Cloud Computing and Security
Cloud Computing and Security
ISSN No:-2456-2165
Abstract:- Cloud computing is one of the latest Companies are moving to the implementation of cloud
technologies that has been employed by many technologies to perform critical functions at least cost. At
organizations. The technology presents the cheaper the same time, these companies are faced with a challenge
means of data management through a secure cloud on how to protect the data and all users’ information stored
system. The majority of organizations have opted for on the cloud systems. Security, confidentiality, and privacy
cloud computing technology since it is a reliable means are the first concerns when it comes to cloud servers, as
of managing organizational information. However, compared to the cost of operation (Al-Mashari & Zairi,
many critics have complained about the security feature 2000). For companies, lack of technologies and resources
of the cloud systems since third-party companies handle to manage third-party security in the cloud servers can
them. Research shows that the sophisticated technology result in low cots safety. Cloud computing users
provided by cloud has shown some vulnerabilities hence consequently are facing various security related risks.
not trustworthy. Research indicates that many
organizations fail to report the cybercrimes associated The cloud systems have both technical and
with cloud system due to reputation damage and institutional challenges. The legal regimes relating to cloud
embarrassments associated. This paper will address the safety management are developing slowly as compared to
cloud computing security, taking the case study of ERP the rate of technology expansion. The safety issues like
systems on the use of secure cloud systems. privacy, information ownership, and privacy currently are
not covered adequately in the current legal systems. Some
I. INTRODUCTION researchers are arguing that the organization is supposed to
be legally responsible for customer's data rather than the
Cloud computing is a technology that involves hosting third-party company (Al-Mashari & Zairi, 2000). Another
applications, information, and other organization services issue raised is the lack of respect on how some third-party
on the servers and accessing the software via the internet companies handle client's information. Criticisms also are
connection. Under this technology, the organizations can facing cloud providers because they do not investigate their
pay for the services they require to a company hosting for clients, who are the organizations whether they have secure
them. To access the resource and computing power from systems before processing their data.
cloud space, services must be paid for depending on the
usage pattern (Al-Mashari & Zairi, 2000). The institutions Businesses and many other clients have expressed
are the rule of the game that is; they include primary their concern on the issue of data security. They have
constraints like laws, and practice, relaxed restrictions like become more cautious about the use of cloud services to
conventions and behaviors are controlled. store their highly valued and sensitive data. Due to weak
security strategies implemented, cloud systems remains the
This research will seek to discuss the issues related to riskiest approach to manage information (Al-Mashari &
the application of ERP's security and privacy at the cloud Zairi, 2000). According to the report done by the
systems. Secondly, it will consider if there are any security International Data Corporation in 2008, safety was the most
mechanisms and pillars that can be established to facilitate significant obstacle to the embracing of cloud computing
trustworthiness and confidentiality of data stored on the technology. Additionally, the organizations are worried
cloud servers. about any hidden charges associated with the lawsuits and
security breaches of data privacy.
A. Background Information
Cloud computing is one of the latest technologies that B. General Analysis and Problem of Statement
are likely to drive many organizations to greater heights. Security issue with cloud computing technology is the
The concept of cloud computing has been widely accepted new puzzle for many organizations today. The whole idea
by regular internet users. However, some severe of implementing cloud services is to reduce the cost
organizations have a great concern over the security involved in managing all resources and software at the
features of these systems. organization level. With the virtualized environment, the
user can access information from any location and at any
time of the day (Al-Mashari & Zairi, 2000). These services
are known as Software as a Service (SaaS). Enterprise
This research was focused on finding a solution to the Cloud’s Newness and Unique Vulnerabilities
problem of cloud-based ERP systems. Formulating a The cloud's new uniqueness and newness in the
research topic is very significant in any study. To evaluate organizations come with particular problems. With more
the pros and cons of ERP systems, which are cloud-based, popularity on this technology, new bugs, security issues
and its security impact, the background of the topic was and vulnerability with virtual technologies are experienced.
first assessed. Cloud systems, however, are not familiar with many IT
security companies. Lack of strategies to offer security at
Qualitative research contributed to the investigation of the cloud (ISACA, 2009). Experts are arguing that such
how cloud-based systems are vulnerable to security issues. vulnerabilities can provide a dangerous effect to the
Qualitative approaches are based on the non-numerical data company implementing the technology (Boykin, 2001).
by providing means of behavior assessment in quantitative The cloud can be challenging forensically in case there is
data (Bryman & Bell, 2003). It seeks to evaluate a concept the data breach. For instance, some public cloud systems
and the meaning of a phenomenon. Personal methods can store information differently depending on the
depends on the conviction that the people are on-screen regulations regarding data privacy, data loss and privacy
characters who play a functioning job in reacting to issues. Some companies may opt to encrypt data before
circumstances and the acknowledgment that the reaction storing it on the cloud.
depends on the specific importance (ECONOMIST, 2009).
V. CONCLUSION