based products. I think that cloud computing will develop to become hybrid in nature as in it will be serving both privately and publically. I am certain that it will be server-less as we are already moving towards a wireless generation. The storage capacity will also increase making it more valuable because this era is dependent on the digital data. In addition, many organizations have started transferring their data to these servers as they offer large storage spaces and are cheaper compared to other products. They buy their products from trusted sources. Due to all this, the security of cloud computing will be enhanced and efficient.
Even though cloud computing has a promising future, it lacks in the security sector. In today’s date, it is expensive and slow. I believe that cloud computing can be more effective if the security is unbreakable. Transparency and trust seems to be the major problems that are restricting the development of cloud computing. Firstly, I think we should work to increase the speed of cloud computing. The business sector seems to be the most attracted to the concept of cloud computing and the organizations will utilize it only when they believe they can rely on it. Therefore, it is necessary to create software that will help to bring the cost of cloud computing down and will as well increase the speed of it.
With the advancement in cloud computing, it will be necessary for the security to be advanced as well due to the fact that the virtual environment is vast and has lots of scope for security breaches. The transparency and trust issues must be next to nil for it to attain a reliable status. For cloud computing to be trustworthy, it should implement various measurements to protect the data of the customers. According to me, the integration of Artificial Intelligence (AI) with cloud computing can be a good start. The walls of these servers can be fortified using machine language. Artificial intelligence has been gaining popularity amongst both people and organizations. We can incorporate the intelligence of the machines for the security of cloud computing as they are more versatile and are smarter than humans. Hackers won’t be able to cross the security walls embedded with machine language. However, the programming of the machines should be such that it adapts to the creative ways of the hackers and also adopts the techniques used by these criminals so that the next time they use similar technique, they don’t get past the fortified walls. It will become automated in the upcoming years and will not be relying on the service providers. Even if all this will increase cloud computing security, for the people to feel at ease and increase their trust on it, the customers need assurance. There must be implantation of new security assurance techniques. There will be transparency between the customer and the cloud computing because it will no more be controlled by people. Since the security will be based more on the machines, there will be no need to hide the processes from the customers. Assurances will lead to trust and trust will increase the customer base for cloud computing.
To conclude, cloud computing will take an entirely new path and will become one of the most invested and effective technology. It will be in use everywhere. The efficiency of work will increase. The future cloud computing will support advanced security methods to safeguard the data and information of the customers. The security systems will be more adaptable to the changing technology and will be able to hack the hackers, thus providing a safe environment for the users. Cloud computing will not remain as a single entity but rather will become a combination of many cloud products and will be more effective than its previous version. It will also be more versatile and advanced. The cost of the installed security will not be expensive and will remain as a one-time investment. Cloud computing will be more secured and secluded in the near future.All free term paper examples and essay samples you can find online are plagiarized. Don't use them as your own academic papers! If you need original term papers, research papers or essays of the highest quality, don't hesitate to contact professional academic writing services like EssayLib. Here you can order your custom paper written according to your specifications. A team of highly qualified writers are available 24/7 for immediate help:
Anisetti, Marco, Claudio A. Ardagna and Ernesto Damiani. (2017). “Towards Transparent and Trustworthy Cloud.” IEEE Cloud Computing. Vol. 17. Pp. 40-48. ISBN 2325-6095
Carrol, Mariana Alta van der Merwe and Paula Kotze. (2011). “Secure Cloud Computing: Benefits, risks and controls.” Information Security for South Africa pp. 1-9
“Future of Cloud Computing – 7 Trends & Prediction about Cloud.” (2019). Retrieved from https://data-flair.training/blogs/future-of-cloud-computing/amp/
Johnson, Ann. “The Future Is Bright for Cloud Security.” (2018). Retrieved from https://www.securityroundtable.org/future-of-cloud-security/
O’Neill, Eric. (2018). “THE FUTURE OF CYBERSECURITY IS IN THE CLOUD” Retrieved from https://www.gigabitmagazine.com/cloud-computing/future-cybersecurty-cloud?amp
Takabi, Hassan and James B.D. Joshi. (2010). “Security and Privacy Challenges in Cloud Computing Environments.” Arizona State University. Vol. 10. Pp.24-31. Retrieved from ISBN 1540-7993