Table of Contents INTRODUCTION...........................................................................................................................1 Presenting cloud computing, cloud storage and different type of cloud with their suitability of business.......................................................................................................................................1 Presenting the difference between privacy and security and how the firm accomplish the cloud to be private and secured.............................................................................................................4 CONCLUSION................................................................................................................................5 References........................................................................................................................................6
INTRODUCTION In this digitalized world, every company wants to be digitalized and that is why they used different advance technology into its working place. In the same way, report is also based upon the Amazon company, that mainly focus on e-commerce and cloud computing and digital streaming. The company is also consider one of the big Four technology company because of its technological innovations. Further, the report describe meaning of cloud computing, cloud storage and different types of cloud that is used by the Amazon. Then study present difference between privacy and security and then show how a firm is achieve cloud to be their data private and secured. Presenting cloud computing, cloud storage and different type of cloud with their suitability of business Cloud computing:As per the view ofJouin and Rabai,(2019)cloud computing is the computing that depend on the shared computing resources as compared to having local servers or some personal device in order to handle the applications. Therefore, it is an availability of a computer system resources especially in data storage and computing power and there is no need of management of users as well. Cloud Storage:It Is the model that is used for computer data storagein which digital data is mainly used to store in logical pools. As per the view ofChen and et.al., (2019)the cloud service providers are mainly responsible for keep the data available and accessible that helps to protect the physical environment of a company. Further, it aid to store the data in the Internet through cloud computing so that they manages and operates the data storage as a service. Different types of cloud:There are different types of cloud computing such as: 1
Private cloud:This type of cloud is dealt out with the system that work on the private infrastructure and also provide the user with a dynamic provisioning of the computer resources . Further, the company where it is hosting all the computing infrastructure is not shared sand the security and control level is also highest when the firm is uses the private network. Amazon Virtual Private cloud is also uses private cloud services because as the firm is deal with e-commerce and provides online shopping experience to their customers and that is why it is quite necessary fro the firm to use private cloud that helps to protect and confidential the data of their customers and employees (Different types of cloud computing,2019). Further, by using private cloud, the company also specify its operation such as data replication, system monitoring and disaster recovery. In addition to this, the company also compliance with the 2 Illustration1: Different types of cloud (Source:Different types of cloud,2018)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
standardprocedureandoperationswhileexecution theapplicantsasper the compliance standards and it is not possible in the case of other cloud. Community Cloud:This clouds are created by the integrating the services of many clouds in order to address the specific needs of an industry, a community and a business sector. Further, according toGill and Buyya (2019)a community cloud is mainly shared between the organization with some common goals that helps to fit into the specific community as well. This type of cloud is mainly used by the media industry and health care industry where clouds are used to share the information at global level with the sensitive data in private infrastructure as well. For example, most of the media company are mainly looking for quick, simple and low cost way that helps to gain the skillfulness and the creation of digital content is a result of collaborative process which further includes the movement of large data and complex workflow execution as well. Hybrid:It is the combination of public and private cloud storage in which some critical data is broadside in an enterprise's private cloud and on the other side, other data is stores from the public cloud storage providers. In addition to this, the major drawback of private preparation is the inability to scale on demand and also helps to efficiently address the peak loads. That is why hybrid cloud takes the advantages of both public and private cloud. Rackspace is an example, or another hybrid cloud vendor that further host to other vendors and products. It also dedicated firewalls for added some security. Public:This cloud is manages by the third party, which provides the cloud service through internet (Rashid and Chaturvedi, 2019). This type of services are mainly offer the services that helps to manage the IT infrastructure prices and it Is also consider as a good option for handling the peak loads. For example, the Microsoft is the public cloud that serve the multiple users and not a single customers. Even the quoted firm uses public cloud storage in which it fully manages the enterprise's public cloud storage. 3
