Thursday, May 2, 2019

Security in the Cloud Essay Example | Topics and Well Written Essays - 2000 words

Security in the vitiate - Essay ExampleCloud computing has emerged as whizz of the most exciting technologies in the modern world as institutions and individuals seek to reduce represent while at the same time increase scalability and flexibility for computing processes and data storage. Anthes (2010) observe that collectible to grease ones palms computing, computing may be organized as a public utility in the near future. He further argues that cloud computing bring people closer and promises elasticity, economy, transparency, and convenience. However, despite the many another(prenominal) benefits that comes with cloud computing, there is a thorny issue of privacy and hostage. This paper will discuss security in the cloud it will focus on the issue of security as regards the concept of cloud computing. Concepts Related to Cloud Computing Cloud computing is defined as the management and provision of applications, information, software, and resources as serve wells over the cloud based on beseech (Singh and Shrivastava, 2012). This technology uses the central remote hosts and net to maintain applications and data. It is broken down into three segments that include connectivity, storage, and application, as demonstrated in the diagram below. Cloud computing allows businesses and consumers to use applications necessarily without installation and to access their files and data at any computer that has net income access. It is a network-based environment providing reliable information technology services to users via the internet. It provides services and resources based on demand across the internet. In addition, it allows developers to create applications and run those applications in the internet. It is as a result of this flexibility that cloud computing is considered as a very attractive solution to many institutions, enterprises and individuals. Many users also favour it because it heavily cut down expenses (Rani et al, 2012). A good example of cloud computing is Hotmail, Gmail, and yahoo email. charm using cloud computing, one does not need a server or software. All that one need is simply an internet access and one can start accessing, sending and receiving information. The email and server management is all in the cloud and is managed completely by the cloud or internet service provider such as Google (Singh and Shrivastava, 2012). The diagram below shows the services of cloud computing Source Singh and Shrivastava (2012) The incident that cloud computing has numerous benefits to individuals and enterprises cannot be disputed. However, there is a major concern that relates to cloud computing how security is taken care of and implemented. Cloud computing technology allows for centralization of bandwidth, processing, memory and storage therefrom making it a much more inefficient and insecure form of computing (Singh and Shrivastava, 2012). While in a sense cloud computing simplifies some of issues of security for consu mers by outsourcing them to a different party, it at the same time signifies insecurity to the same consumers. Complacency by the cloud users to think that they do not have to worry concerning their data and software because it is in the hand of experts is a mistake (Anthes, 2010). Cloud computing, in general has several customers from ordinary users, enterprises, and academia who have varying motivation of moving to cloud. Therefore, cloud

No comments:

Post a Comment