This report aims to discuss the several features of cloud computing. A discussion about the basics of cloud computing is provided. The various kinds of clouds are discussed briefly in this report. The various services that the cloud service providers offer are stated in this report. The issues related to the on premises systems is discussed in this report. The benefits and risks related to the hosted ERP system or the IaaS infrastructure is stated in this report. The risks benefits that are related to the cloud ERP system or SaaS infrastructure is stated in this report. Some benefits of cloud computing are provided in this report. The challenges concerning the implementation of cloud computing are provided. Lastly, this report concludes with an appropriate conclusion of this report.
Cloud computing is a growing trend of disseminated computing. The foundation of cloud computing is viewed as the development of network computing technologies. CEO of Google, Eric Schmidt, was the first person to give importance to the cloud computing term (Arora, Parashar and Transforming 2013). Cloud is generally build on some existing architecture that is grid based. It uses the services of the grid and some added technologies such as virtualisation and various business models. Cloud is a collection of service computers that are interconnected together in similar or different geographical locations, that operates together for serving numerous customers with workload and various needs depending on the basis of virtualisation (Dinh et al. 2013). The services of cloud are provided to the users as utility amenities depending on the business model. The clients utilise these services provided to them by providers of cloud service for building the necessary applications on the internet and finally deliver these services to the end users (Hashem et al. 2015). It provides no concerns to the cloud users about the installing or maintenance of hardware and software. The clients use the services provided by the cloud users and payment is done depending on the usage of these services. Large disseminated data centres are the providers of cloud storage. The data centres are organised as grids and cloud is assembled on the top of these grid services (Fernando, Loke and Rahayu 2013). Virtual images of all physical components in these data centres are provided to the cloud users. This allowance of virtual images to the clients is referred as virtualisation, which helps in building the abstraction over all the physical systems. Several cloud applications are obtaining recognition for the benefits of accessibility, scalability, dependability, and the utility model. The aspect of distributed computing has become easier as the respective cloud providers are handling all the critical aspects of cloud computing.
On premises software
This software is the most common conventional method for utilising the consumer and enterprise applications. On-premises refers to the software that has been installed on the computers of an organisation and it runs in the computers of the organisation rather than working from a server or any remote facility like cloud or server farm (Assunção et al. 2015). A software license is required in the on-premises software for all servers and the end user. In this system, the consumers are solely accountable for the maintenance, safekeeping, and availability of the on-premises software. The vendors provides integration after sales and some support services. The software of on-premises is commonly referred as shrinkwrap and the software that runs on the off-premises facilities is generally known as SaaS (Software as a Service) or cloud computing. The need of providing web servers made the drive for moving away from the on-premises software to co-location. As the growth of web increased around 2000, the companies with a strong foundation has to implement web servers in the remote data centres for achieving the necessary connectivity (Kaltenecker, Hess and Huesig 2015). The deployment of on-premises software and the use of business software was popular till 2005, when the execution of software from a remote location took over the on premises software (Azodolmolky, Wieder and Yahyapour 2013). The new innovation and the use model commonly utilises the facility of internet for removing the demands of the users to install some software on premises and the customers also achieved some extra benefits such as the execution of software from a remote location diminishes the costs of the organisation as it provides reduced maintenance, staffing, and power consumption. The risk factors that are included in the on premises includes lack of accessibility of services because of internet outages, the dependency of data security risks on the locations of data storage and issues of privacy.
Benefits of on-premises software
Limitations of on-premises software
Basics of cloud computing
The basic intention behind implementing cloud computing in an organisation is to utilise the benefits of cloud storage and other services such as utility services that are provided by the cloud service providers (Rittinghouse and Ransome 2016). Any organisation, with the help of cloud computing, can provide the end-users with highly reliable, accessible and efficient services. Cloud comprises of several physical components in these data centres of the cloud providers. Different cloud providers provide the services of cloud with different abstraction level (Garg, Versteeg and Buyya 2013). The services of cloud are partitioned into various types like SaaS (software as a service), PaaS (Platform as a service), and IaaS (Infrastructure as a service). The services are accessible on the internet where cloud acts as a sole entrance point for serving each client. Difficulties of data processing in large scale are addressed by the architecture of cloud computing (Xiao, Song and Chen 2013).
