The Role of Cloud Computing, Privacy, and Security in Business
VerifiedAdded on 2020/12/09
|7
|1887
|381
Essay
AI Summary
This essay provides a comprehensive overview of cloud computing and its significance in modern business operations. It begins by defining cloud computing and its various types, including Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), and Platform-as-a-Service (PaaS), and then explores the benefits of cloud computing such as cost reduction, increased productivity, and enhanced security. The essay also delves into cloud storage and its role in data backup and recovery. Furthermore, it differentiates between privacy and security within the context of cloud computing, emphasizing the importance of protecting data from unauthorized access and misuse. The essay concludes by highlighting the strategic importance of cloud computing in enabling businesses to make informed decisions and gain a competitive advantage. It also references several books and journals to support its arguments.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Computing and
Business
Business
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
INTRODUCTION ..........................................................................................................................1
TASK 1 ...........................................................................................................................................1
Cloud computing and its types ...................................................................................................1
TASK 2 ...........................................................................................................................................3
Difference between privacy and security ...................................................................................3
CONCLUSION ...............................................................................................................................3
.........................................................................................................................................................3
INTRODUCTION ..........................................................................................................................1
TASK 1 ...........................................................................................................................................1
Cloud computing and its types ...................................................................................................1
TASK 2 ...........................................................................................................................................3
Difference between privacy and security ...................................................................................3
CONCLUSION ...............................................................................................................................3
.........................................................................................................................................................3

INTRODUCTION
Cloud computing is a technology paradigm, where a large pool of system are connected
or interlinked in private and public network, to provide dynamically scalable infrastructure fro
application, data and file storage. With the advent of this innovative technology, the cost of
computation, application hosting, content storage and delivery is significantly reduced. However,
cloud computing is a practical approach which helps company to experience direct cost benefit
and enhance their potentiality to transform data centre from a capital intensive set up to a
variable priced environment (Assante and et. al., 2016). Moreover,this tool covers vast range of
options now, from the basics of storage, networking and processing power through to natural
language processing and artificial intelligence as well as improves office application in an
effective way. This essay covers importance and impact of cloud computing and cloud storage
within business operation and function as well as differentiate the privacy and security concept
for cloud computing for company is also mentioned here.
TASK 1
Cloud computing and its types
It is regarded as one of the powerful determinant in today's competitive world as it
signifies that the delivery of different services through internet. Along with this, it involves
resources , tools and application like data storage, servers, databases, networking, software etc.
Rather than keeping files on a proprietary hard drive or local device storage, cloud computing
makes it possible to save them to a remote database (Zhou, Yang and Shao, 2016). Therefore,
cloud computing is a popular option for majority of the business as it benefit them to save cost,
increase productivity, speed and efficiency, performance and security. Furthermore, it can be
both public and private and each of them contains unique features and characteristics which leads
company to attain high level of productivity and profitability ratio. Hence, public cloud services
provide their function over internet for fees on the other hand private services render its activities
to a certain number of people. Moreover, there is a possibility of combining both elements into
one function i.e. hybrid option. Moreover, this element provides users with a series of function
which includes like e-mail, back up, creating and testing app, analysing data, audio and video
streaming, etc. that assist company to improve their overall performance of business in order to
gain competitive advantage.
Cloud computing is a technology paradigm, where a large pool of system are connected
or interlinked in private and public network, to provide dynamically scalable infrastructure fro
application, data and file storage. With the advent of this innovative technology, the cost of
computation, application hosting, content storage and delivery is significantly reduced. However,
cloud computing is a practical approach which helps company to experience direct cost benefit
and enhance their potentiality to transform data centre from a capital intensive set up to a
variable priced environment (Assante and et. al., 2016). Moreover,this tool covers vast range of
options now, from the basics of storage, networking and processing power through to natural
language processing and artificial intelligence as well as improves office application in an
effective way. This essay covers importance and impact of cloud computing and cloud storage
within business operation and function as well as differentiate the privacy and security concept
for cloud computing for company is also mentioned here.
TASK 1
Cloud computing and its types
It is regarded as one of the powerful determinant in today's competitive world as it
signifies that the delivery of different services through internet. Along with this, it involves
resources , tools and application like data storage, servers, databases, networking, software etc.