Presenting the difference between privacy and security and how the firm accomplish the cloud to be private and secured Privacy:As per the view ofJohnson and et.al., (2019)privacy is the ability that helps to protect the sensitive informationrelated to personally identifiable information and on the other side, it is really a security component. Security:According toDawes (2019)security refers to some protective measures which are put in the place in order to protect the digital data from some unauthorized users such as hackers and criminals. In addition to this, it has been analysed that both security and privacy are independent or they are synonyms a well but their main aim is to protect the confidentiality and also preserve the integrity of information assets as well. While on the other side, security also promote the availability of data but privacy is the rights of an individual and organization with respect to their personal information. Security main focus is on data and information rather than personal information, but privacy focus on protecting only personal information such as log in credentials, passwords etc.Privacy and security are also differentiated by principles such as security is based uponthreecoreprinciplessuchaspreventconfidentiality,preservingintegrityofsome informationassetsandalsopromotetheavailabilityofinformation,whileprivacyonly accomplish with a security initiatives. Amazon can achieve its company's cloud to be private and secured by the following ways such as: Data Integrity:it is the critical element which means that the data should be protect from unauthorized users such as hackers. Therefore, Amazon's transaction should follow ACID properties in order to make sure data integrity. Further, it can be obtained by usingRAID like strategy, digital signature and these are also protected from some passwords which is operated by users only. In this way, it will help to protect data and secure it as well (Hebron, Chen and Lee, 2019). Data Confidentiality:It is important for Amazon to protect their important data private and confidential and that is why, it Is quite necessary to use encryption in which hybrid technique should be used because it uses key sharing and authentication techniques. Thus further helps to provide better connectivity between user and cloud service in order to share the details through protective mode. 4
Data Availability:It means that when accidents are occur, at that time, the issue of storing data over the transborder server is a serious concern for clients as it is governed by the local laws. These accidents are hard disk damage, IDC fire and some network failures etc. Therefore, the cloud provider should share all the concerns with the clients and also helps to build the trust relationship through this connection. So, mainly the data are stored in hard drive and the reliability of hard disk should also formulates the foundation of cloud storage as well. Data Privacy:Privacy is the ability that of a company that withdraw themselves or information about themselves. In a cloud, the privacy means when the users are visit the sensitive data, the cloud services are prevent the potential opponent from inferring the user's behaviour by the user's visit. In the same way, most of the research are based upon the Oblivious RAM technology that visits many copies of data in order to hide the real visiting (Collins, 2016). Therefore, this technology is widely used in software protection and also used in order to protecting the privacy in the cloud as a promising technology. Further, it has been analysed that the company should also uses this technology in order to protect the data from getting misused. CONCLUSION By summing up above report, it has been concluded that cloud and cloud computing help the company to protect the data from any misused. That is why, it is also concluded that there are different types of cloud such as private, public, community and hybrid and Amazon uses private cloud services that helps a business to run smoothly and also protect the data from others. Further, report concluded that privacy and security are different from each others and for achieving the company's cloud, firm should use data integrity,Data Confidentiality, Data Availability, Data Privacy so that it will help a business to prevent entire data. 5
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References Books and Journals Chen, E.and et.al., 2019.Cloud storage for image data, image product designs, and image projects. U.S. Patent Application 16/180,588. Collins, A. ed., 2016.Contemporary security studies. Oxford university press. Dawes, P. J., 2019.Security system with networked touchscreen and gateway. U.S. Patent Application 10/257,364. Gill, S. S. and Buyya, R., 2019. Sustainable Cloud Computing Realization for Different Applications: A Manifesto. InDigital Business(pp. 95-117). Springer, Cham. Hebron, Y., Chen, N. and Lee, R., 2019.Method and apparatus for providing a high security mode in a network. U.S. Patent Application 10/284,386. Johnson, N. L. and et.al., 2019. Defamation and Invasion of Privacy in the Internet Age.Sw. J. Int'l L.25. p.9. Jouini, M. and Rabai, L. B. A., 2019. A security framework for secure cloud computing environments. InCloud Security: Concepts, Methodologies, Tools, and Applications(pp. 249-263). IGI Global. Rashid, A. and Chaturvedi, A., 2019. Cloud Computing Characteristics and Services: A Brief Review. Online Differenttypesofcloudcomputing.2019.[Online].Availablethrough: <https://www.geeksforgeeks.org/types-of-cloud/>. 6