Sunday, October 13, 2019

Cloud Computing Essay -- Information Technology, Data, Security

INTRODUCTION Cloud computing has boost a large amount of interest in the IT industry. The market research and analysis firm IDC suggests that the market for cloud computing services was $16bn in 2008 and will rise to $42bn/year by 2012 (Chhabra, Verma & Taneja, 2010) .The era of cloud computing introduces a new dimension for Enterprises. The academia and research worlds have developed a keen interest into challenges and issues introduced by this relatively new concept (Sriram & Khajeh-Hosseini, 2009). As experienced by large or small companies while adopting cloud computing technology, the issues can be outlined as security, privacy, data migration as (Hosseini, et al., 2010 ). Adoption of cloud technology by enterprises especially those are using KBE (knowledge based engineering) systems are in risk in terms of migration their data over the cloud. Most enterprises are in a midst of creating, sharing, streaming and storing data in digital formats to allow collaboration , hence there is a need to continuously managed and protect the data to ensure its value and authenticity (Yale & Chow, 2011). Enterprises now acquire increasingly more information about their products, customers and partners- whether it’s stored in a cloud environment or not and failure to protect this data can be damaging. Partners and clients anticipate their information will be constantly protected before conducting business with a company. Within lay the need for complete data governance to manage and protect crucial data, which has become a key issue for the cloud (Yale, 2011). The literature review aims to address the adoption of cloud computing within enterprises those are using KBE systems and how this adoption of cloud will affect their data governan... ... this process, and it can take several months between the decision to procure hardware and the hardware being delivered, setup and ready to use. The use of cloud computing can greatly reduce this time period, but the more significant change relates to the empowerment of users and the diffusion of the IT department’s authority as pointed out by Yanosky [20]. For example, a company’s training coordinator who requires a few servers to run a week-long web-based training course can bypass their IT department and run the training course in the cloud. They could pay their cloud usage-bill using their personal credit card and charge back the amount as expenses to their employee. A similar scenario was recently reported by BP, where a group bypassed the company’s procurement, IT department and security processes by using AWS to host a new customer facing website [10].

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.