Essay: Cloud Computing, Cloud Storage, Security and Privacy Analysis

Verified

Added on  2021/02/21

|8
|2120
|273
Essay
AI Summary
Document Page
INDIVIDUAL ESSAY
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY ..................................................................................................................................3
1. Cloud computing, cloud storage and different types of the cloud..........................................3
2. Difference between security and privacy................................................................................5
CONCLUSION................................................................................................................................6
REFERENCES................................................................................................................................7
Document Page
INTRODUCTION
Cloud computing is the process and method, which is use to deliver the different
application, data storage, operating system and platform and also the various computing
resources with the help of the internet rather than giving and providing any infrastructural
device. This essay will help to describe the cloud computing, cloud storage and different types of
the cloud with their long germ sustainability in the current business environment. This will also
include the difference between the privacy and security, how it help to protect the cloud or
company's cloud to be secured and private from the third party.
MAIN BODY
1. Cloud computing, cloud storage and different types of the cloud
Cloud computing can be describe as the virtual model that offer the different resources
like, storage, computing, network services and database that can be change any time and can be
use and scale and all these resources are provide over the internet so that user can use these
resources any time with having the internet service. It is being provided by the another company
to the user and can be use with the help of the internet connection. To use this computing service,
user do need to have the any hardware kind of device. Cloud computing is simply can be defined
as the different number of things to the different kind of the people (Li and et.al., 2018). Some of
the cloud computing providers are: Azure, Amazon web services and google cloud platform.
There are many advantages to using the cloud computing, such as:
Disaster and backup recovery – The environment of the cloud and the virtual pool, helps by
providing the various umber of ways, that the user can set their backup of their important data
and information. And can also give the facility to recover the data and information when user
needed and they do not have to buy any new device or to mange data.
Security – When the data and information of the user is very critical and want to safe from other
party and people, cloud computing help to maintain the security of that information. That any
data is removed from the device but remain safe in virtual pool or cloud.
Easily scalable – This cloud model is very easy and scalable. As it is easy to use for the
customers when they want top turn it off or turn it on for the use, when they need. But scalability
sometime based on the server as well.
Document Page
Pay per use model – user or the customer only have to pay those service which they use. That do
not have to purchase or pay for the entire cloud service (Langmead and Nellore, 2018).
Cloud storage can be mean as the technology that enable the user and customer to save
their files, data and any other information, and these data and information can be access or use
any time and anywhere from cloud with the help of the internet connection. As the cloud storage
is little different from the local storage, in which data, files and information are stored in device
like mobile, or tablet but in cloud storage data is removed from the device and stored in a virtual
pool or the cloud, and the user can access or use those files when the need arises in front of them.
There are different cloud namely google drive, drop box or icloud and etc. all these cloud storage
application provide the same benefit of saving the data through the internet to the cloud based
server. Once the user saved their files on the cloud they can later access all their files from the
number of multiple devices with the help of the internet as medium.
Business cloud storage is being used as to store and save the data, files and document and
later they can share all those document with other who need those documents by saving and
preserving the data. This also enable and provide the advantage of collaboration within a project
by sharing data. This also provide the different facility such as:
Security – as the data and files are accesses through the internet and also be controlled by the
internet and for this company need to have encryption of the data (Wang and et.al., 2018).
Storage space – Cloud storage provide the unlimited storage space to the users and with the large
space it can be expensive as well.
Bandwidth – By using the different location this storage offer the multiple locations and balance
and manage all the network issues.
Management interface – Cloud storage provider offers the different web and internet based
panels with their services.
There are number of cloud model. As on the basis of the deployment can be classify the
cloud models as:
Private It is the protected network of the cloud storage services. This provide the high level of
the security and protection control. These services is mainly provide and use by the companies to
share the important and critical data and files with other.
For example amazon uses the private cloud system in their organisation to protect their
data and also the customers information.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Public – This cloud storage service are provided to the customers wit the help of the internet.
This is the open kind of network and completely open and free for use. This is being operated in
shared environment (Daskal, 2018).
United Airlines, use this public cloud system to give the access of cloud to the public.
