Cloud is a term which is being widely used in IT industry in present scenario. The cloud is being used in terms of sharing hardware, platform and software in information technology. Basically cloud is owned by some third party cloud service providers. It is not only being used for sharing the resources of various types but it is also used now for decision making process and data analytics in wide sense. In cloud computing the resources are commonly available on Internet and whoever wants to access these resources must connect with the network. By using cloud computing in businesses, organizations are now gaining advantages of cost saving and better management of resources and services. In this way the small and medium scale businesses who are not capable to purchase all these resources can compete in market. The idea of cloud computing was first given in 1960s. It was evolved through a step by step process which was based on the grid and utility computing and using software as a service. The idea was given by JCR Licklider, who was working with ARPANET that time (Mohamed 2015). The concept for which Licklider was looking for was a huge network which interconnect all the programs and data world-wide and it can be accessible from anytime anywhere.
As we can see in above paragraph, the benefits of cloud computing are endless, but is the transformation of business on cloud computing has many challenges in terms of deployment, security and accessibility of resources (Barabas 2016). The most important factor in moving business onto cloud is selection of best cloud service model as well as cloud deployment model. Cloud computing has three main types of cloud services models available.
Cloud service models
Cloud Deployment Models
The environment of cloud is called as cloud deployment model. In cloud computing there are mainly four types of cloud computing models
Private cloud: According to the NIST: this type of cloud deployment is used by single organization having different consumers. This cloud is managed by single organization and may be on premise and off premise. This model is best suited for those organization which already own their own data centres and IT infrastructure (Johnson 2017). The only thing they need is the security and high performance. It provides virtualization and automation in cloud computing.
Public cloud: NIST describes the public cloud deployment as the cloud for general public. It can be managed and operated by any individual or their combination. It may exists on cloud provider’s premise. As per the study done by 1105 government information groups, public cloud are preferred by federal agencies because of the following reasons:
- Social network
- Better collaboration
- Enhanced customer relationship management
- Secured storage
Hybrid cloud: This type of cloud deployment is the combination of any two or more models. It has advantages of multiple deployment models. Mostly it is the combination of public and private cloud, that’s why the deployment of critical business application will be preferred on private cloud, whereas public cloud can be chosen for non-critical applications (Hashizume 2013). Public cloud services are less expensive and more scalable as compare to private services. By adopting hybrid cloud model, any organization can achieve the maximum output by using this cloud model.
Community cloud: This cloud deployment model is used to provide the cloud computing solutions to specific organization or a community (Barry 2014). It is managed and controlled by all the organizations which are involved in this community. It can be considered as hybrid form of private cloud.
Cloud deployment models
List of cloud providers
65% of cloud consumers use this model
Consumed by 18% cloud consumers
NYSE Capital markets community platform
18% cloud consumers use this model
Security risks of cloud computing
After the discussion about cloud services and deployment models, in this section, we are going to discuss the security aspect of cloud computing in real world, which are very common in business organizations: (Cales 2017)
- Data confidentiality
- Threats due to external users
- Threats due to internal users
- Data Integration
- Data encryption mechanism
- Loss of control
- Compliance violation
As we have discussed various components of cloud computing in this report, we conclude that cloud computing has a dignified potential to enhance the business operations in current scenario. Before moving the business on cloud, every business organization must prepare a plan about their requirements and as per their needed they must adopt the cloud deployment model as well cloud service provider. The cloud is surely the future of evolution in the history of Information technology. The cloud needs in depth study of security risks and their preventive measurements prior deployment to the cloud.
Barabas, Javier. 2016. "iaas-paas-saas cloud service models." www.ibm.com. april 17. https://www.ibm.com/cloud-computing/learn-more/iaas-paas-saas/.
Barry, Douglas K. 2014. community_cloud.html. October 5. https://www.service-architecture.com/articles/cloud-computing/community_cloud.html.
Cales, Cameron. 2017. "9-cloud-computing-security-risks-every-company-faces." www.skyhighnetworks.com. january 10. https://www.skyhighnetworks.com/cloud-security-blog/9-cloud-computing-security-risks-every-company-faces/.
Hashizume, Keiko. 2013. "An analysis of security issues for cloud computing." SpringerOpen 10.
Johnson, Innocent. 2017. "cloud-computing-deployment-models." dzone.com. march 9. https://dzone.com/articles/cloud-computing-deployment-models.
Mohamed, Arif. 2015. A-history-of-cloud-computing. september 20. https://www.computerweekly.com/feature/A-history-of-cloud-computing.