Virtualization and Cloud Computing (BIT2225)
Virtualization and Cloud Computing (BIT2225)
a)How
can cloud computing technology be used to improve resource utilization and
disaster recovery. b) There are a number of security risks associated with
cloud computing, Discuss 7 of them.
Cloud computing is defined as the use of hosted services, such as data storage, servers,
databases, networking, and software over the internet. Cloud computing has revolutionized the way
businesses manage and utilize their resources, providing scalable and flexible solutions for various
computing needs. This essay explores how cloud computing technology can enhance resource
utilization and disaster recovery capabilities. Additionally, it discusses seven security risks associated
with cloud computing.
Virtualization
Virtualization is a key component of cloud computing that enhances resource utilization. It enables
the creation of virtual instances of servers, storage, and networks, allowing multiple workloads to
run on a single physical machine. This consolidation of resources improves efficiency and reduces
hardware costs.
Multi-Tenancy
Cloud providers leverage multi-tenancy to serve multiple customers on shared infrastructure. This
sharing of resources optimizes utilization rates, as providers can distribute workloads efficiently
across their data centers. Multi-tenancy also contributes to cost-effectiveness for both providers and
users.
High Availability
Cloud services often provide high availability through load balancing and redundancy mechanisms.
By distributing workloads across multiple servers and data centers, cloud providers ensure that
services remain accessible even in the face of hardware failures or other disruptions. This approach
enhances the overall resilience of systems against disasters.
Data Breaches
Cloud platforms host vast amounts of sensitive data, making them attractive targets for
cybercriminals. A data breach can occur if unauthorized users gain access to confidential information.
To mitigate this risk, organizations must implement robust encryption, access controls, and regular
security audits.
References
Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing (NIST Special Publication 800-
145). National Institute of Standards and Technology (NIST).
Kavis, M. (2014). Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS,
PaaS, and IaaS). Wiley.
Choudhary, S., Mishra, P., Kumar, S., & Mittal, N. (2015). A survey of cloud computing security
management. Journal of King Saud University - Computer and Information Sciences.