This report summarizes the benefits and challenges of cloud computing, with a focus on security and privacy. It discusses the importance of password management and the use of specific applications to secure information. The report also highlights the advantages of hybrid clouds in organizing and processing data.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Essay Internet
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents INTRODUCTION...........................................................................................................................1 TASK..............................................................................................................................................1 Cloud computing, cloud storage and three different kinds of cloud suitable for current businesses.....................................................................................................................................1 Difference between security and privacy....................................................................................3 CONCLUSION...............................................................................................................................4 REFERENCES................................................................................................................................5
INTRODUCTION Cloud computing is one of the best system and technique used by many businesses to provide better services in current business environment. It impacts on business profitability and productivity and also affect on its operational efficiency (Rittinghouse and Ransome, 2016). The present report is based on impact of cloud computing on ventures, it explains cloud storage, cloud-computingandvarioustypesofcloudwithitssuitabilitytocurrentbusinesses. Furthermore, this study justifies difference between security and privacy and also explain how to achieve cloud or firm's cloud to be secured and private. TASK Cloud computing, cloud storage and three different kinds of cloud suitable for current businesses Cloud computingis practice or activity of using the network of remote servers hosted on internet to mange, process data and store information more than personal computer or local server. In other words cloud computing is common term for anything that includes delivering hosted services over the internet. Within current businesses' environment cloud computing is on demand, many organizations or IT sector is using this technique to save and secure their data and other important information. Computer system resource, computing power and especially data storage is the availability of this system, which work without direct active management by user. The term is mostly used to depict data centers available to many users over internet, cloud computing is divided into three concept or categories such as Infrastructure as service (laaS), Software-as-a-Service (SaaS) and Platfrom-as-a-Service (PaaS). All the categories is using by many companies such asAmazonand other which make them able to secure their data and essential information. Just like cloud computing,Cloud storageis also very helpful and effective service model which is used to maintained data, backed up remotely, managed information or data and made available to customers or businesses over typically internet(Botta and et.al., 2016). Mostly users andcurrent businessesneed to pay for cloud data storage on monthly rate and per consumption. Cloud storage providers added operating expenses that make technology expensive rather than before for which users bargained. With helps of this software any business can be able to managed their data and maintained is appropriately without hard efforts. Private, Public and Hybridcloud are the three types of cloud which is quite beneficial and suitable for current businesses. 1
Private cloudis suitable for businesses who need to control over its data and to customizationoverinformation.Thisstoragefacilitiesgiveusersdedicatedenvironment protected behind the companies' firewall. Their services is delivered from businesses information centre to internal users in which they offer convenience and versatility of cloud to current businesses, while preserving management, security and control general to local data centers. Vendors and common private cloud applications usually includes OpenStack and VMware. Private Cloud infrastructure is stipulation for exclusive use by individual company comprising multiple customers (Chen and et.al., 2015). It is owned, operated and managed by firm or third party and Private cloud may exist off or on premises. Like the other cloud system it is quite useful and beneficial for businesses. Public cloudis one of cloud computing standard in which service provider makes assets or resources such as VMS (Virtual Machines, storage or application available to public over internet. Public cloud services offer on pay per usage model or may be free, it helps to reduce the need for companies to maintain it and invest their own on premises IT resources. Public cloud is beneficial for current businesses and fulfil their needs, it enables measurability to meet user demand and workload, there are limited wasted resources because consumers only pay for assets or things they use. It is fully virtualised environment, providers have multi tenant infrastructure that enables businesses or payer to share computing resources. It relies on high bandwidth network connectivity to quickly transmit information or data.Current businessesused this technique to carefully replicate different versions of file. Justlike the othercloudsystems,Hybridcloudiseffective servicemodelitis combination of an on premise private cloud and public cloud services with automation and orchestration between two (Whaiduzzaman and et.al., 2014). Hybrid cloud is suitable to current businesses because it helps to run their mission, sensitive applications and critical workloads on private cloud and also use public cloud to manage workload bursts. It contributes to create unified,scalableenvironmentandautomatedenvironmentthatgivemanyadvantagesto businesses that public cloud infrastructure provide, while still keeping control over mission critical information. In short Hybrid cloud is term of cloud computing environment that uses mix of private, on premises, third part and public cloud facilities with transcription between two platforms. It is successfully run and applied by selecting cloud software and hypervisor layers 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