Types of cloud
Cloud is of three types:
Services of cloud
The services provided by a cloud provider can be classified in three groups:
Risks of SaaS
Risks of IaaS
Cloud architecture
Cloud architecture refers to software system architecture that are tangled in the cloud computing delivery, and it comprises of software and hardware that are designed by cloud architects working for any cloud integrator. It basically involves several cloud computing components that are communicating with one another over some interfaces that are application programming, typically web services. The complexity is monitored and the systems resulting to this monitoring are easily manageable than the colossal counterparts. The architecture of cloud extends to the clients, and access to the cloud applications are provided using web browsers or applications software. The architecture of cloud storage is loosely coupled and the operations involving the metadata are centralised empowering the scaling of data nodes that are autonomously supplying data (Sanaei et al. 2014).
Benefits of cloud computing services, SaaS and IaaS
As the services of cloud can be accessed from anywhere anytime through the intranet or internet, it makes the computing needs of an organisation more feasible and easy. An organisation can utilise a software application of accounting as installed one license on a single server. RDSH is used by these servers for creating multiple sessions for desktop that an organisation can utilise for various staff members that are located virtually anywhere. Features of devoted desktop computer and secure environment for accessing data are offered depending on the adapted security model by an organisation (Alshamaila, Papagiannidis and Li 2013).
The SaaS provides some benefits for renting software from a vendor of cloud computing at an affordable cost, which mitigates the burden of purchasing own software and managing that software. Vendors can provide SaaS service on a rental basis, which makes it feasible and diminishes cost of maintenance. The risk of software acquisition by an organisation is reduced that makes the organisation more dedicated towards achieving organisational goals. The IaaS is a service of cloud computing that offers several benefits such as infrastructure of computing that includes middleware, applications, virtual machines, network, and operating systems. The vendors can allocate and scale on demand resources of cloud computing to meet the needs of customers quickly by utilising the IaaS. The IaaS helps in standardising the computing capabilities making the customers responsible for configuring and operating infrastructure, and the vendors can focus on covering the services of availability and performance of all infrastructure. It reduces the maintenance cost and burden of the vendors that enables the vendors to provide completive price (Xia et al. 2016).
There is a significant reduction of risks with proper implementation of cloud computing. Better security with proper security and proper planning is offered by cloud computing. The resources of cloud computing can be reallocated dynamically providing cloud computing a significant advantage. Real time backup of the data of organisations is executed by cloud computing to ensure proper restoring of data in case of any data loss or data theft. Data reallocation facility of the cloud computing creates a difficult situation for the hackers to track the data of an organisation. Security of cloud computing is made secure by the implementation of security patches and Multi-factor authentication. Better security in cloud computing provides better privacy, accessibility, and integrity of information for an organisation. Better environment of security is offered by cloud computing with the help of proper monitoring of assets and regular assessment of security policies.
Cloud computing limitations
The major challenges in cloud computing are as follows:
Conclusion
Therefore, it can be concluded that organisation are shifting towards the implementation of cloud computing after analysing the benefits and advantages of cloud computing. On-premises refers to the software that has been installed on the computers of an organisation and it runs in the computers of the organisation rather than working from a server or any remote facility like cloud or server farm. A software license is required in the on-premises software for all servers and the end user. Cloud is a collection of service computers that are interconnected together in similar or different geographical locations, that operates together for serving numerous customers with workload and various needs depending on the basis of virtualisation. The services of cloud are provided to the users as utility amenities depending on the business model. The basic intention behind implementing cloud computing in an organisation is to utilise the benefits of cloud storage and other services such as utility services that the providers of cloud service offer to the users. Any organisation, with the help of cloud computing, can provide the end-users with highly reliable, accessible and efficient services. The environment of cloud computing that uses a assortment of on-premises, third party or private cloud, services of public cloud with the architecture designed between these two platforms is the hybrid cloud. The services that are provided on cloud are IaaS, PaaS, AaaS, and SaaS. The on-premises software is the software that are independent of any server or cloud, and this software are provided to the users for their own purposes.
