Cloud Computing
Cloud Computing
Cloud Computing is the delivery of computing services such as servers, storage, databases,
networking, software, analytics, intelligence, and more, over the Cloud (Internet).
The cloud environment provides an easily accessible online portal that makes handy for the user to
manage the compute, storage, network, and application resources. Some cloud service providers
are in the following figure.
Advantages of cloud computing
o Cost: It reduces the huge capital costs of buying hardware and software.
o Speed: Resources can be accessed in minutes, typically within a few clicks.
o Scalability: We can increase or decrease the requirement of resources according to the
business requirements.
o Productivity: While using cloud computing, we put less operational effort. We do not need
to apply patching, as well as no need to maintain hardware and software. So, in this way,
the IT team can be more productive and focus on achieving business goals.
o Reliability: Backup and recovery of data are less expensive and very fast for business
continuity.
o Security: Many cloud vendors offer a broad set of policies, technologies, and controls that
strengthen our data security.
1. Infrastructure as a Service (IaaS): In IaaS, we can rent IT infrastructures like servers and
virtual machines (VMs), storage, networks, operating systems from a cloud service vendor.
We can create VM running Windows or Linux and install anything we want on it. Using IaaS,
we don’t need to care about the hardware or virtualization software, but other than that,
we do have to manage everything else. Using IaaS, we get maximum flexibility, but still, we
need to put more effort into maintenance.
2. Platform as a Service (PaaS): This service provides an on-demand environment for
developing, testing, delivering, and managing software applications. The developer is
responsible for the application, and the PaaS vendor provides the ability to deploy and run
it. Using PaaS, the flexibility gets reduce, but the management of the environment is taken
care of by the cloud vendors.
3. Software as a Service (SaaS): It provides a centrally hosted and managed software services
to the end-users. It delivers software over the internet, on-demand, and typically on a
subscription basis. E.g., Microsoft One Drive, Dropbox, WordPress, Office 365, and Amazon
Kindle. SaaS is used to minimize the operational cost to the maximum extent.
Cloud Computing?
Cloud Computing means storing and accessing the data and programs on remote servers that are
hosted on the internet instead of the computer’s hard drive or local server. Cloud computing is also
referred to as Internet-based computing, it is a technology where the resource is provided as a
service through the Internet to the user. The data that is stored can be files, images, documents, or
any other storable document.
The following are some of the Operations that can be performed with Cloud Computing
Storage, backup, and recovery of data
Delivery of software on demand
Development of new applications and services
Streaming videos and audio
Cloud Sustainability
The following are the some of the key points of Cloud sustainability:
Enery Efficiency: Cloud Providers supports the optimization of data center operations for
minimizing energy consumption and improve efficiency.
Renewable Energy: On increasing the adoption of renewable energy sources like solar and
wind power to data centers and reduce carbon emissions.
Virtualization: Server virtualization facilitates better utilization of hardware resources,
reducing the need for physical servers and lowering the energy consumptions.
Cloud Security
Cloud security recommended to measures and practices designed to protect data, applications,
and infrastructure in cloud computing environments. The following are some of the best practices
of cloud security:
Data Encryption: Encryption is essential for securing data stored in the cloud. It ensures
that data remains unreadable to unauthorized users even if it is intercepted.
Access Control: Implementing strict access controls and authentication mechanisms helps
ensure that only authorized users can access sensitive data and resources in the cloud.
Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring users
to provide multiple forms of verification, such as passwords, biometrics, or security tokens,
before gaining access to cloud services.
1. Data Backup and Restoration: - Cloud computing offers a quick and easy method for data
backup and restoration. Businesses may simply access and restore their data in the event of
any data loss or system failure by keeping it in the cloud.
2. Improved Collaboration: - Collaboration is improved because cloud technologies make it
possible for teams to share information easily. Multiple users may work together on
documents, projects, and data thanks to shared storage in the cloud, enhancing
productivity and teamwork.
3. Excellent Accessibility:- Access to information stored in the cloud is made possible. Users
can access their data from anywhere in the world with an internet connection, making
remote work, flexibility, and effective operations possible.
4. Cost-effective Maintenance:- Organizations using cloud computing can save money on
both hardware and software upkeep. Because cloud service providers manage the
maintenance and updates, businesses no longer need to make costly infrastructure
investments or set aside resources for continuous maintenance.
5. Upkeep and Updates:- Cloud service providers take care of infrastructure upkeep, security
patches, and updates, freeing organizations from having to handle these duties themselves.
