Cloud Computing: Types, Advantages, Disadvantages and Applications
Verified
Added on Β 2023/06/05
|7
|286
|474
AI Summary
This presentation provides an overview of cloud computing, including its types (IaaS, PaaS, SaaS, RaaS), advantages (efficiency, performance, cost-effectiveness), disadvantages (cost, security risks, complexity), and applications (backup, data storage, e-commerce, word processing). References are also provided.
Contribute Materials
Your contribution can guide someoneβs learning journey. Share your
documents today.
Cloud Computing
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction οCloud computing is an advanced technology in the field of computer science οIt is a kind of process to transfer information technology services by using internet and web based servers οThere are main three parts of cloud computing used: ο‘Private cloud ο‘Public cloud ο‘Hybrid cloud
Types of cloud computing οThere are following types of cloud available in market: ο‘Infrastructure as a service (IaaS) ο‘Platform as a services (PaaS) ο‘Software as a services (SaaS) ο‘Recovery as a services (RaaS)
Advantages of cloud computing οMore efficient and flexible process οIncrease performance of mobile devices οReduced cyber-attacks οVery cheap and easy to understand οConsumers can use this process as a backup plan [1].
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Disadvantages of cloud computing οVery expansive process οLimited resources οIncreased security risks and threats οVery complex to design οUsers can lose their private details οVulnerability to attack [2].
Applications οAs a backup plan οOnline data storage οTwitter related applications οWeb- based applications οFor e-commerce business οWord processing application οSpreadsheets
References [2]. I.A.T., Hashem, I., Yaqoob, N.B., Anuar, S., Mokhtar, A. Gani and S.U., Khan. βThe rise of βbig dataβ on cloud computing: Review and open research issues.βInformation Systems,47(2), pp.98-115, 2015. [2]. J., Li, X., Chen, C. Jia and W., Lou. βIdentity-based encryption with outsourced revocation in cloud computing.βIeee Transactions on computers,64(2), pp.425-437, 2015.