Report: Cloud Computing Advantages, Disadvantages, and Security
VerifiedAdded on 2020/02/19
|12
|2402
|75
Report
AI Summary
This report provides a comprehensive overview of cloud computing, examining its advantages such as cost-effectiveness, unlimited storage, software integration, and rapid deployment. It also addresses the disadvantages, including technical issues and security threats. The research questions focus on the benefits and security measures. The methodology involves both qualitative and quantitative research, including questionnaires and interviews. The report discusses expected outcomes, reliability, and validity, offering a balanced perspective on cloud computing's role in modern business and its associated challenges. The report also examines the sampling techniques, method of analysis, data collection, and research processes used to arrive at the conclusion, which highlights the importance of understanding both the benefits and risks of cloud computing before adoption.

report
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Introduction......................................................................................................................................1
Literature Review............................................................................................................................1
Research Questions and Hypothesis................................................................................................3
Research Questions......................................................................................................................3
Primary research question........................................................................................................3
Secondary research question....................................................................................................3
Hypothesis...................................................................................................................................3
Operational Definitions...................................................................................................................3
Justifications................................................................................................................................3
Research Methodologies: Data Collection & Analysis...................................................................4
Sampling Techniques...................................................................................................................4
Method of Analysis......................................................................................................................4
Data Collection............................................................................................................................5
Research Processes..........................................................................................................................5
Expected Outcomes.....................................................................................................................6
Reliability and validity................................................................................................................6
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
Introduction......................................................................................................................................1
Literature Review............................................................................................................................1
Research Questions and Hypothesis................................................................................................3
Research Questions......................................................................................................................3
Primary research question........................................................................................................3
Secondary research question....................................................................................................3
Hypothesis...................................................................................................................................3
Operational Definitions...................................................................................................................3
Justifications................................................................................................................................3
Research Methodologies: Data Collection & Analysis...................................................................4
Sampling Techniques...................................................................................................................4
Method of Analysis......................................................................................................................4
Data Collection............................................................................................................................5
Research Processes..........................................................................................................................5
Expected Outcomes.....................................................................................................................6
Reliability and validity................................................................................................................6
Conclusion.......................................................................................................................................6
References........................................................................................................................................7

⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Introduction
The concept of cloud computing is becoming an important topic for businesses these days. The
report will discuss in detail about different advantages and disadvantages of cloud competing.
This is why, during the process of discovering the power of this concept, it is also crucial to have
more understanding related to streamlining the procedure of IT that make this process more
helpful (Oliveira et al, 2014).
Literature Review
Following are the list of advantages of cloud computing: -
Cost effective: the concept of cloud computing is actually considered as one of the most cost
effective methods that helps in maintain and also upgrading the system to next level. The
conventional form of software based costs is huge in term of money. In addition the licensing
fees for different number of users can further prove to be very costly for the organization (Kumar
et al, 2015).
Unlimited storage: the storage of data in this system provides an unlimited amount of storage
ability and this is why, it is important to understand that people do not worry about the storage
space or rise in the present storage space presence (Rittinghouse et al., 2016).
Software integration: the concept of cloud computing along with software integration is normally
related to something that happens automatically. This further means that one does not require
taking some additional efforts to change as well as integrate the application as per the preference
of the people (Fernández et al, 2014).
The concept of cloud computing is becoming an important topic for businesses these days. The
report will discuss in detail about different advantages and disadvantages of cloud competing.
This is why, during the process of discovering the power of this concept, it is also crucial to have
more understanding related to streamlining the procedure of IT that make this process more
helpful (Oliveira et al, 2014).
Literature Review
Following are the list of advantages of cloud computing: -
Cost effective: the concept of cloud computing is actually considered as one of the most cost
effective methods that helps in maintain and also upgrading the system to next level. The
conventional form of software based costs is huge in term of money. In addition the licensing
fees for different number of users can further prove to be very costly for the organization (Kumar
et al, 2015).
Unlimited storage: the storage of data in this system provides an unlimited amount of storage
ability and this is why, it is important to understand that people do not worry about the storage
space or rise in the present storage space presence (Rittinghouse et al., 2016).
