1 / 6100%
Runningii Head:ii CLOUDii COMPUTING
1
CIS512ii Weekii 10ii Assignment
Strayerii University
Juneii 12,2022
CLOUDii COMPUTING
2
Introductionii
Inii theii technology-drivenii era,ii cloudii computingii isii knownii asii oneii ofii theii mostii promisingii
technologiesii thatii haveii beenii revolutionizingii theii businessii landscape.ii Cloudii computingii refersii toii
aii sharedii poolii ofii servicesii thatii offerii theii facilityii ofii sharingii computerii resourcesii inii additionii toii
otherii devicesii basedii onii theii demandii ofii theii user.ii Thisii internet-basedii emergingii technologyii hasii
beenii playingii aii dominatingii roleii inii theii businessii landscapeii sinceii aii largeii numberii ofii companiesii
acrossii diverseii industriesii areii migratingii towardsii theii technologyii (Ahmed,ii 2019).ii
Planningii processii beforeii adoptingii cloudii computingii
Priorii toii theii implementationii ofii cloudii computingii services,ii organizationsii needii toii adoptii aii
methodicalii approach.ii Initially,ii anii end-to-endii assessmentii needsii toii beii carriedii outii toii understandii
theii exactii requirementsii ofii aii businessii andii theii roleii thatii cloudii computingii willii playii inii addressingii
theii needs.ii Itii mustii beii followedii byii theii designationii ofii aii cloudii stewardii whoii willii beii responsibleii
forii takingii theii cloudii initiativeii forwardii inii theii organizationalii setting.ii Itii mustii beii followedii byii theii
selectionii ofii theii specificii cloudii computingii serviceii modelii suchii asii Softwareii asii aii Softwareii
(SaaS),ii Infrastructureii asii aii Softwareii (IaaS),ii orii Platformii asii aii Softwareii (PaaS).ii Forii example,ii inii
caseii SaaSii hasii beenii chosenii asii theii idealii cloudii computingii serviceii modelii thatii willii beii
implementedii byii aii businessii entity,ii itii isii necessaryii forii theii firmii toii understandii howii allii operationsii
andii dataii storageii operationsii mustii beii doneii byii usingii web-basedii toolsii andii applicationsii (Pise,ii
2019).ii
Aii comprehensiveii adoptionii strategyii mustii beii adoptedii forii fasterii implementationii withii
minimumii risk.ii Theii staffii must alsoii beii givenii timelyii trainingii soii thatii theyii canii beii aii partii ofii
theii transitionii process.ii Ultimatelyii aii cloudii governanceii frameworkii mustii beii establishedii thatii willii
CLOUDii COMPUTING
3
ensureii thatii theii newii technologyii hasii beenii integratedii andii isii beingii usedii inii anii accountableii
manner.ii Itii isii vitalii toii ensureii thereii isii properii adherenceii toii theii properii roadmapii relatingii toii cloudii
adoptionii andii implementationii (Shimba,ii 2010).ii
Cloudii computingii -ii Advantagesii andii Disadvantagesii
Cloudii computingii technologyii canii giveii riseii toii severalii advantages,ii suchii asii itsii adoptionii
canii reduceii theii costii ofii operationsii forii aii business,ii theii technologyii canii enableii firmsii toii easilyii
recoverii fromii disaster,ii andii itii offersii betterii securityii asii comparedii toii traditionalii systems.ii Inii
additionii toii theseii benefits,ii cloudii computingii technologyii canii addii valueii forii businessesii byii
allowingii theii retrievalii ofii businessii informationii fromii anyii locationii andii atii anyii time.ii Itii increasesii
theii overallii flexibilityii inii termsii ofii dataii managementii inii theii businessii context.ii Theii quickii
deploymentii alsoii facilitatesii efficientii dataii operationsii withinii aii firmii (Ahmed,ii 2019).ii
However,ii cloudii computingii alsoii hasii aii numberii ofii disadvantages,ii suchii asii theii highii riskii
ofii dataii lossii orii dataii theftii andii exposureii toii technologicalii vulnerabilities.ii Ioneii ofii theii mainii areasii
ofii concernii forii businessesii revolvesii aroundii privacyii andii securityii aspects.ii Similarly,ii theii abilityii
toii leverageii theii technologyii isii dependentii onii solidii internetii connectivity.ii Theii issueii relatingii toii
downtimeii canii alsoii actii asii aii majorii disadvantageii thatii canii affectii theii abilityii ofii businessii entitiesii
toii useii theirii businessii dataii andii informationii atii theii timeii ofii need.ii Theii highii dependenceii onii theii
vendorsii ofii cloudii computingii servicesii actsii asii anotherii disadvantageii thatii reducesii theii flexibilityii
ofii theii end-usersii (Islamii etii al.,ii 2013).ii
Methodologyii toii selectii aii cloudii computingii serviceii modelii
Aii systematicii andii methodicalii approachii mustii beii adoptedii byii aii businessii inii orderii toii
