Question

In: Computer Science

1) Privacy/Security 2) Deployment 3) Heterogenous computig(cloud, distributed computing) is these challenges still exist today and...

1) Privacy/Security

2) Deployment

3) Heterogenous computig(cloud, distributed computing)

is these challenges still exist today and is there any other challanges exist also ?

It is related to issues with computer and cloud computing

Solutions

Expert Solution

Cloud computing is an effective way to supplement the current resources/delivery model for IT services based on the Internet.
The deployment models will include Private, Public, Community and Hybrid cloud.

Below are the listed challenges faced while cloud computing deployment:
1. Security
2. Performance and Bandwidth cost
3. Governance, Risk and Compliance
4. Building a private cloud
5. Lack of expertise in the market

Heterogenous computing comes in with different components from different vendors, with its own security and privacy challenges.A single governance module needs to be introduced in the model to manage all the components from different vendors and to keep them in compliance. Heterogenous clouds face the challenges of vendor lock -in. It should be ensured that the services taken by a vendor are transporatable to the other providers with the requirements clearly stated by each.

Security measures should be taken to ensre that the cloud is in proper compliance and there are no such incidents reported. The compliance should be taken care while taking up the backup from the cloud. All the assets are compliant to the company policy and procedures, this needs to be ensured through proper governance.Managing resources and having skilled expertise in cloud also comes with a cost. Cross-training and upskilling resources will be an additional cost to the company to manage the cloud platform.

With the advancement in the Internet, there are multiple ways to overcome the challenges but there are always chances that you are prey to some motivational attacker. Ensuring the deployment of cloud whether its homogeneous or heterogenous with the security guidelines and procedures and protect you to an extent.
The vulnerabilities coming in from shared technologies and different vendors can be dealt by proper penetration testing and patching.A good governance model can help in giving visibility and control over the data and applications hosted on cloud.

Use Secure APIs and avoid Data breaches by user awareness, data encryption, traffic monitoing and other authentication and authorization protocols. All the softwares should be updated with the latest patches. The security bugs in the API should be identified by pentest and fixed before deploying.Security requirements and implementation should be discussed and worked out from the initial phases of the software development lifecycle. Avoid using public clouds for any sensitive data. Multi-layer security models should be deployed to avoid security breaches.


Related Solutions

1. Explain the common security threat concept in the cloud. [Hint : chapter 9] Cloud Computing,...
1. Explain the common security threat concept in the cloud. [Hint : chapter 9] Cloud Computing, Kris Jamsa, 2013, Johns & Bartlett Learning, ISBN: 978-1- 4496-4739-1
A research project focused on developing a security policy for the use of cloud computing and...
A research project focused on developing a security policy for the use of cloud computing and mobile devices in a selected business environment. Developing a security policy for the use of cloud computing and mobile devices. A summary that would be appropriate to give your manager so that he/she would know the essence of your project. • Description of the business environment. • Compliance or other regulatory requirements under which this business operates. • Description of the specific cloud service...
write a research paper on DATA SECURITY IN MULTI-TENANT CLOUD COMPUTING?
write a research paper on DATA SECURITY IN MULTI-TENANT CLOUD COMPUTING?  
Some authors make the assertion that there are no new security issues with cloud computing at...
Some authors make the assertion that there are no new security issues with cloud computing at a network-, host-, or application-level. They maintain that cloud computing may exacerbate existing issues, but that cloud computing does not present new security issues. Do you agree with that assertion? Explain security issues with cloud computing. Include how they differ from privacy issues. How are organizations and CSPs overcoming those issue? Use examples and references to support your answer. Provide at least one reference...
what are the structures and practices created by mercantilism that still exist today?
what are the structures and practices created by mercantilism that still exist today?
What are some significant security challenges in the world today?
What are some significant security challenges in the world today?
3. Describe how to deploy applications over commercial cloud computing infrastructures: 1) Amazon Web Services, 2)...
3. Describe how to deploy applications over commercial cloud computing infrastructures: 1) Amazon Web Services, 2) Windows Azure, 3) Google AppEngine
Write a research project on Biometrics Authentication. What are the security challenges and privacy implications. What...
Write a research project on Biometrics Authentication. What are the security challenges and privacy implications. What are the technologies used for biometrics authentication?
The Cloud Effect" Please respond to the following: 1. Many firms are relying on cloud computing,...
The Cloud Effect" Please respond to the following: 1. Many firms are relying on cloud computing, also known as “the cloud,” to perform key business functions. By moving transactional processing to the cloud, firms are exposing themselves to additional attacks as well as to tighter scrutiny from regulators and stakeholders. From the e-Activity, assume that you are the CFO of Amazon.com. Create an argument indicating how your firm will be able to balance the needs of security with the desire...
1. Please compare “Cloud Computing” with “Cloud Storage” and the integral parts used in both, and...
1. Please compare “Cloud Computing” with “Cloud Storage” and the integral parts used in both, and provide examples. 2. What is social network & it's influence on today's society? Give examples of social network..
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT