Cloud Computing's Impact on Business Services: An Assessment
VerifiedAdded on  2025/05/03
|6
|1626
|445
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Impact of Cloud Computing on business in providing their services in current business environment
Assessment 1
DATE
Course Number
ID Number
Assessment 1
DATE
Course Number
ID Number
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cloud computing, as well as cloud storage, is a revolutionary innovation for the
businessmen because this newly introduced technique is really helpful in the era of
globalization. This technique of data storage has advantages and is utterly beneficial for
businessmen; they can provide conducive ambiance to customers. There are certain loopholes
like security and privacy which can be resolved by putting heart and soul in digging out
remedies.
Cloud computing has rapidly spread throughout the world and has strengthened the relation
amid businessmen and client. A lot of research has been done to elucidate the importance of
the services. Federico Etro has highlighted the financial effect of this technique in Europe
especially for the business creation and employment. He has also lucidly defined this is an
internet-oriented technique through which the data is stored in servers and provides services
on demand. Moreover, he has analyzed several other things in his research paper i.e. gradual
inauguration of this technique; also accentuate the increasing role of this technique in
creation of business. DSGE model, in accordance to his perception, with the inauguration of
new SMEs is very significant in European Union. Furthermore, he is of the government can
get more benefit from these services by giving subsidy (Etro, 2009).
No doubt, innovation of cloud computing has casted revolutionary impacts particularly in the
business field. Angela Lin and Nan-Chou Chen have discussed this technique as an
innovation; perception, behavior and authority in their research paper. They have
meticulously studied about the adoption of this technique in Taiwan by IT professionals.
Their finding suggests that the main concerns are the level of comfortableness amid the
demand of the customer and the policies of the company (Lin & Chen, 2012).
Cloud computing is basically a path to use cluster of different networks of far-flung servers
hosted by the internet for the purpose of storing, managing and processing data, instead of
using their own server. Through the logical pools data is stored in the cloud storage i.e. block
storage, file storage, object storage, archive storage and data ingest solutions.
Saas (Software as a service), IaaS (infrastructure as a service), and PaaS (platform as a
service) are the key amenities offered by cloud computing
Cloud storage technique can be classified as follows: Personal cloud storage (used in daily
life i.e. android and i-phone cloud), publicly available cloud storage (Either rented or
subscribed but available publically), privately available cloud storage (company providing
cloud services to users) and a hybrid cloud storage (data is available privately as well as
publically)
businessmen because this newly introduced technique is really helpful in the era of
globalization. This technique of data storage has advantages and is utterly beneficial for
businessmen; they can provide conducive ambiance to customers. There are certain loopholes
like security and privacy which can be resolved by putting heart and soul in digging out
remedies.
Cloud computing has rapidly spread throughout the world and has strengthened the relation
amid businessmen and client. A lot of research has been done to elucidate the importance of
the services. Federico Etro has highlighted the financial effect of this technique in Europe
especially for the business creation and employment. He has also lucidly defined this is an
internet-oriented technique through which the data is stored in servers and provides services
on demand. Moreover, he has analyzed several other things in his research paper i.e. gradual
inauguration of this technique; also accentuate the increasing role of this technique in
creation of business. DSGE model, in accordance to his perception, with the inauguration of
new SMEs is very significant in European Union. Furthermore, he is of the government can
get more benefit from these services by giving subsidy (Etro, 2009).
No doubt, innovation of cloud computing has casted revolutionary impacts particularly in the
business field. Angela Lin and Nan-Chou Chen have discussed this technique as an
innovation; perception, behavior and authority in their research paper. They have
meticulously studied about the adoption of this technique in Taiwan by IT professionals.
Their finding suggests that the main concerns are the level of comfortableness amid the
demand of the customer and the policies of the company (Lin & Chen, 2012).
Cloud computing is basically a path to use cluster of different networks of far-flung servers
hosted by the internet for the purpose of storing, managing and processing data, instead of
using their own server. Through the logical pools data is stored in the cloud storage i.e. block
storage, file storage, object storage, archive storage and data ingest solutions.
Saas (Software as a service), IaaS (infrastructure as a service), and PaaS (platform as a
service) are the key amenities offered by cloud computing
Cloud storage technique can be classified as follows: Personal cloud storage (used in daily
life i.e. android and i-phone cloud), publicly available cloud storage (Either rented or
subscribed but available publically), privately available cloud storage (company providing
cloud services to users) and a hybrid cloud storage (data is available privately as well as
publically)

The technique of cloud computing is extra-ordinarily beneficial for the micro businesses. A
few of them are as follows: Flexibility (requirement of an organization is speedily meet) and
Increased collaboration (enhancing collaboration of employees by allowing them for the
work on document and for synchronization).