Rather than keeping files on a proprietary hard drive or local device storage, cloud computing
makes it possible to save them to a remote database (Zhou, Yang and Shao, 2016). Therefore,
cloud computing is a popular option for majority of the business as it benefit them to save cost,
increase productivity, speed and efficiency, performance and security. Furthermore, it can be
both public and private and each of them contains unique features and characteristics which leads
company to attain high level of productivity and profitability ratio. Hence, public cloud services
provide their function over internet for fees on the other hand private services render its activities
to a certain number of people. Moreover, there is a possibility of combining both elements into
one function i.e. hybrid option. Moreover, this element provides users with a series of function
which includes like e-mail, back up, creating and testing app, analysing data, audio and video
streaming, etc. that assist company to improve their overall performance of business in order to
gain competitive advantage.

Cloud storage is a cloud computing model in which data is stored on remote servers
accessed from an internet or 'cloud'. Along with this, it is maintained, operated and managed by
cloud storage service provider on a keeping servers that are built on virtualisation techniques. In
addition, it operates through web based API that is remotely implemented through its interaction
with client application's in-house cloud storage infrastructure for input/output (I/O) and read
write (R/W) operations (Chang, Kuo and Ramachandran, 2016). Moreover, it benefit company's
IT departments by providing total cost of ownership because it does not require hardware to
purchase, contains effective time to deployment of IT infrastructure, and improves information
management system within business premises and function in order to achieve high level of
satisfaction (Kranz, Hanelt and Kolbe, 2016).
Types of Cloud Computing
It is not a single piece of technology as it offer various types of services which are as
follows:
Software-as-a-service (SaaS):In this type, a complete application is facilitates to
customers as a service on demand. Along with this, a single instance of services runs on the
cloud and multiple end users are serviced. Along with this, it includes licensure of software
application to customers as licenses are typically provided through pay-as-you-go model or non
demand. Moreover, this type of system are found in Microsoft Office's 365 and today SaaS isd
offerd by companies such as Google, Salesforce, Microsoft, Zoho etc. that enhance their
proficiency among competitive industry.
Infrastructure-as-a-service(IaaS):This render basic storage and computing capabilities as
standardized services over the network. There are various tools which are pooled and made to
handle network like servers, networking equipments, data centre spaces etc. Along with this, it
involves a method of delivering everything from operating system to servers through IP based
connectivity as part of on demand services. Some common examples are Amazon, GoGrid, 3
Tera etc.
Platform-as-a-service (PaaS): This platform is used to design, develop, build and test
application that are provided by cloud infrastructure. Along with this, customers has the freedom
to build their own application, which run on the provider infrastructure. However, it is regarded
as one of the most complex among three layers of cloud computing as well as it is very much
similar with SaaS, the main difference is that instead of delivering software online, it generally
accessed from an internet or 'cloud'. Along with this, it is maintained, operated and managed by
cloud storage service provider on a keeping servers that are built on virtualisation techniques. In
addition, it operates through web based API that is remotely implemented through its interaction
with client application's in-house cloud storage infrastructure for input/output (I/O) and read
write (R/W) operations (Chang, Kuo and Ramachandran, 2016). Moreover, it benefit company's
IT departments by providing total cost of ownership because it does not require hardware to
purchase, contains effective time to deployment of IT infrastructure, and improves information
management system within business premises and function in order to achieve high level of
satisfaction (Kranz, Hanelt and Kolbe, 2016).
Types of Cloud Computing
It is not a single piece of technology as it offer various types of services which are as
follows:
Software-as-a-service (SaaS):In this type, a complete application is facilitates to
customers as a service on demand. Along with this, a single instance of services runs on the
cloud and multiple end users are serviced. Along with this, it includes licensure of software
application to customers as licenses are typically provided through pay-as-you-go model or non
demand. Moreover, this type of system are found in Microsoft Office's 365 and today SaaS isd
offerd by companies such as Google, Salesforce, Microsoft, Zoho etc. that enhance their
proficiency among competitive industry.
Infrastructure-as-a-service(IaaS):This render basic storage and computing capabilities as
standardized services over the network. There are various tools which are pooled and made to
handle network like servers, networking equipments, data centre spaces etc. Along with this, it
involves a method of delivering everything from operating system to servers through IP based
connectivity as part of on demand services. Some common examples are Amazon, GoGrid, 3
Tera etc.
