1- Definition of cloud Computing and examples of cloud computing
2- Brief of the history of cloud computing
3- Explaining the benefits and the harms of cloud computing
4- Focus on the security issues
1- Benefits of Cloud Computing.
a. Cost-Effective (provider).
b. Reliability (user).
c. How to make the mentioned benefits better.
2- Harms of Cloud computing.
a. Security issues.
c. Lack of support.
d. How to fix these issues.
2- Answer the question of the introduction briefly by connecting the dots from the collected data.
Figures and Table
Cloud Computing is the new generation of this era. Cloud computing is a controversial subject for the users ...view middle of the document...
Cloud Computing eases producing an environment that developed the computing world in a way that data cannot be lost. The impact of Cloud Computing is huge. Without the Cloud computing many of the today’s software would not exist.
I address following questions:
a. What are the benefits of using Cloud Computing?
b. What are the harms of Cloud Computing?
c. How do we create safe Cloud Computing environment for users?
Cloud computing is a type huge, complete, and user interfaced or non-user interfaced base network access a programmable storage space. The storage space used large scale networks, online storages, software application and services. There are many examples of applications and devices that use cloud computing. Facebook, Google docs, Dropbox, and smartphones. Cloud computing include compile (translate the computer program code into a machine language using a compiler) and execution (run the program) as third party. How does the cloud computing work? There are two programming methods that are used to transmit and receive the data by the cloud storage provider. Encryption uses complex algorithms to change the data to something that cannot be read by the hackers. Decryption decodes the encrypted data using reverse algorithm that are known only by the provider of the cloud storage. The clients have two processes. First, authentication which is using a password and a username to access the storage. Second, authorization allows the main users to give permission to other users to access the account with limited authorities assigned the main user.
(Figure 1.0 explains how the cloud computing works)