This frees up IT teams' time and resources to work on higher-value projects like application
development, data analysis, or strategic initiatives rather than wasting them on rote
upkeep and updates.
6. Mobility:- Cloud computing makes it simple for mobile devices to access data. Utilizing
smartphones and tablets, users can easily access and control their cloud-based applications
and data, increasing their mobility and productivity.
7. Pay-per-use Model:- Cloud computing uses a pay-per-use business model that enables
companies to only pay for the services they really utilize. This method is affordable,
eliminates the need for up-front investments, and offers budget management flexibility for
IT.
8. Scalable Storage Capacity:- Businesses can virtually store and manage a limitless amount of
data in the cloud. The cloud offers a scalable and centralized storage option for all types of
data, including documents, photos, audio, video, and other kinds of files.
9. Enhanced Data Security:- Cloud computing places a high focus on data security. To
guarantee that data is handled and stored safely, cloud service providers offer cutting-edge
security features like encryption, access limits, and regular security audits. Businesses can
rest easy knowing that their important data is secure.
10. Disaster Recovery and Business Continuity:- Cloud computing provides reliable options for
these two issues. Businesses can quickly bounce back from any unforeseen disasters or
disruptions thanks to data redundancy, backup systems, and geographically dispersed data
centers.
11. Agility and Innovation:- Businesses can continue to be innovative and nimble thanks to
cloud computing. Organizations may quickly embrace new solutions, test out emerging
trends, and promote corporate growth with access to a variety of cloud-based tools,
services, and technology.
12. Green Computing:- By maximizing the use of computer resources, lowering energy use,
and minimizing e-waste, cloud computing may support environmental sustainability.
Disadvantages of Cloud Computing
1. Vendor Reliability and Downtime:- Because of technological difficulties, maintenance
needs, or even cyberattacks, cloud service providers can face outages or downtime. Users
may not be able to access their data or applications during these times, which can interfere
with business operations and productivity.
2. Internet Dependency:- A dependable and fast internet connection is essential for cloud
computing. Business operations may be delayed or interrupted if there are connectivity
problems or interruptions in the internet service that affect access to cloud services and
data.
3. Limited Control and Customization:- Using standardized services and platforms offered by
the cloud service provider is a common part of cloud computing. As a result, organizations
may have less ability to customize and control their infrastructure, applications, and
security measures. It may be difficult for some organizations to modify cloud services to
precisely match their needs if they have special requirements or compliance requirements.
4. Data Security and Concerns about Privacy:- Concerns about data security and privacy arise
when sensitive data is stored on the cloud. Businesses must have faith in the cloud service
provider's security procedures, data encryption, access controls, and regulatory
compliance. Unauthorized access to data or data breaches can have serious repercussions,
including financial loss, reputational harm, and legal obligations.
5. Hidden Costs and Pricing Models:- Although pay-as-you-go models and lower upfront costs
make cloud computing more affordable, businesses should be wary of hidden charges. Data
transfer fees, additional storage costs, fees for specialized support or technical assistance,
and expenses related to regulatory compliance are a few examples.
6. Dependency on Service Provider:- When an organization depends on a cloud service
provider, it is dependent on that provider's dependability, financial security, and longevity.
Users may have disruptions and difficulties switching to alternate options if the provider
runs into financial difficulties, changes their pricing policy, or even closes down their
services.
7. Data Location and Compliance:- When data is stored in the cloud, it frequently sits in
numerous data centers around the globe that may be governed by multiple legal systems
and data protection laws. This may pose compliance issues, especially if some sectors of
the economy or nations have stringent data sovereignty laws.
Client-server architecture is used by cloud computing to distribute computer resources over the
internet. It provides a pay-as-you-go pricing structure, allowing businesses to only pay for the
resources they actually use.
Due to its benefits, such as cost savings, increased productivity, efficiency, and performance, data
backups, disaster recovery, and security, cloud computing has grown in popularity.
It does away with the requirement for up-front infrastructure expenses and enables businesses to
increase resources fast. Additionally, it offers automated management, allowing IT professionals to
concentrate on important jobs. Global data centers, strong data backup and disaster recovery
capabilities, and improved security features to safeguard data and maintain regulatory compliance
are all provided by cloud computing.
Grid Computing
Grid computing, also known as distributed computing, links various computing resources, including
desktop computers, workstations, servers, and storage components. Users who have access to
these resources can make use of the available processing power and storage space.
The main advantages of grid computing are accelerated work completion and higher user
productivity. Grid computing increases user productivity by making resources easily accessible
while openly granting access to a wide variety of computer resources.