Critical analysis suggests several detriments and returns to cloud technology. A few of them
are: failure of communication will result in disconnection of a cloud service; danger of
recording of the data while communication, stealing of the data from disk storage; quality is
also damaging of service of a cloud provider and perplexed legal problems may arise. The
most recent problems are the intelligence agencies which have covertly doing surveillance of
data traffic via internet (Carto, 2015).
Advantages of cloud storage are: from any patch of the land reachability to the data and data
backups as per our own convenience. Disadvantages of cloud storage are very few. First one
is the increased usage of bandwidth that increases the cost and secondly unable to access data
due to lesser speed of internet connection (Queensland, 2017).
With an analytical lens and under the light of aforesaid arguments, cloud servicing is more
advantageous for business organization and in upcoming period of time it will help customers
especially those who are settled somewhere else and doing business somewhere else.
Cloud computing can be evaluated by understanding its impacts on business. It has some
serious effects on internal business operations and processes. This technique directly
impacted on the human resources because for conversion of business on cloud computing
skillful and adept team members are required.
Some other positive impacts of cloud servicing are: convenient in use (some business
employees are habitual to work outside rather in actual office so they have very easy access
to the data), sharing and collaboration (with the invention and proliferation of smart phone
and social media , small companies can easily access their customers), security and privacy
(cloud security risk can be reduced by doing authentication and encryption), cost reduction
(because of the subscription model, cost is being heavily saved by small firms and almost
70% of decline in cost is observed after adopting AWS (Amazon Web Services)) and
reliability (Cloud is available 24/7; employees of the organizations and firms could call up
the cloud center instead off depending upon IT staff within office (Devasena, 2014).
Cloud computing services have really suffered from the issues of privacy and security.
Security in cloud computing service mention to as protection of data against unauthorized
access. Where privacy refers to as encrypting user identity and its personal information (like,
few of them are as follows: Flexibility (requirement of an organization is speedily meet) and
Increased collaboration (enhancing collaboration of employees by allowing them for the
work on document and for synchronization).
Critical analysis suggests several detriments and returns to cloud technology. A few of them
are: failure of communication will result in disconnection of a cloud service; danger of
recording of the data while communication, stealing of the data from disk storage; quality is
also damaging of service of a cloud provider and perplexed legal problems may arise. The
most recent problems are the intelligence agencies which have covertly doing surveillance of
data traffic via internet (Carto, 2015).
Advantages of cloud storage are: from any patch of the land reachability to the data and data
backups as per our own convenience. Disadvantages of cloud storage are very few. First one
is the increased usage of bandwidth that increases the cost and secondly unable to access data
due to lesser speed of internet connection (Queensland, 2017).
With an analytical lens and under the light of aforesaid arguments, cloud servicing is more
advantageous for business organization and in upcoming period of time it will help customers
especially those who are settled somewhere else and doing business somewhere else.
Cloud computing can be evaluated by understanding its impacts on business. It has some
serious effects on internal business operations and processes. This technique directly
impacted on the human resources because for conversion of business on cloud computing
skillful and adept team members are required.
Some other positive impacts of cloud servicing are: convenient in use (some business
employees are habitual to work outside rather in actual office so they have very easy access
to the data), sharing and collaboration (with the invention and proliferation of smart phone
and social media , small companies can easily access their customers), security and privacy
(cloud security risk can be reduced by doing authentication and encryption), cost reduction
(because of the subscription model, cost is being heavily saved by small firms and almost
70% of decline in cost is observed after adopting AWS (Amazon Web Services)) and
reliability (Cloud is available 24/7; employees of the organizations and firms could call up
the cloud center instead off depending upon IT staff within office (Devasena, 2014).
Cloud computing services have really suffered from the issues of privacy and security.
Security in cloud computing service mention to as protection of data against unauthorized
access. Where privacy refers to as encrypting user identity and its personal information (like,
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

credit card number) (Surveillance, 2018). As a cloud services provider, we take measures to
ensure our cloud service able to tackle such issues. In term of privacy user private data is
most vulnerable against cloud service providing employees (Aldossary & Allen, 2016).
