Cloud Computing and Security Protocols for Business Report

Verified

Added on  2023/01/11

|10
|2235
|40
Report
AI Summary
This report provides a comprehensive overview of cloud computing, focusing on the security protocols and architectures of three major providers: Amazon Web Services (AWS), Microsoft Azure, and IBM Cloud Services. The introduction defines cloud computing and its importance for businesses, followed by an examination of each provider's security measures. AWS's network architecture, secure access points, and transmission protection using SSL are discussed. Azure's multi-factor authentication, encryption services, and network security features are analyzed. IBM Cloud's private cloud architecture, layered security controls, and compliance with data protection regulations are also presented. The report concludes by highlighting the suitability of each provider for different business needs, such as online cloud storage (AWS), SaaS applications (Azure), and PaaS/SaaS solutions (IBM Cloud), emphasizing the overall significance of cloud computing for both small and large organizations.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CLOUD COMPUTING FOR BUSINESS
Cloud Computing for Business
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CLOUD COMPUTING FOR BUSINESS
Table of Contents
Introduction:...................................................................................................................2
Cloud Computing Providers:..........................................................................................2
Amazon Web Services:..............................................................................................2
Microsoft Azure:........................................................................................................4
IBM Cloud Services:..................................................................................................5
Conclusion:....................................................................................................................6
References:.....................................................................................................................7
Document Page
2CLOUD COMPUTING FOR BUSINESS
Introduction:
Cloud computing is considered as the on demand accessibility of various types of
computer resources which active managed and used by the user. Mainly the concept of cloud
computing provides the accessibility of computing power and data storage to the users of and
the data regarding the cloud computing is updated in real time [1]. To use the services that are
provided by the cloud computing engines the users of it needs an active internet connection.
The functionality of the cloud computing is fetched from a central server. In the aspects of
the organizations this cloud computing can be two types which are enterprise clouds and the
public cloud.
In present situation the services of the cloud computing is utilised by both the small
and large organizations for their business purposes as an effective cloud service provides
various of cost benefits in Australia. In this report various of security protocols and
architectures will be surveyed that are provided by the cloud computing providers and their
suitability will be identified for various types of businesses.
Cloud Computing Providers:
In the current situation there are various of cloud computing providers in the market
which actively helps in various types of businesses for the small and large scale organization.
In this case the most important three cloud service providers are the Amazon Web Services,
Microsoft Azure and the IBM cloud services. All of these cloud service providers provide
IaaS, PaaS and the SaaS related services [2]. In the following section these cloud service
providers will described briefly in terms of security protocols and architectures provided by
them.
Document Page
3CLOUD COMPUTING FOR BUSINESS
Amazon Web Services:
The Amazon Web Services or the AWS is one of the leading organization in the field
of cloud computing. Considering the security protocols and architectures that are provided by
amazon web services are considerably high. The security protocol of the AWS has been
architect in a unique particular approach that it can provide a high level of security with high
amount of workload. Considering the network architecture of the AWS it is very much
secured. Various of network devices has been utilised in this case for securing this
architecture which includes firewalls and various of others boundary devices [3]. This
devices are utilised for controlling and monitoring communication at the external boundaries
and at the internal boundaries of the network. In this aspects these boundaries set some rules
and access control lists for controlling flow of the information for a specific type of system
services. These ACLs are established at every managed interface which perfectly enforce and
manages data traffic flow. These policies of ACL are approved by the Amazon Information
Security.
The AWS also provides secure access points for its users. In this aspects the AWS
utilised a strategic approach of providing limited number of access point to the clouds.
Actually by this approach the AWS will be able to achieve a comprehensive monitoring of
outbound and inbound communications and the network related traffics. Secure HTTP access
is provided by the AWS and provides a secure communication sessions [4].
AWS also provides transmission protection in this case. For the transmission related
protection, the AWS utilises secure socket layer or the SSL. This is a cryptographic protocol
which protects against the tampering, message forgery and eavesdropping related problem
[5]. An additional security layer is also provided to the users of the AWS which known as the
amazon virtual private cloud and this provides extra layer of security by providing a private
type of subnet.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CLOUD COMPUTING FOR BUSINESS
Considering all the above aspects of the AWS this is very much suitable for the
business of online cloud storages. The online cloud storages requires a secure way of sharing
the files between various of entities and this secure transfer of files is very much important
for the businesses as this protects the confidentiality of the organization. Thus AWS is the
best solution for the businesses which requires online storage related cloud computing
services.
Microsoft Azure:
Microsoft Azure is also an important cloud service provider in this segment. The
Microsoft Azure also provides a high degree of security to the users of it. The Azure has its
dedicated Azure Security Centre for the security related operations. The Microsoft Azure
utilises multifactor authentication process of their users which verifies the users twice during
the authentication process of them [6]. This the aspects of controlling and managing the
access of the user to the azure platform.
The Microsoft Azure also provides encryption related solution to the users of it. This
encryption can be utilized in the communication and in the operational process that are done
on the Azure platform. In this segment for the encryption related services three types of
