Cloud Computing: IBM Cloud Implementation, CloudIOT & Security in SaaS

Verified

Added on  2023/06/12

|19
|5557
|419
Report
AI Summary
This report provides a comprehensive overview of cloud computing with a specific focus on IBM Cloud, its implementation, and security solutions. It begins by introducing the benefits of cloud computing for businesses, particularly highlighting the advantages of Software-as-a-Service (SaaS) model while also addressing the associated security concerns. The report delves into the security issues prevalent in the SaaS model for private companies, including data confidentiality, integrity, and availability. It further compares IBM Cloud with other cloudIoT providers, discussing the evolution of current cloud providers in relation to cloudIOT. The report emphasizes the importance of cloud computing in enabling universal network access to computing resources, offering efficiency and flexibility. It also addresses the limitations of cloud computing, such as the reliance on internet access and the costs associated with infrastructure. The discussion extends to Platform-as-a-Service (PaaS) and the advantages it offers to businesses, particularly in terms of cost savings and access to software. Finally, the report highlights the key benefits of cloud computing, including reduced investment, scalability, reliability, and availability, while also addressing the challenges related to data confidentiality and security.
Document Page
Running head: CLOUD COMPUTING
Cloud Computing
Name of the Student
Name of the University
Author’s note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
CLOUD COMPUTING
Table of Contents
Introduction......................................................................................................................................3
Cloud Computing.........................................................................................................................3
Security Solutions......................................................................................................................11
Case Study.....................................................................................................................................14
Conclusion.....................................................................................................................................15
References......................................................................................................................................17
Document Page
3
CLOUD COMPUTING
Introduction
Cloud computing have been an interesting topic in the market due to its quality services
in the market. Maximum companies have been using this technology in their business operations.
The use of the cloud computing have provided various benefits to the business organization.
These benefits have been discussed in the report. Cloud computing has been able to attract
various businesses in the market for availing their services.
This report has focused on the importance of the IBM Cloud and its implementation. The factors
of other cloudIoT providers have been compared to the IBM cloud. Various development of
current cloud providers with respect to the cloudIOT have been discussed.
Cloud Computing
The cloud computing and Software-as-a-Service (SaaS) has pulled in numerous independent
companies including IBM. There have been numerous points of interest of the SaaS in the
independent venture undertakings. Then again, there has been security issues winning in the
SaaS display. The sending of the cloud administrations has ready to give different
administrations to the business association in the market. The utilization of the cloud computing
has some constraint including the dangers and danger of the information and data of association
(Saa, Moscoso-Zea, Costales, and Luján-Mora, 2017). The cloud computing has ready to give
adaptability and on-request administrations to the business association in the market; along these
lines, it has made a need in the market for the little endeavors.
This report has delineated the security issues in SaaS model of cloud computing in
private companies. The difficulties in execution of the SaaS demonstrate has been distinguished
in the report. The fundamental issue is the security of the information and data including
Document Page
4
CLOUD COMPUTING
information classification issue, information accessibility issue, information honesty issue and
information territory of little and medium undertakings in the market (Puthal, Sahoo, Mishra, and
Swain, 2015). This report centers around giving answer for the information and data security
issues including evaluating procedure, RAID and security arrangements in the SaaS model of
cloud computing in independent ventures. This exploration tosses light to the Policies for
relieving the security issues in the SaaS model of cloud computing in the private venture
undertakings. The results of the report have ready to moderate the difficulties looked by the
business association in advertise. The security of the information and data has been limited with
the outcomes and results of the exploration.
The cloud computing is a model that aides in empowering universal and on-request organize
access for a pool of figuring assets. This likewise helps in furnishing quick and productive
administrations with negligible overseeing exertion and specialist organization communication.
A cloud computing is a stage that gives dynamic web applications and administrations that aides
in limiting additional exertion made by various organizations. As remarked by (Rittinghouse and
Ransome, 2016), cloud computing has ready to give diverse points of interest to the business
association and different clients in the market. The utilization of the cloud computing has limited
the administration exertion in the market. The cloud computing gives effectiveness and
adaptability to the figuring assets. It went for giving greatest administrations at negligible cost
(Saa, Moscoso-Zea, Costales, and Luján-Mora, 2017).