Employees can steal data or corrupt data for different reason, for instance getting paid to just
hurt company reputation. For that kind of behavior (Hubbard & Sutton, 2010) suggest some
strategies to overcome such situation. The first strategy is to conduct a service supplier
assessment and make supply chain management stricter. Impose a section in employee
contract where he have to make sure protection of user privacy. Making cloud service process
transparent and notify when privacy breach happens. Another strategy for user privacy
protection introduced by (Halevi, et al., 2011). To prove ownership of account, owner file
creates a Merkle Hash Tree (MHT) and sent it to cloud called verifier. When file received by
cloud, it divide file using pairwise independent hash into bits. After that it asks owner to
identify the root and leaves of a file. When owner returns sibling paths as proof to cloud it
verifies against MHT and validate the ownership.
In cloud services data security is main concern of user and for that purpose cloud service
provider uses encryption method for data security. Encryption of data provide protection
against unauthorized access and some of the encryption techniques are Public Key, Identity-
Based, and Attribute Based encryption (Aldossary & Allen, 2016). Public Key encryption
method encrypt data using public key and it can only be decrypt by private key holder. For
multiple access of data it is not suitable for data security. Identity Based encryption in which
data encryption carried out by authorized entity of owner (Aldossary & Allen, 2016). For
decryption same authorized entity is needed which must match the same entity provided by
owner. Attribute Based encryption, encrypt data on the basis of identified user attributes. A
secret key is generated on the set of attribute and it also defines the access structure of data.
This type of encryption allow data to be share among group of users with confidentiality. For
data security purpose, we choose Attribute Based Encryption for our cloud service. This will
enhance our cloud service in case user requires multiple sharing of data.
Cloud computing and cloud storage are really abetting the businesses, especially to the ones
whose customers belong to suburb and remote areas. The most significant impact of
deploying cloud services cited by small businesses and large networks like Amazon,
Microsoft, apple, is the ease-of-use and accessibility provided by cloud services. Security and
privacy regarding cloud storage of businesses, is another powerful impact analyzed in this
essay. While providing services to customers, security of cloud data is a matter of grave
concern which can be boosted using encryption techniques. Cost-effectiveness of businesses
ensure our cloud service able to tackle such issues. In term of privacy user private data is
most vulnerable against cloud service providing employees (Aldossary & Allen, 2016).
Employees can steal data or corrupt data for different reason, for instance getting paid to just
hurt company reputation. For that kind of behavior (Hubbard & Sutton, 2010) suggest some
strategies to overcome such situation. The first strategy is to conduct a service supplier
assessment and make supply chain management stricter. Impose a section in employee
contract where he have to make sure protection of user privacy. Making cloud service process
transparent and notify when privacy breach happens. Another strategy for user privacy
protection introduced by (Halevi, et al., 2011). To prove ownership of account, owner file
creates a Merkle Hash Tree (MHT) and sent it to cloud called verifier. When file received by
cloud, it divide file using pairwise independent hash into bits. After that it asks owner to
identify the root and leaves of a file. When owner returns sibling paths as proof to cloud it
verifies against MHT and validate the ownership.
In cloud services data security is main concern of user and for that purpose cloud service
provider uses encryption method for data security. Encryption of data provide protection
against unauthorized access and some of the encryption techniques are Public Key, Identity-
Based, and Attribute Based encryption (Aldossary & Allen, 2016). Public Key encryption
method encrypt data using public key and it can only be decrypt by private key holder. For
multiple access of data it is not suitable for data security. Identity Based encryption in which
data encryption carried out by authorized entity of owner (Aldossary & Allen, 2016). For
decryption same authorized entity is needed which must match the same entity provided by
owner. Attribute Based encryption, encrypt data on the basis of identified user attributes. A
secret key is generated on the set of attribute and it also defines the access structure of data.
This type of encryption allow data to be share among group of users with confidentiality. For
data security purpose, we choose Attribute Based Encryption for our cloud service. This will
enhance our cloud service in case user requires multiple sharing of data.
