云计算英文文献和中文翻译(5)

(ii) Certifications are also important for user certification. Developers have to open their application to security specialists or companies that provide certificationsfor security. This is one way o


(ii) Certifications are also important for user certification.

Developers have to open their application to security specialists or companies that provide certificationsfor security. This is one way of assuring users that the application has been fully tested against different types of attacks. This is often the dilemma for cloud computing as external security checks might open the company secrets on cloud computing. But this has to be sacrificed to ensure the security of their users.

B. Data Security

Aside from user protection against different types of attacks, the data itself should be protected. In this aspect, the hardware and software linked to cloud computing should be scrutinized. Again, a certification is highly desired in this part of cloud computing.

The hardware component for cloud computing on the other hand requires a different type of security consideration. The location of data center should not only be selected because of its proximity to controllers and intended users but also on its security (and even secrecy) from external problems. The data center should be protected against different types of weather conditions, fire and even physical attacks that might destroy the center physically.

With regards to the hardware component in relation to the application, certain manual components have to be available for increased security. Among them is manual shutdown to prevent further access of the information. Although data could be controlled with another application that data could be infiltrated unless  the application is shutdown immediately.

C.  Recovery and Investigation

Cloud computing security should not only focus itself on prevention. Ample resources should also be focused on recovery if the unfortunate event really strikes. Even before disaster happens, certain plans have to be in place to ensure that everyone will be working in unison towards recovery. The plans do not have to be focused on software attacks alone – certain external disasters such as weather conditions should have separate recovery plans.

When everything has been recovered, developers and the company handling the application should have the means to investigate the cause of the problem. Through investigation, certain conditions that lead to the event could be realized and insecurities could be discovered. Even legal actions could be done if security has been breached on purpose.

Security is one of the most difficult task to implement in cloud computing. It requires constant vigilance against different forms of attacks not only in the application side but also in the hardware components.Attacks with catastrophic effects only needs one security flaw so it ’s always a challenge for everyone involved to make things secured.

6 Challenges in cloud computing

The challenge for applications in cloud computing is largely based on the number of requests the application could handle[2]. Although this factor could be highly suggested by the data center, the application will usually have a threshold if they are not properly written.

       To deal with this concern, developers use metadata to enable personalized services to their users as well as data processing. Through metadata, inpidualized requests will be entertained and will be properly

implemented. Metadata also ensures uptime of transaction as data requests will be slowed down if the developer chooses to do so.

7 Future of cloud computing

      Cloud computing may be a relatively new concept for some businesses and consumers. But even though some businesses are only starting to adopt and realizing the advantages of cloud computing, industry giants  are already looking forward to the next big step of cloud computing.

     The future of cloud computing should be highly considered by businesses in any industry. The  possibility of full adaptation of cloud computing by almost any industry is slowly starting to happen. If a business will not consider their future in cloud computing, the challenges as well as the advantages of cloud computing may not be addressed and fully harnessed.