3 pages/≈825 words
Proof Reading and Plagiarism Free Assignment Paper: Cloud Computing (Proofreading Sample)
proofread and submit a plagiarism free paper. the sample is a complete paper proofread and corrected plagiarismsource..
Proof reading and Plagiarism
Proof reading and Plagiarism free
A couple of Information technology experts would consent that cloud computing is the most convenient and most dynamic model of message delivery since the birth of internet. Cloud computing has been used by corporate managers and decision makers to help them achieve several financial advantages and protect them from any security threats that could result to tainting of their reputable image and even the longevity of the business itself CITATION Per14 \l 1033 (Pereira, 2014). In itself, cloud computing is cost-effective and an efficient option to purchasing and sustaining hardware and software in-house. This has been the case since the introduction of Amazon's S3 (Simple Storage Services) and EC2 (Elastic Compute cloud).
Cloud computing has had various definitions, having different service providers and the available standard organizations giving different definitions of the same. For instance, the National Institute of standards and Technology (NIST) defines cloud computing as "a model for that enables the ubiquitous, convenient, on-demand network access to a pool of shared configurable computing services that can be speedily provisioned and released with minimal management effort. What cloud computing does, is to avail platforms, software, and infrastructure in form of web services using the internet. However the consumers do not know the specific physical location where these services are provided from. They therefore purchase the software and hardware as services rather than physical assets CITATION Per14 \l 1033 (Pereira, 2014).
Cloud computing is categorized into various classifications. Software, platform, and infrastructure as a service.
Software as a service moves the separation to the highest level in the stack. Most of cloud services such as web-based email and word processing which are offered for free are in this category CITATION Per14 \l 1033 (Pereira, 2014). It is beneficial for the users since they do not incur any costs of maintenance.
Platform as a service boosts the separation slightly higher and is a surrounding where the already developed and deployed applications are made available by cloud providers. The consumers take advantage of the platforms provided such as Java programming language and oracle databases CITATION Per14 \l 1033 (Pereira, 2014).
Infrastructure as a service is the minimum class of separation between what consumers desire and the services that are readily available for them to use CITATION Per14 \l 1033 (Pereira, 2014). Consumers are supplied with raw computing, storage services and networking, this assists them to establish applications and custom services. The cloud provider is in charge of all the physical resources, while the consumer monitors all the other factors mentioned including development tools and operating system CITATION Per14 \l 1033 (Pereira, 2014).
Technology alongside its tremendous benefits is also faced with security threats. The prevalent threats include cybercrimes. There has been however measures that have been put in place to try and alleviate this challenges CITATION Per14 \l 1033 (Pereira, 2014). Cloud itself can be used as a means of securing data and also disseminate information among others.
According to CITATION Per14 \l 1033 (Pereira, 2014) customers ought to get cloud services from the internet. Reports according to CITATION Per14 \l 1033 (Pereira, 2014) claims that ethics that regulate internet usage and accessibility are used to help clients access the cloud. Through a communication process clients are able to access information and software in the cloud. Correspondence through the cloud is grouped into; outside correspondence, which happens between the cloud and the clients and inner correspondence, which happens inside the cloud's framework.
Outer correspondence has likenesses with other Internet types of correspondence. Subsequently, according to CITATION Per14 \l 1033 (Pereira, 2014) the issues experienced by the cloud as a consequence of its Internet highlight are like those of ordinary information and communication technology. These are concerns such as incorporate man-in-the-center, refusal of administration, IP-parodying based flooding, double dealing and listening to private conversations without consent CITATION Per14 \l 1033 (Pereira, 2014).
The general problem is that breaches in security are evident in cloud computing (Jansen, 2011). The specific problem is the increasing costs in the prevention and alleviation of breaches in cloud security. Despite the increased growth in the computing technology, a great danger of losing data due to cybercrimes and other related threats exists. Efforts have been made to curb the problem of security issues (Younis, 2013). One of these measures includes the use of cloud as a tool to secure data and share information among others. Moreover, the insecurity of cloud computing has recently upsurged (Han, 2013). The paper looks into security vulnerabilities in cloud computing and recent solutions posted by different scholars are discussed.
The cloud's security risks may vary from those of the infrastructure of traditional IT either in intensity, nature, or even both. Several works have been put in place to monitor the cloud's security challenges from the service model perspective. The identified challenges are classified according to the following domains; communication issues, contractual and legal issues.
Communication Level Challenges
Normally, the services of the cloud are accessed by customers through the Internet (Younis, 2013). Subashini (2011) reports that standard Internet protocols and mechanisms aid in facilitating the communication between the cloud and customers. The process of communication leads to conveyance of either applications or information/data between the cloud and the customers. Virtual Machines (VMs) of the cloud are also in constant communication with each other. Communication through the cloud is classified into; external communication, which occurs between the cloud and the customers and internal communication, which takes place within the cloud's infrastructure.
External communication has similarities with other Internet forms of communication. Consequently, the problems encountered by the cloud as a result of its Internet feature are similar to those of conventional IT communication (Rong, 2013). These issues include man-in-the-middle, denial-of-service, IP-spoofing based flooding, eavesdropping, and deception (Jansen, 2011).
Contractual and Legal Level Challenges
According to Rong (2013), implementation of cloud computing requires applications and data to be migrated by institutions to the administrative control of Cloud Service Providers (CSP). As a result, several issues crop up such as geographic jurisdictions, performance assurance, compliance with regulatory laws, contract enforcement monitoring etc. These issues are associated with the legalities, physical locations of the data, and service level agreement (SLA).
Cloud computing is an involving term that (Pereira, 2014) defines a cloud computing as an inclusion of software and system software in the datacenterthat satisfies these services. Some of the exceptional features of cloud computing include the illusion of different hardware resources and the ability to pay for the required resources. In a unique way, (Han, 2013) states that some of the features of cloud computing include use of a wide network access, large resource pool, dynamic elasticity, on-demand self-service, and also the some of the metered services that are similar to utility.
In general, cloud computing uses three main service models (Mell, 2011). The first service is software as a service (SaaS), which is software, distributed based representation in which applications are hosted by a service/vendor provider. The models are accessed by customers or the end users via the network, usually the internet. This model some scholars like (Sebesta, 2012) states that it is associated with the pass-as-you-go subscription licensing model. The second computing model is a platform as a service (PaaS) that allows customers to manage the hosting environment (Chen, 2012, March). The third model is the infrastructure as a service (IaaS).
In this model, the customers control everything ap...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- Reading on Spiritual Economies Journal Proofreading AssignmentDescription: Rudnyckyj claims that that spiritual economy is depicted by religious ethics as well as the knowledge in managing the business. The conception of matters pertaining spiritual virtue and religious devotion is an abstract of spiritual economies....1 page/≈275 words| 2 Sources | APA | Social Sciences | Proofreading |