Cloud Computing Security and Privacy
VerifiedAdded on  2020/10/22
|7
|2046
|118
AI Summary
This report summarizes the benefits and challenges of cloud computing, with a focus on security and privacy. It discusses the importance of password management and the use of specific applications to secure information. The report also highlights the advantages of hybrid clouds in organizing and processing data.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Essay Internet
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
INTRODUCTION...........................................................................................................................1
TASK ..............................................................................................................................................1
Cloud computing, cloud storage and three different kinds of cloud suitable for current
businesses.....................................................................................................................................1
Difference between security and privacy ....................................................................................3
CONCLUSION ...............................................................................................................................4
REFERENCES................................................................................................................................5
INTRODUCTION...........................................................................................................................1
TASK ..............................................................................................................................................1
Cloud computing, cloud storage and three different kinds of cloud suitable for current
businesses.....................................................................................................................................1
Difference between security and privacy ....................................................................................3
CONCLUSION ...............................................................................................................................4
REFERENCES................................................................................................................................5
INTRODUCTION
Cloud computing is one of the best system and technique used by many businesses to
provide better services in current business environment. It impacts on business profitability and
productivity and also affect on its operational efficiency (Rittinghouse and Ransome, 2016). The
present report is based on impact of cloud computing on ventures, it explains cloud storage,
cloud-computing and various types of cloud with its suitability to current businesses.
Furthermore, this study justifies difference between security and privacy and also explain how to
achieve cloud or firm's cloud to be secured and private.
TASK
Cloud computing, cloud storage and three different kinds of cloud suitable for current businesses
Cloud computing is practice or activity of using the network of remote servers hosted on
internet to mange, process data and store information more than personal computer or local
server. In other words cloud computing is common term for anything that includes delivering
hosted services over the internet. Within current businesses' environment cloud computing is on
demand, many organizations or IT sector is using this technique to save and secure their data and
other important information. Computer system resource, computing power and especially data
storage is the availability of this system, which work without direct active management by user.
The term is mostly used to depict data centers available to many users over internet, cloud
computing is divided into three concept or categories such as Infrastructure as service (laaS),
Software-as-a-Service (SaaS) and Platfrom-as-a-Service (PaaS). All the categories is using by
many companies such as Amazon and other which make them able to secure their data and
essential information.
Just like cloud computing, Cloud storage is also very helpful and effective service model
which is used to maintained data, backed up remotely, managed information or data and made
available to customers or businesses over typically internet (Botta and et.al., 2016). Mostly users
and current businesses need to pay for cloud data storage on monthly rate and per consumption.
Cloud storage providers added operating expenses that make technology expensive rather than
before for which users bargained. With helps of this software any business can be able to
managed their data and maintained is appropriately without hard efforts.
Private, Public and Hybrid cloud are the three types of cloud which is quite beneficial
and suitable for current businesses.
1
Cloud computing is one of the best system and technique used by many businesses to
provide better services in current business environment. It impacts on business profitability and
productivity and also affect on its operational efficiency (Rittinghouse and Ransome, 2016). The
present report is based on impact of cloud computing on ventures, it explains cloud storage,
cloud-computing and various types of cloud with its suitability to current businesses.
Furthermore, this study justifies difference between security and privacy and also explain how to
achieve cloud or firm's cloud to be secured and private.
TASK
Cloud computing, cloud storage and three different kinds of cloud suitable for current businesses
Cloud computing is practice or activity of using the network of remote servers hosted on
internet to mange, process data and store information more than personal computer or local
server. In other words cloud computing is common term for anything that includes delivering
hosted services over the internet. Within current businesses' environment cloud computing is on
demand, many organizations or IT sector is using this technique to save and secure their data and
other important information. Computer system resource, computing power and especially data
storage is the availability of this system, which work without direct active management by user.
The term is mostly used to depict data centers available to many users over internet, cloud
computing is divided into three concept or categories such as Infrastructure as service (laaS),
Software-as-a-Service (SaaS) and Platfrom-as-a-Service (PaaS). All the categories is using by
many companies such as Amazon and other which make them able to secure their data and
essential information.
Just like cloud computing, Cloud storage is also very helpful and effective service model
which is used to maintained data, backed up remotely, managed information or data and made
available to customers or businesses over typically internet (Botta and et.al., 2016). Mostly users
and current businesses need to pay for cloud data storage on monthly rate and per consumption.
Cloud storage providers added operating expenses that make technology expensive rather than
before for which users bargained. With helps of this software any business can be able to
managed their data and maintained is appropriately without hard efforts.
