ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Cloud Computing and Security in Business

Verified

Added on  2021/02/22

|7
|1998
|42
AI Summary
The assignment explores the concept of cloud computing and its applications in business. It delves into the different types of cloud computing (public, private, hybrid) and cloud services (IaaS, PaaS, SaaS). The essay also discusses the importance of security and privacy in cloud computing, mentioning various methods to protect data, such as encryption and secure passwords. It concludes that businesses must prioritize data security when using cloud storage for corporate information.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Individual Essay

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
ASSESSMENT 1 ............................................................................................................................1
Cloud computing, cloud storage and different kinds of cloud to current businesses .................1
Difference between privacy and security and ways of achievement of cloud ...........................3
CONCLUSION ...............................................................................................................................4
REFERENCES................................................................................................................................5
Document Page
INTRODUCTION
Cloud computing is the normal term for anything which includes delivering hosted
facilities over the internet. These facilities are wider divided into three classes like Structure as a
service, platforms as service and software as a service (Rittinghouse and Ransome, 2016). This
study is based on Amazon. It is the multinational technology firm which focus on cloud
computing, e-commerce and artificial intelligence. Report will discuss the could computing,
cloud storage and different types of cloud to current business. It will explain difference between
privacy and security as well as ways of achievement of cloud to be private and secured.
ASSESSMENT 1
Cloud computing, cloud storage and different kinds of cloud to current businesses
Cloud Computing:
According to that Botta and et.al., (2016) Cloud computing is the bringing of various
services through internet. These resources involves tools and applications like data storage,
server, data base, networking and software. It is the popular option for people and business for
number of reasons involving cost saving, enhancing productiveness speed and efficiency,
execution and security. It is the on-demand transfer of computer power, information, storage
applications as well as other information technology resources through internet with pay-as-you-
go pricing.
As per the view of Hashem and et.al., (2015) Company like Amazon utilise cloud
computing to run applications which shares images to millions of mobile users or to help
business complex operations. Cloud service platforms gives fast access to flexible and power
prices of resources of information technology. They do not require to create big direct
investment and spend lot of time on the large assistance of handling that hardware. A cloud
service supplier like Amazon Web services operates and maintains network-linked hardware
needed for these application facilities while they provision and utilise as well as needs through
web application of the firm.
Cloud Storage:
In order to that Almorsy, Grundy and Müller, (2016) Cloud storage is the cloud
computing technique which stores informations on the internet through cloud computing
suppliers who handles and operates information storage as the services. It is supplied on demand
1
Document Page
with just-in time capabilities, prices and removing purchasing as well as handling own
information storage structure. This provides agility, international scale, lastingness with anytime,
anywhere access the information. It is buying from third party could vendor who operates
capacity of information storage and suppliers it through internet in pay-as-you-go theory. These
cloud keeping vendor handle capacity, security and strength to create information accessible to
applications all across the worldwide. Applications way cloud store through traditional storage
protocols or directly through an API. Many sellers offer complementary facilities designed to aid
gather, handle and secure as well as evaluate information at large scale. There are benefits of
cloud storage like total cost of ownership, time to preparation and information management.
With cloud storage, there is no hardware to buy, store of provision or capital being utilised for
someday scenarios.
Different types of Cloud:
It states that Ali, Khan and Vasilakos, (2015) There are three kinds of clouds like public,
private and hybrid cloud. Public cloud means that entire computing structure is situated on the
premises of cloud computing firm which offers the cloud service. Therefore, the location
remains separate from the consumers and has no physical control over the structure. In this
contrast Xia and et.al., (2016) private cloud refers utilising cloud structure exclusively by one
consumer/company. The firms have no option of selecting premise private cloud that is more
costly but they do have physical power over the construction (Cloud Computing – Types of
Cloud, 2013). As compared to that Rittinghouse and Ransome, (2016) Hybrid cloud refers to use
both private and public clouds depending on their purposes. For instance, public cloud can be
utilised to communicate with users while keeping their information secured through private
cloud.
In order to that Botta and et.al., (2016) there are three kinds of cloud services like
Infrastructure, platform and software as services. Amazon utilised all the cloud services in which
infrastructure as a services provides capabilities to processing provision to consumers. As
compared to that Hashem and et.al., (2015) Platforms as services that gives different facilities
such as information, workflow engines, e-mail to their users. In this contrast Almorsy, M.,
Grundy and Müller, (2016) software as services give end-users applications to their consumers
with some management capacity at the application level. All the cloud services are suitable for
company. Cloud services are also scalable.
2