Hybrid – This is the combination of the private and public cloud but depends on the purpose of
the use. For example, public cloud is being used to communicate with the customers whereas the
private is being used to save their data.
SEGA, which is one of the largest video game manufacturer, use this hybrid cloud, to
protect their technology and data from the third party.
Community – This cloud service is being used as share between the organisation and this usually
belong to the government of a single country.
DAT solution use the community cloud system to safeguarding of their information and
documents from the unauthorized access.
2. Difference between security and privacy
Privacy is refer to the protection of the data and personal information from the public.
Whereas security refers to the being protected from different kind of the unauthorized access and
threats. Privacy can be refer as the protection of the personal information of an individual and
details from the public and third party access. So that they can not take miss advantage of those
personal information and details.
Security refers to protect and secure data or information from the unauthorized access
from third party, and also maintain and set limit to access the data and files, who can use it who
can not.
Difference between Privacy and security
Objective of privacy and security – As the security means to the safeguarding of the data and
files from the unauthorized party and the main objectives are to maintain the integrity,
confidentiality of the files and documents and the availability of the data. Else this will affect the
business of any organisation (Braun and et.al., 2018). Whereas privacy refers to the protecting of
the personal details and information from the third party and also refers to the right of the every
individual to being protected.
Program of security and privacy The program of the privacy is basically focus on
safeguarding and protecting the personal information of the individual like with password, login
Document Page
privacy and many more. On the other hand security program refer to focusing on the protecting
the data and files of the business organisation and also the individual. This is the set of some
protocols and regulation that make up this security program.
Definition of security and privacy – As security and privacy both are interconnected with each
other over the technology. And also can be used as the conjunction of each other. Privacy is
being free from the unwanted threats whereas the security can be refer as the free from the
potential and unauthorized access.
Dependency – Privacy and security go simultaneously with each other. In which this give the
security of the data but do not give the full guarantee to the privacy. As the security can be
achieved with the help of the privacy, whereas the privacy can not being achieved without the
security. If the security program is weak and not according to the customers and client then it can
affect the privacy of the customer's data, documents and files.
Principles of privacy and security – Privacy is being define as the rights of the person and
individual and the organisation with respect to the personal information and details of the
individual and organisation. Whereas the security refers to its key principles such as preserve the
integrity, maintain the information assets and, protect the confidentiality of the document and
data of the organisation and individual and the promote the availability of the documents, data
files and etc (Kirrane, Villata and d’Aquin, 2018).
As the organisation make the privacy through the help of the password, like they set the
password for their employees to access their files and documents from their portal that anybody
can not access or use their data.
Business organisation also control the access of the any website that contain the virus that
can harm the system of the organisation and vanish their documents. In this way an organisation
achieve the cloud to be secured and private.
CONCLUSION
It has been concluded from the above study, that the cloud computing is the model that
offer the different resources to the users and customers like storage and many more. It also been
concluded that cloud storage is the system that help to provide the storing facility to the users.
They can store their data and files over the cloud and can also share with the other with the help
of the internet medium. It also been analysed from the essay that security and privacy is
Document Page
interconnected with each other with the help of the technology and both re used to save and
protect the files and information.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Books and journals
Braun and et.al., 2018. Security and privacy challenges in smart cities. Sustainable cities and
society. 39. pp.499-507.
Daskal, J., 2018. Privacy and Security Across Borders. Yale LJF.128. p.1029.
Kirrane, S., Villata, S. and d’Aquin, M., 2018. Privacy, security and policies: A review of
problems and solutions with semantic web technologies. Semantic Web, (Preprint), pp.1-
10.
Langmead, B. and Nellore, A., 2018. Cloud computing for genomic data analysis and
collaboration. Nature Reviews Genetics, 19(4), p.208.
Li and et.al., 2018. Secure attribute-based data sharing for resource-limited users in cloud
computing. Computers & Security, 72, pp.1-12.
Wang and et.al., 2018. Data integrity checking with reliable data transfer for secure cloud
storage. International Journal of Web and Grid Services. 14(1). pp.106-121.
Zhong, H., Zhu, W., Xu, Y. and Cui, J., 2018. Multi-authority attribute-based encryption access
control scheme with policy hidden for cloud storage. Soft Computing. 22(1). pp.243-251.
Online
What Is Cloud Computing.2019.[Online].Available through<https://intellipaat.com/blog/what-is-
cloud-computing/>
What is the Difference between Security and Privacy.2019.[Online].Available
through<https://www.hiv.gov/blog/difference-between-security-and-privacy-and-why-it-
matters-your-program>
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]