Users can save time and effort by no longer having to handle and maintain their own exclusive
resources on their own. Grid computing also enables parallel processing and distributed data
storage, allowing tasks to be accomplished more quickly by combining the power of numerous
resources.
Assume that you are an executive at a very big corporation. Your particular responsibilities include
to make sure that all of your employees have the right hardware and software they need to do
their jobs. To buy computers for everyone is not enough. You also have to purchase software as
well as software licenses and then provide these softwares to your employees as they require.
Whenever you hire a new employee, you need to buy more software or make sure your current
software license allows another user. It is so stressful that you have to spend lots of money.
But, there may be an alternative for executives like you. So, instead of installing a suite of software
for each computer, you just need to load one application. That application will allow the
employees to log-in into a Web-based service which hosts all the programs for the user that is
required for his/her job. Remote servers owned by another company and that will run everything
from e-mail to word processing to complex data analysis programs. It is called cloud computing,
and it could change the entire computer industry.
In a cloud computing system, there is a significant workload shift. Local computers have no longer
to do all the heavy lifting when it comes to run applications. But cloud computing can handle that
much heavy load easily and automatically. Hardware and software demands on the user's side
decrease. The only thing the user's computer requires to be able to run is the cloud computing
interface software of the system, which can be as simple as a Web browser and the cloud's
network takes care of the rest.
2. Business Applications:- Business applications are based on cloud service providers. Today, every
organization requires the cloud business application to grow their business. It also ensures that
business applications are 24*7 available to users.
There are the following business applications of cloud computing -
i. MailChimp :- MailChimp is an email publishing platform which provides various options
to design, send, and save templates for emails.
ii. Salesforce :- Salesforce platform provides tools for sales, service, marketing, e-commerce,
and more. It also provides a cloud development platform.
iii. Chatter:- Chatter helps us to share important information about the organization in real
time.
iv. Bitrix24:- Bitrix24 is a collaboration platform which provides communication,
management, and social collaboration tools.
v. Paypal :- Paypal offers the simplest and easiest online payment mode using a secure
internet account. Paypal accepts the payment through debit cards, credit cards, and also
from Paypal account holders.
vi. Slack :- Slack stands for Searchable Log of all Conversation and Knowledge. It provides
a user-friendly interface that helps us to create public and private channels for
communication.
vii. Quickbooks :- Quickbooks works on the terminology "Run Enterprise anytime, anywhere,
on any device." It provides online accounting solutions for the business. It allows more
than 20 users to work simultaneously on the same system.
4. Education Applications :- Cloud computing in the education sector becomes very popular. It
offers various online distance learning platforms and student information portals to the students.
The advantage of using cloud in the field of education is that it offers strong virtual classroom
environments, Ease of accessibility, secure data storage, scalability, greater reach for the students,
and minimal hardware requirements for the applications.
There are the following education applications offered by the cloud -
1. Google Apps for Education:- Google Apps for Education is the most widely used platform
for free web-based email, calendar, documents, and collaborative study.
2. Chromebooks for Education:- Chromebook for Education is one of the most important
Google's projects. It is designed for the purpose that it enhances education innovation.
3. Tablets with Google Play for Education:- It allows educators to quickly implement the
latest technology solutions into the classroom and make it available to their students.
4. AWS in Education:- AWS cloud provides an education-friendly environment to universities,
community colleges, and schools.
5. Entertainment Applications:- Entertainment industries use a multi-cloud strategy to interact
with the target audience. Cloud computing offers various entertainment applications such as
online games and video conferencing.
i. Online games:- Today, cloud gaming becomes one of the most important entertainment media.
It offers various online games that run remotely from the cloud. The best cloud gaming services are
Shaow, GeForce Now, Vortex, Project xCloud, and PlayStation Now.
ii. Video Conferencing Apps:- Video conferencing apps provides a simple and instant connected
experience. It allows us to communicate with our business partners, friends, and relatives using a
cloud-based video conferencing. The benefits of using video conferencing are that it reduces cost,
increases efficiency, and removes interoperability.
6. Management Applications:- Cloud computing offers various cloud management tools which
help admins to manage all types of cloud activities, such as resource deployment, data integration,
and disaster recovery. These management tools also provide administrative control over the
platforms, applications, and infrastructure.
Some important management applications are -
1. Toggl:- Toggl helps users to track allocated time period for a particular project.
2. Evernote:- Evernote allows you to sync and save your recorded notes, typed notes, and
other notes in one convenient place. It is available for both free as well as a paid version.It
uses platforms like Windows, macOS, Android, iOS, Browser, and Unix.
