Cloud Computing, Assignments for Computer Networks Assignment 2 Unit 16
Table of Contents
I. Introduction .......................................................................................................................................................................................................................... 6
II. Develop Cloud Computing solutions using service provider’s frameworks and open-source tools .................................................. 6
III. The most common problems and solutions in cloud computing ............................................................................................................... 24
1. Problems from Cloud Provider Perspective ....................................................................................................................................................... 25
1.1 Data security, Privacy and Control Risks .................................................................................................................................................... 25
1.2 Organizational risks ............................................................................................................................................................................................ 26
1.3 Technical risk ......................................................................................................................................................................................................... 27
1.4 Compliance and Audit ............................................................................................................................................................................................. 28
1.5 Physical Security........................................................................................................................................................................................................ 28
2. Risks from Cloud Customer Perspective .............................................................................................................................................................. 28
1.1 Data security, Privacy and Control risks ..................................................................................................................................................... 28
1.2 Technical risks ....................................................................................................................................................................................................... 29
1.3 Compliance and Audit ........................................................................................................................................................................................ 30
2.4 Physical Security........................................................................................................................................................................................................ 30
3. Solution ............................................................................................................................................................................................................................. 30
IV. Security issues and solutions ....................................................................................................................................................................................... 32
V. Conclusion ........................................................................................................................................................................................................................... 36
VI. References ........................................................................................................................................................................................................................... 37
4