Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing of storage and computing resources. A hybrid cloud environment is an excellent example of cloud computing. Specifically, the hybrid system provides organizations with increased scalability and control over their data and support for a remote workforce. However, hybrid cloud systems are expensive as organizations operate different infrastructures while introducing complexity to the organization’s activities. Data security is critical among the most vital concerns that have resulted from the use of cloud computing, thus, affecting the rate of user adoption and acceptance. This article, borrowing from the hybrid cloud computing system, recommends combining traditional and modern data security systems. Traditional data security systems have proven effective in their respective roles, with the main challenge arising from their recognition of context and connectivity. Therefore, integrating traditional and modern designs is recommended to enhance effectiveness, context, connectivity, and efficiency.
References
[1]
Mell, P. and Grance, T. (2009) The National Institute of Standards and Technology Definition of Cloud Computing. National Institute of Standards & Technology.
[2]
Rountree, D. and Castrillo, I. (2014) The Basics of Cloud Computing, Syngress. https://doi.org/10.1016/C2012-0-02521-5
[3]
Laszewski, T. and Nauduri, P. (2012) Migrating to the Cloud. Syngress. https://doi.org/10.1016/C2010-0-67145-8
[4]
Pallis, G. (2010) Cloud Computing: The New Frontier of Internet Computing. IEEEInternetComputing, 14, 70-73. https://doi.org/10.1109/mic.2010.113
[5]
Wei, Y. and Blake, M.B. (2010) Service-Oriented Computing and Cloud Computing: Challenges and Opportunities. IEEEInternetComputing, 14, 72-75. https://doi.org/10.1109/mic.2010.147
[6]
Rajan, S. and Jairath, A. (2011) Cloud Computing: The Fifth Generation of Computing. 2011 InternationalConferenceonCommunicationSystemsandNetworkTechnologies, Katra, 3-5 June 2011, 665-667. https://doi.org/10.1109/csnt.2011.143
[7]
Latif, R., Abbas, H., Assar, S. and Ali, Q. (2014) Cloud Computing Risk Assessment: A Systematic Literature Review. In: Park, J., Stojmenovic, I., Choi, M. and Xhafa, F., Eds., Future Information Technology, Springer, 285-295. https://doi.org/10.1007/978-3-642-40861-8_42
[8]
Sagiroglu, S. and Sinanc, D. (2013) Big Data: A Review. 2013 InternationalConferenceonCollaborationTechnologiesandSystems (CTS), San Diego, 20-24 May 2013, 42-47. https://doi.org/10.1109/cts.2013.6567202
[9]
Chen, D. and Zhao, H. (2012) Data Security and Privacy Protection Issues in Cloud Computing. 2012 InternationalConferenceonComputerScienceandElectronicsEngineering, Hangzhou, 23-25 March 2012, 647-651. https://doi.org/10.1109/iccsee.2012.193
[10]
Takabi, H., Joshi, J.B.D. and Ahn, G. (2010) Security and Privacy Challenges in Cloud Computing Environments. IEEESecurity&PrivacyMagazine, 8, 24-31. https://doi.org/10.1109/msp.2010.186