Cloud computing provides for dynamically scalable and virtualized sources on the internet for online business applications which utilize software and data resources which are stored in the servers.
Cloud Computing has also been defined as a revolutionary development of certain existing computing technologies and approaches into a form that is capable of separating the application and database from the infrastructure and mechanisms that are employed to deliver them. Cloud computing augments the cooperation, suppleness, size, accessibility and also offers significant cost reduction with the use of optimized and competent computing techniques, (Armbrust, and Griffith, et al., 2009).
Cloud computing is basically the use of group of services, data sources and technical applications, all of which can be swiftly rearranged, reconditioned, implemented and also decommissioned with the help of an allocation model. In order to increase the scope of the services offered, the resources are set away from the infrastructure that is employed to deliver the results. For example, for a particular service to be based upon cloud computing technology, the internet can be utilized for transport and the browser as an accessibility tool – which states that the sources are at all the times shared in a multi-tenant surroundings exterior to the “boundary.”
The users, who are serviced through cloud computing services, do not possess any kind of infrastructure, the user only pays for the resources they utilize and therefore avoid the capital costs by renting the infrastructure from a third part owner. The infrastructure behind the cloud computing is composed of efficient services through the use of virtual data centers that are based upon virtualization technologies, (Armbrust, and Griffith, et al., 2009). The cloud computing services can be ...
Cite this document
(“Securing the Cloud Essay Example | Topics and Well Written Essays - 4000 words”, n.d.)
Retrieved from https://studentshare.net/miscellaneous/380759-securing-the-cloud
(Securing the Cloud Essay Example | Topics and Well Written Essays - 4000 Words)
“Securing the Cloud Essay Example | Topics and Well Written Essays - 4000 Words”, n.d. https://studentshare.net/miscellaneous/380759-securing-the-cloud.
Cloud computing is a new IT paradigm that allows provisioning of IT infrastructure through the flexible pay-per-use model. Its application in industry is still new because it has not yet been fully understood.
Data location and processes makes the difference in the computation realm (Kandukuri et al, 2009). This is evident by the fact that on one hand, a user has complete control on processes and data in his or her device. On the other hand, however, the user has cloud computing where a vendor provides the data and service maintenance thus leaving a user unaware of where the processes run and where storage of data takes place.
With the multimedia world and its applications dominating the entire scenario, space saturation and congestion was a serious obstacle and consideration, thereby solutions were being thought of in form of cloud computing. However the concept of cloud computing is equally prone to the threats in terms of the security and other safety measures of the entire network and the clients and their information.
This emerging trend in the contemporary world gives companies both attractive technological and financial benefits as well as giving them a competitive edge in the highly competitive environment. Cloud computing involves sharing of computer resources, both software and hardware, among many users along connected computers over a network, mostly the internet (Armbrust et al, 2010).
This is even made worse by the porous and complex nature of modern transactions and the increasing demand for safe and secure information storage and retrieval mechanisms. The process of securing and protecting information refers to defending data and information from unauthorized access, disclosure, modification, inspection, use or destruction (Layton, 2007).
Starting from a general overview of cloud computing and the context of the discussion with regard to the nature of human rights violations under the age of the Internet and cloud computing, namely privacy and ownership rights, the paper focuses on the impact of cloud computing on privacy, citing specific examples of individual and massive breaches in privacy perpetuated by insiders and by entire governments.
Due to the abrupt changes in the technology propositions have been made of replacing personal computers with dumb terminals which have no software’s installed on them. This includes accessing the data from the worldwide web and integrating it in such a way that the data can be utilized.
An application or program runs under multiples of interconnected computers. A set of hardware machines known as a server provided in a communications, for instance, intranet, Local area networks, internet or Wide area
Mobile devices have made the implementation of the BYOD technology simpler and less bound by time and physical boundaries, as employees can share can share and receive information on its cloud network on time regardless of their
In addition, cloud computing comprises of Software as a service and utility computing. However, small or medium data centers do not makeup cloud computing although it is under virtual management.
Cloud computing requires software as an
2 Pages(500 words)Assignment
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic Securing the Cloud for FREE!