3. Outright:- Outright is used by management users for the purpose of accounts. It helps to
track income, expenses, profits, and losses in real-time environment.
4. GoToMeeting:-GoToMeeting provides Video Conferencing and online meeting apps, which
allows you to start a meeting with your business partners from anytime, anywhere using
mobile phones or tablets. Using GoToMeeting app, you can perform the tasks related to the
management such as join meetings in seconds, view presentations on the shared screen,
get alerts for upcoming meetings, etc.
7. Social Applications
Social cloud applications allow a large number of users to connect with each other using social
networking applications such as Facebook, Twitter, Linkedln, etc.
There are the following cloud based social applications -
1. Facebook:- Facebook is a social networking website which allows active users to share
files, photos, videos, status, more to their friends, relatives, and business partners using the
cloud storage system. On Facebook, we will always get notifications when our friends like
and comment on the posts.
2. Twitter:- Twitter is a social networking site. It is a microblogging system. It allows users to
follow high profile celebrities, friends, relatives, and receive news. It sends and receives
short posts called tweets.
3. Yammer:- Yammer is the best team collaboration tool that allows a team of employees to
chat, share images, documents, and videos.
4. LinkedIn:- LinkedIn is a social network for students, freshers, and professionals.
What are the Security Risks of Cloud Computing
Cloud computing provides various advantages, such as improved collaboration, excellent
accessibility, Mobility, Storage capacity, etc. But there are also security risks in cloud computing.
Security Challenges and Considerations in Cloud Computing
A key component of cloud computing is security. Despite the numerous precautions that cloud
providers take to ensure the security of their infrastructure and services, there are still some
security issues and factors that businesses need to be aware of.
o Compliance: Using cloud services may be subject to legal compliance regulations,
depending on the industry. Organizations must make sure their cloud provider complies
with these specifications and has access to the required paperwork.
o Data Loss: Data loss is the most common cloud security risk of cloud computing. It is also
known as data leakage. Data loss is the process in which data is deleted, corrupted, and
unreadable by a user, software, or application. In a cloud computing environment, data loss
occurs when our sensitive data is in somebody else's hands, one or more data elements can
not be utilized by the data owner, the hard disk is not working properly, and the software is
not updated.
o Data Breach: It is the process in which confidential data is viewed, accessed, or stolen by a
third party without any authorization, so the organization's data is hacked by hackers.
o Account Hijacking: It is a serious security risk in cloud computing. It is the process in which
individual users' or organizations' cloud account (bank account, e-mail account, and social
media account) is stolen by hackers. The hackers use the stolen account to perform
unauthorized activities.
o Spectre & Meltdown: Spectre & Meltdown allows programs to view and steal data that is
currently processed on the computer. It can run on personal computers, mobile devices,
and in the cloud. It can store the password, and your personal information, such as images,
e-mails, and business documents, in the memory of other running programs.
o Increased Complexity Strains IT Staff: Migrating, integrating, and operating the cloud
services is complex for the IT staff. IT staff must require the extra capability and skills to
manage, integrate, and maintain the data in the cloud.
o Data Security and Privacy: The security of sensitive data is one of the main issues with
cloud computing. Access controls must be in place to restrict who can access the data, and
organizations must make sure that their data is encrypted both in transit and at rest.
o Vendor Lock-In: Switching cloud providers can be expensive and complex, which might
result in vendor lock-in. When choosing a cloud provider, businesses should take this into
account and make sure they have a plan in place in case switching providers becomes
essential.
o DDoS: Cloud service companies are a prime target for distributed denial of service (DDoS)
attacks, which can cause downtime and data loss. Organizations should verify that the
cloud provider has sufficient defenses against DDoS assaults in place.
o Identity and Access Management: The security of cloud computing environments depends
on effective identity and access management. To prevent unauthorized access to their data,
organizations must make sure that they have robust authentication and authorization
mechanisms in place.
o Monitoring and Logging: Monitoring and logging services are frequently offered by cloud
providers. These services can assist organizations in identifying and addressing security
concerns. However, businesses must make sure they have the systems and procedures in
place to analyze the data and take appropriate action.
o Shared Infrastructure: Cloud service providers frequently employ this type of setup, which
allows several businesses to use the same hardware and software resources. Organizations
should make sure their cloud provider has proper isolation mechanisms in place because
this could result in security issues like cross-tenant attacks.
In general, businesses should adopt a proactive approach to cloud security and put the required
security policies in place to safeguard their infrastructure and data.