Evaluating the Advantages, Disadvantages, and Security of Cloud
VerifiedAdded on 2023/04/22
|7
|1551
|467
Essay
AI Summary
This essay provides a comprehensive overview of cloud computing, defining it as a service-oriented approach to delivering software, information, and resources over a network. It presents arguments for and against cloud computing, highlighting its advantages such as scalability, cost reduction, and accessibility, while also addressing associated risks like security vulnerabilities, privacy concerns, and lack of standardized laws and regulations. The essay emphasizes the importance of securing sensitive data in the cloud, discussing potential threats like eavesdropping and man-in-the-middle attacks. It concludes that while cloud computing offers significant benefits for businesses of all sizes, addressing technical, operational, and financial issues is crucial for widespread acceptance and adoption of this technology. Desklib offers similar solved assignments for students.

Cloud Computing
Student’s name
Institutional Affiliation(s)
Student’s name
Institutional Affiliation(s)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Abstract
The research paper is centred on the concept of cloud computing. Cloud computing is a
popular concept in the field of information technology. It is related to the delivery of computing
which is considered to be service rather than any product. In this form of method software,
information and resources are given to devices and computers in the form of utility across a
network. This paper presents some of the arguments for and against the use of this innovative
technology.
The research paper is centred on the concept of cloud computing. Cloud computing is a
popular concept in the field of information technology. It is related to the delivery of computing
which is considered to be service rather than any product. In this form of method software,
information and resources are given to devices and computers in the form of utility across a
network. This paper presents some of the arguments for and against the use of this innovative
technology.

Introduction
With the development of a computerized world in the recent past, technologists have
resorted to cloud computing as one of the most efficient methods of storing and sharing
information. Cloud computing refers to the mechanism that connects a large number of
computers through the internet, to allow clients within the network to share crucial information
and develop a common network. Although this technology has many advantages to a global
society, it has some risks that make it disadvantageous in its application. Cloud computing is
considered to be a developing field that has attracted the attention of numerous researchers over
the past decade.
Cloud Computing
Many researchers have aimed to explain the concept in the most comprehensive manner.
Stergiou, Psannis, Kim, and Gupta, stated that cloud computing is defined as an amalgamation of
utility computing and Software as a Service (SaaS) since it enables the purchase of computing
power in the same manner as other utilities of life, like water, gas among others. The authors
further add that cloud computing mainly involves two aspects. Firstly, applications and platforms
that might be offered as services via the internet by the cloud computing service providers and
secondly the hardware and software systems that might be residing in the data centres of the
service providers [1].
The private and confidential property and data must be secured by the ‘Business Cloud’
that contains trading secrets, customer’s information, and other data. It is the primary
responsibility of business cloud to ensure proper security of data. A security breach can cause
permanent damage to the business that leads towards bankruptcy and other legal complications.
Therefore, it is also necessary to analyze service models and implementation methods before
With the development of a computerized world in the recent past, technologists have
resorted to cloud computing as one of the most efficient methods of storing and sharing
information. Cloud computing refers to the mechanism that connects a large number of
computers through the internet, to allow clients within the network to share crucial information
and develop a common network. Although this technology has many advantages to a global
society, it has some risks that make it disadvantageous in its application. Cloud computing is
considered to be a developing field that has attracted the attention of numerous researchers over
the past decade.
Cloud Computing
Many researchers have aimed to explain the concept in the most comprehensive manner.
Stergiou, Psannis, Kim, and Gupta, stated that cloud computing is defined as an amalgamation of
utility computing and Software as a Service (SaaS) since it enables the purchase of computing
power in the same manner as other utilities of life, like water, gas among others. The authors
further add that cloud computing mainly involves two aspects. Firstly, applications and platforms
that might be offered as services via the internet by the cloud computing service providers and
secondly the hardware and software systems that might be residing in the data centres of the
service providers [1].
The private and confidential property and data must be secured by the ‘Business Cloud’
that contains trading secrets, customer’s information, and other data. It is the primary
responsibility of business cloud to ensure proper security of data. A security breach can cause
permanent damage to the business that leads towards bankruptcy and other legal complications.
Therefore, it is also necessary to analyze service models and implementation methods before
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

making any plans related to critical applications transfers of the cloud. To implement the right
services and to avoid any possible risks, business requirements must be aligned [2].
Cloud computing has many advantages that have underpinned its current adoption and
integration into business, academic and social networks. Cloud services offer some business and
economic benefits to an organization such as the access to a highly scalable infrastructure while
reducing the cost of operation and maintenance. Servers in traditional networking and hosting
setups are fixed in hardware meaning that an organization has to spend more money in upgrades
in case it wants to scale up to cater for more users than the current hardware can support. This
proves to be costly with minimal benefits given that the upgraded hardware is still limited to
some users. Cloud services, on the other hand, has its servers and other infrastructures virtually
installed in place enabling for scalability from small needs of users to massive corporate needs.
The ability for cloud computing to quickly scale resources with minimal cost makes it more
affordable than the traditional hosting system since users only pay for what they use. Server and
infrastructure upgrades are done by the cloud service providers rather than the business
organization thus ensuring minimum operating cost. Primarily cloud computing provides a
business organization with unlimited resources and services at a much lower price as compared
to the traditional hosting and networking where the business spends a lot in operating expenses
while receiving minimal and limited benefits [3]. Cloud computing eliminates a lot of the costs
to a business organization such as the costs of physically securing the infrastructure such as the
servers, installation and maintenance costs. Given its easy availability and access, an
organization can save on its electricity consumption by allowing employees to work remotely
from their homes.
services and to avoid any possible risks, business requirements must be aligned [2].
Cloud computing has many advantages that have underpinned its current adoption and
integration into business, academic and social networks. Cloud services offer some business and
economic benefits to an organization such as the access to a highly scalable infrastructure while
reducing the cost of operation and maintenance. Servers in traditional networking and hosting
setups are fixed in hardware meaning that an organization has to spend more money in upgrades
in case it wants to scale up to cater for more users than the current hardware can support. This
proves to be costly with minimal benefits given that the upgraded hardware is still limited to
some users. Cloud services, on the other hand, has its servers and other infrastructures virtually
installed in place enabling for scalability from small needs of users to massive corporate needs.
The ability for cloud computing to quickly scale resources with minimal cost makes it more
affordable than the traditional hosting system since users only pay for what they use. Server and
infrastructure upgrades are done by the cloud service providers rather than the business
organization thus ensuring minimum operating cost. Primarily cloud computing provides a
business organization with unlimited resources and services at a much lower price as compared
to the traditional hosting and networking where the business spends a lot in operating expenses
while receiving minimal and limited benefits [3]. Cloud computing eliminates a lot of the costs
to a business organization such as the costs of physically securing the infrastructure such as the
servers, installation and maintenance costs. Given its easy availability and access, an
organization can save on its electricity consumption by allowing employees to work remotely
from their homes.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

However, cloud computing has its associated risks that have undermined its proliferation
within the world today. Cloud computing is based on public clouds that make it accessible to the
general users of the internet, although the data and intellectual assets of the companies are
protected by effective security measures the concept still seems vulnerable to some users.
Therefore, Subramanian and Jeyaraj, explain that there exist different laws in the US and UK
regarding the privacy and confidentiality of data. Thus, the placement of data in different regions
plays an essential part in the protection of the data. The transfer and access of information on
public clouds increase chances of eavesdropping, intrusion and man-in-the-middle attacks as
compared to the transmission of data on private clouds. Therefore, the decreasing control of
security and privacy proves to be one of the inhibitions regarding the usage of cloud computing
services. Subramanian and Jeyaraj, further explains that security and privacy of data is a
significant issue that needs to be addressed by the service providers [4]. However, several
approaches can be adopted to improve the status of the respective technology. Cloud computing
service providers should urge the concerned authorities to issue policies and standards for
safeguarding the security and privacy of the intellectual assets of the users. Also, laws regarding
the placement of the data should be regulated such that the data should reside in the same
country as the initiator of the request [5]. In this way, the user shall be aware of the protection
rights of the data of his country and therefore, he shall expect the same protective measures for
his intellectual assets on the data servers of the cloud computing service providers.
There are still a lot of gaps in this new field of cloud computing in terms of laws,
standards, and research. There are no sufficient laws to govern the utilization of this technology.
There are countries where there are such laws, but there is still no global laws to govern the use
of cloud computing. Also, there is no agreed standards or models to be used while implementing
within the world today. Cloud computing is based on public clouds that make it accessible to the
general users of the internet, although the data and intellectual assets of the companies are
protected by effective security measures the concept still seems vulnerable to some users.
Therefore, Subramanian and Jeyaraj, explain that there exist different laws in the US and UK
regarding the privacy and confidentiality of data. Thus, the placement of data in different regions
plays an essential part in the protection of the data. The transfer and access of information on
public clouds increase chances of eavesdropping, intrusion and man-in-the-middle attacks as
compared to the transmission of data on private clouds. Therefore, the decreasing control of
security and privacy proves to be one of the inhibitions regarding the usage of cloud computing
services. Subramanian and Jeyaraj, further explains that security and privacy of data is a
significant issue that needs to be addressed by the service providers [4]. However, several
approaches can be adopted to improve the status of the respective technology. Cloud computing
service providers should urge the concerned authorities to issue policies and standards for
safeguarding the security and privacy of the intellectual assets of the users. Also, laws regarding
the placement of the data should be regulated such that the data should reside in the same
country as the initiator of the request [5]. In this way, the user shall be aware of the protection
rights of the data of his country and therefore, he shall expect the same protective measures for
his intellectual assets on the data servers of the cloud computing service providers.
There are still a lot of gaps in this new field of cloud computing in terms of laws,
standards, and research. There are no sufficient laws to govern the utilization of this technology.
There are countries where there are such laws, but there is still no global laws to govern the use
of cloud computing. Also, there is no agreed standards or models to be used while implementing