It additionally causes in giving security to the information and data of clients over web.
The cloud computing has empowered online administrations including programming and
equipment to different clients in the market through web. The primary necessity of the cloud
computing is benefiting web association (Modi, Patel, Borisaniya, Patel, and Rajarajan, 2013).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
CLOUD COMPUTING
The utilization of cloud computing has been temporarily utilized as a part of the business
association in the market. The advantage of cloud computing is that the organization can transfer
and reinforcement their vital records and archive over the cloud. The availability of the archive
should be possible from anyplace finished the web. Cloud computing is an on-request benefit
gave to the clients in the market. The client can whenever profit the cloud administrations from
different online sources (Almorsy, Grundy, and Ibrahim, Adaptable, demonstrate driven security
building for SaaS cloud-based applications, 2014).
Albaroodi, Manickam, and Singh, 2014 contended that there are different constraints of
the cloud computing. One of the significant constraint is the accessibility of web get to. The
information put away in cloud must be gotten to in accessibility of good web association. It may
be conceivable that the client does not have any web association. Subsequently, client can't gain
admittance to the information and data in a dire case (Flint, 2017). There may be moderate web
association with the client. In this way, an appropriate web association is required to gain
admittance to information and records put away finished cloud.
Numerous little organizations cannot manage the cost of exorbitant foundation. Along
these lines, cloud computing helps in giving this exorbitant foundation on lease. Thusly, this
assistance Small business in maintaining in the market (Ramachandra, Iftikhar, and Khan, 2017).
The capacity given to the client is the course of action of systems or gatherings or virtualized
servers, dealing with, amassing, frameworks, and other vital preparing resources where the
customer can send and run subjective programming, which can join working structures (Kshetri,
2013). The most hoisted profile case is Amazon's Elastic Compute Cloud (EC2) and Simple
Storage Service, yet IBM and other customary IT dealers are also offering organizations, as is
telecom-and just telecom provider Verizon Business (Goyal, 2014)
Document Page
6
CLOUD COMPUTING
A PaaS supplier encourages in giving access to different parts required for working
application over the web. Cloud computing has created to join stage for building and running
custom electronic applications, a thought referred to as Platform as-a-Service. PaaS is an
outgrowth of the SaaS application movement show (Cimler, Matyska, Balík, Horalek, and
Sobeslav, 2015). The PaaS demonstrate makes most of workplaces required to help complete life
cycle of building and passing on web applications and organizations totally available from Web,
all with no item downloads or foundation for planners, IT chiefs, or end customers.
Diverse organizations are not ready to bear the cost of expensive programming that are
accessible in the market. Along these lines, they are not ready to utilize confirm innovation in the
market. The cloud computing has helped in profiting these exorbitant programming on a lease.
This enables Small organizations to manage the cost of this product and develop in the market
(Shahzad and Hussain, 2013). The traditional model of programming assignment, in which
programming is purchased for and presented on PCs, is at times insinuated as Software-as-a-
Product. Programming as-a-Service is a product assignment show in which applications are
encouraged by a trader or, then again authority center and affected open to customers over a
framework, usually Internet (Burns, Posey, Courtney, Roberts, and Nanayakkara, 2017). SaaS is
transforming into a verifiably transcendent movement exhibit as crucial advancements, that
assistance web organizations, advantage masterminded plan (SOA) create and new
developmental procedures wind up perceptibly surely understood (Lin and Liao, 2017). SaaS is
every now and again associated with a remuneration membership permitting model. In the
interim, broadband advantage has ended up being logically available to enable customer to
access from more ranges all over the place.
Document Page
7
CLOUD COMPUTING
The cloud computing have given different advantages to the private companies in the
market. A portion of the points of interest are talked about underneath:
Limiting speculation
The cloud computing have helped in giving administrations requiring little to no effort to
the business association. The cloud computing has ready to screen the plan of action of the
organizations in the market. The cloud computing used to give on-request administrations to the
independent venture that assistance keeping up the speculation cost of the organization in the
market (Alassafi et al., 2017). It give benefits on a month to month and yearly based that aides in
limiting the underlying hail of the little and medium endeavors.
A cloud's Measured Usage trademark addresses a rundown of capacities that licenses
estimated operational utilizations to supplant expected capital employments. This is in like
manner insinuated as relative costs. This minimization of progress monetary obligations licenses
endeavors to start close to nothing and as necessities be addition IT resource allocation as
required. Likewise, the abatement of ahead of time capital costs contemplates the income to be
occupied to the middle business wander (Goyal, 2014). In its most central casing, opportunities
to lessen costs are gotten from the course of action and activity of generous scale server
cultivates by critical cloud providers. Such server ranches are by and large arranged in objectives
where arrive, IT specialists, and framework information exchange limit can be gotten at cut
down costs, realizing both capital and operational hold reserves (Shei, Mouratidis and Delaney,
2017).
A comparative technique for thinking applies to working structures, middleware or
organize programming, and application programming. Pooled IT resources are made open to and
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
CLOUD COMPUTING
shared by various cloud buyers, realizing extended or extraordinary possible utilize (Modi et al.,
2013). Operational expenses and wasteful aspects can be also diminished by applying exhibited
practices and outlines for upgrading cloud models, their organization, and their organization.
Adaptability
The cloud computing helps in giving diverse instruments and methods to utilizing
different administrations in the business association (Garg and Babbar, 2017). It helps in gave
dynamic assets in the business association. In this way, the business association can work
quicker than past. The cloud-based arrangements are adaptable and dynamic in nature (Goyal,
2014). The cloud shoppers are buying distinctive plans of the cloud benefits that aides in
expanding the piece of the overall industry of the organization. The cloud computing is adaptable
that there is no prerequisite of specialized help for establishment process.
Unwavering quality and accessibility
The availability and unwavering quality of IT resources are associated with unmistakable
business benefits. The availability of private company is around 12 hours per day. Then again,
Constrain limits the time an IT resource can be "open for business" for its customers, thus
confining its use and salary creating potential (McCormac et al., 2017). Runtime
disillusionments that are not immediately reviewed can have a more imply can't influence in the
midst of high-volume use periods. Not solely is the IT resource unfit to respond to customer
requests, its astounding dissatisfaction can decrease general customer certainty (Modi et al.,
2013). An instance of an affiliation is changing enthusiasm for an IT resource consistently. An
indication of the normal cloud condition is its intrinsic ability to give wide reinforce for growing
the availability of a cloud-based IT advantage for restrict or even shed power outages, and for
Document Page
9
CLOUD COMPUTING
extending its faithful quality with a specific end goal to constrain the impact of runtime
frustration conditions (Mohammad, Kak and Alam, 2017).
The limiting in cost and usability are two noteworthy advantages of cloud computing. In any
case, there are a few constraints of the SaaS model of the cloud computing. A portion of the
significant impediment of the SaaS display has been talked about underneath.
Figure 1: Security traits
(Source: Aljawarneh, Alawneh, and Jaradat, Cloud security engineering, 2017, pp.387)
Information Confidentiality issue
The privacy of information and data is urgent component in a business association. Privacy
alludes to the guidelines and directions forced by an association to confine the entrance of
different assets and resources of organization (Dang-Pham, Pittayachawan, and Bruno, 2017).
The private data about the representatives and customers are not imparted to anybody that gives
security to the information and data. The secrecy of the information and data in the association
may be broken due to the digital assaults over the web. The clients of the cloud administration
approach different records of the clients. In this way, the information and data can be unveiled
starting with one record then onto the next record in the organization (Aikat, et al., 2017). The
Document Page
10
CLOUD COMPUTING
break in the security convention of the organization may uncover the private information md data
in the market.
Information Availability issue
Putting away information and data in remote area to give high security may cause
disappointment in getting to the information and data. For the situation, of cloud administrations
quit working because of a few reasons, the information and data can't be gotten to from the
remote area. The proprietor of the information may get misfortune in information bringing
(Aljawarneh, Alawneh, and Jaradat, Cloud security designing, 2017). There are dangers in the
information accessibility including information flooding assaults that causes preclude from
claiming administrations in the organization. The cloud computing gives on-request
administrations to the business association. In this manner, in the event that the administration
isn't accessible because of any disappointment, the request of the cloud computing may diminish.
It may abuse the Service Level Agreement (SLA) with the clients and business associations in
the market (Duncan, Zhao, and Whittington, 2017).
Information Integrity Issue
The information trustworthiness alludes to the consistency and legitimacy of the
administrations gave by the cloud computing in the market. The utilization of the cloud
computing in the business association has been expanding in the market. Along these lines,
because of some significant equipment issue, the administrations won't not be accessible in the
market (Aljawarneh, Alawneh, and Jaradat, Cloud security building, 2017). Accordingly, the
proprietor of the information and data can't get to. The cloud storage is in charge of putting away
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11
CLOUD COMPUTING
the information and data of the association over the web. In this manner, there is a possibility of
information rupture over the cloud that causes information loss of the organization in the market.
Information region issue
The information region issue in the model for putting away the information and data of
the business association over the cloud. The Small organizations can store their information and
data over the web utilizing the cloud storage display (Luna, Taha, Trapero, and Suri, 2017).
Digital assaults are real dangers for the organization over the web. Diverse infections and
malwares assaults the server of the Small organizations, as they have less secured security
convention. These malwares enter the server of the organization and rupture private data to the
outsider.
Security Solutions
Different cases have given request of security answer for various cloud computing models. This
report has proposed a model that may help in securing information a data over the cloud.
Security administration, chance administration and consistence
The essential obligation of any business association is to control and screen usage process
in the organization. The administration may force a few arrangements and laws that aides in
limiting the abuse of the processing assets in workplace. As remarked by (Mumme, Wallace, and
McGraw, 2017), security structures help in successful hazard administration process in the
business association to distinguish different dangers for the organization. The hazard
administration helps in breaking down the distinguished dangers and treats in the organization.
Different systems and Policies are made to alleviate these security dangers and dangers in Small
organizations.
Document Page
12
CLOUD COMPUTING
Auditing
Auditing inside a CC area basically alludes to the route toward information respectability
uprightness of outsourced data and extra customer's figuring time and weight of additional
dealing with. (Rewadkar and Ghatage 2014) Proposed a security sparing outsider reviewing
(TPA). TPA will affirm limit accuracy of outsourced data periodically when customers begin an
interest for affirmation. The goal of TPA is to minimize heaviness of customers by saving their
computation resources while ensuring accuracy of data set away in cloud (Coppolino, D'Antonio,
Mazzeo, and Romano, 2017). Clearly, customers have option of checking this data themselves,
however these choices are nonsensical or threats order of data (Rewadkar and Ghatage , 2014).
The proposed plan will play out looking into on customer's request. This will be finished by
sending check metadata from customer to server and response will by then be affirmed by TPA.
It moreover consolidates a claimed 'group assessing', which will reduce response time for survey
requests when sent by different customers (Rewadkar and Ghatage , 2014).
Strategies
Strategies are much of the time used as way to deal with ensure that affiliation wide
security targets are being managed a comparative way finished affiliation. While Policies
isolated can't understand security issues, they are a fundamental organization gadget.
Appropriated registering is no exceptional case to this (De Carvalho, de Castro Andrade, de
Castro, Coutinho, and Agoulmine, 2017). While influencing a methodology as for circulated
figuring to review that the cloud master community must think about the game plan. Or maybe it
is more astute to make approaches that plan with solitary customers and their specific needs
(Sabahi, 2011). In the end an approach is in a manner of speaking reasonable of the affiliation
owning it reliably makes secure deals with using the game plan as a base. Whether it is, porting a
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]