Cloud Storage 2

Cloud storage is the way forward for many organisations, but many providers offer a bad mode in terms of security and privacy.

Introduction:
Cloud computing is model which is used for enabling convenient, on-demand , network access to share pool of configurable computing resources such as networks, servers, storage, applications and services. This model is classified into three things they are:
' Essential characteristics
' Service model
' Deployment model

I. Essential characteristics:
The essential characteristics is further divided in to five characteristics they are as follows
a) On-demand self service
b) Broad network access
c) Resources pooling
d) Rapid elasticity
e) Measured service
a) On-demand self service:
On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.

b) Broad network access:
Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations).
This service is available over the network and client network.(e.g. mobiles, tablets ,laptop,and workstation).
c) Resources pooling:
Resource pooling. The provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, and network bandwidth.

d) Rapid elasticity:
Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time.

e) Measured service:
Measured service. Cloud systems automatically control and optimize resource use by leveraging a metering capability1 at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.
II. Service model:
This model is divided into three service they are as follows
a) Software as a service
b) Platform as a service
c) Infrastructure as a service

a) Software as a service:
Software as a Service (SaaS). The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure2. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
b) Platform as a service:

Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming 3
languages, libraries, services, and tools supported by the provider.3 The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.

c) Infrastructure as a service:
The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).
III. Deployment cloud:
This model is further divided into a four cloud they are as follows
a) Public cloud
b) Private cloud
c) Community cloud
d) Hybrid cloud
a) Public cloud :
The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises.

b) Private cloud:
Public cloud. The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider.
c) Community cloud:
Community cloud. The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises.
d) Hybrid cloud:
Hybrid cloud. The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds).

Executive Summary:
The amount of digital data either in home or business is need to be a protective, since its reserved without loss. Cloud storage services provide solution for the problems. These years the popularity has been increased dramatically so everybody want to store and backup their data as well as they want to share and synchronized data from the multiple devices.
Features of cloud computing:
The features of cloud computing is as follows:
' Copy
' Backup
' Share
' Synchronization
Copy: This service provide mirror image of data . in case of hardware drop out such as laptop stolen.
Backup: This feature is used to preserved data in to the cloud with any version.
Share: This is used for collaboration of multi users, such as project partners.
Synchronization: This feature is used to synchronize data with multiple devices such as laptop, desktop, tablets and mobile phone.
Lets take the example of few cloud storage and their features as follows


However , individual person and business person specially hesitate to shared their data to cloud storage services since they have a fear that they may lost their control on it because of recent successful attacks on cloud storage .
So, the providers are trying to handle the situation on it and its measures that they tried to keep their customer data as secure as.
In this scenario we have survey the security mechanism of few cloud storage services such as cloudme, crashplan, dropbox , mozy, teamdrive

CLOUD COMPUTING SECURITY AND PRIVACY ISSUES:

Source: Essay UK - http://www.essay.uk.com/free-essays/information-technology/cloud-storage2.php



About this resource

This Information Technology essay was submitted to us by a student in order to help you with your studies.


Search our content:


  • Download this page
  • Print this page
  • Search again

  • Word count:

    This page has approximately words.


    Share:


    Cite:

    If you use part of this page in your own work, you need to provide a citation, as follows:

    Essay UK, Cloud Storage 2. Available from: <https://www.essay.uk.com/free-essays/information-technology/cloud-storage2.php> [27-05-20].


    More information:

    If you are the original author of this content and no longer wish to have it published on our website then please click on the link below to request removal: