This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Art

The implication of storing patients’ data in cloud computing controlled by the third party

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

 

 

 

 

 

The implication of storing patients’ data in cloud computing controlled by the third party

Name

Institutional Affiliation

Date of Submission

 

 

 

 

 

 

 

 

 

 

The implication of storing patients’ data in cloud computing controlled by the third party

The first implication is the risk of lack of control by the users working for the health institutions. When it’s stored and managed by the third party, the organization has little control over it hence making it difficult to monitor and update the system as required to improve the security of the stored data. When the third party makes a mistake the organization can lose all the data as it is not in a position to rescue the situation because the control of the system is from the third party operating outside the organization. Another implication is that third parties enable the servers to be shared, which brings a risk of data-stealing because, in case of any system protocol breach, one user can access confidential information of another user hence using for personal benefit.

Data privacy is another challenge affecting cloud computing services that are managed by third parties. Some information is confidential and is not supposed to be leaked to the public because it can lead to unfair competition to the business organization because some of them are business secrets. But when the third parties control the cloud computing services, then it means that it will be in a position to see all the stored information hence making such information not a secret to the organization.

Another challenge is the lack of a backup plan for the data. When the third party controls the system, the organization cannot back up the data; hence, data can be lost entirely in case of an accident, thus affecting the normal functioning of the organization.

The role of the hypervisor in cloud computing

The hypervisor is the technology that allows network administrators to separate the operating system from the hardware. In cloud computing technology, where organizations are permitted to store data on the internet network, the hypervisor is essential because it allows multiple operating systems to operate on a single hardware. It will enable the different system applications to function simultaneously without interference on a single host.  Separating the function of the various application system helps in minimizing the chances of other users accessing the information that belongs to the other person. Therefore, hypervisor supports a monitor and ensure the confidentiality and privacy of confidential information in the system (Jain & Choudhary, 2016, March).

Tools that can be used to mitigate the risk associated with cloud computing

CSP is a tool used in cloud computing that ensures that that persistent data cannot be lost from the system. When the stored data is lost, it becomes difficult for the organization to make better decisions because it depends on the available data.  Secure third-party validation ensures that the information stored cannot be leaked to the public by third parties responsible for the control of the system. There is also the feature that limits the users who can access the system at a time. It helps in preventing the jam on the network that can result in the collapse of the net. When the grid collapses, the organization risks losing essential data (Tancock, Pearson, & Charlesworth, 2013).

How a small business clinic can implement cloud computing without risking the information stored.

They need to take control of the system and not allow the third party o control everything. By doing that, they will be able to prevent confidential information from reaching the third part. Doing that means that data such as the patient’s medication history remain confidential between the patient and the hospital.

The second option is for the clinic to categorize the type of data they have and for those perceived to be confidential should not be stored on the cloud because when hackers access such information may lead to a negative impact on both the patient and the hospital. Monitoring and response plans should be in place to ensure that any vulnerability in the network is detected and preventative measures to mitigate the negative impact of the risks.

Small clinic businesses should select a public cloud because it is easier to manage and cheaper to maintain as compared to the private cloud. Considering that low business enterprise revenues are minimal, then public cloud computing becomes the best option because it can be maintained.

Implications of public and private cloud

Public cloud is delicate for the organizations to control, and it is only the third parties that have control over the system. It is cheaper to install and maintain as co pared to private cloud hence making them a better option for small businesses that have little revenue. For the private cloud, organizations have control over them, and they can monitor any activities being undertaken on the system. It is expensive to install and maintain hence making them a better option for larger companies (Chunlin, & LaYuan, 2017).

 

 

 

 

References

Chunlin, L., & LaYuan, L. (2017). Optimal scheduling across public and private clouds in a complex hybrid cloud environment. Information Systems Frontiers, 19(1), 1-12.

Tancock, D., Pearson, S., & Charlesworth, A. (2013). A privacy impact assessment tool for cloud computing. In Privacy and security for Cloud computing (pp. 73-123). Springer, London.

Jain, N., & Choudhary, S. (2016, March). Overview of virtualization in cloud computing. In 2016 Symposium on Colossal Data Analysis and Networking (CDAN) (pp. 1-4). IEEE.

 

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask