StudentShare solutions
Triangle menu

Securing the Cloud - Essay Example

Nobody downloaded yet

Extract of sample
Securing the Cloud

Cloud computing provides for dynamically scalable and virtualized sources on the internet for online business applications which utilize software and data resources which are stored in the servers.
Cloud Computing has also been defined as a revolutionary development of certain existing computing technologies and approaches into a form that is capable of separating the application and database from the infrastructure and mechanisms that are employed to deliver them. Cloud computing augments the cooperation, suppleness, size, accessibility and also offers significant cost reduction with the use of optimized and competent computing techniques, (Armbrust, and Griffith, et al., 2009).
Cloud computing is basically the use of group of services, data sources and technical applications, all of which can be swiftly rearranged, reconditioned, implemented and also decommissioned with the help of an allocation model. In order to increase the scope of the services offered, the resources are set away from the infrastructure that is employed to deliver the results. For example, for a particular service to be based upon cloud computing technology, the internet can be utilized for transport and the browser as an accessibility tool – which states that the sources are at all the times shared in a multi-tenant surroundings exterior to the “boundary.”
The users, who are serviced through cloud computing services, do not possess any kind of infrastructure, the user only pays for the resources they utilize and therefore avoid the capital costs by renting the infrastructure from a third part owner. The infrastructure behind the cloud computing is composed of efficient services through the use of virtual data centers that are based upon virtualization technologies, (Armbrust, and Griffith, et al., 2009). The cloud computing services can be ...Show more

Summary

Further, the advantage of cloud computing are also referred to along with brief references given to other forms of computing as well. The privacy challenges that are…
Author : eleonore46
Securing the Cloud essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Securing the Cloud"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Cloud Computing
Cloud computing is a new IT paradigm that allows provisioning of IT infrastructure through the flexible pay-per-use model. Its application in industry is still new because it has not yet been fully understood.
15 pages (3750 words) Essay
Telecommunications - Cloud Computing
What new functionality is available to application developers and service providers? How do such applications and services leverage pay-as-you-go pricing models to meet elastic demands? Introduction: Cloud computing is a word in voyage in modern times and is aiming to change the pattern of how computer operations are being handled.
4 pages (1000 words) Essay
Security in the Cloud
Data location and processes makes the difference in the computation realm (Kandukuri et al, 2009). This is evident by the fact that on one hand, a user has complete control on processes and data in his or her device. On the other hand, however, the user has cloud computing where a vendor provides the data and service maintenance thus leaving a user unaware of where the processes run and where storage of data takes place.
8 pages (2000 words) Essay
The future of Cloud Security
With the multimedia world and its applications dominating the entire scenario, space saturation and congestion was a serious obstacle and consideration, thereby solutions were being thought of in form of cloud computing. However the concept of cloud computing is equally prone to the threats in terms of the security and other safety measures of the entire network and the clients and their information.
8 pages (2000 words) Essay
Securing and Protecting Information
This is even made worse by the porous and complex nature of modern transactions and the increasing demand for safe and secure information storage and retrieval mechanisms. The process of securing and protecting information refers to defending data and information from unauthorized access, disclosure, modification, inspection, use or destruction (Layton, 2007).
3 pages (750 words) Essay
Essay Title: Cloud computing has the potential to create some of the largest human rights violations of the 21st century. Discus
Starting from a general overview of cloud computing and the context of the discussion with regard to the nature of human rights violations under the age of the Internet and cloud computing, namely privacy and ownership rights, the paper focuses on the impact of cloud computing on privacy, citing specific examples of individual and massive breaches in privacy perpetuated by insiders and by entire governments.
8 pages (2000 words) Essay
The Future of Cloud Computing
Due to the abrupt changes in the technology propositions have been made of replacing personal computers with dumb terminals which have no software’s installed on them. This includes accessing the data from the worldwide web and integrating it in such a way that the data can be utilized.
5 pages (1250 words) Essay
Cloud
An application or program runs under multiples of interconnected computers. A set of hardware machines known as a server provided in a communications, for instance, intranet, Local area networks, internet or Wide area
2 pages (500 words) Essay
Integrated system design for cloud enterprise network and a secure BYOD
Mobile devices have made the implementation of the BYOD technology simpler and less bound by time and physical boundaries, as employees can share can share and receive information on its cloud network on time regardless of their
2 pages (500 words) Essay
Health care informatics
In the traditional environment, IT infrastructure plays a monumental roles in sub divisions and groups. In a larger scale of teams, messages can be lost and misconstrued which may be detrimental to the dynamics of the group. It is crucial to
3 pages (750 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Click to create a comment