Private, Public and Hybrid cloud are the three types of cloud which is quite beneficial
and suitable for current businesses.
1
Private cloud is suitable for businesses who need to control over its data and to
customization over information. This storage facilities give users dedicated environment
protected behind the companies' firewall. Their services is delivered from businesses information
centre to internal users in which they offer convenience and versatility of cloud to current
businesses, while preserving management, security and control general to local data centers.
Vendors and common private cloud applications usually includes OpenStack and VMware.
Private Cloud infrastructure is stipulation for exclusive use by individual company comprising
multiple customers (Chen and et.al., 2015). It is owned, operated and managed by firm or third
party and Private cloud may exist off or on premises. Like the other cloud system it is quite
useful and beneficial for businesses.
Public cloud is one of cloud computing standard in which service provider makes assets
or resources such as VMS (Virtual Machines, storage or application available to public over
internet. Public cloud services offer on pay per usage model or may be free, it helps to reduce the
need for companies to maintain it and invest their own on premises IT resources. Public cloud is
beneficial for current businesses and fulfil their needs, it enables measurability to meet user
demand and workload, there are limited wasted resources because consumers only pay for assets
or things they use. It is fully virtualised environment, providers have multi tenant infrastructure
that enables businesses or payer to share computing resources. It relies on high bandwidth
network connectivity to quickly transmit information or data. Current businesses used this
technique to carefully replicate different versions of file.
Just like the other cloud systems, Hybrid cloud is effective service model it is
combination of an on premise private cloud and public cloud services with automation and
orchestration between two (Whaiduzzaman and et.al., 2014). Hybrid cloud is suitable to current
businesses because it helps to run their mission, sensitive applications and critical workloads on
private cloud and also use public cloud to manage workload bursts. It contributes to create
unified, scalable environment and automated environment that give many advantages to
businesses that public cloud infrastructure provide, while still keeping control over mission
critical information. In short Hybrid cloud is term of cloud computing environment that uses mix
of private, on premises, third part and public cloud facilities with transcription between two
platforms. It is successfully run and applied by selecting cloud software and hypervisor layers
2
customization over information. This storage facilities give users dedicated environment
protected behind the companies' firewall. Their services is delivered from businesses information
centre to internal users in which they offer convenience and versatility of cloud to current
businesses, while preserving management, security and control general to local data centers.
Vendors and common private cloud applications usually includes OpenStack and VMware.
Private Cloud infrastructure is stipulation for exclusive use by individual company comprising
multiple customers (Chen and et.al., 2015). It is owned, operated and managed by firm or third
party and Private cloud may exist off or on premises. Like the other cloud system it is quite
useful and beneficial for businesses.
Public cloud is one of cloud computing standard in which service provider makes assets
or resources such as VMS (Virtual Machines, storage or application available to public over
internet. Public cloud services offer on pay per usage model or may be free, it helps to reduce the
need for companies to maintain it and invest their own on premises IT resources. Public cloud is
beneficial for current businesses and fulfil their needs, it enables measurability to meet user
demand and workload, there are limited wasted resources because consumers only pay for assets
or things they use. It is fully virtualised environment, providers have multi tenant infrastructure
that enables businesses or payer to share computing resources. It relies on high bandwidth
network connectivity to quickly transmit information or data. Current businesses used this
technique to carefully replicate different versions of file.
Just like the other cloud systems, Hybrid cloud is effective service model it is
combination of an on premise private cloud and public cloud services with automation and
orchestration between two (Whaiduzzaman and et.al., 2014). Hybrid cloud is suitable to current
businesses because it helps to run their mission, sensitive applications and critical workloads on
private cloud and also use public cloud to manage workload bursts. It contributes to create
unified, scalable environment and automated environment that give many advantages to
businesses that public cloud infrastructure provide, while still keeping control over mission
critical information. In short Hybrid cloud is term of cloud computing environment that uses mix
of private, on premises, third part and public cloud facilities with transcription between two
platforms. It is successfully run and applied by selecting cloud software and hypervisor layers
2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
that is compatible with coveted public cloud, assuring appropriate interoperability with that
public cloud APIs (Application Programming Interfaces) and services.
Difference between security and privacy
Privacy and security is different from each other-
Privacy Security
Privacy is the state in which one is not
interpreted and observed by other people.
Privacy in software such cloud computing,
hybrid cloud and other is very essential.
Privacy is different from security, it enables
people to let their businesses information
private and secure from others. Information
privacy is correct to have some control over
how organizations personal data is used and
collected (Ali, Khan and Vasilakos, 2015).
