CLOUD COMPUTING
Cloud computing is a technique in which software’s, resources and data are shared virtually provided by servers on computers. In today world it has great value; we can do everything without changing our locations.
Cloud computing can be public as well as private. In public, resources are available to everyone whereas in private, resources are available only in private network.
Cloud computing can be of different types in which we can download or use any software such as spreadsheet tools etc. online. We can also develop new applications using APIs deployed and configurable remotely such as Force and Google APP engine etc. It also provides virtual machines, abstracted hardware and operating systems which may be contracted by service API such as Amazon EC2 and S3, Windows Live Skydive etc.
VULNERABILTIES OF CLOUD COMPUTING:
- Confidentiality- Data provided by the customers is not stay confidential on cloud because no one knows where the data is stored when one is not using it.
- Integrity- Data is not protected as whole because it is not centralized.
- Availability- If any error occurs the availability chances of data decreases
Some systems are malicious which provides unauthorized access to the resources, so hackers can attack the system easily.
RISKS IN CLOUD COMPUTING:
RISKS IN CLOUD COMPUTING:
- Customers bind to one provider for data and services which may lead to business failure should bankrupt the service provider. It increases the likelihood of sudden changes in provider policy and non-binding agreements such as terms of use.
- There is the risk of availability of the cloud services because if hacker hacks the services it can force the provider to stop their services due to huge loss.
- There is a risk of data security as data is processed by the cloud customers but it is carried out by the cloud provided which causes security breaches.
CONSEQUENCES OF CLOUD COMPUTING:
1. The reputation of the company affects due to risks which has an huge impact on the cloud systems.
2. Personal data is not safe to store in the cloud systems due to vulnerabilities and risks in the system.
3. Service delivery will be affected due to restrictions occurred during the data flow from one cloud system to another.