The software system architecture referred as cloud architecture is involved in the cloud computing delivery, and it comprises of software and hardware that are designed by cloud architects working for any cloud integrator. The SaaS provides some benefits for renting software from a vendor of cloud computing at an affordable cost, which mitigates the burden of purchasing own software and managing that software. The IaaS helps in standardising the computing capabilities making the customers responsible for configuring and operating infrastructure, and the vendors can focus on covering the services of availability and performance of all infrastructure.
References
Alshamaila, Y., Papagiannidis, S. and Li, F., 2013. Cloud computing adoption by SMEs in the north east of England: A multi-perspective framework. Journal of Enterprise Information Management, 26(3), pp.250-275.
Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), pp.1922-1926.
Assunção, M.D., Calheiros, R.N., Bianchi, S., Netto, M.A. and Buyya, R., 2015. Big Data computing and clouds: Trends and future directions. Journal of Parallel and Distributed Computing, 79, pp.3-15.
Avram, M.G., 2014. Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, pp.529-534.
Azodolmolky, S., Wieder, P. and Yahyapour, R., 2013. Cloud computing networking: Challenges and opportunities for innovations. IEEE Communications Magazine, 51(7), pp.54-62.
Boillat, T. and Legner, C., 2013. From on-premise software to cloud services: the impact of cloud computing on enterprise software vendors’ business models. Journal of theoretical and applied electronic commerce research, 8(3), pp.39-58.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2016. Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, pp.684-700.
Carlin, S. and Curran, K., 2013. Cloud computing security. In Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI Global.
Dinh, H.T., Lee, C., Niyato, D. and Wang, P., 2013. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), pp.1587-1611.
Fernando, N., Loke, S.W. and Rahayu, W., 2013. Mobile cloud computing: A survey. Future generation computer systems, 29(1), pp.84-106.
Gao, Y., Guan, H., Qi, Z., Hou, Y. and Liu, L., 2013. A multi-objective ant colony system algorithm for virtual machine placement in cloud computing. Journal of Computer and System Sciences, 79(8), pp.1230-1242.
Garg, S.K., Versteeg, S. and Buyya, R., 2013. A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), pp.1012-1023.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, pp.98-115.
Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B., 2013. An analysis of security issues for cloud computing. Journal of internet services and applications, 4(1), p.5.
Herbst, N.R., Kounev, S. and Reussner, R.H., 2013, June. Elasticity in Cloud Computing: What It Is, and What It Is Not. In ICAC (Vol. 13, pp. 23-27).
Jain, R. and Paul, S., 2013. Network virtualization and software defined networking for cloud computing: a survey. IEEE Communications Magazine, 51(11), pp.24-31.
Kaltenecker, N., Hess, T. and Huesig, S., 2015. Managing potentially disruptive innovations in software companies: Transforming from On-premises to the On-demand. The Journal of Strategic Information Systems, 24(4), pp.234-250.
Manvi, S.S. and Shyam, G.K., 2014. Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41, pp.424-440.
Moreno-Vozmediano, R., Montero, R.S. and Llorente, I.M., 2013. Key challenges in cloud computing: Enabling the future internet of services. IEEE Internet Computing, 17(4), pp.18-25.
Oliveira, T., Thomas, M. and Espadanal, M., 2014. Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), pp.497-510.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press.
Rong, C., Nguyen, S.T. and Jaatun, M.G., 2013. Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering, 39(1), pp.47-54.
Sanaei, Z., Abolfazli, S., Gani, A. and Buyya, R., 2014. Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), pp.369-392.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-386.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X. and Ren, K., 2016. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), pp.2594-2608.
Xiao, Z. and Xiao, Y., 2013. Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials, 15(2), pp.843-859.
Xiao, Z., Song, W. and Chen, Q., 2013. Dynamic resource allocation using virtual machines for cloud computing environment. IEEE Trans. Parallel Distrib. Syst., 24(6), pp.1107-1117.
Yang, K. and Jia, X., 2013. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing. IEEE Trans. Parallel Distrib. Syst., 24(9), pp.1717-1726.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download