Escolar Documentos
Profissional Documentos
Cultura Documentos
Digital Age
UNIVERSITY OF SUFFOLK
BABSFY 2018/2019
STUDENT NAME:
PAULA-ANDUTA BANU
I declare that this assignment is all my own work and that I have acknowledged all
materials used from the published or unpublished works of other people. All
internet-based utility computing that uses shared resources such as hardware and software as well
as other information that can be accessed by the end users on their virtual servers (Hashem et al.,
96). In simpler terms cloud computing is a way of renting computer hardware, storage and network
on an hourly basis from firms that are able to afford such assets and resources in their data centers.
In fact, the majority of the definitions term anything that is beyond a given firm or user’s personal
firewall to be their cloud computing system. Some of the most popular companies such as Amazon
Inc. utilize these models of cloud. Cloud computing functions the same ways as electricity; after
turning on the electricity that you are subscribed to the meter starts charging the user. When you
switch off the electricity you do not get charged (Hashem et al., 100). Firms offering cloud
computing charge a user the same as the utility companies; paying for the software, information,
storage space or the applications that you utilize. In a nutshell, cloud computing allows firms to
It is notable that personal computing, as well as business computing, has evolved in three
phases. The first phase is where the data and the applications are all stored in one’s local desktop
or the firm serve. The second phase involves applications residing in a local server or software on
the desktop powered by the internet to provide critical data for the company. The third phase is
where the majority of the data and software reside online. This is the phase that cloud computing
falls in. as much as 80% of the computational data across the planet is predicted to move to the
cloud within the next decade, there are still some unanswered questions with regard to business
2
computing include iTunes, Calendars among other forms of backups (Yum et al., 750).
Cloud storage refers to the saving of information to offsite storage systems created for data
storage and security. The systems are maintained by third parties. Instead of storing information
on a firms storage unit or computer hard drives, the data is saved n remote databases which can be
accessed through the firm’s computers and internet (Yum et al., 750). This provides security of
data considering that issues such as natural disasters cannot disrupt or destroy the information
stored within these systems. Cloud storage is linked to numerous benefits and advantages
compared to the traditional physical storage systems and devices. This includes situations where
the data is stored in cloud storage systems, the firm has the ability to access the data as well as add
onto the database from any location that has internet access. It is however notable that the users or
people accessing this information must be authenticated and authorized to change or store the data.
Such systems eliminate the need to walk around carrying a portable or phycial storage or mass
device considering that it is online. It is also notable that the same computer that was utilized in
saving a file is not needed while retrieving the file (Kasemsap, 29).
The first type of cloud systems is Infrastructure as a service (IaaS). This is defined as the
lowest level of these systems and solutions. This system is comprised of computing infrastructure
which is outsourced as a service. The IaaS providers tend to deliver or offer pre-installed and pre-
configured hardware as well as software. This is delivered in virtual interfaces. The clients can do
what they want with the services provided. A good example of such a system includes the managed
hosting and development systems or environments (Hashem et al., 108). In terms of business, this
3
service reduces the costs of purchasing or ownership of the assets hence reducing the capital
expenditures. Secondly, a firm only selects the service that they want and pay for it. This reduces
the operational costs for the organization. it is also possible for the organization to scale based on
their requirements at any given time. this flexibility can be aligned with an organization's strategic
objectives.
The second type is the platform as services abbreviated as PaaS. This refers to a
solution that is similar to the IaaS but it is more advanced and revamped. With this system apart
from the basic infrastructure provided, the providing firm also offers an avenue or platform as well
as a solution especially when it comes to services for storage and accessibility of data. this
integrates aspects such as the IT infrastructure as well as graphically designed or tailored user
interfaces. Others integrate programming languages as well as an operating system while others
run-time system libraries. The PaaS systems and services are mainly deployed by firms that need
to develop examine and test or deploy cloud solutions for specific software or applications. The
hosting is however done by the provider who in this case is the third party examples include the
Microsoft Azure (Kasemsap, 40). In terms of a business organization, the PaaS provides an
opportune environment for many people to be involved hence it is easy to create supportive teams
and communities. the organization is also not required to conduct system updates of the
infrastructure considering that this is done by the provider and most importantly it is low costs
Thirdly there is software as a service (SaaS). The service provider, in this case, provides
an entirely functional web-based application to the client. The applications include enterprise
resource planning, email and time management among others. Such systems are rapidly scalable,
4
easy access from any location with internet, eliminates the need for organizational IT infrastructure
Lastly, there is recovery as a service type of cloud system (RaaS). This system helps
companies to “replace their backups through archiving, disaster recovery and continuity solutions
or packages on a single platform” (Kasemsap, 27). These providers can ensure that a firm covers
an entire data center including the operating systems and configurations as well as data and files
in databases. This is a critical security platform that ensures the organization can be restored
without the risk of data loss. This systems prevent permanent or temporary information loss,
provides an effective recovery approach, and eliminates the risk of permanent loss of physical
Privacy is etched on the idea that an individual or entity has enough rights to control the
flow of their personal information and how it is used. This is most common in privacy policies that
come with the apps we download on a daily basis and install on the phones. Security, on the other
hand, refers to how personal information is protected (Chang et al., 30). For example how your
passwords and account information in an email account is protected. Security relates to data and
how it is safeguarded from leaking. As much as many people will regard security and privacy as
the same thing, security does not integrate the notion of individual rights (Chang et al., 26). It
focuses on the rights of an individual in relation to a third party or software that is expected to
maintain and secure their private data. a good example to differentiate the two is a virtual private
network also known as VPN which functions like a tunnel that allows only your information
5
passwords and other data on the internet to stay private. In this case, as it relates to privacy, a VPN
will block websites, browsers, cable firms as well as internet providers from the acts of tracking
and investigating personal user data. in fact they cannot even know your location. In terms of
security, the VPN will protect another individual or entity from accessing your information.
The same concept applies to cloud systems. Security is etched on the idea of preventing
another individual or entity from accessing your information while privacy is etched on the rights
to control who has the right to see your information by blocking unauthorized people. The third
parties are responsible for the majority of the activities involving security and privacy. To ensure
security an organization can utilize firewalls (Truong et al., 68). This is an effective method of
deterring external parties with malicious intent from accessing data and using it in a manner that
is not desired. Secondly, firms can limit what they share in these cloud services, destroy critical
but unnecessary information as well as install and invest in offsite databases to ensure that natural
calamities do not rob the firm of its data. Privacy, on the other hand, can be achieved through data
encryption. This ensures that unauthorized people cannot use the information or even access it. In
the same context, the use of passwords and identification mechanisms such as retina detection,
fingerprints, and numerical passwords helps improve privacy. This is because the user or business
only allows authorized personnel to utilize or even come close to their data (Truong et al., 68).
Works Cited
6
Chang, Victor, Yen-Hung Kuo, and Muthu Ramachandran. "Cloud computing adoption
Hashem, Ibrahim Abaker Targio, et al. "The rise of “big data” on cloud computing: Review and
Kasemsap, Kijpokin. "The role of cloud computing adoption in global business." Delivery and
26-55.
Truong, Hong-Linh, and Schahram Dustdar. "Principles for engineering IoT cloud systems." IEEE
Yum, Takkin G., Matthew J. Threefoot, and Cheul Shim. "Cloud service brokering systems and