Software integration: the concept of cloud computing along with software integration is normally
related to something that happens automatically. This further means that one does not require
taking some additional efforts to change as well as integrate the application as per the preference
of the people (Fernández et al, 2014).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Rapid deployment: in the end, the concept of cloud computing provides number of advantages of
rapid deployment. Here it is crucial to actually opt for the method of operations for the complete
system and can be completely functional in sometime (Sultan, 2014).
Disadvantages
Following is detailed discussion: -
Issues related to technicalities: it is important to understand here that information on the concept
of cloud computing can also be accessed at any point of time and from any place at all (Almorsy
et al., 2016). There are also multiple times when the current system can have some serious
problems. The company must always be preparing of technical issues that can come up at any
point of time (Nkhoma et al, 2013).
Attacks: confidential information can actually create vulnerability in the company’s existence to
any kind of hack and threats. It is important to be well prepared and aware of the fact that there is
nothing online which is secure and there is always a change of stealth of any kind of sensitive
data (Hameed, et al 2016)
Research Questions and Hypothesis
Research Questions
Primary research question
What are the advantages and disadvantages of cloud computing in business?
Secondary research question
What are some of the best measures that have been taken to improve the security of the system?
rapid deployment. Here it is crucial to actually opt for the method of operations for the complete
system and can be completely functional in sometime (Sultan, 2014).
Disadvantages
Following is detailed discussion: -
Issues related to technicalities: it is important to understand here that information on the concept
of cloud computing can also be accessed at any point of time and from any place at all (Almorsy
et al., 2016). There are also multiple times when the current system can have some serious
problems. The company must always be preparing of technical issues that can come up at any
point of time (Nkhoma et al, 2013).
Attacks: confidential information can actually create vulnerability in the company’s existence to
any kind of hack and threats. It is important to be well prepared and aware of the fact that there is
nothing online which is secure and there is always a change of stealth of any kind of sensitive
data (Hameed, et al 2016)
Research Questions and Hypothesis
Research Questions
Primary research question
What are the advantages and disadvantages of cloud computing in business?
Secondary research question
What are some of the best measures that have been taken to improve the security of the system?

Why do business use cloud computing?
How does cloud computing reduces the risk for the business?
Hypothesis
Cloud computing is becoming an integral part of organization in today’s time and the concept
comes with advantages and disadvantages which are equally important to understand. The scope
of the report goes from different organizations and using the cloud computing model (Liu et al,
2014). The concept of cloud computing actually means internet based computing of the
information. This is why it is important for the organizations to never have data put up on this
system if they are not very sure or comfortable about the sensitivity of data (Subramanian et al,
2014).
Recovery and backup: all the information is actually stored in the cloud and this is why back up
along with restoring that is actually much simpler than storing it as a physical machine. In
addition many cloud based functions are normally very competent to deal with the recovery of
data (Garrison et al, 2015).
Security: the other important problem while present in the cloud is various security based
challenges (Hwang et al., 2016). Right before selecting the base for technology, one must also
understand that the company can surrender all the sensitive and confidential data to a third party.
This is actually a huge amount of risk for the company (Chang et al, 2014).
Operational Definitions
Setting the concept of cloud computing, their vendors have gone to an extra mile to promote the
concept in organizations (Yadav et al., 2016). There are definitely some security issues and
How does cloud computing reduces the risk for the business?
Hypothesis
Cloud computing is becoming an integral part of organization in today’s time and the concept
comes with advantages and disadvantages which are equally important to understand. The scope
of the report goes from different organizations and using the cloud computing model (Liu et al,
2014). The concept of cloud computing actually means internet based computing of the
information. This is why it is important for the organizations to never have data put up on this
system if they are not very sure or comfortable about the sensitivity of data (Subramanian et al,
2014).
Recovery and backup: all the information is actually stored in the cloud and this is why back up
along with restoring that is actually much simpler than storing it as a physical machine. In
addition many cloud based functions are normally very competent to deal with the recovery of
data (Garrison et al, 2015).
Security: the other important problem while present in the cloud is various security based
challenges (Hwang et al., 2016). Right before selecting the base for technology, one must also
understand that the company can surrender all the sensitive and confidential data to a third party.
