Cloud Computing Data Security–Background and Benefits
Cloud Computing and Security
Cloud computing, a subdomain of computer security, consists of a set of policies, controls, and technologies. Through the aforementioned elements, cloud computing primarily aims to preserve computer data as well as applications (Bassi & Chaudhary, 2015). This is accomplished through the existence of processes in cloud computing security that address the security controls that the cloud provider, in particular, should include in order to safeguard the customer's privacy, data security, and compliance with the established rules.
Differences from Traditional Network Designs
Cloud computing, arguably, differs from traditional network designs in two fundamental respects. First, there is a significant difference between the two in relation to execution, which is more often referred to as virtualization. Virtualization takes the lane to allow massive scalability as well as offering clients virtually unlimited resources (Salam, 2012). In line with virtualization, it is worth noting that, in the traditional networking, the servers are fixed in hardware. Such hence accounts for one to spend more money to upgrade and at the same time encounter more limits in the case that one needs to scale more users compared to those that the hardware can hold (Salam, 2012). However, the above is all different in cloud computing since it offers an opportunity of multiple servers without similar limitation as depicted in the traditional networking architecture. For instance, in cloud computing, through virtualization, one is able to provide only the resources that a specific user needs hence offering cloud computing a greater scalability (Salam, 2012). Besides the second major difference between the two lies on the aspect of cost-effective. While in traditional network architecture, in the case one need to scale more users, such will, in turn, result to incurring more cost, in agreement with Salam (2012), with cloud computing being capable of scaling multiple users, such hence account for it being cost effective when compared to traditional networks. Supportively, Salam (2012) brings to lights that, unlike cloud computing, in traditional networking, once I required to pay everything from hardware, installation, maintenance to the monthly fee, which accounts for its being more expensive than cloud computing hence less cost-effective.
The Future of Cloud Computing
To my perception, and based on my evaluation on cloud computing, I hold the view and premise that, in future, cloud computing will be more effective unlike at the moment when it is on its initial and early stage. Such is since there is the likelihood of more advancement and inventions in line with cloud computing. The advancement and inventions will seek to make cloud computing more efficient in attaining its set target of offering security to computer data, application and users besides ensuring that it complies with the set laid regulation. Therefore, it is arguable that with the presence of advancements and inventions targeting cloud computing, there is a high possibility that in future, cloud computing will be more effective towards delegating its set targets.
Increased Adoption by Companies
Arguably, in future, cloud computing is likely to encounter a higher adoption rate by companies. The pre-stated is based on two major reasons. First, with cloud computing being cheap and cost-effective when compared to traditional networking, more companies are likely to adopt it since they will reduce the expenses. For instance, companies will adopt cloud computing since they will not incur everything from hardware, installation, maintenance and monthly or annual fee like in the case of traditional networking (Salam, 2012). Besides, companies will adopt cloud computing at a higher rate, since it will offer them the opportunity for multiple users and at the same time can be able to offer single user their specific preference needs, unlike in traditional networking.
Technologies and Solutions
In conclusion, although cloud computing has numerous benefits when compared to traditional networking, it is prone to various risks that can limit its effectiveness. Such risks can be curb through the presence of various technologies and solutions. For instance, cloud computing ought to embrace a monitoring and evaluation software. A significant example is embracing the presence of user access platforms as well as hardware that are both hosted and maintained by the provider (Parms, 2016). Such will help in monitoring the activities of the users, based on the fact that cloud computing. Besides, other solutions include such as organizations using cloud computing renting aspect such as firewalls, virtual data centers, virtual machines as well as VPN. In agreement with Parms (2016), monitoring and evaluation is the only best method that can be applied in order to reduce potential risks to cloud computing.
References
Bassi, S., & Chaudhary, A. (2015). Cloud Computing Data Security–Background and Benefits. International Journal of Computer Science & Communication, 6(1).
Parms, J.(2016).How to mitigate your cloud computing risks. ITProPortal Inc.
Salam, A.(2012).Traditional Networks Vs. The Cloud.Big Data, Cloud Computing, Saas, Security. CloudTweaks Inc.
Academic levels
Skills
Paper formats
Urgency types
Assignment types
Prices that are easy on your wallet
Our experts are ready to do an excellent job starting at $14.99 per page
We at GrabMyEssay.com
work according to the General Data Protection Regulation (GDPR), which means you have the control over your personal data. All payment transactions go through a secure online payment system, thus your Billing information is not stored, saved or available to the Company in any way. Additionally, we guarantee confidentiality and anonymity all throughout your cooperation with our Company.