Cloud Computing – What is it?

What is Cloud Computing?

Cloud Computing is not a new concept in the IT industry.

Today organizations are migrating to cloud with traits like complex supply chains, rich in digital content, undergoing significant reorganization and lack of legacy system.

There are three types of clouds available: private, public and hybrid.

Each of these differs from one another on various characteristics.

The service provided on these clouds are SAAS, PAAS and IAAS.

The combination of all these three services constitutes the terminology known popularly as Cloud Computing.

The 3 services provided are:


Software as a service

The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser or a program interface.


Platform as a service

It provides the capability to the user to deploy onto the cloud infrastructure consumer created or acquired application created using programming languages, libraries, services and tools supported by the provider.

It is meant for the developers to create and  host applications on the cloud.


Infrastructure as a service

The capability provided to the consumer is to provision processing, storage, networks and other fundamental computing resources where the consumer is able to deploy and run arbitrary software which can include operating systems and applications.

Pros, Cons and Threats to Cloud Computing:

Cost Saving:
The cloud service providers tends to utilize their resources to the maximum level. This is possible because of the complete demand for the business is made available on the common hardware.

Scalability and elasticity:
A cloud based environment offers easy scalability for its user. The cloud enable capacity can be purchased temporarily, as the requirement rises and than can be done away with as the demand lapses.

Improved flexibility:
Cloud computing platforms are the most adjustable to the ever changing  need of business. New services/technologies can be deployed with ease in cloud environment.

Increased speed and agility:
The infrastructure provided to the users allows rapid deployment changes and 24 hour availability. They also want to secure their cloud from any malicious practice and thus would deploy the best in class security system to ensure the safety of their client’s data and applications.

The demand to access the data from anywhere anytime is possible when the data is kept at a particular location and authorized people have access to it from anywhere. This matter is resolved with cloud service as the data is stored in the cloud and the person can have access to it whenever there is a need.

The risk can be reflected in security issues pertaining to sensitive data and privacy, risk of losing independance and potentially losing control.

Potential Threat to Security:
The appropriate procedures must be put in place to ensure that only certain authorized employees can access confidential information of the company.

Loss of Control:
The third party is wholly solely responsible for the data and other information stored on the cloud. Complete control lies in the hands fo the service provider rather than the service user.

Poor Quality of service:
When the objectives are not clear the result is always hazy. It is caused by continuous change in the demands of the client and unclear objectives.

Job Loss:
With the IT related work being outsourced to third party vendors , the result will be loss of employment to an extent.

Lack of Standardization:
There are a number of players in the market that have made cloud computing as their top priority to achieve the maximum market share. Without the standardization, there will again be issues that have to be dealt with the concerned organization on one-to-one basis rather than being applicable to all.

Security Threats:
With the data being stored on the cloud, there are chances of it getting into the hands of hackers or unlawful people.

Data Leakage:
The threat of confidential data getting compromised is very high in the cloud model with insufficient authentication and/or authorization.

Insecure Interface and API:
The security of cloud services is dependent on the security of the APIs which are used by customers to interact with the  varied cloud services.


Comments are closed.