Table of Contents INTRODUCTION...........................................................................................................................1 MAIN BODY...................................................................................................................................1 Discuss about cloud computing and cloud storage.....................................................................1 Different kinds of clouds with their suitability to current business............................................2 Differences between privacy and security..................................................................................3 How do you achieve your cloud or organisation’s cloud to be private and secured..................4 CONCLUSION................................................................................................................................4 REFERENCES................................................................................................................................5
INTRODUCTION Digitalisation can be defined as an electronic technology that generates, processes and stores the data in two aspects such as positive or negative. In addition digital transformation is a process in which several digital techniques i.e. cloud computing is used so that business process can be modified and requirements of customers can be fulfilled in desired manner. This report will covers cloud computing, storage and several kind of cloud with its suitability to current business. Along with it, comparison between security and privacy will also discussed in this report. MAIN BODY Discuss about cloud computing and cloud storage Cloud computing is defined as the delivery of several services by using internet. This system also includes several applications and tools like servers, software, database, data storage etc. This name is given because informations and data is stored in a specific space or cloud. Several organisations like Microsoft, Amazon, Google etc. are the main providers of this kind of storage in which they allows the users to store their important data or files on distinct servers and they can see or download this data by using internet. By using this, users can freely access their necessary informations from anywhere or it can be said that they have no need to going anywhere for accessing these informations (Bertino and Ferrari, 2018). It consists of heavy lifting that is a part of processing and crunching far away from device which is carried by individuals. It also assist the managers of organisations in performing their duties without installing heavy data base systems within the workplace. Therefore, it can be said that internet becomes cloud which have allowed the users in accessing their private and personal informations from anywhere across the world. Cloud computing services are referred to a system of networks that supplies hosted services in two ways such as private or public. Service related with public cloud are provided to customers on the basis of fees whereas, private cloud services are available for limited number of customers only. In addition, it can be defined as a service model which allows the users to manage, secured or maintained in a specific place or field that provides access to users that they can store their informations and data at monthly rate. Even if gigabyte cost is driven down radically then operating expenses will be high which can restricts the organisations or users for 1
using this kind of services. Whereas, in cloud storage, data is being stored in several logical pools and if users wants to access the information then they have to pass several tests. These data is managed into several servers by the service providers main reason behind this is to protect the valid information in a protective manner so that if user wants to access the nit will be accessible and available for them. Therefore, different cloud storage providers have duty to keep the data is accessible and available so that users don't get frustrated while they wants to access the information (Radenkovic,2016). Several business organisations in a marketplace take lease or buy storage capacity from these service providers so that important data such as customer's informations, stakeholder reports, share capital, several bonds etc. can be stored effectively. Service related with cloud storage can be accessed by users through web service application interface. This system is mainly depends on virtualised infrastructure in which users can access their informations easily from the storage which is available in broader cloud computing storage. Different kinds of clouds with their suitability to current business Thiswillbenefitbusinessorganisationsinreducingtotalcapitalexpenditureand ownership cost. It will allow companies to pay for only those services for which they wish to pay. Beside this, it has access to enterprise grade infrastructure and IT resources due to which firms are able to access needed data without spending high amount. This help business organisation in performing their business activities by achieving high results(Marinescu, 2017) Inpresentscenario,cloudcomputingisbecomingastandardisedplatformforbusiness organisations because through it they can easily store necessary informations of organisation effectively. It also supports the organisations in managing their software, IT infrastructure and hardware resources. This technology also benefited the organisations in utilising their resources and applications which are managed by third party without any problem or difficulty. These systems are usually established for business purposes. There are different cloud systems are available in marketplace which can be used by the organisations as per their suitability. One of them isInfrastructure as a servicewhich is also called lowest level of cloud computing service. It also assist the organisations in delivering configured hardware and software services with the help of virtualised software service. These services are provided by several cloud computing providers such as Google, Amazon, Microsoft etc. which provides benefits to the business organisations in saving their expenditures and ownership costs. Apart from that, it also allows the firms to pay for only those services for which they want to access. In addition, it also assists the 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