the services. Every vendor has their models of cloud computing. Finally, the fact that there is no
universally agreed definition of cloud computing shows that there is not enough research in this
field.
Conclusion
To sum up, although cloud-based systems have multiple advantages over their premise-
based counterparts data being sent across the globe on the internet will always pose a security
challenge. From the customers perspective, the very idea that company data is in the hands of a
third party is in itself a security concern as this is a “relationship” based on trust. Furthermore,
cloud infrastructure is based on the idea of multi-tenancy, and basically, the cloud provider and
their ability to maintain data integrity and privacy is the first line of security. Again cloud
applications are subject to constant upgrades and revision which alters everything including the
security settings; therefore with every update possibly a new security challenge is created. Cloud
Computing is a fundamental concept that cannot be ignored. The technology holds significant
value for small and medium and large businesses. Major technical, operational and financial
issues that come with the cloud need to be addressed for individuals and organizations to accept
this fantastic technology fully.
universally agreed definition of cloud computing shows that there is not enough research in this
field.
Conclusion
To sum up, although cloud-based systems have multiple advantages over their premise-
based counterparts data being sent across the globe on the internet will always pose a security
challenge. From the customers perspective, the very idea that company data is in the hands of a
third party is in itself a security concern as this is a “relationship” based on trust. Furthermore,
cloud infrastructure is based on the idea of multi-tenancy, and basically, the cloud provider and
their ability to maintain data integrity and privacy is the first line of security. Again cloud
applications are subject to constant upgrades and revision which alters everything including the
security settings; therefore with every update possibly a new security challenge is created. Cloud
Computing is a fundamental concept that cannot be ignored. The technology holds significant
value for small and medium and large businesses. Major technical, operational and financial
issues that come with the cloud need to be addressed for individuals and organizations to accept
this fantastic technology fully.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

References
[1] C. Stergiou, K. E. Psannis, B.-G. Kim, and B. Gupta, “Secure integration of IoT and Cloud
Computing,” Future Gener. Comput. Syst., vol. 78, pp. 964–975, Jan. 2018.
[2] J. Weinman, “Toward a Theoretical Model of Cloud Computing,” IEEE Cloud Comput., vol.
5, no. 6, pp. 92–101, Nov. 2018.
[3] M. S. Mahmoud and Y. Xia, “Chapter 3 - Cloud Computing,” in Networked Control Systems,
M. S. Mahmoud and Y. Xia, Eds. Butterworth-Heinemann, 2019, pp. 91–125.
[4] N. Subramanian and A. Jeyaraj, “Recent security challenges in cloud computing,” Comput.
Electr. Eng., vol. 71, pp. 28–42, Oct. 2018.
[5] L. F. Bittencourt, A. Goldman, E. R. M. Madeira, N. L. S. da Fonseca, and R. Sakellariou,
“Scheduling in distributed systems: A cloud computing perspective,” Comput. Sci. Rev., vol.
30, pp. 31–54, Nov. 2018.
[1] C. Stergiou, K. E. Psannis, B.-G. Kim, and B. Gupta, “Secure integration of IoT and Cloud
Computing,” Future Gener. Comput. Syst., vol. 78, pp. 964–975, Jan. 2018.
[2] J. Weinman, “Toward a Theoretical Model of Cloud Computing,” IEEE Cloud Comput., vol.
5, no. 6, pp. 92–101, Nov. 2018.
[3] M. S. Mahmoud and Y. Xia, “Chapter 3 - Cloud Computing,” in Networked Control Systems,
M. S. Mahmoud and Y. Xia, Eds. Butterworth-Heinemann, 2019, pp. 91–125.
[4] N. Subramanian and A. Jeyaraj, “Recent security challenges in cloud computing,” Comput.
Electr. Eng., vol. 71, pp. 28–42, Oct. 2018.
[5] L. F. Bittencourt, A. Goldman, E. R. M. Madeira, N. L. S. da Fonseca, and R. Sakellariou,
“Scheduling in distributed systems: A cloud computing perspective,” Comput. Sci. Rev., vol.
30, pp. 31–54, Nov. 2018.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.