Impact of Technology Innovation: A Study on Cloud Risk Mitigation

Impact of Technology Innovation: A Study on Cloud Risk Mitigation

Niranjali Suresh (University at Buffalo, USA) and Manish Gupta (University at Buffalo, USA)
Copyright: © 2019 |Pages: 31
DOI: 10.4018/978-1-5225-8176-5.ch072
OnDemand PDF Download:
List Price: $37.50
10% Discount:-$3.75


Cloud enables computing as a utility by offering convenient, on-demand network access to a centralized pool of configurable computing resources that can be rapidly deployed with great efficiency and minimal management overhead. In order to realize the benefits of the innovative cloud computing paradigm, companies must overcome heightened risks and security threats associated with it. Security and privacy in cloud is complex owing to newer dimensions in problem scope such as multi-tenant architectures and shared infrastructure, elasticity, measured services, viability etc. In this paper, we survey existing literature on cloud security issues and risks which then guides us to provide a section on auditing based to address the identified risks. We also provide a discourse on risk assessment frameworks to highlight benefits using such structured methods for understanding risks. The main contribution of the paper is investigation of current innovations in cloud computing that are targeted towards assisting in effective management of aforementioned risks and security issues. The compilation of discussed solutions has been developed to cater to specific cloud security, compliance and privacy requirements across industries by cloud service providers, software-as-a-service (SaaS) application vendors and advisory firms.
Chapter Preview

1. Introduction

Cloud computing is transforming and redefining the design and procurement of IT infrastructure and software thereby providing attractive services to its users across the globe. The US National Institute of Standards and Technology (NIST) defines cloud computing as “a model for enabling ubiquitous, convenient, on - demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction” (Mell and Grance, 2011). The technology allows individuals and enterprises to avoid committing large capital outlays when purchasing and managing or operating software and hardware. Cloud reduces strain on developers by allowing them to focus their efforts on coding business logic rather than concerning about over or under provisioning resources for a service based on the market for a service. Large batch oriented tasks can be efficiently executed with minima1 resources simply through scalable programming. In cloud, 1000 servers for one hour costs no more than using one server for 1,000 hours. This elasticity of resources, without paying a premium for large scale, is unprecedented in the history of IT. As Heiser and Nicolett (2008) of Gartner mention that cloud computing lacks transparency because it is, for most part, provided by an external entity and is a method for “storing and processing your data externally in multiple unspecified locations, often sourced from other, unnamed providers, and containing data from multiple customers.” In the same vein, companies are also advised they consider all the involved risks in moving to cloud and also evaluate all the required controls around the protection of data and processes before migrating to cloud.

One of the main contributions of the chapter is reviewing recent innovations in cloud computing in security space and how they are aligned to manage risks from specific areas of cloud implementation. The discussions on extant literature on cloud, auditing focus areas and risk assessment frameworks help the chapter highlight how recent innovations are poised to manage risks. The primary tenet of the research is innovation in cloud computing. Innovation in IT is one of the widely studied topics (Baregheh et al., 2009) with many acceptable definitions. We use Rogers’ (1998) definition as ‘‘introduction of a new product or a ‘qualitative change’ in a product, a process…”. Not all innovations have the same impact and vary based on type of innovation (Grover et al., 1997; Adomavicius et al., 2007; Christensen et al., 2007; Carlo et al., 2011). Innovation has been linked to higher productivity, growth, and development. (Fagerberg, 2005; Kaplinsky et al., 2009). In recent years, with increasing adoption of IT, the impact of innovations is on rise as well and has been of high interest to researchers (Avgerou, 2008; Xiao et al., 2013).

This chapter is organized in six sections that delve deep into cloud security and innovations. Having introduced cloud computing as a technology platform in the first section, we move on to discuss key risks in cloud, their impact on environmental security and customer’s business processes. The third section elaborates on significant aspects of cloud that require additional attention through continuous auditing. Audit challenges and suggested approaches have been delineated in line with industry best practices. This is followed by a description of some of the most prominent cloud computing frameworks and working groups that are widely used accepted across industries and geographies as enablers and benchmarks while setting up cloud systems. The following section briefly examines additional challenges specific to particular cloud computing domains such as banking, medical, and government sectors. The final section discusses recent innovations in cloud computing and its impact on transforming enterprise cloud implementations and managing cloud computing risks. Figure 1 shows how different sections and approach for the study.

Figure 1.

Components and approach of the study


Complete Chapter List

Search this Book: