<s>
Cloud	B-Architecture
computing	I-Architecture
has	O
become	O
a	O
social	O
phenomenon	O
used	O
by	O
most	O
people	O
every	O
day	O
.	O
</s>
<s>
In	O
the	O
present	O
scenario	O
,	O
cloud	B-Architecture
computing	I-Architecture
is	O
seen	O
as	O
a	O
fast	O
developing	O
area	O
that	O
can	O
instantly	O
supply	O
extensible	O
services	O
by	O
using	O
internet	O
with	O
the	O
help	O
of	O
hardware	O
and	O
software	O
virtualization	B-General_Concept
.	O
</s>
<s>
The	O
biggest	O
advantage	O
of	O
cloud	B-Architecture
computing	I-Architecture
is	O
flexible	O
lease	O
and	O
release	O
of	O
resources	O
as	O
per	O
the	O
requirement	O
of	O
the	O
user	O
.	O
</s>
<s>
Although	O
,	O
there	O
are	O
numerous	O
benefits	O
of	O
adopting	O
the	O
latest	O
cloud	B-Architecture
technology	I-Architecture
still	O
there	O
are	O
privacy	O
issues	O
involved	O
in	O
cloud	B-Architecture
computing	I-Architecture
because	O
in	B-Architecture
the	I-Architecture
cloud	I-Architecture
at	O
any	O
time	O
the	O
data	O
can	O
outbreak	O
the	O
service	O
provider	O
and	O
the	O
information	O
is	O
deleted	O
purposely	O
.	O
</s>
<s>
There	O
are	O
security	O
issues	O
of	O
various	O
kinds	O
related	O
with	O
cloud	B-Architecture
computing	I-Architecture
falling	O
into	O
two	O
broader	O
categories	O
:	O
First	O
,	O
the	O
issues	O
related	O
to	O
the	O
cloud	O
security	O
that	O
the	O
cloud	O
providers	O
face	O
(	O
like	O
software	O
provided	O
to	O
the	O
organizations	O
,	O
infrastructure	O
as	O
a	O
service	O
)	O
.	O
</s>
<s>
Most	O
issues	O
start	O
from	O
the	O
fact	O
that	O
the	O
user	O
loses	O
control	O
of	O
their	O
data	O
,	O
because	O
it	B-General_Concept
is	O
stored	O
on	O
a	O
computer	O
belonging	O
to	O
someone	O
else	O
(	O
the	O
cloud	O
provider	O
)	O
.	O
</s>
<s>
This	O
happens	O
when	O
the	O
owner	O
of	O
the	O
remote	O
servers	O
is	O
a	O
person	O
or	O
organization	O
other	O
than	O
the	O
user	O
;	O
as	O
their	O
interests	O
may	O
point	O
in	O
different	O
directions	O
(	O
for	O
example	O
,	O
the	O
user	O
may	O
wish	O
that	O
their	O
information	O
is	O
kept	O
private	O
,	O
but	O
the	O
owner	O
of	O
the	O
remote	O
servers	O
may	O
want	O
to	O
take	O
advantage	O
of	O
it	B-General_Concept
for	O
their	O
own	O
business	O
)	O
.	O
</s>
<s>
Other	O
issues	O
hampering	O
the	O
adoption	O
of	O
cloud	B-Architecture
technologies	I-Architecture
include	O
the	O
uncertainties	O
related	O
to	O
guaranteed	O
QoS	O
provisioning	O
,	O
automated	O
management	O
,	O
and	O
remediation	O
in	O
cloud	O
systems	O
.	O
</s>
<s>
Many	O
issues	O
relate	O
to	O
cloud	B-Architecture
computing	I-Architecture
,	O
some	O
of	O
which	O
are	O
discussed	O
here	O
:	O
</s>
<s>
GNU	B-Operating_System
project	O
initiator	O
Richard	O
Stallman	O
has	O
characterized	O
cloud	B-Architecture
computing	I-Architecture
as	O
raising	O
cost	O
and	O
information-ownership	O
concerns	O
.	O
</s>
<s>
Oracle	B-Application
founder	O
Larry	O
Ellison	O
viewed	O
the	O
trend	O
to	O
"	O
cloud	B-Architecture
computing	I-Architecture
"	O
in	O
terms	O
of	O
"	O
fashion-driven	O
 [ ... ] 	O
complete	O
gibberish	O
"	O
.	O