Cloud computing and cloud storage are really abetting the businesses, especially to the ones
whose customers belong to suburb and remote areas. The most significant impact of
deploying cloud services cited by small businesses and large networks like Amazon,
Microsoft, apple, is the ease-of-use and accessibility provided by cloud services. Security and
privacy regarding cloud storage of businesses, is another powerful impact analyzed in this
essay. While providing services to customers, security of cloud data is a matter of grave
concern which can be boosted using encryption techniques. Cost-effectiveness of businesses
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

especially small business environments is being highly encouraged since cloud services are
in-practice. In terms of cloud storage, small businesses rely more on other storage devices
and backups instead of going online. But if we observe from the lens of sharing and
collaboration, small business environments are highly involved in practicing cloud services
instead of face-to-face meetings, file transfers and business travels having reduced their
investments while increasing revenues. Overall, cloud computing has substantially altered the
ambiance of business firms
in-practice. In terms of cloud storage, small businesses rely more on other storage devices
and backups instead of going online. But if we observe from the lens of sharing and
collaboration, small business environments are highly involved in practicing cloud services
instead of face-to-face meetings, file transfers and business travels having reduced their
investments while increasing revenues. Overall, cloud computing has substantially altered the
ambiance of business firms

References
Aldossary, S. & Allen, W., 2016. Data Security, Privacy, Availability and Integrity in Cloud
Computing: Issues and Current Solutions. International Journal of Advanced Computer
Science and Applications, 7(4), pp. 485-498.
Carto, D., 2015. Open Cloud Manifesto. [Online]
Available at: https://www.opencloudmanifesto.org/what-is-cloud-storage-types-advantages-
and-disadvantages/
[Accessed 17 May 2019].
Devasena, C. L., 2014. Impact study of cloud computing on business development.
Operations Research and Applications: An International Journal (ORAJ), 1(1), pp. 1-7.
Etro, F., 2009. The economic impact of cloud computing on business creation, employment
and output in Europe. Review of Business and Economics, 54(2), pp. 179-208.
Halevi, S., Harnik, D., Pinkas, B. & Shulman-Peleg, A., 2011. Proofs of ownership in remote
storage systems. s.l., Proceedings of the 18th ACM conference on Computer and
communications security, pp. 491-500.
Hubbard, D. & Sutton, M., 2010. https://cloudsecurityalliance.org/. [Online]
Available at: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
[Accessed 17 May 2019].
Lin, A. & Chen, N.-C., 2012. Cloud computing as an innovation: Percepetion, attitude, and
adoption. International Journal of Information Management, 32(6), pp. 533-540.
Queensland, B., 2017. Queensland Goverment. [Online]
Available at: https://www.business.qld.gov.au/running-business/it/cloud-computing/benefits
[Accessed 17 May 2019].
Surveillance, D. G., 2018. https://www.hiv.gov/. [Online]
Available at: https://www.hiv.gov/blog/difference-between-security-and-privacy-and-why-it-
matters-your-program
[Accessed 17 May 2019].
Aldossary, S. & Allen, W., 2016. Data Security, Privacy, Availability and Integrity in Cloud
Computing: Issues and Current Solutions. International Journal of Advanced Computer
Science and Applications, 7(4), pp. 485-498.
Carto, D., 2015. Open Cloud Manifesto. [Online]
Available at: https://www.opencloudmanifesto.org/what-is-cloud-storage-types-advantages-
and-disadvantages/
[Accessed 17 May 2019].
Devasena, C. L., 2014. Impact study of cloud computing on business development.
Operations Research and Applications: An International Journal (ORAJ), 1(1), pp. 1-7.
Etro, F., 2009. The economic impact of cloud computing on business creation, employment
and output in Europe. Review of Business and Economics, 54(2), pp. 179-208.
Halevi, S., Harnik, D., Pinkas, B. & Shulman-Peleg, A., 2011. Proofs of ownership in remote
storage systems. s.l., Proceedings of the 18th ACM conference on Computer and
communications security, pp. 491-500.
Hubbard, D. & Sutton, M., 2010. https://cloudsecurityalliance.org/. [Online]
Available at: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
[Accessed 17 May 2019].
Lin, A. & Chen, N.-C., 2012. Cloud computing as an innovation: Percepetion, attitude, and
adoption. International Journal of Information Management, 32(6), pp. 533-540.
Queensland, B., 2017. Queensland Goverment. [Online]
Available at: https://www.business.qld.gov.au/running-business/it/cloud-computing/benefits
[Accessed 17 May 2019].
Surveillance, D. G., 2018. https://www.hiv.gov/. [Online]
Available at: https://www.hiv.gov/blog/difference-between-security-and-privacy-and-why-it-
matters-your-program
[Accessed 17 May 2019].
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.