Thursday, December 12, 2019

Impact of Cloud Computing in Business-Free-Samples-Myassignment

Question: Discuss about the Impact of Cloud Computing in Business. Answer: Introduction With the advent of the digital era business operations are becoming complicated as information is treated as the main resource. So every business needs a smooth single entry solution in a cost effective way to cope up with the environmental changes. With the technological advancements business can take reward of the above efforts by utilizing the concept of cloud computing. Cloud computing can drive business operation from its complex forms to a smooth form (Damsgaard Scheepers 2001). Business of all trade focus on profit and by utilizing the concept of cloud computing business can earn maximum profit with low budget. Access to data and other process can get done via promised inbuilt software. Even the business becomes portable as the end user can access from anywhere via the device used. Business is getting transformed to smooth and sophisticated form via cloud computing (Rahul et al, 2012). Irrespective of the workers of the IT departments the other departments gets active with th e advent of the cloud computing applications. With legal licensing the cost of cloud computing can get monitored with proper security and integrity. This helps business to go for the concept of cloud computing whether its small or big. And even the package system can get altered or updated in a dynamic manner as per the need of the business. Before going for the change an organization should analyze some aspects that are very crucial to make the cloud computing fruitful (Linthicum 2009). The factors that are important will be discussed in the literature review section. The topic selection for the business research lies in the fact that cloud computing is a user friendly interface for the users and more over the user can retrieve data without having much knowledge of IT and perform their operation smoothly. The concept of cloud computing is new and getting upgraded through advancement in technology. The users are using the data in real time and real time is the best time to correct errors. Pros and Cons of cloud computing will be the core research activities. Project Objective The primary objective of the research: Analyse the impact of cloud computing in business. Secondary objectives: Cloud computing as a tool for decreasing risk and increasing business revenue Determining Pros and Cons behind cloud computing in business Analyzing Cloud computing as driver for fighting competition Project Scope The scope of the project suits from small start-up companies to big business organization as per the requirements of the business operation and cost of operation. As the project needs to get completed in a specific period of time the researcher faced the following limitations: Time is limited The primary source of data is limited so mostly secondary data is used. Limited edition of literature review was found of the proposed topic Throughout the report the researcher has tried to distinguish the changes that cloud computing can bring in business operations. As the cost of hardware components reduces with time every company can increase profit margin with low investment. Critical analysis of Pros and cons of cloud computing is analyzed to great extent. Strategies required to overcome the risk associated with cloud computing is recommended by the researcher. Literature Review Background In this section critical analysis of the literature review of the impact of cloud computing is done. Critical analysis of the literature review enhances the research validation by data analysis against the problem statement of the research objectives (Saunders et al, 2009). In cloud computing internet computer technology are used in a standard manner by tuning the capabilities under a protocol. With minimum effort of the management of the organization the operations are processed under a network access by sharing the relevant information under a single point for gaining the results is termed as cloud computing. The data are stored, accessed and retrieved under a protocol for running the business in a competent manner with the environmental changes. In information technology the term cloud can be defined as the remote hub of data access where the date get stored and retrieved from any stand point, highlighted by Nabil, 2010. The definition of cloud computing is dynamic as various researchers have produced ideologies of their own about the concept. User can access data with the compatible application provided by the provider that gets linked with the cloud. The architecture of cloud computing is divided into four parts. Variation of Cloud Computing Concept Now a days various types of cloud computing packages are available in the market and so based on the requirement of the business and its size the package are chosen. Some common types of cloud computing that are in use are analyzed below: (IaaS): INFRASTRUCTURE AS A SERVICE (PaaS): PLATFORM AS A SERVICE (SaaS): SOFTWARE AS A SERVICE Small business house with limited business operation use IaaS. Even this package startup