</s>
<s>
However	O
,	O
the	O
concept	O
of	O
cloud	B-Architecture
computing	I-Architecture
appeared	O
to	O
gain	O
steam	O
,	O
with	O
56%	O
of	O
the	O
major	O
European	O
technology	O
decision-makers	O
seeing	O
the	O
cloud	O
as	O
a	O
priority	O
in	O
2013	O
and	O
2014	O
,	O
and	O
the	O
cloud	O
budget	O
may	O
reach	O
30%	O
of	O
the	O
overall	O
IT	B-General_Concept
budget	O
.	O
</s>
<s>
According	O
to	O
the	O
TechInsights	O
Report	O
2013	O
:	O
Cloud	O
Succeeds	O
based	O
on	O
a	O
survey	O
,	O
cloud	O
implementations	O
generally	O
meet	O
or	O
exceed	O
expectations	O
across	O
major	O
service	O
models	O
,	O
such	O
as	O
Infrastructure	O
as	O
a	O
Service	O
(	O
IaaS	O
)	O
,	O
Platform	B-Application
as	I-Application
a	I-Application
service	I-Application
(	O
PaaS	B-Application
)	O
and	O
Software	B-Architecture
as	I-Architecture
a	I-Architecture
service	I-Architecture
(	O
SaaS	B-Architecture
)	O
.	O
</s>
<s>
Several	O
deterrents	O
to	O
the	O
widespread	O
adoption	O
of	O
cloud	B-Architecture
computing	I-Architecture
remain	O
.	O
</s>
<s>
The	O
cloud	O
market	O
of	O
the	O
early	O
2010s	O
-	O
especially	O
for	O
private	O
clouds	O
-	O
was	O
dominated	O
by	O
software	O
and	O
services	O
in	O
SaaS	B-Architecture
mode	O
and	O
IaaS	O
(	O
infrastructure	O
)	O
.	O
</s>
<s>
PaaS	B-Application
and	O
the	O
public	O
cloud	O
lag	O
in	O
comparison	O
.	O
</s>
<s>
The	O
increased	O
use	O
of	O
cloud	B-Architecture
computing	I-Architecture
services	O
such	O
as	O
Gmail	O
and	O
Google	O
Docs	O
has	O
pressed	O
the	O
issue	O
of	O
privacy	O
concerns	O
of	O
cloud	B-Architecture
computing	I-Architecture
services	O
to	O
the	O
utmost	O
importance	O
.	O
</s>
<s>
The	O
provider	O
of	O
such	O
services	O
lie	O
in	O
a	O
position	O
such	O
that	O
with	O
the	O
greater	O
use	O
of	O
cloud	B-Architecture
computing	I-Architecture
services	O
has	O
given	O
access	O
to	O
a	O
plethora	O
of	O
data	O
.	O
</s>
<s>
The	O
privacy	O
of	O
the	O
companies	O
can	O
be	O
compromised	O
as	O
all	O
the	O
information	O
is	O
sent	O
to	O
the	O
cloud	B-Architecture
service	I-Architecture
provider	I-Architecture
.	O
</s>
<s>
Instances	O
such	O
as	O
the	O
secret	O
NSA	O
program	O
,	O
working	O
with	O
AT&T	O
,	O
and	O
Verizon	B-Application
,	O
which	O
recorded	O
over	O
10	O
million	O
telephone	O
calls	O
between	O
American	O
citizens	O
,	O
causes	O
uncertainty	O
among	O
privacy	O
advocates	O
,	O
and	O
the	O
greater	O
powers	O
it	B-General_Concept
gives	O
to	O
telecommunication	O
companies	O
to	O
monitor	O
user	O
activity	O
.	O
</s>
<s>
A	O
cloud	B-Architecture
service	I-Architecture
provider	I-Architecture
(	O
CSP	O
)	O
can	O
complicate	O
data	O
privacy	O
because	O
of	O
the	O
extent	O
of	O
virtualization	B-General_Concept
(	O
virtual	O
machines	O
)	O
and	O
cloud	O
storage	O
used	O
to	O
implement	O
cloud	B-Architecture
service	I-Architecture
.	O
</s>
<s>
While	O
there	O
have	O
been	O
efforts	O
(	O
such	O
as	O
US-EU	O
Safe	O
Harbor	O
)	O
to	O
"	O
harmonise	O
"	O
the	O
legal	O
environment	O
,	O
providers	O
such	O
as	O
Amazon	O
still	O
cater	O
to	O
major	O
markets	O
(	O
