Cloud Computing challenges associated with it
Cloud Computing challenges
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud.
Businesses across industries have come to a consensus about the inherent business value of cloud computing and are increasingly transitioning to the cloud. Cloud’s popularity has grown immensely, as more and more recognize its benefits of improving data access, freeing up internal IT resources for more strategic tasks, cutting costs, and increasing flexibility, versatility, efficiency and economies of scale. However, the ongoing development and growth of cloud and its vast benefits are limited by Cloud Computing challenges and inconsistencies that exist in its current state.
Concerns about the data security and the efficiency and effectiveness of cloud services are a result of these Cloud Computing challenges.
- Data Protection
Data Security is a crucial element that warrants scrutiny. Enterprises are reluctant to buy an assurance of business data security from vendors. They fear losing data to competition and the data confidentiality of consumers. In many instances, the actual storage location is not disclosed, adding onto the security concerns of enterprises.
In the existing models, firewalls across data centers (owned by enterprises) protect this sensitive information. In the cloud model, Service providers are responsible for maintaining data security and enterprises would have to rely on them.
- Data Recovery and Availability
All business applications have Service level agreements that are stringently followed.
Operational teams play a key role in management of service level agreements and runtime governance of applications. In production environments, operational teams support
- Appropriate clustering and Fail over
- Data Replication
- System monitoring (Transactions monitoring, logs monitoring and others)
- Maintenance (Runtime Governance)
- Disaster recovery Capacity and performance management
If, any of the above mentioned services is under-served by a cloud provider, the damage & impact could be severe.
- Management Capabilities
Despite there being multiple cloud providers, the management of platform and infrastructure is still in its infancy. Features like “Auto-scaling” for example, are a crucial requirement for many enterprises. There is huge potential to improve on the scalability and load balancing features provided today.
- Regulatory and Compliance Restrictions
In some of the European countries, Government regulations do not allow customer’s personal information and other sensitive information to be physically located outside the state or country. In order to meet such requirements, cloud providers need to setup a data center or a storage site exclusively within the country to comply with regulations. Having such an infrastructure may not always be feasible and is a big challenge for cloud providers.
It is clear that the security issue has played the most important role in hindering Cloud computing acceptance. Without doubt, putting your data, running your software on someone else’s hard disk using someone else’s CPU appears daunting to many. Well-known security issues such as data loss, phishing, botnet (running remotely on a collection of machines) pose serious threats to organization’s data and software. Moreover, the multi-tenancy model and the pooled computing resources in cloud computing has introduced new security challenges that require novel techniques to tackle with. For example, hackers can use Cloud to organize botnet as Cloud often provides more reliable infrastructure services at a relatively cheaper price for them to start an attack.
- Limited Control
Since the cloud infrastructure is entirely owned, managed and monitored by the service provider, it transfers minimal control over to the customer. The customer can only control and manage the applications, data and services operated on top of that, not the backend infrastructure itself.
Though I have covered a few Cloud Computing challenges but there may be more depending on the ever changing requirements of the organisation. These seems to be challenges in today’s environment but with the ever increasing adaptability this is the future.