business can use for moving ahead with nominal costing. When the business operation size is huge and the tasks are complicated Paas and IaaS are utilized as SaaS has limited service and moreover this type of cloud computing software installation is highly cost intensive. Big business organization is taking advantages of third type of services. Amazon is using the components of IaaS and gaining huge profits in the market by being the biggest bookstore virtually. Several other IaaS are like the Google compute engine, HP cloud Etc. Companies using PaaS type of cloud computing are Microsoft Azure, SAP weaver cloud, and Amazon elastic beanstalk. Case Study For enhancing the validation of the business research the researcher has taken Google, Amazon, and IBM as the service provider. The global users choose the service providers as per their choice and requirement. IaaS SaaS PaaS GOOGLE The user using this model gets access to millions of information in a short period of time and from various options they can choose their requirements. Via Google Docs the service provider is placing this interface. The users are able to store, update, retrieve, and analyze data as per their requirements via Google App engine. AMAZON Multiple services are offered to the customers for the growth of the providers with better functioning of the users. This service is not provided by Amazon The users need to pay for the interface that Amazon is providing to the users. IBM Open interface interested users are provided by this interface. Public, Private and hybrid clouds are offered to the users. Loyal customers who have their own business functioning uses this interface. End users are using static computing infrastructure. Pros and Cons of Cloud Computing Reason behind business getting transformed to cloud computing: By 2020 it is forecasted that cloud computing will cross 240 billion$ market value (Columbus 2013). Cloud computing is transforming the complicated business operations to a smooth operations for increasing the profit margin by reducing the expenditure (Rahul et al, 2012). Some of the benefits of cloud computing is discussed below: Optimization of the cost of investment is one of the biggest advantages of going for cloud computing concept in the current business scenario. Companies can take advantage of the cloud computing model by either of the below given mechanism: Reduce the running cost of the technology that is in use Reduce cost of capital expenditure and increase cost of operating expenditure Getting the cost of technology reduced Increase business values by focusing on core competencies The above benefits are taken by business in their initial stages or the business that has just set up the cloud computing concept. Other than this there are several pros for getting business transformed to cloud computing. Pricing based on usage concept can be used in a pay as you go pricing concept where the users need to pay as per their usage of the IT support based on their business operations. So it suits the decision makers to purchase IT supports as per their budgets and requirements. So it is a low cost intensive move for the business to go for cloud computing model for their daily operations. As per the demand with time the infrastructure can get optimized in a dynamic manner for coping up with environmental changes and fight competition. The decision maker can regulate the cost management in a smooth and viable manner via a user friendly interface. Usage based pricing protocol enhances rise in operational expenditure from capital expenditure for business (Roomi et al 2013). Start up business or business with limited resources can run their business by investing nominally in their fixed investment via cloud computing model. Without investing a lot in infrastructure development some common components of ICT like computers, internet can be purchased for taking the advantage of the whole cloud computing model. Business can focus on operational expenditure instead of focusing on cost of expenditure for gaining return with low cost cloud computing model instead of remaining stick to high cost investment(Columbus 2013). Business owners can reduce the cost of the business by eliminating the cost of purchasing fixed cost hardware components in daily basis and not only that the maintenance cost also gets reduced. Beside that the service provider of the cloud computing assures the security and reliability of the functioning. Once the implementation is done the business can take advantage of the cloud computing model with a user friendly mode. The business operations become more flexible as whenever required the service can be updated and the obsolete operations can get eliminated when required. However for every operation some investments are required for purchasing softwares and other functional activities of cloud computing. Controlling risk in business operations is another important pros of the cloud computing model. The cloud computing support service providers are having team to handle all type of risks that are associated in cyber business operations. No one can be expert in every field and hence the business can