Cloud Computing and Data Security Analysis

Verified

Added on  2020/10/05

|7
|1982
|455
AI Summary
The assignment provided is an in-depth analysis of cloud computing and its associated security techniques. It delves into the various types of cloud computing models (private, public, and hybrid) and services (SaaS, PaaS, IaaS). The importance of maintaining security and privacy in cloud computing environments is highlighted, with a focus on integrity and appropriate data usage. A thorough review of relevant literature and online resources provides a comprehensive understanding of the topic.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Integrated Professional Skills
in the Digital Age

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODCUTION...........................................................................................................................1
MAIN BODY..................................................................................................................................1
CONCLUSION................................................................................................................................4
REFERENCES................................................................................................................................5
Document Page
INTRODCUTION
The technological era has resulted in bringing new software and applications. It has ease in
doing business functions. Also, it has provided a platform for business to expand and develop
new products and services (Thota and et.al., 2018). In present time, cloud computing has
emerged as new technology that has enabled business in offering services through internet.
Through this, businesses are able to store, process, retrieve, etc. data and information easily. It
depends on firm that what type of cloud computing service they use. This report will describe
about cloud computing types. Moreover, it will discuss about difference between security and
privacy and how organisations are able to preserve it.
MAIN BODY
Discuss cloud computing, storage and different types of cloud
Cloud computing is a technology that uses network in hosted on internet to store,
manage, access, etc. data and information. In this there is no use of local server. The companies
using cloud computing have not to use their own infrastructure. For example – Google provide G
mail as service, Dropbox enables to store data, etc. these all are able to capture market by using
internet. Through this, user can access services by using infrastructure. They only have to pay for
services that they are using (Ahmed and et.al., 2015). Cloud storage is data storage model in
which data is stored digitally. It consists of servers and database that are been managed and
owned by host business. By using cloud storage data can be accessed or stored. In order to access
cloud storage there are different platforms available. It includes web service application (API),
desktop storage, etc. It enables user to access data from multiple resources. They can share
information with others.
Cloud computing is further categorised in two that is on basis of service and models.
They work on same platform that is on internet but offers different types of services (Cloud
computing models. 2016). They are explained below :-
Public – It is an open platform that can be used by any organisation or business. These clouds
are owned by public or private organisation. They manage hardware and resources of cloud. The
customers using it are not having any control on resources. For example - G mail is public cloud
that is used by individual and companies.
1
Document Page
Private – It offers the same services but is different from public cloud. Here, third party or
private companies own the infrastructure. Sometimes, private companies also implement and use
their own cloud to offer services. For example- SAP is private cloud.
Hybrid – It is combination of both clouds. The public one can be used to provide services
whereas private is used for storing data.
Community cloud – They are used by organisation that shares same concern like security,
policy, etc. the cloud may be owned and managed by single organisation or third party. It is
commonly used for shared data management (Sharma and et.al., 2016).
Each cloud offers different types of services to businesses (Types of cloud computing
services. 2018). They are classified below :-
Platform as a service (PaaS)- Here, the user can use resources in order to develop applications
and host in over internet. In this components are used that is required in developing web services.
Infrastructure as a service (IaaS)- It provides complete infrastructure over internet that can be
used by user. Generally, it is used for storing and accessing of data. The infrastructure includes
server, database, etc. For this user have to pay for service been used.
Software as a service (SaaS)- in this software are delivered through applications over internet.
The third party provides services to manage applications. It enables user to access it on cloud.
The use of cloud computing depends on business nature and types of services they
provide. Also, what application or resources they want to use. For instance, they only want to
offer service to store and access data over internet. Thus, for this they can use IaaS service. It can
be used either on private or public cloud. Beside this, IaaS enables in covering large area and
user can easily store data and information. On other side, the business that offers resources to
provide services on internet can use PaaS. They will act as third party and charge fees for using
of resources from other companies (Jouini and Rabai, 2019). So, this type of service is suitable
for those businesses. Furthermore, the software and hardware used by enterprise is directly
related to their services. Basically, it is used by SME’s as they are not capable of implementing
their own infrastructure to provide services. Thus, by availing services of cloud businesses reach
customers.
Difference between privacy and security and how company achieve it
It is very important for companies to maintain privacy and security of data and
information so that it is not misused. It is because in cloud data is stored on database and server.
2