This is actually a huge amount of risk for the company (Chang et al, 2014).
Operational Definitions
Setting the concept of cloud computing, their vendors have gone to an extra mile to promote the
concept in organizations (Yadav et al., 2016). There are definitely some security issues and
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

security of data is prime concerns but the credibility here has also suffered a lot. There are so
many kinds of elements in the research that can be categorized as dependent as well as
independent elements like the cloud computing, security, vulnerability, threats, SaaS etc.
Research Methodologies: Data Collection & Analysis
Sampling Techniques
The case will have different organizations that are using cloud computing in their system. This
further will be done to make sure that the opinion of social media and companies will be covered
through all small to larger organizations.
The study will be based on a simple random based sampling method that will help in conducting
interviews as well as answering the research question and also evaluate the stated hypothesis.
Method of Analysis
There are two sides of the arguments and the concept means different for different people this is
why the debate on using qualitative or quantitative methods for study concludes that both the
methods must be adopted and there should be mix usage (Mezgár & Rauschecker, 2014).
Qualitative research
The qualitative aspect of collecting data will further make it possible to gain clarity on the
complicated nature of the features that has to be studied here and therefore there will be more
clarity on the topic (Gupta et al, 2013). The qualitative research will be used to form
questionnaires which have some open as well as close ended doubts.
Quantitative research
many kinds of elements in the research that can be categorized as dependent as well as
independent elements like the cloud computing, security, vulnerability, threats, SaaS etc.
Research Methodologies: Data Collection & Analysis
Sampling Techniques
The case will have different organizations that are using cloud computing in their system. This
further will be done to make sure that the opinion of social media and companies will be covered
through all small to larger organizations.
The study will be based on a simple random based sampling method that will help in conducting
interviews as well as answering the research question and also evaluate the stated hypothesis.
Method of Analysis
There are two sides of the arguments and the concept means different for different people this is
why the debate on using qualitative or quantitative methods for study concludes that both the
methods must be adopted and there should be mix usage (Mezgár & Rauschecker, 2014).
Qualitative research
The qualitative aspect of collecting data will further make it possible to gain clarity on the
complicated nature of the features that has to be studied here and therefore there will be more
clarity on the topic (Gupta et al, 2013). The qualitative research will be used to form
questionnaires which have some open as well as close ended doubts.
Quantitative research
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

For the sake of quantitative methods, there are number of properly structure interviews that must
be conducted to similar number of respondents on phone along direct meeting. This further will
make sure that every interview will have similar set of queries (He & Da Xu, 2014).
Data Collection
While selecting the sample for the study, it is important to have informed consent and must be
sent to the study candidates participating in electrical as well as hand based delivery (Sajid &
Raza, 2013). The main motive of the study will be further explained to the candidates and there
are responses that will promise to be sensitive by nature and also compile at one place with an
opinion of other candidates to make normal conclusion.
Research Processes
The number of responses achieved from the questionnaires will be assessed by entering it into an
excel file and later it will also be edited in the right manner. The information will later will be
send into SPS based version of seventeen data analysis software and also evaluate the data
shown in using the statistics as a means along with model based percentages and scales and
standard amount of deviations (Sadiku et al, 2014).
Work Start Date End Date
Project Objective 30th July 3rd August
Scope of the project 4th August 15th August
Literature Review 15th August 25th August
Research Questions 25th August 30th August
be conducted to similar number of respondents on phone along direct meeting. This further will
make sure that every interview will have similar set of queries (He & Da Xu, 2014).
Data Collection
While selecting the sample for the study, it is important to have informed consent and must be
sent to the study candidates participating in electrical as well as hand based delivery (Sajid &
Raza, 2013). The main motive of the study will be further explained to the candidates and there
are responses that will promise to be sensitive by nature and also compile at one place with an
opinion of other candidates to make normal conclusion.
Research Processes
The number of responses achieved from the questionnaires will be assessed by entering it into an
excel file and later it will also be edited in the right manner. The information will later will be
send into SPS based version of seventeen data analysis software and also evaluate the data
shown in using the statistics as a means along with model based percentages and scales and
standard amount of deviations (Sadiku et al, 2014).