encryption services has been provide in this case which are the Azure data encryption, Azure
key vault services and the Azure data storage security features.
In the same segment another security features that has been provided by the Azure in
this case are the infrastructure and the network related security services. For proving these
services to the users of Azure here four services has been provided by the Microsoft Azure
[7]. Here these four services are the Azure Virtual Network, Azure network security groups,
Azure physical infrastructure security and the infrastructure related controls and design.
Document Page
5CLOUD COMPUTING FOR BUSINESS
Azure also provides a high level of security against various of online threats. In this
segment of the Microsoft Azure two types of security features is provided by the Microsoft
Azure. This security features are the Azure security centre and the Microsoft Antimalware for
the Azure.
Considering all the above security measures it can be stated that the Microsoft Azure
is very much useful in the case of providing SaaS related services as it provides greater
protection for the applications against various of online threats [8]. Azure provides the
security control centre through which every applications that are running on the SaaS
platform can be managed very much easily. The Microsoft Azure also provides online office
related solution on a more secured way. Thus azure can be also utilised for the online office
services.
IBM Cloud Services:
The cloud service offered by IBM is based on a private cloud reference architecture. It
provides Cloud Service through container as a service and platform as a service. The
architecture enables execution of private workloads in the cloud the platform which offers
container as a service. It is built on container-based architecture and this includes kubernetes
as part of the reference architecture framework. the container platform that is built on
kubernetes aimed at providing ability in cloud development and simplifying operational
activities such as middleware data and analytics services [9]. This architecture contains two
layers one is PaaS layer and another is SaaS layer. Both of these layers apart of infrastructure
layer which provides a context for computation through virtual machines network storage and
security. This private cloud architecture is deployed and managed by IBM cloud private and
also provides customization for application development in the cloud platform.
Document Page
6CLOUD COMPUTING FOR BUSINESS
The cloud service offered by IBM cloud is based on private cloud architecture which
enhances Cloud Security as the cloud service is offered to private cloud. the cloud services
and the cloud storage and not shared between clients so this enhances the security process
and make sure that data is not accessible to the public which is an important requirement to
ensure security in cloud platform and cloud services [10]. Along with that this Cloud Service
integrates high-level authentication and encryption which makes the cloud data secured and
ensure data security data availability and Data integrity as well.
Security protocols by the IBM cloud services are very much high. It currently has
various of layered security controls for providing a better security architectures. Various of
applications is utilized by the IBM cloud for providing an ultimate security solution. For the
data related security the IBM follows various of security polices which includes IBM cloud
compliance and General Data Protection Regulations.
Considering the above implications the IBM cloud solution is very much beneficial
for the businesses that uses the services of the PaaS and the SaaS. Both of the PaaS and the
SaaS are provide very well when compared with other service providers in the same segment
of the cloud computing. With the SaaS and PaaS the IBM cloud is also capable of providing
services regarding IaaS which also used by various of cloud service providers [11]. The IBM
cloud services is mostly used in the IT related organization as IBM cloud is consisting
various of IT business solution tools and these tools are available online and integrated with
the IBM cloud.
Conclusion:
Form the above discussion it can be concluded that cloud computing and its services
are very much important for the current situation of the businesses small and large
organizations. In this segment a brief description of the cloud computing has been discussed.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CLOUD COMPUTING FOR BUSINESS
Following that in this segment total three cloud service providers has been selected which are
the AWS, Microsoft Azure and the IBM cloud services. A survey has been presented in this
case regarding security protocols and architectures of these three cloud service providers and
suitability for various of businesses has been discussed.
Document Page
8CLOUD COMPUTING FOR BUSINESS
References:
[1] Botta, Alessio, Walter De Donato, Valerio Persico, and Antonio Pescapé. "Integration of
cloud computing and internet of things: a survey." Future generation computer systems 56
(2016): 684-700.
[2] Gai, Keke, Meikang Qiu, Hui Zhao, Lixin Tao, and Ziliang Zong. "Dynamic energy-
aware cloudlet-based mobile cloud computing model for green computing." Journal of
Network and Computer Applications 59 (2016): 46-54.
[3] Xia, Zhihua, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, and Kui Ren. "A
privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud
computing." IEEE Transactions on Information Forensics and Security 11, no. 11 (2016):
2594-2608.
[4] Jalali, Fatemeh, Kerry Hinton, Robert Ayre, Tansu Alpcan, and Rodney S. Tucker. "Fog
computing may help to save energy in cloud computing." IEEE Journal on Selected Areas in
Communications 34, no. 5 (2016): 1728-1739.
[5] Chang, Victor, Yen-Hung Kuo, and Muthu Ramachandran. "Cloud computing adoption
framework: A security framework for business clouds." Future Generation Computer
Systems57 (2016): 24-41.
[6] Etro, Federico. "The economics of cloud computing." In Cloud Technology: Concepts,
Methodologies, Tools, and Applications, pp. 2135-2148. IGI Global, 2015.
[7] Deng, Ruilong, Rongxing Lu, Chengzhe Lai, Tom H. Luan, and Hao Liang. "Optimal
workload allocation in fog-cloud computing toward balanced delay and power
consumption." IEEE Internet of Things Journal 3, no. 6 (2016): 1171-1181.
Document Page
9CLOUD COMPUTING FOR BUSINESS
[8] Bera, Samaresh, Sudip Misra, and Joel JPC Rodrigues. "Cloud computing applications for
smart grid: A survey." IEEE Transactions on Parallel and Distributed Systems 26, no. 5
(2015): 1477-1494.
[9] Yang, Chaowei, Qunying Huang, Zhenlong Li, Kai Liu, and Fei Hu. "Big Data and cloud
computing: innovation opportunities and challenges." International Journal of Digital
Earth 10, no. 1 (2017): 13-53.
[10] Varghese, Blesson, and Rajkumar Buyya. "Next generation cloud computing: New
trends and research directions." Future Generation Computer Systems 79 (2018): 849-861.
[11] Boru, Dejene, Dzmitry Kliazovich, Fabrizio Granelli, Pascal Bouvry, and Albert Y.
Zomaya. "Energy-efficient data replication in cloud computing datacenters." Cluster
computing18, no. 1 (2015): 385-402.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]