typically	O
to	O
the	O
United	O
States	O
and	O
the	O
European	O
Union	O
)	O
by	O
deploying	O
local	O
infrastructure	O
and	O
allowing	O
customers	O
to	O
select	O
"	O
regions	O
and	O
availability	B-General_Concept
zones	O
"	O
.	O
</s>
<s>
Cloud	B-Architecture
computing	I-Architecture
poses	O
privacy	O
concerns	O
because	O
the	O
service	O
provider	O
can	O
access	O
the	O
data	O
that	O
is	O
on	O
the	O
cloud	O
at	O
any	O
time	O
.	O
</s>
<s>
It	B-General_Concept
could	O
accidentally	O
or	O
deliberately	O
alter	O
or	O
even	O
delete	O
information	O
.	O
</s>
<s>
Sometimes	O
there	O
can	O
be	O
some	O
technical	O
issues	O
like	O
servers	O
might	O
be	O
down	O
so	O
at	O
that	O
time	O
it	B-General_Concept
becomes	O
difficult	O
to	O
gain	O
access	O
to	O
the	O
resources	O
at	O
any	O
time	O
and	O
from	O
anywhere	O
e.g.	O
</s>
<s>
non-availability	O
of	O
services	O
can	O
be	O
due	O
to	O
denial	O
of	O
service	O
attack	O
.	O
</s>
<s>
To	O
use	O
the	O
technique	O
of	O
cloud	B-Architecture
computing	I-Architecture
there	O
should	O
always	O
be	O
a	O
strong	O
internet	O
connection	O
without	O
which	O
we	O
would	O
not	O
be	O
able	O
to	O
take	O
advantage	O
of	O
the	O
cloud	B-Architecture
computing	I-Architecture
.	O
</s>
<s>
The	O
other	O
issue	O
related	O
to	O
the	O
cloud	B-Architecture
computing	I-Architecture
is	O
that	O
it	B-General_Concept
consumes	O
the	O
great	O
power	O
of	O
the	O
physical	O
devices	O
such	O
as	O
a	O
smartphone	O
.	O
</s>
<s>
That	O
is	O
permitted	O
in	O
their	O
privacy	O
policies	O
which	O
users	O
have	O
to	O
agree	O
to	O
before	O
they	O
start	O
using	O
cloud	B-Architecture
services	I-Architecture
.	O
</s>
<s>
As	O
to	O
whether	O
NSW	O
Police	O
needed	O
a	O
warrant	O
to	O
access	O
the	O
information	O
it	B-General_Concept
was	O
likely	O
to	O
have	O
,	O
Byrne	O
said	O
it	B-General_Concept
depended	O
on	O
the	O
process	O
taken	O
.	O
</s>
<s>
"	O
Gmail	O
does	O
set	O
out	O
in	O
their	O
process	O
in	O
terms	O
of	O
their	O
legal	O
disclosure	O
guidelines	O
 [ that ] 	O
it	B-General_Concept
can	O
be	O
done	O
by	O
a	O
search	O
warrant	O
...	O
but	O
there	O
are	O
exceptions	O
that	O
can	O
apply	O
in	O
different	O
parts	O
of	O
the	O
world	O
and	O
different	O
service	O
providers	O
.	O
</s>
<s>
NSW	O
Police	O
would	O
not	O
comment	O
on	O
whether	O
it	B-General_Concept
had	O
received	O
help	O
from	O
Google	O
.	O
</s>
<s>
The	O
search	O
giant	O
also	O
declined	O
to	O
comment	O
,	O
instead	O
offering	O
a	O
standard	O
statement	O
on	O
how	O
it	B-General_Concept
cooperated	O
with	O
law	O
enforcement	O
.	O
</s>
<s>
He	O
also	O
said	O
“	O
It	B-General_Concept
happens	O
with	O
relative	O
frequency	O
.	O
</s>
<s>
Solutions	O
to	O
privacy	O
in	O
cloud	B-Architecture
computing	I-Architecture
include	O
policy	O
and	O
legislation	O
as	O
well	O
as	O
end	O
users	O
 '	O
choices	O
for	O
how	O
data	O
is	O
stored	O
.	O
</s>
<s>
The	O
cloud	B-Architecture
service	I-Architecture
provider	I-Architecture
needs	O
to	O
establish	O
clear	O
and	O
relevant	O
policies	O
that	O
describe	O
how	O
the	O
data	O
of	O
each	O
cloud	O
user	O
will	O
be	O
accessed	O
and	O
used	O
.	O
</s>
<s>
Cloud	B-Architecture
service	I-Architecture
users	O
can	O
encrypt	O
data	O
that	O
is	O
processed	O
or	O
stored	O
within	O
the	O
cloud	O
to	O
prevent	O
unauthorized	O
access	O
.	O
</s>
<s>
In	O
addition	O
,	O
authentication	O
and	O
integrity	O
protection	O
mechanisms	O
ensure	O
that	O
data	O
only	O
goes	O
where	O
the	O
customer	O
wants	O
it	B-General_Concept
to	O
go	O
and	O
it	B-General_Concept
is	O
not	O
modified	O
in	O
transit	O
.	O
</s>
<s>
User	O
authentication	O
is	O
the	O
primary	O
basis	O
for	O
access	O
control	O
,	O
and	O
specially	O
in	B-Architecture
the	I-Architecture
cloud	I-Architecture
environment	O
,	O
authentication	O
and	O
access	O
control	O
are	O
more	O
important	O
than	O
ever	O
since	O
the	O
cloud	O
and	O
all	O
of	O
its	O
data	O
are	O
publicly	O
accessible	O
.	O
</s>
<s>
In	O
a	O
virtualized	B-General_Concept
cloud	B-Architecture
computing	I-Architecture
environment	O
,	O
customers	O
may	O
never	O
know	O
exactly	O
where	O
their	O
data	O
is	O
stored	O
.	O
</s>
<s>
In	O
fact	O
,	O
data	O
may	O
be	O
stored	O
across	O
multiple	O
data	O
centers	O
in	O
an	O
effort	O
to	O
improve	O
reliability	B-General_Concept
,	O
increase	O
performance	O
,	O
and	O
provide	O
redundancies	O
.	O
</s>
<s>
This	O
geographic	O
dispersion	O
may	O
make	O
it	B-General_Concept
more	O
difficult	O
to	O
ascertain	O
legal	O
jurisdiction	O
if	O
disputes	O
arise	O
.	O
</s>
<s>
As	O
with	O
other	O
changes	O
in	O
the	O
landscape	O
of	O
computing	O
,	O
certain	O
legal	O
issues	O
arise	O
with	O
cloud	B-Architecture
computing	I-Architecture
,	O
including	O
trademark	O
infringement	O
,	O
security	O
concerns	O
and	O
sharing	O
of	O
proprietary	O
data	O
resources	O
.	O
</s>
<s>
The	O
Electronic	O
Frontier	O
Foundation	O
has	O
criticized	O
the	O
United	O
States	O
government	O
during	O
the	O
Megaupload	B-Application
seizure	O
process	O
for	O
considering	O
that	O
people	O
lose	O
property	O
rights	O
by	O
storing	O
data	O
on	O
a	O
cloud	B-Architecture
computing	I-Architecture
service	O
.	O
</s>
<s>
One	O
important	O
but	O
not	O
often	O
mentioned	O
problem	O
with	O
cloud	B-Architecture
computing	I-Architecture
is	O
the	O
problem	O
of	O
who	O
is	O
in	O
"	O
possession	O
"	O
of	O
the	O
data	O
.	O
</s>
<s>
The	O
next	O
problem	O
in	O
the	O
legalities	O
of	O
cloud	B-Architecture
computing	I-Architecture
is	O
the	O
problem	O
of	O
legal	O
ownership	O
of	O
the	O
data	O
.	O
</s>
<s>
These	O
legal	O
issues	O
are	O
not	O
confined	O
to	O
the	O
time	O
period	O
in	O
which	O
the	O
cloud-based	B-Architecture
application	O
is	O
actively	O
being	O
used	O
.	O
</s>
<s>
Because	O
cloud	B-Architecture
computing	I-Architecture
is	O
still	O
relatively	O
new	O
,	O
standards	O
are	O
still	O
being	O
developed	O
.	O
</s>
<s>
Three	O
types	O
of	O
vendor	O
lock-in	O
can	O
occur	O
with	O
cloud	B-Architecture
computing	I-Architecture
:	O
</s>
<s>
Platform	O
lock-in	O
:	O
cloud	B-Architecture
services	I-Architecture
tend	O
to	O
be	O
built	O
on	O
one	O
of	O
several	O
possible	O
virtualization	B-General_Concept
platforms	O
,	O
for	O
example	O
VMware	O
or	O
Xen	O
.	O
</s>
<s>
who	O
actually	O
owns	O
the	O
data	O
once	O
it	B-General_Concept
lives	O
on	O
a	O
cloud	O
platform	O
,	O
are	O
not	O
yet	O
developed	O
,	O
which	O
could	O
make	O
it	B-General_Concept
complicated	O
if	O
cloud	B-Architecture
computing	I-Architecture
users	O
ever	O
decide	O
to	O
move	O
data	O
off	O
of	O
a	O
cloud	O
vendor	O
's	O
platform	O
.	O
</s>
<s>
Heterogeneous	O
cloud	B-Architecture
computing	I-Architecture
is	O
described	O
as	O
a	O
type	O
of	O
cloud	O
environment	O
that	O
prevents	O
vendor	O
lock-in	O
,	O
and	O
aligns	O
with	O
enterprise	O
data	O
centers	O
that	O
are	O
operating	O
hybrid	O
cloud	O
models	O
.	O
</s>
<s>
The	O
absence	O
of	O
vendor	O
lock-in	O
lets	O
cloud	O
administrators	O
select	O
their	O
choice	O
of	O
hypervisors	O
for	O
specific	O
tasks	O
,	O
or	O
to	O
deploy	O
virtualized	B-General_Concept
infrastructures	O
to	O
other	O
enterprises	O
without	O
the	O
need	O
to	O
consider	O
the	O
flavor	O
of	O
hypervisor	O
in	O
the	O
other	O
enterprise	O
.	O
</s>
<s>
A	O
heterogeneous	O
cloud	O
is	O
considered	O
one	O
that	O
includes	O
on-premises	O
private	O
clouds	O
,	O
public	O
clouds	O
and	O
software-as-a-service	B-Architecture
clouds	O
.	O
</s>
<s>
Heterogeneous	O
clouds	O
can	O
work	O
with	O
environments	O
that	O
are	O
not	O
virtualized	B-General_Concept
,	O
such	O
as	O
traditional	O
data	O
centers	O
.	O
</s>
<s>
The	O
result	O
is	O
complicated	O
migration	B-General_Concept
between	O
backends	O
,	O
and	O
makes	O
it	B-General_Concept
difficult	O
to	O
integrate	O
data	O
spread	O
across	O
various	O
locations	O
.	O
</s>
<s>
Heterogeneous	O
cloud	B-Architecture
computing	I-Architecture
differs	O
from	O
homogeneous	O
clouds	O
,	O
which	O
have	O
been	O
described	O
as	O
those	O
using	O
consistent	O
building	O
blocks	O
supplied	O
by	O
a	O
single	O
vendor	O
.	O
</s>
<s>
Open-source	B-Application
software	I-Application
has	O
provided	O
the	O
foundation	O
for	O
many	O
cloud	B-Architecture
computing	I-Architecture
implementations	O
,	O
prominent	O
examples	O
being	O
the	O
Hadoop	B-Application
framework	I-Application
and	O
VMware	O
's	O
Cloud	B-General_Concept
Foundry	I-General_Concept
.	O
</s>
<s>
In	O
November	O
2007	O
,	O
the	B-Operating_System
Free	I-Operating_System
Software	I-Operating_System
Foundation	I-Operating_System
released	O
the	O
Affero	O
General	B-License
Public	I-License
License	I-License
,	O
a	O
version	O
of	O
GPLv3	B-License
intended	O
to	O
close	O
a	O
perceived	O
legal	O
loophole	O
associated	O
with	O
free	B-Application
software	I-Application
designed	O
to	O
run	O
over	O
a	O
network	O
.	O
</s>
<s>
As	O
of	O
November	O
2012	O
,	O
the	O
Open	O
Standard	O
with	O
broadest	O
industry	O
support	O
is	O
probably	O
OpenStack	B-Application
,	O
founded	O
in	O
2010	O
by	O
NASA	O
and	O
Rackspace	O
,	O
and	O
now	O
governed	O
by	O
the	O
OpenStack	B-Application
Foundation	I-Application
.	O
</s>
<s>
supporters	O
include	O
AMD	O
,	O
Intel	O
,	O
Canonical	O
,	O
SUSE	O
Linux	O
,	O
Red	O
Hat	O
,	O
Cisco	O
,	O
Dell	O
,	O
HP	O
,	O
IBM	O
,	O
Yahoo	B-Application
,	O
Huawei	O
and	O
now	O
VMware	O
.	O
</s>
<s>
As	O
defined	O
in	O
information	O
security	O
,	O
it	B-General_Concept
is	O
a	O
condition	O
in	O
which	O
an	O
information	O
asset	O
is	O
protected	O
against	O
its	O
confidentiality	O
(	O
quality	O
or	O
state	O
of	O
being	O
free	O
from	O
unauthorised	O
or	O
insecure	O
disclosure	O
contrary	O
to	O
the	O
defined	O
access	O
rights	O
as	O
listed	O
in	O
the	O
access	O
control	O
list	O
and	O
or	O
matrix	O
)	O
,	O
integrity	O
(	O
a	O
quality	O
or	O
state	O
of	O
being	O
whole/	O
as	O
complete	O
as	O
original	O
and	O
uncorrupted	O
as	O
functionally	O
proven	O
by	O
the	O
hash	O
integrity	O
values	O
)	O
and	O
availability	B-General_Concept
(	O
a	O
desired	O
state	O
of	O
an	O
information	O
resource	O
being	O
accessible	O
only	O
by	O
authorised	O
parties	O
(	O
as	O
listed	O
in	O
access	O
control	O
list	O
and	O
or	O
matrix	O
)	O
in	O
the	O
desired	O
state	O
and	O
at	O
the	O
right	O
time	O
.	O
</s>
<s>
Security	O
is	O
an	O
important	O
domain	O
in	O
as	O
far	O
as	O
cloud	B-Architecture
computing	I-Architecture
is	O
concerned	O
,	O
there	O
are	O
a	O
number	O
of	O
issues	O
to	O
be	O
addressed	O
if	O
the	O
cloud	O
is	O
to	O
be	O
perfectly	O
secure	O
(	O
a	O
condition	O
i	O
doubt	O
will	O
ever	O
be	O
achieved	O
)	O
(	O
Martin	O
Muduva	O
,	O
2015	O
)	O
.	O
</s>
<s>
As	O
cloud	B-Architecture
computing	I-Architecture
is	O
achieving	O
increased	O
popularity	O
,	O
concerns	O
are	O
being	O
voiced	O
about	O
the	O
security	O
issues	O
introduced	O
through	O
adoption	O
of	O
this	O
new	O
model	O
.	O
</s>
<s>
The	O
relative	O
security	O
of	O
cloud	B-Architecture
computing	I-Architecture
services	O
is	O
a	O
contentious	O
issue	O
that	O
may	O
be	O
delaying	O
its	O
adoption	O
.	O
</s>
<s>
Issues	O
barring	O
the	O
adoption	O
of	O
cloud	B-Architecture
computing	I-Architecture
are	O
due	O
in	O
large	O
part	O
to	O
the	O
private	O
and	O
public	O
sectors	O
 '	O
unease	O
surrounding	O
the	O
external	O
management	O
of	O
security-based	O
services	O
.	O
</s>
<s>
It	B-General_Concept
is	O
the	O
very	O
nature	O
of	O
cloud	O
computing-based	O
services	O
,	O
private	O
or	O
public	O
,	O
that	O
promote	O
external	O
management	O
of	O
provided	O
services	O
.	O
</s>
<s>
This	O
delivers	O
great	O
incentive	O
to	O
cloud	B-Architecture
computing	I-Architecture
service	O
providers	O
to	O
prioritize	O
building	O
and	O
maintaining	O
strong	O
management	O
of	O
secure	O
services	O
.	O
</s>
<s>
Cloud	B-Architecture
computing	I-Architecture
offers	O
many	O
benefits	O
,	O
but	O
is	O
vulnerable	O
to	O
threats	O
.	O
</s>
<s>
As	O
cloud	B-Architecture
computing	I-Architecture
uses	O
increase	O
,	O
it	B-General_Concept
is	O
likely	O
that	O
more	O
criminals	O
find	O
new	O
ways	O
to	O
exploit	O
system	O
vulnerabilities	O
.	O
</s>
<s>
Many	O
underlying	O
challenges	O
and	O
risks	O
in	O
cloud	B-Architecture
computing	I-Architecture
increase	O
the	O
threat	O
of	O
data	O
compromise	O
.	O
</s>
<s>
To	O
mitigate	O
the	O
threat	O
,	O
cloud	B-Architecture
computing	I-Architecture
stakeholders	O