Data privacy is concentrating on governance
and use of personal information and things
such as putting policies on place to assure that
customers personal data is shared, being
collected and used in proper ways. To make
privacy on system is very important because
technologies gets more invasive and people try
to stolen data for gaining competitive
advantages. It is one of the reason that leaves
companies facing incredibly complex risk
matrix for assuring that personal data is
protected or secure. It is the ability to control
and secure who can access data about
organizations business information and its
activities. It helps to protect businesses against
entities they depend on and those who is more
On the other hand security is focuses on
protecting data or information from malicious
attacks and exploitation of taken data for profit.
While it is essential for protecting data, which
is not sufficient for addressing privacy. Privacy
and security is not the same things but related
to data protection. In other words security is
resilience and freedom from potential harm
caused by others. Security means safety, with
the help of privacy company can secure their
data which is the term of security. In
Information technology world, security word
refers to protection of IT assets and digital
information against all types of threats, be it
accidental or malicious. It does not mean
product or software security, Security define
that needs to be taken into intellection in
current businesses decision. Security is about
protecting essential data, networks, equipment,
documents, files, software, confidential
information, companies assets (Jula,
Sundararajan and Othman, 2014). If company
does not maintain security appropriately, all
the safety measures is useless once attacker or
information tracker gets through by gaining
access.
3
public cloud APIs (Application Programming Interfaces) and services.
Difference between security and privacy
Privacy and security is different from each other-
Privacy Security
Privacy is the state in which one is not
interpreted and observed by other people.
Privacy in software such cloud computing,
hybrid cloud and other is very essential.
Privacy is different from security, it enables
people to let their businesses information
private and secure from others. Information
privacy is correct to have some control over
how organizations personal data is used and
collected (Ali, Khan and Vasilakos, 2015).
Data privacy is concentrating on governance
and use of personal information and things
such as putting policies on place to assure that
customers personal data is shared, being
collected and used in proper ways. To make
privacy on system is very important because
technologies gets more invasive and people try
to stolen data for gaining competitive
advantages. It is one of the reason that leaves
companies facing incredibly complex risk
matrix for assuring that personal data is
protected or secure. It is the ability to control
and secure who can access data about
organizations business information and its
activities. It helps to protect businesses against
entities they depend on and those who is more
On the other hand security is focuses on
protecting data or information from malicious
attacks and exploitation of taken data for profit.
While it is essential for protecting data, which
is not sufficient for addressing privacy. Privacy
and security is not the same things but related
to data protection. In other words security is
resilience and freedom from potential harm
caused by others. Security means safety, with
the help of privacy company can secure their
data which is the term of security. In
Information technology world, security word
refers to protection of IT assets and digital
information against all types of threats, be it
accidental or malicious. It does not mean
product or software security, Security define
that needs to be taken into intellection in
current businesses decision. Security is about
protecting essential data, networks, equipment,
documents, files, software, confidential
information, companies assets (Jula,
Sundararajan and Othman, 2014). If company
does not maintain security appropriately, all
the safety measures is useless once attacker or
information tracker gets through by gaining
access.
3
powerful than it.
Password is the best way to assure that personal data has been secured and protected in
cloud system. It helps to ensure security and privacy in cloud system which is quite beneficial for
businesses as growth and success in marketplace. Companies management need to focus on
cloud system data privacy, they must try to make hard password, no one can break it and open
system with entering accurate security password (Wei and et.al., 2014). In cloud computing,
company can be able to secure data and consistently make privacy in which no one can else see
their personal information such as financial balance sheets, customer data etc. this term usually
refers to computer system or network through which important information is processed,
transmitted and stored and over which businesses have few direct knowledge, control or
involvement. Through this step company can be able to achieve cloud system and secure and
protect data more than before.
One of the main reason behind securing data and make privacy on computer system is
consistent growth of digital technology, people used many techniques to stolen data from
companies to gain profit and many advantages in market. With the help to making strong
password and using specific application for securing information firms can able to protect
personal information for long term period, still they do not revile it personally.
CONCLUSION
From above, this report summarizes that cloud computing, cloud storage, public cloud,
private cloud and hybrid cloud is beneficial for current businesses as it helps to protect, managed
data. Hybrid cloud is the best and suitable for businesses as it help to organized information and
process appropriately. All the above system support company to balance their data and gather at
one place, managed by users. Furthermore, security and privacy is different things in which firms
can secure their personal information. Password is the best source or method to secure important
information and business data, the term is used to achieve cloud and through this organization
cloud is secured and private.