ascertainii whetherii itii wouldii requireii SaaS,ii IaaS,ii orii Paas.ii Roschii hasii identifiedii thatii dueii toii theii
CLOUDii COMPUTING
4
availabilityii ofii aii diverseii rangeii ofii cloudii services,ii itii mightii becomeii aii dauntingii taskii forii
businessesii orii usersii toii chooseii theii rightii kindii ofii cloudii computingii services.ii Initially,ii aii businessii
mustii beii awareii ofii itsii specificii needs.ii Then,ii aii numberii ofii criteriaii mustii beii introducedii inii place,ii
suchii asii scalability,ii affordability,ii security,ii etc.,ii beforeii makingii theii selectionii ofii aii cloudii
computingii serviceii model.ii Thenii aii businessii mustii beii awareii ofii scenariosii inii whichii diverseii cloudii
computingii modelsii canii beii used.ii Forii example,ii IaaSii isii designedii toii offerii virtualii machines,ii
operatingii systems,ii andii networksii toii theii end-users.ii SaaSii enablesii aii userii toii utilizeii applicationsii
thatii runii onii theii cloudii servicesii andii thatii areii offeredii byii theii vendor.ii PaaSii allowsii businessesii toii
createii theirii veryii ownii applicationii byii utilizingii programmingii languageii andii linkedii librariesii
(Ahmed,ii 2019).ii Theii properii alignmentii betweenii businessii requirementsii andii theii functionalii
aspectsii ofii differentii cloudii computingii serviceii modelsii isii vitalii toii ensureii thatii anii idealii cloudii
computingii serviceii modelii isii selected.ii
Securityii risksii andii mitigationii activitiesii
Beforeii adoptingii cloudii computingii technology,ii itii isii necessaryii toii reviewii securityii risksii
andii implementii effectiveii mitigationii strategies.ii Someii ofii theii chiefii securityii risksii thatii mayii ariseii
priorii toii theii implementationii ofii aii cloudii solutionii includeii dataii securityii concerns,ii networkii
securityii complexities,ii theii possibilityii ofii segregationii ofii data,ii andii areasii whereii vulnerabilitiesii
couldii ariseii andii compromiseii theii businessii data.ii Theii possibilityii ofii compromiseii inii theii qualityii ofii
dataii isii alsoii aii chiefii concernii thatii needsii toii beii takenii intoii considerationii beforeii migratingii toii theii
cloudii environmentii (Patelii &ii Alabisi,ii 2019).ii
Aii numberii ofii mitigationii activitiesii needii toii beii undertakenii toii reduceii theii securityii risks.ii
Dataii encryptionii methodii mustii beii adoptedii soii thatii dataii willii notii beii inii originalii textii format.ii
CLOUDii COMPUTING
5
Instead,ii itii willii beii inii anii unreadableii format.ii Suchii aii methodii canii minimizeii theii riskii relatingii toii
compromiseii inii dataii quality.ii Anotherii measureii thatii canii beii undertakenii involvesii developingii
robustii exposureii managementii soii thatii theii sensitiveii informationii ofii theii businessii willii beii exposedii
inii aii limitedii mannerii andii itsii vulnerabilityii canii beii reduced.ii Theii adoptionii ofii aii robustii riskii
managementii frameworkii isii alsoii criticalii sinceii itii canii helpii inii theii evaluationii ofii risksii thatii mayii
ariseii inii theii cloudii environmentii (Patelii &ii Alabisi,ii 2019).ii
Conclusionii
Cloudii computingii hasii beenii identifiedii asii oneii ofii theii mostii promisingii technologiesii thatii
canii beii usedii byii businessii entities.ii However,ii priorii toii itsii implementation,ii aii methodicalii approachii
mustii beii adoptedii soii thatii aii companyii canii haveii aii smoothii transitionii fromii aii traditionalii modelii toii aii
cloud-basedii model.ii Theii specificii cloudii computingii serviceii modelii mustii beii chosenii byii takingii
intoii accountii theii specificii businessii needs.ii Furthermore,ii emphasisii mustii beii laidii onii theii
advantages,ii disadvantages,ii andii securityii risksii relatingii toii cloudii computingii soii thatii properii
adoptionii ofii theii technologyii willii beii possible.ii
CLOUDii COMPUTING
6
References
Ahmed,ii I.ii (2019).ii Aii briefii review:ii securityii issuesii inii cloudii computingii andii theirii solutions.ii
Telkomnika,ii 17(6).
Islam,ii M.ii M.,ii Morshed,ii S.,ii &ii Goswami,ii P.ii (2013).ii Cloudii computing:ii Aii surveyii onii itsii
limitationsii andii potentialii solutions.ii Internationalii Journalii ofii Computerii Scienceii Issuesii
(IJCSI),ii 10(4),ii 159.
Pise,ii V.ii H.ii (2019).ii Cloudii Computing-Recentii Trendsii inii Informationii Technology.ii Anwesh,ii
4(1),ii 27.
Patel,ii K.,ii &ii Alabisi,ii A.ii (2019).ii Cloudii computingii securityii risks:ii Identificationii andii assessment.ii
Theii Journalii ofii Newii Businessii Ideasii &ii Trends,ii 17(2),ii 11-19.
Shimba,ii F.ii (2010).ii Cloudii computing:ii Strategiesii forii cloudii computingii adoption.
Students also viewed