should	O
invest	O
heavily	O
in	O
risk	O
assessment	O
to	O
ensure	O
that	O
the	O
system	O
encrypts	O
to	O
protect	O
data	O
,	O
establishes	O
trusted	O
foundation	O
to	O
secure	O
the	O
platform	O
and	O
infrastructure	O
,	O
and	O
builds	O
higher	O
assurance	O
into	O
auditing	O
to	O
strengthen	O
compliance	O
.	O
</s>
<s>
Security	O
concerns	O
must	O
be	O
addressed	O
to	O
maintain	O
trust	O
in	O
cloud	B-Architecture
computing	I-Architecture
technology	O
.	O
</s>
<s>
Data	O
breach	O
is	O
a	O
big	O
concern	O
in	O
cloud	B-Architecture
computing	I-Architecture
.	O
</s>
<s>
Although	O
cloud	B-Architecture
computing	I-Architecture
is	O
often	O
assumed	O
to	O
be	O
a	O
form	O
of	O
green	O
computing	O
,	O
there	O
is	O
currently	O
no	O
way	O
to	O
measure	O
how	O
"	O
green	O
"	O
computers	O
are	O
.	O
</s>
<s>
Phil	O
Radford	O
of	O
Greenpeace	O
said	O
“	O
we	O
are	O
concerned	O
that	O
this	O
new	O
explosion	O
in	O
electricity	O
use	O
could	O
lock	O
us	O
into	O
old	O
,	O
polluting	O
energy	O
sources	O
instead	O
of	O
the	O
clean	O
energy	O
available	O
today.	O
”	O
Greenpeace	O
ranks	O
the	O
energy	O
usage	O
of	O
the	O
top	O
ten	O
big	O
brands	O
in	O
cloud	B-Architecture
computing	I-Architecture
,	O
and	O
successfully	O
urged	O
several	O
companies	O
to	O
switch	O
to	O
clean	O
energy	O
.	O
</s>
<s>
Citing	O
the	O
servers	O
 '	O
effects	O
on	O
the	O
environmental	O
effects	O
of	O
cloud	B-Architecture
computing	I-Architecture
,	O
in	O
areas	O
where	O
climate	O
favors	O
natural	O
cooling	O
and	O
renewable	O
electricity	O
is	O
readily	O
available	O
,	O
the	O
environmental	O
effects	O
will	O
be	O
more	O
moderate	O
.	O
</s>
<s>
Thus	O
countries	O
with	O
favorable	O
conditions	O
,	O
such	O
as	O
Finland	O
,	O
Sweden	O
and	O
Switzerland	O
,	O
are	O
trying	O
to	O
attract	O
cloud	B-Architecture
computing	I-Architecture
data	O
centers	O
.	O
</s>
<s>
Energy	O
efficiency	O
in	O
cloud	B-Architecture
computing	I-Architecture
can	O
result	O
from	O
energy-aware	O
scheduling	O
and	O
server	O
consolidation	O
.	O
</s>
<s>
As	O
with	O
privately	O
purchased	O
hardware	O
,	O
customers	O
can	O
purchase	O
the	O
services	O
of	O
cloud	B-Architecture
computing	I-Architecture
for	O
nefarious	O
purposes	O
.	O
</s>
<s>
The	O
introduction	O
of	O
cloud	B-Architecture
computing	I-Architecture
requires	O
an	O
appropriate	O
IT	B-General_Concept
governance	O
model	O
to	O
ensure	O
a	O
secured	O
computing	O
environment	O
and	O
to	O
comply	O
with	O
all	O
relevant	O
organizational	O
information	B-General_Concept
technology	I-General_Concept
policies	O
.	O
</s>
<s>
As	O
such	O
,	O
organizations	O
need	O
a	O
set	O
of	O
capabilities	O
that	O
are	O
essential	O
when	O
effectively	O
implementing	O
and	O
managing	O
cloud	B-Architecture
services	I-Architecture
,	O
including	O
demand	O
management	O
,	O
relationship	O
management	O
,	O
data	O
security	O
management	O
,	O
application	O
lifecycle	O
management	O
,	O
risk	O
and	O
compliance	O
management	O
.	O
</s>
<s>
A	O
danger	O
lies	O
with	O
the	O
explosion	O
of	O
companies	O
joining	O
the	O
growth	O
in	O