that is compatible with coveted public cloud, assuring appropriate interoperability with that public cloud APIs (Application Programming Interfaces) and services. Difference between security and privacy Privacy and security is different from each other- PrivacySecurity Privacyisthestateinwhichoneisnot interpretedandobservedbyotherpeople. Privacyinsoftwaresuchcloudcomputing, hybridcloudandotherisveryessential. Privacy is different from security, it enables peopletolettheirbusinessesinformation private and secure from others. Information privacy is correct to have some control over how organizations personal data is used and collected(Ali,KhanandVasilakos,2015). Data privacy is concentrating on governance and use of personal information and things such as putting policies on place to assure that customerspersonaldataisshared,being collected and used in proper ways. To make privacy on system is very important because technologies gets more invasive and people try tostolendataforgainingcompetitive advantages. It is one of the reason that leaves companiesfacingincrediblycomplexrisk matrixforassuringthatpersonaldatais protected or secure. It is the ability to control andsecurewhocanaccessdataabout organizationsbusinessinformationandits activities. It helps to protect businesses against entities they depend on and those who is more Ontheotherhandsecurityisfocuseson protecting data or information from malicious attacks and exploitation of taken data for profit. While it is essential for protecting data, which is not sufficient for addressing privacy. Privacy and security is not the same things but related to data protection. In other words security is resilience and freedom from potential harm caused by others. Security means safety, with the help of privacy company can secure their datawhichisthetermofsecurity.In Information technology world, security word refers to protection of IT assets and digital information against all types of threats, be it accidentalormalicious.Itdoesnotmean product or software security, Security define thatneedstobetakenintointellectionin current businesses decision. Security is about protecting essential data, networks, equipment, documents,files,software,confidential information,companiesassets(Jula, Sundararajan and Othman, 2014). If company does not maintain security appropriately, all the safety measures is useless once attacker or information tracker gets through by gaining access. 3
powerful than it. Password is the best way to assure that personal data has been secured and protected in cloud system. It helps to ensure security and privacy in cloud system which is quite beneficial for businesses as growth and success in marketplace. Companies management need to focus on cloud system data privacy, they must try to make hard password, no one can break it and open system with entering accurate security password(Wei and et.al., 2014). In cloud computing, company can be able to secure data and consistently make privacy in which no one can else see their personal information such as financial balance sheets, customer data etc. this term usually refers to computer system or network through which important information is processed, transmitted and stored and over which businesses have few direct knowledge, control or involvement. Through this step company can be able to achieve cloud system and secure and protect data more than before. One of the main reason behind securing data and make privacy on computer system is consistent growth of digital technology, people used many techniques to stolen data from companies to gain profit and many advantages in market. With the help to making strong password and using specific application for securing information firms can able to protect personal information for long term period, still they do not revile it personally. CONCLUSION From above, this report summarizes that cloud computing, cloud storage, public cloud, private cloud and hybrid cloud is beneficial for current businesses as it helps to protect, managed data. Hybrid cloud is the best and suitable for businesses as it help to organized information and process appropriately. All the above system support company to balance their data and gather at one place, managed by users. Furthermore, security and privacy is different things in which firms can secure their personal information. Password is the best source or method to secure important information and business data, the term is used to achieve cloud and through this organization cloud is secured and private. 4
REFERENCES Books and Journals Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and challenges.Information sciences.305.pp.357-383. Botta, A. and et.al., 2016. Integration of cloud computing and internet of things: a survey.Future generation computer systems.56.pp.684-700. Chen, X. and et.al., 2015. Efficient multi-user computation offloading for mobile-edge cloud computing.IEEE/ACM Transactions on Networking.24(5). pp.2795-2808. Chen, X., 2014. Decentralized computation offloading game for mobile cloud computing.IEEE Transactions on Parallel and Distributed Systems.26(4). pp.974-983. Gai, K. and et.al., 2016. Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing.Journal of Network and Computer Applications.59.pp.46-54. Jula, A., Sundararajan, E. and Othman, Z., 2014. Cloud computing service composition: A systematic literature review.Expert systems with applications.41(8). pp.3809-3824. Rittinghouse, J.W. and Ransome, J.F., 2016.Cloud computing: implementation, management, and security. CRC press. Sadiku, M.N., Musa, S.M. and Momoh, O.D., 2014. Cloud computing: opportunities and challenges.IEEE potentials.33(1). pp.34-36. Wei,L.andet.al.,2014.Securityandprivacyforstorageandcomputationincloud computing.Information Sciences.258.pp.371-386. Whaiduzzaman, M. and et.al., 2014. A survey on vehicular cloud computing.Journal of Network and Computer applications.40.pp.325-344. Online CloudComputing,2017.[Online].Availablethrough: <https://searchcloudcomputing.techtarget.com/definition/cloud-computing>. 5