Platform-as-a-service (PaaS): This platform is used to design, develop, build and test
application that are provided by cloud infrastructure. Along with this, customers has the freedom
to build their own application, which run on the provider infrastructure. However, it is regarded
as one of the most complex among three layers of cloud computing as well as it is very much
similar with SaaS, the main difference is that instead of delivering software online, it generally
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

develop a platform to create software which is delivered via Internet. Some of the examples are
Force.com, Google App Engine4 etc.
However, cloud computing enable their company to strengthen its business function as
well as helps them to add value to clients and also to enhance firm's brand image among
competitive marketplace.
TASK 2
Difference between privacy and security
Security can be defined as the protection of data against the unauthorised use. It also relates to
the protection and safeguarding of data from misuse. The main focus of security is on the safety
and security of data. As the technology advances, and the use of increases it could lead to many
problems related to the data breach and its misuse. Due to this reason it has become important for
the companies to make their data safe and secure so that the unauthorised access and criminal
activities could be stopped to some extent (Dawson and et. al., 2016). The informations systems
and the data they contain have compromised because of the inadequate security. The main goal
of security is to make the data secure, confidential, integrity and availability. It means to
safeguarding the information assets and confidential data from unauthorised sources. As security
can be achieved without privacy but privacy could not be achieved without security. Internet is
one of the areas in which the informational privacy, the protection of personal information has
become crucial. The internet users do not want to be left alone. While we can only have the
limited control as to how some information gathered in certain context. In the age of big data, it
becomes important for the companies to make their data safe and secure so that they could be
prevented from misuse (privacy. 2019). As in the modern times, the big data is of great use for
the companies so they are required to make their focus on the ways by which the company could
make their data safe and secure and can also prevent that from being misused (Wang and et. al.,
2016).
Privacy is all about making the identity of the user to be safe and secure. In other words,
privacy can also be defined as the part of user specific details which can be modified by the user
at any time according to the needs and wants. It is more like a notion that includes secrecy in its
work. The core principle is about the human dignity. The main goal of privacy is secure the
Force.com, Google App Engine4 etc.
However, cloud computing enable their company to strengthen its business function as
well as helps them to add value to clients and also to enhance firm's brand image among
competitive marketplace.
TASK 2
Difference between privacy and security
Security can be defined as the protection of data against the unauthorised use. It also relates to
the protection and safeguarding of data from misuse. The main focus of security is on the safety
and security of data. As the technology advances, and the use of increases it could lead to many
problems related to the data breach and its misuse. Due to this reason it has become important for
the companies to make their data safe and secure so that the unauthorised access and criminal
activities could be stopped to some extent (Dawson and et. al., 2016). The informations systems
and the data they contain have compromised because of the inadequate security. The main goal
of security is to make the data secure, confidential, integrity and availability. It means to
safeguarding the information assets and confidential data from unauthorised sources. As security
can be achieved without privacy but privacy could not be achieved without security. Internet is
one of the areas in which the informational privacy, the protection of personal information has
become crucial. The internet users do not want to be left alone. While we can only have the
limited control as to how some information gathered in certain context. In the age of big data, it
becomes important for the companies to make their data safe and secure so that they could be
prevented from misuse (privacy. 2019). As in the modern times, the big data is of great use for
the companies so they are required to make their focus on the ways by which the company could
make their data safe and secure and can also prevent that from being misused (Wang and et. al.,
2016).
Privacy is all about making the identity of the user to be safe and secure. In other words,
privacy can also be defined as the part of user specific details which can be modified by the user
at any time according to the needs and wants. It is more like a notion that includes secrecy in its
work. The core principle is about the human dignity. The main goal of privacy is secure the

rights of an individual and organisations with respect to the personal information. It focuses on
the protection of the personal data of the users and their information such as log in credentials,
passwords an many more. It also defines the rights of an individual and organisations with
respect to the personal information. To some extent the privacy could be achieved with the help
of security initiatives and security depends on privacy of credentials and access to data. The
privacy concerns are now more focused on a large extent on the information shared or generated
on the internet. The notion of the privacy is to change the situations and make the privacy more
focused to the users information (Di Spaltro, Polvi and Welliver, RACKSPACE US Inc, 2016).
