logo

Introduction to Cloud Computing Introduction 3 Main Body3 Approaches: 5 Demonstration and Evaluation

   

Added on  2021-02-19

14 Pages5243 Words273 Views
Cloud ComputingCloud Computing
Introduction to Cloud Computing Introduction 3 Main Body3 Approaches: 5 Demonstration and Evaluation_1
Table of ContentsIntroduction......................................................................................................................................3Main Body.......................................................................................................................................3Overview:...............................................................................................................................3Approaches:............................................................................................................................5Demonstration and evaluation................................................................................................6Conclusion.....................................................................................................................................12References......................................................................................................................................13
Introduction to Cloud Computing Introduction 3 Main Body3 Approaches: 5 Demonstration and Evaluation_2
IntroductionCloud computing refers to on-demand availability of resources of computer system whichprovides data storage along with computing power without any kind of direct active managementthrough its user. Basically, it is being utilised for description of data centre which are availablefor users on the internet (Ahmed and Hossain, 2014). This is liable for delivering diverseservices by making use of internet to their clients. It involves applications and tools such asservers, data storage, software, networking and database. This essay is based on cloudcomputing, approaches associated with this, its understanding and evaluation of different aspectsassociated with this. Along with this, different aspects, facts and opinions are also illustrated.Furthermore, it includes limitations it has with respect to security aspects. Main BodyOverview:Delivery of computing power as a service over a network rather then having the physicalresources within the location of customer is referred to as cloud computing. Cloud renders astrong computing platform which allows organisations as well as individuals to deliver theirtasks like usage of online storage space, development of customised software for systems,adopting business applications and creating realistic network environment (Ashktorab andTaghizadeh, 2012). At present, lots of people are making use of cloud services for deliveringtheir services in an amplified manner. This also denotes that ample of data is stored within cloudcomputing environments. But, with this security is also compromised which leads to databreaches to cloud services as hackers are attempting to exploit the vulnerabilities that existwithin its architecture. It is liable for delivering storage space as well as application through theutilisation of internet with minimal cost. An instance can be taken to understand its usage onindividuals on day to day basis like web based mail systems are used for exchanging messageswith each other, social networking sites provide a platform where information can be sharedwith friends and remain in contact with them. These are some basic examples of cloudcomputing which denotes that services from cloud are being utilised by each individual in real
Introduction to Cloud Computing Introduction 3 Main Body3 Approaches: 5 Demonstration and Evaluation_3
time and also backup is provided within the cloud servers by which it can be accessed wheneverit is being required (Chou, 2013).Cloud computing is also utilised by businesses for having services to reduction ofoperational costs as well as improvisation of flow of cash. For an instance, social news websitehave the storage space from Amazon Elastic Compute Cloud (EC2). This denotes a web servicewhich is liable for providing resizable and secured computing capacity within the cloud(Hashizume and et. al, 2013). Furthermore, Amazon EC2 provides an interface that will assistwithin obtaining as well as configuring capacity via minimised friction that is responsible forproviding complete control to the resources. Basically, Amazon EC2 will eliminate therequirement for investment within hardware up front for development as well as deployment ofapplications quickly. It leads to launching of virtual servers when they are required, security canbe configured, management of storage and networking. In the similar manner digital photo sharing websites makes use of Amazon S3 for photohosting services. Amazon Simple Storage Service denotes a object storage that is responsible foroffering data availability, performance, security and industry leading scalability (Jiang, Ma andWei, 2016). This denotes that customers of all sizes as well as industries can make its use forstoring as well as protecting any amount of data for their use cases like mobile applications,websites and restoring them. Likewise software firms opt for services delivered by MicrosoftAzure. This is being delivered by Microsoft for development, its testing, deployment andmanagement of services along with applications through the utilisation of Microsoft manageddata centres. This furnishes tools as well as frameworks for development of services via a globalnetwork. Cloud renders services at affordable prices but it also leads to rise within the securityissues that are related with it. This makes firms or individuals more vulnerable to cybercrimes.For this, hackers or intruders tend to develop and utilise the different techniques for gainingaccess to clouds without any kind legal authorization so that they can attain their goals. Ifappropriate location of data can be attained then it will make hackers to have access to thesensitive as well private information which will lead them to carry out illegal activities. This canbe understood by taking an instance, like hackers have taken a storage space from Amazon's EC2services and attacked the Sony's PlayStation Network (Jouini and et. al, 2012). Within the dataleakage incident, Epsilon leaked email addresses and names of millions of customers from the
Introduction to Cloud Computing Introduction 3 Main Body3 Approaches: 5 Demonstration and Evaluation_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Summary of Amazon EC2
|13
|2756
|393

Cloud Based Solution for Cake Franchise System
|12
|3322
|30

Cloud Computing
|9
|1593
|247

Development of Cloud Computing - PDF
|15
|4861
|117

Individual Essay - Cloud Computing
|7
|1998
|42

Implementation of Cloud Computing in VideoDev
|32
|2579
|320