Work Start Date End Date
Project Objective 30th July 3rd August
Scope of the project 4th August 15th August
Literature Review 15th August 25th August
Research Questions 25th August 30th August

Research Design &
Methodology
30th August 3rd Sept
Limitations 3rd Sept 8th Sept
Expected Outcomes
It is without question that organization these days are getting a lot of advantages from cloud
computing. But with number of advantages, there are some disadvantages also. It is important to
understand these aspects of cloud computing before taking it up so that maximum benefit from it
can be gained (Hsu, & Li-Hsieh, 2014).
Reliability and validity
The overall usage of mixed techniques of research can be related with number of threats for the
validity as well as level of trust of the outcomes that are obtained here. For the sake of primary
base of data, primary information tests the data for the sake of reliability and validity and also
based on finding out the same outcome (Hsu, & Li-Hsieh, 2014).
Conclusion
The kind of limitations using discussed methods in research will also be related to long amount
of time as well as efforts needed here. In addition, the research also requires more amounts of
resources to collect important data to also answer the discussed research questions.
Methodology
30th August 3rd Sept
Limitations 3rd Sept 8th Sept
Expected Outcomes
It is without question that organization these days are getting a lot of advantages from cloud
computing. But with number of advantages, there are some disadvantages also. It is important to
understand these aspects of cloud computing before taking it up so that maximum benefit from it
can be gained (Hsu, & Li-Hsieh, 2014).
Reliability and validity
The overall usage of mixed techniques of research can be related with number of threats for the
validity as well as level of trust of the outcomes that are obtained here. For the sake of primary
base of data, primary information tests the data for the sake of reliability and validity and also
based on finding out the same outcome (Hsu, & Li-Hsieh, 2014).
Conclusion
The kind of limitations using discussed methods in research will also be related to long amount
of time as well as efforts needed here. In addition, the research also requires more amounts of
resources to collect important data to also answer the discussed research questions.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Chang, V., Walters, R. J., & Wills, G. (2014). Review of Cloud Computing and existing
Frameworks for Cloud adoption.
Fernández, A., del Río, S., López, V., Bawakid, A., del Jesus, M. J., Benítez, J. M., & Herrera, F.
(2014). Big Data with Cloud Computing: an insight on the computing environment,
MapReduce, and programming frameworks. Wiley Interdisciplinary Reviews: Data
Mining and Knowledge Discovery, 4(5), 380-409.
Garrison, G., Wakefield, R. L., & Kim, S. (2015). The effects of IT capabilities and delivery
model on cloud computing success and firm performance for cloud supported processes
and operations. International Journal of Information Management, 35(4), 377-393.
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by
small and medium businesses. International Journal of Information Management, 33(5),
861-874.
Hameed, A., Khoshkbarforoushha, A., Ranjan, R., Jayaraman, P. P., Kolodziej, J., Balaji, P., ...
& Khan, S. U. (2016). A survey and taxonomy on energy efficient resource allocation
techniques for cloud computing systems. Computing, 98(7), 751-774.
He, W., & Da Xu, L. (2014). Integration of distributed enterprise applications: A survey. IEEE
Transactions on Industrial Informatics, 10(1), 35-42.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Chang, V., Walters, R. J., & Wills, G. (2014). Review of Cloud Computing and existing
Frameworks for Cloud adoption.
Fernández, A., del Río, S., López, V., Bawakid, A., del Jesus, M. J., Benítez, J. M., & Herrera, F.
(2014). Big Data with Cloud Computing: an insight on the computing environment,
MapReduce, and programming frameworks. Wiley Interdisciplinary Reviews: Data
Mining and Knowledge Discovery, 4(5), 380-409.
Garrison, G., Wakefield, R. L., & Kim, S. (2015). The effects of IT capabilities and delivery
model on cloud computing success and firm performance for cloud supported processes
and operations. International Journal of Information Management, 35(4), 377-393.
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by
small and medium businesses. International Journal of Information Management, 33(5),
861-874.
Hameed, A., Khoshkbarforoushha, A., Ranjan, R., Jayaraman, P. P., Kolodziej, J., Balaji, P., ...