The complementary notion of privacy is to provide access to control information is limited to
certain contexts so that their misuse can be prevented and the data could be made safe and
secure.
CONCLUSION
From the above mentioned essay, it has been concluded that with the help of cloud
computing technology it assist organisation to control over cost, increased storage and enhance
the flexibility of company . By this, business can easily identify the current and emerging trend
of business as well as allow them to make best strategic decision in order to gain competitive
advantage within an industry. However, cloud storage is a crucial part of backup and recovering
the date and allow company to protect information and increase capacity requirements based on
constant challenge.
the protection of the personal data of the users and their information such as log in credentials,
passwords an many more. It also defines the rights of an individual and organisations with
respect to the personal information. To some extent the privacy could be achieved with the help
of security initiatives and security depends on privacy of credentials and access to data. The
privacy concerns are now more focused on a large extent on the information shared or generated
on the internet. The notion of the privacy is to change the situations and make the privacy more
focused to the users information (Di Spaltro, Polvi and Welliver, RACKSPACE US Inc, 2016).
The complementary notion of privacy is to provide access to control information is limited to
certain contexts so that their misuse can be prevented and the data could be made safe and
secure.
CONCLUSION
From the above mentioned essay, it has been concluded that with the help of cloud
computing technology it assist organisation to control over cost, increased storage and enhance
the flexibility of company . By this, business can easily identify the current and emerging trend
of business as well as allow them to make best strategic decision in order to gain competitive
advantage within an industry. However, cloud storage is a crucial part of backup and recovering
the date and allow company to protect information and increase capacity requirements based on
constant challenge.

REFERNCES
Books and journals
Assante, D. and et. al., 2016. The use of cloud computing in SMEs. Procedia computer science.
83. pp.1207-1212.
Chang, V., Kuo, Y. H. and Ramachandran, M., 2016. Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems. 57.
pp.24-41.
Dawson, C. J. and et. al., 2016. Optimizing cloud service delivery within a cloud computing
environment. U.S. Patent 9,274,848.
Di Spaltro, D., Polvi, A. and Welliver, L., RACKSPACE US Inc, 2016. Methods and systems for
cloud computing management. U.S. Patent 9,501,329.
Kranz, J. J., Hanelt, A. and Kolbe, L. M., 2016. Understanding the influence of absorptive
capacity and ambidexterity on the process of business model change–the case of on‐
premise and cloud‐computing software. Information Systems Journal. 26(5). pp.477-
517.
Wang, N. and et. al., 2016. Cloud computing research in the IS discipline: A citation/co-citation
analysis. Decision Support Systems. 86. pp.35-47.
Zhou, K., Yang, S. and Shao, Z., 2016. Energy internet: the business perspective. Applied
Energy. 178. pp.212-222.
Online
privacy. 2019. [Online]. Available Through:
<http://www.businessdictionary.com/definition/privacy.html>
Books and journals
Assante, D. and et. al., 2016. The use of cloud computing in SMEs. Procedia computer science.
83. pp.1207-1212.
Chang, V., Kuo, Y. H. and Ramachandran, M., 2016. Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems. 57.
pp.24-41.
Dawson, C. J. and et. al., 2016. Optimizing cloud service delivery within a cloud computing
environment. U.S. Patent 9,274,848.
Di Spaltro, D., Polvi, A. and Welliver, L., RACKSPACE US Inc, 2016. Methods and systems for
cloud computing management. U.S. Patent 9,501,329.
Kranz, J. J., Hanelt, A. and Kolbe, L. M., 2016. Understanding the influence of absorptive
capacity and ambidexterity on the process of business model change–the case of on‐
premise and cloud‐computing software. Information Systems Journal. 26(5). pp.477-
517.
Wang, N. and et. al., 2016. Cloud computing research in the IS discipline: A citation/co-citation
analysis. Decision Support Systems. 86. pp.35-47.
Zhou, K., Yang, S. and Shao, Z., 2016. Energy internet: the business perspective. Applied
Energy. 178. pp.212-222.
Online
privacy. 2019. [Online]. Available Through:
<http://www.businessdictionary.com/definition/privacy.html>
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.