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
As per the view of Xia and et.al., (2016) Companies follow cloud facilities normally
benefits from developed ratio and lower cost. This provides them competitive advantage that can
aid them to rapidly increase market share. As grow of company, they can raise subscription to
the resources that they require to go on online with development. Most of the cloud suppliers
have packages which enable to select level of facility they need. Company can access of cloud
facilities from any computing device connected to the internet involving laptop, tablets and
smartphone.
Difference between privacy and security and ways of achievement of cloud
According to that Rittinghouse and Ransome, (2016) privacy protection is less technical
issue and more of policy and legal issue in cloud computing. It is bit of various issues having to
do with right of individual to own the information created by their life and actions. It is to limit
outbound flowing of the information. The one issue of privacy which frequently implements
rights of users to safeguard data of individual from any other parties. It includes covering of
undefended information consumer feedback data and other types of demographic or personal
information from being freely distributed over the internet or sold to third parties. Privacy is to
keep information and rights of individual to itself. It is difficult describe in portion because user
specific details can be also be secure information.
As compared to that Botta and et.al., (2016) security is dominating value of information
technology. There are more technologies become linked by networks like global IP and wireless
telecommunication networks. Security fields can involve very different elements from end point
security activities which control the display of information on smartphone as well as tablets for
data in usage, network security activities which secure web information as well as infrastructure
from hacking or cyberattack. Therefore, company like Amazon must have secure all the
information and facts of consumers. Also, they must have ensured that do not misuse of the
information or data related to users. It refers to protection against the unlicensed access of
information. Company put security controls in place in limits those can access the data.
In order to that Hashem and et.al., (2015) Privacy and security are arrangement of
objectives and goals of organization. Same precautions which offer information security for
consumers. But, privacy is can not by built into security efforts. As, it is necessary objective by
the large firms or government agencies. Most of the leading companies look digital security as
dominants while avoiding digital privacy of consumers and others. Security as the protection
3
Document Page
against unlicensed access with the some involving declared mention of integrity and availability.
Security controls are out in place of control who can access particular informations. As
compared to that Almorsy, Grundy and Müller, (2016) privacy is another part. It allows access
when business need exists while cashier can be precondition to view all account detail of
consumers like consumer walking into branch in another city to access the accounts of
consumers.
According to that Ali, Khan and Vasilakos, (2015) privacy disable that same cashier
viewing their neighbours relationship balance or because they are interested which means dislike
their access perquisites granting them access. Existing privacy and security are rethink as they
raise development costs, length testing and slow speed to market. The acquiring and sharing of
all this data frequently decriminalised by businesses which is threat to privacy. Businesses can
chosen to adopt privacy by design and security by design methods. Privacy and security can
work in arrangement to secure large data because it can be impossible to put back.
As per the view of Xia and et.al., (2016) There are many ways for privacy and security
of cloud of Amazon. It involves ignore storing delicate information in the cloud, read users
agreement to discover ways of works to cloud service storage. Also, companies must be serious
about passwords. Firms like Amazon utilise an encrypted cloud service which refers that services
takes care of both encrypting files on computer and storing them safely on the cloud (5 Tips to
Keep Your Data Secure on the Cloud, 2013). If the company selecting the best ways of
protecting data keep in mind and ways of valuable data of firm and level it is the reasonable to
secure it. If the they utilise cloud storage for keeping corporate information that they will
discover paying for safe and protect information storage reasonable.
CONCLUSION
This essay has summarised that cloud computing and cloud storage essential aspects for
company. It can be concluded that different kinds of cloud like public, private and hybrid and
also different cloud services such as infrastructure as a services Platforms as services and
software as services used by the selected company. It can be discussed that comparison between
security and privacy for accomplish the cloud.
4
Document Page
REFERENCES
Books and Journals
Ali, M., Khan, S. U. and Vasilakos, A. V., 2015. Security in cloud computing: Opportunities and
challenges. Information sciences. 305. pp.357-383.
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Botta, A. and et.al., 2016. Integration of cloud computing and internet of things: a
survey. Future generation computer systems. 56. pp.684-700.
Hashem, I. A. T. and et.al., 2015. The rise of “big data” on cloud computing: Review and open
research issues. Information systems. 47. pp.98-115.
Rittinghouse, J. W. and Ransome, J. F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Xia, Z. and et.al., 2016. A privacy-preserving and copy-deterrence content-based image retrieval
scheme in cloud computing. IEEE Transactions on Information Forensics and
Security. 11(11). pp.2594-2608.
Online
5 Tips to Keep Your Data Secure on the Cloud. 2013. [ONLINE]. Available through. :
<https://www.cio.com/article/2380182/5-tips-to-keep-your-data-secure-on-the-
cloud.html>.
Cloud Computing Types of Cloud. 2013. [ONLINE]. Available through. :
<https://www.globaldots.com/cloud-computing-types-of-cloud/>.
5
1 out of 7
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]