& Khan, S. U. (2016). A survey and taxonomy on energy efficient resource allocation
techniques for cloud computing systems. Computing, 98(7), 751-774.
He, W., & Da Xu, L. (2014). Integration of distributed enterprise applications: A survey. IEEE
Transactions on Industrial Informatics, 10(1), 35-42.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Hsu, P. F., Ray, S., & Li-Hsieh, Y. Y. (2014). Examining cloud computing adoption intention,
pricing mechanism, and deployment model. International Journal of Information
Management, 34(4), 474-488.
Hwang, K. (2017). Cloud and Cognitive Computing: Principles, Architecture, Programming.
MIT Press.
Kumar, N. S., Lakshmi, G. R., & Balamurugan, B. (2015). Enhanced attribute based encryption
for cloud computing. Procedia Computer Science, 46, 689-696.
Liu, C. Y., Zou, C. M., & Wu, P. (2014, November). A task scheduling algorithm based on
genetic algorithm and ant colony optimization in cloud computing. In Distributed
Computing and Applications to Business, Engineering and Science (DCABES), 2014
13th International Symposium on(pp. 68-72). IEEE.
Mezgár, I., & Rauschecker, U. (2014). The challenge of networked enterprises for cloud
computing interoperability. Computers in Industry, 65(4), 657-674.
Nkhoma, M. Z., Dang, D. P., & De Souza-Daw, A. (2013, May). Contributing factors of cloud
computing adoption: a technology-organisation-environment framework approach.
In Proceedings of the European Conference on Information Management &
Evaluation (pp. 180-189).
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information
& Management, 51(5), 497-510.
pricing mechanism, and deployment model. International Journal of Information
Management, 34(4), 474-488.
Hwang, K. (2017). Cloud and Cognitive Computing: Principles, Architecture, Programming.
MIT Press.
Kumar, N. S., Lakshmi, G. R., & Balamurugan, B. (2015). Enhanced attribute based encryption
for cloud computing. Procedia Computer Science, 46, 689-696.
Liu, C. Y., Zou, C. M., & Wu, P. (2014, November). A task scheduling algorithm based on
genetic algorithm and ant colony optimization in cloud computing. In Distributed
Computing and Applications to Business, Engineering and Science (DCABES), 2014
13th International Symposium on(pp. 68-72). IEEE.
Mezgár, I., & Rauschecker, U. (2014). The challenge of networked enterprises for cloud
computing interoperability. Computers in Industry, 65(4), 657-674.
Nkhoma, M. Z., Dang, D. P., & De Souza-Daw, A. (2013, May). Contributing factors of cloud
computing adoption: a technology-organisation-environment framework approach.
In Proceedings of the European Conference on Information Management &
Evaluation (pp. 180-189).
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information
& Management, 51(5), 497-510.

Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management,
and security. CRC press.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and
challenges. IEEE potentials, 33(1), 34-36.
Sajid, M., & Raza, Z. (2013, November). Cloud computing: Issues & challenges. In International
Conference on Cloud, Big Data and Trust (Vol. 20, No. 13, pp. 13-15).
Subramanian, N., Abdulrahman, M. D., & Zhou, X. (2014). Integration of logistics and cloud
computing service providers: Cost and green benefits in the Chinese
context. Transportation Research Part E: Logistics and Transportation Review, 70, 86-98.
Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and
challenges. International Journal of Information Management, 34(2), 177-184.
Yadav, D. S., & Doke, K. (2016). Mobile Cloud Computing Issues and Solution Framework.
and security. CRC press.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and
challenges. IEEE potentials, 33(1), 34-36.
Sajid, M., & Raza, Z. (2013, November). Cloud computing: Issues & challenges. In International
Conference on Cloud, Big Data and Trust (Vol. 20, No. 13, pp. 13-15).
Subramanian, N., Abdulrahman, M. D., & Zhou, X. (2014). Integration of logistics and cloud
computing service providers: Cost and green benefits in the Chinese
context. Transportation Research Part E: Logistics and Transportation Review, 70, 86-98.
Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and
challenges. International Journal of Information Management, 34(2), 177-184.
Yadav, D. S., & Doke, K. (2016). Mobile Cloud Computing Issues and Solution Framework.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