get support to run the business and fight competition as risks can get anticipated by adopting cloud computing model. In a single package end user can get benefit of various business operations to risk management. The run time problems get eliminated once it is conveyed to the service providers. If the problem is not solvable the SaaS provider it gets solved by the external IaaS. Mostly the risks are eliminated by the SaaS service providers for the end user of the cloud computing model. Total cost of ownership (TCO) can be easily calculated by the end users as the model providers always propose a transparent cost of the required service without any hidden charges (ENISA 2012). So as per the bid end users can compare their requirement and purchase their needs with respect to time without going for mass investment in the initial stage. Even often single user packages can be shared with multi user discipline without extra charges. Resource can get shared and utilized to its extent with cloud computing model with low cost budget for better output. Challenge of cloud computing Beside superficial benefits there are some challenges in adopting cloud computing in business as said by (Reza 2013). As said by (Anthony 2011) the efficiency of the concept goes down when the utilization is more than 80% as the hardware peripherals becomes inactive for generating desired outputs. Other than that there are several challenges that must be taken into consideration before adopting cloud computing in business and are discussed below: Data thieving: as per (Anthony 2011) it is seen that security issues holds the main impact in adopting cloud computing according to the survey of International Data Corporation (IDC). Mathew 2013 concludes most of the service provider of cloud computing dont have their own server and they rely on third party server, this is a major issues in reducing the data security of the users. Report of (Abhinay et al. 2013) justify that more than 37% cloud computing users is getting affected from external hackers. In real life the case of Zappos is a true example of the malicious cyber attack. Malware injection assault: in this type of attack the hackers injects malicious code inside the cloud of the user and get access to users database said by Te-Shun 2013. SQL injection is the common strategy used by hackers for getting access to the database of the cloud highlighted by Sara Kausar 2012. Wrapping assault: in this attack the hackers utilize extensible markup language for gaining access to the web server highlighted by (Wen Ling 2010). By penetrating the cloud the unauthorized users gets access to the users database by reducing the security of the cloud highlighted by (Subramaniam Deepa 2015). Authentication attack: business using ineffective encryption system might get affected by this attack where the hackers hacks the cloud in the authorization step of the web server as described by Subashini Kavith 2011. Denial of service attack (DoS): This type of attack occurs in the peripherals either it can be in the network or in the CPU. In this type of attack usually the users dont get access to their server as the hackers miscues the stored data of the cloud, highlighted by (Wang, et al. 2014). Data privacy: the issue related to data privacy depends on the control and compliance of the users, improper operation management of the user increase reduces the data privacy level, justified by Waleed Li (2016). It is the responsibility of the users to store and retrieve data with validation for insuring data security of the cloud, addressed by Choubey Namdeo( 2015). Strategies for resolving challenge of cloud computing As discussed above cloud computing is having some bad effects that need to get resolved before going for cloud computing adoption in the organization. Below mentioned strategies can rectify the problems associated with cloud computing. Data thieving resolution: this type of threats can be reduced by the applications of generating new codes after the end of every session; this will conceal the penetration of hackers to enter the cloud for malfunctioning as suggested by Angadi et al. 2013. The control and monitoring process of the server plays an important role in reducing this kind of risk as its controllable. Malware assault resolution: for reducing this type of challenge the server should interfere in cross checking of the operating system related to security issues with the user to avoid the opportunity of the hackers to inject malware in the cloud as said by (Kazi Susan 2010). Wrapping assault resolution: the resolution for this is provided by Apurva et al. 2013; the server should generate extra bit security system for saving the operating system so that the hackers find it difficult to penetrate the cloud and get access to data. Authentication attack resolution: as per the suggestion of (Sumitra, et al. 2014), better key management program can reduce this type of risks, as better coordination between the server and the user via ID management increases the security of the cloud. Denial of service attack resolution: as per the suggestion of the (Poonam Sujata 2013) this type of risk can be