organisations in securing their data or information without spending heavy investments on this function which leads the organisations in gaining sustainability at marketplace. Platform related to the services is identify as an another kind of cloud which is advanced than IaaS. Along with this, for offering infrastructure is also consider as a tupe of solution stacks and computing platform. In such cloud, information technology infrastructure is given as a operating system as well as graphic user interface. This type of cloud is used by those organisation whose have requirement to create test and collaborate for particular applications. There are some examples of organisation which used such type of cloud such as Google app, Microsoft Azure and so on. Therefore, with the help of such cloud, company can easily update its infrastructure software regularly. It will also assist them by reducing risk of lack of capital. Used of this capital in investment in hardware and software. Due to this, activities of an organisation executed in a cost effective way and it will become more easy for them to accomplish their goals and objectives within given time period. Differences between privacy and security Both terms i.e. privacy and security are interconnected with each other but sometimes users can't make difference between them and understands same. Whole modern era of business environment is related with technology because each user wants to get services with proper security. Whereas, they also tend to use privacy in securing their informations. Due to which privacy and security both terms are using widely by the organisations. Apart from that, privacy and security both are different with each other because security is defined as the protective measures which are taken by users or organisations in order to protecting their data from hackers, cyber criminals etc. whereas, privacy is a freedom of persons from unwanted things and intrusiveness. In other words, it is a state in which users are prevented from secret surveillance and unwanted attention. Security is a safeguard which is used by the persons for making safe their informations and other private things. Whereas, privacy is a right of person which is used by them to make them safe from the unwanted things. Main aim of security programmes to protect all assets and resources of business organisations whereas, privacy programmes mainly focuses on securing informations of employees and organisations. Therefore in last, it can be said security can be gained by persons without using privacy but it is not possible to achieve privacy without security (Steinfeld,2016). 3
How do you achieve your cloud or organisation’s cloud to be private and secured The use of cloud based storages and data processing tools has increaseddue to which business firms are facing various privacy issues. Business firms in this present century is focused on controlling their data so that the other external parties or services provides cannot access it directly without the permission from companies. In order to protect the data from external sources, business firms are using the distributed approach through which the firms can divide the cloud database in several segments which are available to the clients through cloud storages. Companies can also use thein-memory RDBMS with row level data encryption for getting a private cloud storage (Marinescu, 2017). The firms can also encrypt their data from end to end encryption so that the data can be secured in an effective manner. The business firms can encrypt the sensitive data which are not used every time due to which they could not be transmitted over a network. The business companies also needs to have enforced and defined data deletion policy in order to secure the data of cloud storages in an effective manner. CONCLUSION It has been concluded from the above discussed report that cloud computing and cloud storage both are important for business organisations as it helps them in storing their large number of data without any difficulty. It is also concluded that privacy is a term which is used for securing the entity or individuals from unwanted activities or functions whereas, security is related with safeguarding data properly so that any rival company can misuse the data for gaining competitive edge. Private and secure cloud systems providing both kind of facilities to their customers so that any kind of loss not be faced by them in future. 4
REFERENCES Books and journals Bertino, E. and Ferrari, E., 2018. Big data security and privacy. InA Comprehensive Guide Through the Italian Database Research Over the Last 25 Years(pp. 425-439). Springer. Cham. Steinfeld, N., 2016. “I agree to the terms and conditions”:(How) do users read privacy policies online? An eye-tracking experiment.Computers in human behavior.55.pp.992-1000. Radenkovic,M.,2016.Cognitiveprivacyforpersonalclouds.MobileInformation Systems.2016. Öğütçü, G., Testik, Ö.M. and Chouseinoglou, O., 2016. Analysis of personal information security behavior and awareness.Computers & Security.56.pp.83-93. Emara, K., Woerndl, W. and Schlichter, J., 2015. On evaluation of location privacy preserving schemes for VANET safety applications.Computer Communications.63.pp.11-23. Pahl, C. and Lee, B., 2015, August. Containers and clusters for edge cloud architectures--a technology review. In2015 3rd international conference on future internet of things and cloud(pp. 379-386). IEEE. Orsini, G., Bade, D. and Lamersdorf, W., 2015. Context-aware computation offloading for mobile cloud computing: Requirements analysis, survey and design guideline.Procedia Computer Science.56.pp.10-17. Marinescu, D. C., 2017.Cloud computing: theory and practice. Morgan Kaufmann. Gangwar, H., Date, H. and Ramaswamy, R., 2015. Understanding determinants of cloud computingadoptionusinganintegratedTAM-TOEmodel.JournalofEnterprise Information Management.28(1). pp.107-130. Singh, S. and Chana, I., 2016. A survey on resource scheduling in cloud computing: Issues and challenges.Journal of grid computing.14(2). pp.217-264. Online Cloudcomputing.2019.[online].Availablethrough. <https://searchcloudcomputing.techtarget.com/definition/cloud-computing> WhatisPrivateCloud.2019.[online].Availablethrough.[online].Availablethrough. <https://www.liquidweb.com/blog/private-cloud/> What is cloud computing?. 2018.[online]. Available through. [online]. Available through. <https://www.zdnet.com/article/what-is-cloud-computing-everything-you-need-to- know-from-public-and-private-cloud-to-software-as-a/> Google cloud outage is resolved but it reveals the holes in cloud computing atmosphere. 2019. [online].Availablethrough.[online].Availablethrough. <https://techcrunch.com/2019/06/02/googles-cloud-outage-is-resolved-but-it-reveals- the-holes-in-cloud-computings-atmosphere/> 5
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Data Security and Privacy in Cloud Computing. 2014.[online]. Available through. [online]. Available through. <https://journals.sagepub.com/doi/full/10.1155/2014/190903> Security and privacy in cloud computing. 2018. [online]. Available through. [online]. Available through. <http://tec.gov.in/pdf/Studypaper/Paper-1-security%20and%20Privacy.pdf> 6