cloud	B-Architecture
computing	I-Architecture
by	O
becoming	O
providers	O
.	O
</s>
<s>
However	O
,	O
many	O
of	O
the	O
infrastructural	O
and	O
logistical	O
concerns	O
regarding	O
the	O
operation	O
of	O
cloud	B-Architecture
computing	I-Architecture
businesses	O
are	O
still	O
unknown	O
.	O
</s>
<s>
The	O
increased	O
use	O
of	O
cloud	B-Architecture
computing	I-Architecture
could	O
lead	O
to	O
a	O
reduction	O
in	O
demand	O
for	O
high	O
storage	O
capacity	O
consumer	O
end	O
devices	O
,	O
due	O
to	O
cheaper	O
low	O
storage	O
devices	O
that	O
stream	O
all	O
content	O
via	O
the	O
cloud	O
becoming	O
more	O
popular	O
.	O
</s>
<s>
In	O
a	O
Wired	O
article	O
,	O
Jake	O
Gardner	O
explains	O
that	O
while	O
unregulated	O
usage	O
is	O
beneficial	O
for	O
IT	B-General_Concept
and	O
tech	O
moguls	O
like	O
Amazon	O
,	O
the	O
anonymous	O
nature	O
of	O
the	O
cost	O
of	O
consumption	O
of	O
cloud	O
usage	O
makes	O
it	B-General_Concept
difficult	O
for	O
business	O
to	O
evaluate	O
and	O
incorporate	O
it	B-General_Concept
into	O
their	O
business	O
plans	O
.	O
</s>
<s>
Outside	O
of	O
the	O
information	B-General_Concept
technology	I-General_Concept
and	O
software	O
industry	O
,	O
the	O
term	O
"	O
cloud	O
"	O
can	O
be	O
found	O
to	O
reference	O
a	O
wide	O
range	O
of	O
services	O
,	O
some	O
of	O
which	O
fall	O
under	O
the	O
category	O
of	O
cloud	B-Architecture
computing	I-Architecture
,	O
while	O
others	O
do	O
not	O
.	O
</s>
<s>
Examples	O
of	O
service	O
that	O
are	O
sometimes	O
referred	O
to	O
as	O
"	O
the	O
cloud	O
"	O
include	O
,	O
but	O
are	O
not	O
limited	O
to	O
,	O
crowd	O
sourcing	O
,	O
cloud	B-General_Concept
printing	I-General_Concept
,	O
crowd	O
funding	O
,	O
cloud	O
manufacturing	O
.	O
</s>
<s>
Due	O
to	O
its	O
multi-tenant	O
nature	O
and	O
resource	O
sharing	O
,	O
cloud	B-Architecture
computing	I-Architecture
must	O
also	O
deal	O
with	O
the	O
"	O
noisy	O
neighbor	O
"	O
effect	O
.	O
</s>
<s>
This	O
observation	O
has	O
led	O
in	O
turn	O
to	O
research	O
efforts	O
to	O
make	O
cloud	B-Architecture
computing	I-Architecture
applications	O
intrinsically	O
aware	O
of	O
changes	O
in	O
the	O
infrastructure	O
so	O
that	O
the	O
application	O
can	O
automatically	O
adapt	O
to	O
avoid	O
failure	O
.	O
</s>
<s>
Philosopher	O
Slavoj	O
Žižek	O
points	O
out	O
that	O
,	O
although	O
cloud	B-Architecture
computing	I-Architecture
enhances	O
content	O
accessibility	O
,	O
this	O
access	O
is	O
"	O
increasingly	O
grounded	O
in	O
the	O
virtually	O
monopolistic	B-Application
privatization	O
of	O
the	O
cloud	O
which	O
provides	O
this	O
access	O
"	O
.	O
</s>
<s>
Žižek	O
criticizes	O
the	O
argument	O
purported	O
by	O
supporters	O
of	O
cloud	B-Architecture
computing	I-Architecture
that	O
this	O
phenomenon	O
is	O
part	O
of	O
the	O
"	O
natural	O
evolution	O
"	O
of	O
the	O
Internet	O
,	O
sustaining	O
that	O
the	O
quasi-monopolies	O
"	O
set	O
prices	O
at	O
will	O
but	O
also	O
filter	O
the	O
software	O
they	O
provide	O
to	O
give	O
its	O
"	O
universality	O
"	O
a	O
particular	O
twist	O
depending	O
on	O
commercial	O
and	O
ideological	O
interests.	O
"	O
</s>