reduced by utilizing the concept of firewall and signature. The use of firewall and signature will hike the security system and reduce threat from external hackers. Conclusions: The report focused on the adoption of cloud computing in business and the pros and cons associated with it. It is seen that there are various service providers in the market where the giant players are competing for money with their unique service interface. Profound knowledge about the mechanism of cloud computing is shared within the report and mostly secondary source of data are used for the critical analysis. Both pros and cons are associated with adopting the cloud computing mechanism in business. For the competencies of the mechanism business gains profits and for the cons business operation gets affected and incurs loss. The objective of the research is examined through the critical analysis of the literature review and theories. Cloud computing mechanism will not only enhance the profit margin but will lead to innovation among the business environment. Beside advantages there are certain challenges in developing cloud computing. The researcher has proposed strategies that can reduce threat of cloud computing. Standardization and virtualization process will allow the user to use the data that are in need with a user friendly interface with proper rules and regulations. Via cloud computing the information within the business can get shared smoothly without barriers that will lead to better decision making process for the wellbeing of the business and better job satisfaction of the employees. From the report it can be concluded that cloud computing adoption in business will lead to profit maximization without increasing the expenditure cost and the pros holds more weighted advantages compared to cons. References Abhinay, B. A., Akshata, B. A. Karuna, C. G., (2013). Security Issues with Possible Solutions in Cloud Computing - A Survey. International Journal of Advanced Research in Computer Engineering Technology, 2(2), pp. 652-661. Anthony, B. Syed, M. R., (2011). An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security Its Applications, 3(1), pp. 30-45. Angadi, A. B., Angadi, A. B. Gull, K. C., (2013). Security Issues with Possible Solutions in Cloud Computing - A Survey. International Journal of Advanced Research in Computer Engineering Technology, 2(2), pp. 652-661. Apurva, S., Sanjay, S. Rahul, C., (2013). Security Aspects in Cloud Computing. International Journal of Engineering Trends and Technology, 6(3), pp. 118-120. Bourne J, 2014 Enterprise cloud adoption goes up- and the bets are on SDN and NFV to make the most of it, viewed 5th August 2017 from, https://www.cloudcomputing-news.net/news/2014/nov/24/enterprise-cloud-adoption-goes-and-bets-are-sdn-and-nfv-make-most-it/ Columbus L, 2013 IDG cloud computing survey: security, integration challenge growth,: Forbes, US Damsgaard J, Scheepers R, (2001). Harnessing Intranet Technology for Organizational Knowledge Creation Austrian Journal of Information System, viewed 5th August 2017 from, https://vbn.aau.dk/en/persons/jan-damsgaard(e8fee34e-40a3-4ad7-9b84-ea830be27251)/publications.html ENISA 2012 (European Network and Information Security Agency)Cloud computing: benefits, risks and recommendations for information security, Greece, viewed 4th August 2017 from, https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment Hogan M, Liu F, Sokol A, Tong J, (2011). NIST Cloud Computing Standards Roadmap, National Institute of Standards and Technology, Tokyo Linthicum D, (2009).The integration challenges of cloud computing, Info world, viewed 4th August 2017 from, https://www.infoworld.com/article/2631583/cloud-computing/the-integration-challenges-of-cloud-computing.html Kazi, Z. Susan, V., (2010). Security Attacks and Solutions in Clouds. ACM, Berlin Poonam, Y. Sujata, (2013). Security Issues in Cloud Computing Solution of DDoS and Introducing Two-Tier CAPTCHA. International Journal on Cloud Computing: Services and Architecture, 3(3), pp. 25-40. Rahul M, Haque M J, Muntjir M (2012). Impact of cloud computing on IT industry: A review and analysis, Publishing: International Journal of Computer and Information Technology, viewed 5th August 2017 from, https://www.noexperiencenecessarybook.com/g9Ggj/title-cloud-computing-impact-on-business.html Roomi A, Ebrahim S, Buqrais S, Ahmad I, (2013). Cloud computing pricing models: a survey, viewed 5th August 2017 from, https://www.researchgate.net/publication/270527081_Cloud_Computing_Pricing_Models_A_Survey Rountree D, Castrillo I, (2013).The Basics of cloud computing: Understanding the fundamentals of cloud computing in theory and practice, Elsevier publishing, US Saunders M, Lewis P, Thornhill A, (2009) .Research methods for business students, fifth edition, Pearson Education, UK Sara, Q. Kausar, F. K., (2012). Cloud Computing: Network/Security Threats and Countermeasures. Interdisciplinary Journal of Contemporary Research in Business, 3(9), pp. 1323-1329 Subashini, S. Kavitha, V., (2011.) A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications, 34(1), pp. 1-11

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.