4
Password is the best way to assure that personal data has been secured and protected in
cloud system. It helps to ensure security and privacy in cloud system which is quite beneficial for
businesses as growth and success in marketplace. Companies management need to focus on
cloud system data privacy, they must try to make hard password, no one can break it and open
system with entering accurate security password (Wei and et.al., 2014). In cloud computing,
company can be able to secure data and consistently make privacy in which no one can else see
their personal information such as financial balance sheets, customer data etc. this term usually
refers to computer system or network through which important information is processed,
transmitted and stored and over which businesses have few direct knowledge, control or
involvement. Through this step company can be able to achieve cloud system and secure and
protect data more than before.
One of the main reason behind securing data and make privacy on computer system is
consistent growth of digital technology, people used many techniques to stolen data from
companies to gain profit and many advantages in market. With the help to making strong
password and using specific application for securing information firms can able to protect
personal information for long term period, still they do not revile it personally.
CONCLUSION
From above, this report summarizes that cloud computing, cloud storage, public cloud,
private cloud and hybrid cloud is beneficial for current businesses as it helps to protect, managed
data. Hybrid cloud is the best and suitable for businesses as it help to organized information and
process appropriately. All the above system support company to balance their data and gather at
one place, managed by users. Furthermore, security and privacy is different things in which firms
can secure their personal information. Password is the best source or method to secure important
information and business data, the term is used to achieve cloud and through this organization
cloud is secured and private.
4
REFERENCES
Books and Journals
Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and
challenges. Information sciences. 305. pp.357-383.
Botta, A. and et.al., 2016. Integration of cloud computing and internet of things: a survey. Future
generation computer systems. 56. pp.684-700.
Chen, X. and et.al., 2015. Efficient multi-user computation offloading for mobile-edge cloud
computing. IEEE/ACM Transactions on Networking. 24(5). pp.2795-2808.
Chen, X., 2014. Decentralized computation offloading game for mobile cloud computing. IEEE
Transactions on Parallel and Distributed Systems. 26(4). pp.974-983.
Gai, K. and et.al., 2016. Dynamic energy-aware cloudlet-based mobile cloud computing model
for green computing. Journal of Network and Computer Applications. 59. pp.46-54.
Jula, A., Sundararajan, E. and Othman, Z., 2014. Cloud computing service composition: A
systematic literature review. Expert systems with applications. 41(8). pp.3809-3824.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Sadiku, M.N., Musa, S.M. and Momoh, O.D., 2014. Cloud computing: opportunities and
challenges. IEEE potentials. 33(1). pp.34-36.
Wei, L. and et.al., 2014. Security and privacy for storage and computation in cloud
computing. Information Sciences. 258. pp.371-386.
Whaiduzzaman, M. and et.al., 2014. A survey on vehicular cloud computing. Journal of Network
and Computer applications. 40. pp.325-344.
Online
Cloud Computing, 2017. [Online]. Available through :
<https://searchcloudcomputing.techtarget.com/definition/cloud-computing>.
5
Books and Journals
Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and
challenges. Information sciences. 305. pp.357-383.
Botta, A. and et.al., 2016. Integration of cloud computing and internet of things: a survey. Future
generation computer systems. 56. pp.684-700.
Chen, X. and et.al., 2015. Efficient multi-user computation offloading for mobile-edge cloud
computing. IEEE/ACM Transactions on Networking. 24(5). pp.2795-2808.
Chen, X., 2014. Decentralized computation offloading game for mobile cloud computing. IEEE
Transactions on Parallel and Distributed Systems. 26(4). pp.974-983.
Gai, K. and et.al., 2016. Dynamic energy-aware cloudlet-based mobile cloud computing model
for green computing. Journal of Network and Computer Applications. 59. pp.46-54.
Jula, A., Sundararajan, E. and Othman, Z., 2014. Cloud computing service composition: A
systematic literature review. Expert systems with applications. 41(8). pp.3809-3824.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Sadiku, M.N., Musa, S.M. and Momoh, O.D., 2014. Cloud computing: opportunities and
challenges. IEEE potentials. 33(1). pp.34-36.
Wei, L. and et.al., 2014. Security and privacy for storage and computation in cloud
computing. Information Sciences. 258. pp.371-386.
Whaiduzzaman, M. and et.al., 2014. A survey on vehicular cloud computing. Journal of Network
and Computer applications. 40. pp.325-344.
Online
Cloud Computing, 2017. [Online]. Available through :
<https://searchcloudcomputing.techtarget.com/definition/cloud-computing>.
5
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.