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Also, user can access and share it with others, so its integrity must be maintained. Moreover, it
helps in protecting data from been hacked and having any unauthorised access of it. Besides this,
it becomes easy to retrieve data in case of loss. There are many policies and guidelines formed
by companies that enable to use share or access data in ethical manner. But there are several
differences between security and privacy of data. Thus, it is necessary to understand this as it
will help in giving insight about how these both vary and in what way. The difference is shown
as below :-
Security Privacy
It refers to confidentiality and integrity of
data.
It refers to appropriate use of data by
organisation.
It includes process and practices that are
followed in doing so.
It consists of policies and guidelines through
which privacy is maintained.
Security can be attained without privacy. So,
it automatically affects privacy (Zheng and
et.al., 2015).
Privacy can not be attained without security.
In this data and information is protected
against unauthorised access.
In this the data is protected personally in
identifiable information.
There are various protocols used in order to
maintain integrity of assets.
It protects privacy rights and processing of
data.
For example- each user will have id and
password to access data,
For example- the data will be shared only in
decrypted manner with third party.
In cloud computing services are provided through an open source that is internet. So, the
data and information can be easily hacked or misused. In addition to it, third parties share data
with business and other person so there are high chances of misuse. Also, due to technical error
data can be lost. Therefore, it is the responsibility of business to maintain integrity of data. For
this various measures are taken in order to do so. The most used measure is setting strong
passwords. This restricts any other person to access data. Another measure that can be taken is
forming policies and guidelines through which data can be shared. The third party have to
compliance with it (Manogaran, Thota and Kumar, 2016). They have to follow those policies to
3
Document Page
share data. It shows a defined way through which data is shared. It contains some standards that
have to be followed. But among all these data encryption technique is used by companies to
protect data. Here, data is kept into encrypted form until it is shared. So, for hacker it is difficult
to read and access data. Moreover, DLP strategy is used to back up data. It helps in retrieving of
data copies in case original data is lost. It enables in managing data and asset of cloud computing
and securing server, database from any threat.
So, these all are techniques through which data is kept protected and secured. It is useful
in reducing risk of getting data hacked. Alongside it, through guidelines data and information is
used in proper way (Ghahramani, Zhou and Hon, 2017). Also, its confidentiality of data is
maintained by following a specific process. Moreover, maintaining integrity of data benefit is
dealing with third parties. It also helps in gaining trust of user.
CONCLUSION
From report it can be concluded that by using cloud computing businesses provide services
through internet. It provides flexibility and integrates services. There are three types of cloud that
are private, public and hybrid. Besides this, SaaS, PaaS and IaaS are three types of services.
These all uses third party platform and offer services to companies. In this security and privacy is
to be maintained. These both concepts differ from each other but are dependent on one another.
Security refers to integrity of data and information whereas privacy is using data is appropriate
manner.
4
Document Page
REFERENCES
Books and Journals
Ahmed, E. and et.al., 2015. Application optimization in mobile cloud computing: Motivation,
taxonomies, and open challenges. Journal of Network and Computer Applications. 52.
pp.52-68.
Ghahramani, M.H., Zhou, M. and Hon, C.T., 2017. Toward cloud computing QoS architecture:
Analysis of cloud systems and cloud services. IEEE/CAA Journal of Automatica
Sinica. 4(1), pp.6-18.
Jouini, M. and Rabai, L.B.A., 2019. A security framework for secure cloud computing
environments. In Cloud Security: Concepts, Methodologies, Tools, and Applications (pp.
249-263). IGI Global.
Manogaran, G., Thota, C. and Kumar, M.V., 2016. MetaCloudDataStorage architecture for big
data security in cloud computing. Procedia Computer Science. 87. pp.128-133.
Sharma, S.K. and et.al., 2016. Predicting motivators of cloud computing adoption: A developing
country perspective. Computers in Human Behavior. 62. pp.61-69.
Thota, C. and et.al., 2018. Centralized fog computing security platform for IoT and cloud in
healthcare system. In Fog Computing: Breakthroughs in Research and Practice (pp. 365-
378). IGI Global.
Zheng, K. and et.al., 2015. An SMDP-based resource allocation in vehicular cloud computing
systems. IEEE Transactions on Industrial Electronics. 62(12), pp.7920-7928.
Online
Cloud computing models. 2016. [Online] Available through : <
https://www.paranet.com/blog/bid/128265/The-Four-Types-of-Cloud-Computing-Models
>
Types of cloud computing services. 2018. [Online] Available through : <
https://azure.microsoft.com/en-in/overview/types-of-cloud-computing/>
5
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]