Cloud
computing in general can be portrayed as a synonym for distributed computing over a network, with the ability to
run a program or application on many connected computers at the same time. It
specifically refers to a computing hardware machine or group of computing
hardware machines commonly referred as a server connected through a communication
network such as the Internet, an intranet, a local area network (LAN) or wide
area network (WAN) and individual
users or user who have permission to access the server can use the server's
processing power for their individual computing needs like to run an
application, store data or any other computing need. Therefore, instead of
using a personal computer every-time to run the application, the individual can
now run the application from anywhere in the world, as the server provides the
processing power to the application and the server is also connected to a
network via internet or other connection platforms to be accessed from
anywhere.
Cloud computing offers your business many benefits. It
allows you to set up what is essentially a virtual office to give you the
flexibility of connecting to your business anywhere, any time. With the growing
number of web-enabled devices used in today's business environment (e.g.
smartphones, tablets), access to your data is even easier. There are many
benefits to moving your business to the cloud:
·
Reduced
IT costs
Moving to cloud computing may reduce
the cost of managing and maintaining your IT systems. Rather than purchasing
expensive systems and equipment for your business, you can reduce your costs by
using the resources of your cloud computing service provider. You may be able
to reduce your operating costs because:
1. the cost of system upgrades, new
hardware and software may be included in your contract
2. you no longer need to pay wages for
expert staff
3. your energy consumption costs may be
reduced
4. there are fewer time delays.
·
Scalability
Your business can scale up or scale
down your operation and storage needs quickly to suit your situation, allowing
flexibility as your needs change. Rather than purchasing and installing
expensive upgrades yourself, your cloud computer service provider can handle
this for you. Using the cloud frees up your time so you can get on with running
your business.
·
Business
continuity
Protecting your data and systems is
an important part of business continuity planning. Whether you
experience a natural disaster, power failure or other crisis, having your data
stored in the cloud ensures it is backed up and protected in a secure and safe
location. Being able to access your data again quickly allows you to conduct
business as usual, minimising any downtime and loss of productivity.
·
Collaboration
efficiency
Collaboration in a cloud environment
gives your business the ability to communicate and share more easily outside of
the traditional methods. If you are working on a project across different
locations, you could use cloud computing to give employees, contractors and
third parties access to the same files. You could also choose a cloud computing
model that makes it easy for you to share your records with your advisers (e.g.
a quick and secure way to share accounting records with your accountant or
financial adviser).
·
Flexibility
of work practices
Cloud computing allows employees to
be more flexible in their work practices. For example, you have the ability to
access data from home, on holiday, or via the commute to and from work
(providing you have an internet connection). If you need access to your data
while you are off-site, you can connect to your virtual office, quickly and
easily.
·
Access
to automatic updates
Access to automatic updates for your
IT requirements may be included in your service fee. Depending on your cloud
computing service provider, your system will regularly be updated with the
latest technology. This could include up-to-date versions of software, as well
as upgrades to servers and computer processing power.
Cloud computing exhibits the following key characteristics:
intensive computing tasks. Pricing on a utility computing basis
is fine-grained, with usage-based options and fewer IT skills are required for
implementation (in-house).[40] The
e-FISCAL project's state-of-the-art repository contains several
articles looking into cost aspects in more detail, most of them concluding that
costs savings depend on the type of activities supported and the type of
infrastructure available in-house.
Device and location independence. enable users to access systems
using a web browser regardless of their location or what device they use (e.g.,
PC, mobile phone). As infrastructure is off-site (typically provided by a
third-party) and accessed via the Internet, users can connect from anywhere.
Virtualization technology allows sharing of
servers and storage devices and increased utilization. Applications can be
easily migrated from one physical server to another.
Multitenancy enables sharing of resources
and costs across a large pool of users thus allowing for:
·
centralization of infrastructure in locations
with lower costs (such as real estate, electricity, etc.)
·
peak-load
capacity increases
(users need not engineer for highest possible load-levels)
·
utilisation
and efficiency improvements
for systems that are often only 10–20% utilised.
Reliability improves with the use of
multiple redundant sites, which makes well-designed cloud computing suitable
for business continuity and disaster
recovery. Scalability and elasticity via dynamic
("on-demand") provisioning of resources on a fine-grained,
self-service basis in near real-time (Note, the VM startup time varies by VM
type, location, os and cloud providers), without users having to engineer for
peak loads.
Performance is monitored, and consistent
and loosely coupled architectures are constructed using web services as
the system interface.
Security can improve due to
centralization of data, increased security-focused resources, etc., but
concerns can persist about loss of control over certain sensitive data, and the
lack of security for stored kernels. Security is often as good as or better
than other traditional systems, in part because providers are able to devote
resources to solving security issues that many customers cannot afford to
tackle.
Maintenance of cloud computing
applications is easier, because they do not need to be installed on each user's
computer and can be accessed from different places.
Cloud
security architecture is effective only if the correct defensive
implementations are in place. An efficient cloud security architecture should
recognize the issues that will arise with security management. The security
management addresses these issues with security controls. These controls are
put in place to safeguard any weaknesses in the system and reduce the effect of
an attack. While there are many types of controls behind a cloud security
architecture, they can usually be found in one of the following categories:
Deterrent
controls
These
controls are set in place to prevent any purposeful attack on a cloud system.
Much like a warning sign on a fence or a property, these controls do not reduce
the actual vulnerability of a system.
Preventative
controls
These
controls upgrade the strength of the system by managing the vulnerabilities.
The preventative control will safeguard vulnerabilities of the system. If an
attack were to occur, the preventative controls are in place to cover the
attack and reduce the damage and violation to the system's security.
Corrective
controls
Corrective controls are used to
reduce the effect of an attack. Unlike the preventative controls, the
corrective controls take action as an attack is occurring.
Detective
controls
Detective controls are used to
detect any attacks that may be occurring to the system. In the event of an
attack, the detective control will signal the preventative or corrective
controls to address the issue.
Related Link :
http://www.business.qld.gov.au/business/running/technology-for-business/cloud-computing-business/cloud-computing-benefits
http://en.wikipedia.org/wiki/Cloud_computing
http://royanafwani.wordpress.com/2011/12/22/keamanan-pada-cloud-computing/
http://en.wikipedia.org/wiki/Cloud_computing_security