Cloud computing becomes a buzzword of recent years and businesses are switching every day. There are several advantages of cloud computing such as cost savings, reliability, manageability and strategic edge. Cloud computing provides improved as well as simplified IT management and maintaining capabilities by central administration of resources. However, disadvantages of cloud computing makes some issues while dealing with cloud. The issues like its downtime, security, vendor lock-in and limited control are the major disadvantages of using cloud computing. Hence, it is important to analyze the advantages and disadvantages of using cloud computing. The present paper discusses project objective, project scope, literature review, research methodology and conclusion that will be helpful to conduct the research in proper way.
With rapid growth and usage of cloud computing, it becomes important to evaluate the advantages and disadvantages of using cloud computing. Business and organizations often minimize annual operating cost through using cloud computing (Alzahrani et al. 2014). The cost of cloud storage is approximately 3 cents per gigabyte in order to store data internally. In addition, users can avail extra cost savings, as it does not need internal power in order to store information remotely. However, it is important to be careful when using to move a document into cloud folder. In addition, various cloud storage services have particular bandwidth allowance. Hence, analyzing the advantages and disadvantages of cloud computing, it will be helpful to highlight the features and functionality of cloud computing along with the role of cloud computing in an IT organization (Hameed et al. 2016). The study will allow the reader evaluating all possible solution for mitigating the issues related to the technology. In addition, the project will be helpful to extend the provided advantages of cloud computing for making the process more effective in future days.
Concept of cloud computing:
Cloud computing is considered as an information technology paradigm that enables access to the shared pools of configurable system resources as well as higher-level services. It is provisioned with minimal management effort over the internet (Gutierrez et al. 2015). In addition, cloud computing relies on the sharing resources in order to achieve coherence along with economies of scale. In addition, third party cloud enables the organizations focusing on core business instead of increasing the resources on infrastructure and maintaining the computer. Cloud computing organizations are consuming compute resource like virtual machine, storage on application like a utility. Cloud computing boasts various attractive advantages for business as well as end users.
Cloud computing services are private, public or hybrid. Private cloud services are generally delivered from a business data center to the internal users. The model offers versatility as well as convenience of cloud (Hashem et al. 2015). Thus, preserving the management, control as well as security are common to the local data centers. In addition, the internal users may be billed for the particular services by IT chargeback. A hybrid cloud is considered as a combination of public cloud services as well as an on-premises private cloud. It is processed with orchestration as well as automation between the processes. Organizations run on important workloads and sensitive applications (Boutaba et al. 2014). The goal of hybrid cloud is creating an automated, unified and scalable environment, which takes benefits of public cloud infrastructure.
Moreover, the organizations are embracing multi-cloud model and use as infrastructure-as-a service providers. It enables the applications migrating between several cloud providers and operates concurrently to cloud providers. The benefits of cloud computing is taking advantages of more competitive pricing from a specific provider. On the other hand, multi-cloud deployment as well as application development is a challenge as a challenge of cloud computing interface.
The use of cloud computing has changed over the years. It is divided into three broad service categories such as infrastructure as a service, platform as a service and software as a service (Girma et al. 2015). IaaS providers like AWS supply virtual server as well as storage along with APIs. It enables the users to have allocated storage capacity and configure virtual machine. In PaaS model, the cloud providers host the development tools on the infrastructures. The users can access the tools to the customized examples for workload requirements. SaaS is considered as a distribution model that can deliver software applications over internet. The applications of SaaS as well as services from anywhere can be accessed.
The advantages of using cloud computing can be described as followed.
Storing information in cloud is considered as one of the most-efficient methods to use in the organizations. Strong data in cloud provides unlimited storage capacity. Since all the data is stored in cloud, it becomes easier compared to storing the process. Moreover, the cloud service providers are generally competent for handling the information. However, it is evident that the information on cloud is accessed. It is required to be aware that there are times where the technology has outages as well as technical issues. The other major issue in cloud is security issue. Thus, before adoption of the technology, it is required to understand sensitive information to third party cloud service information. Thus, it is required to ensure that the reliable service provider will be helpful to keep information secured.
Although there are several advantages of cloud computing, disadvantages of cloud computing are required to evaluate.
Downtime: de Bruin and Floridi (2017) mentioned that as cloud service providers has to take care of several clients, it becomes overwhelmed as well as come up against the technical outages. It leads to the business procedure that is temporarily suspended.
Security: Cloud service providers deploy the best standard of security as well as industry certifications, storing data as well as vital files on the external service providers (Sookhak et al. 2015). Thus, using cloud-powered technologies need to provide accesses significant and confidential data. For an example, the users can provide adequate benefits for this.
Vendor lock-in: The cloud service providers give promise that it is flexible for use as well as integration and switching the cloud services. Hosting as well as integrating the present services from a vendor to different vendor is processed (Shameli-Sendi et al. 2015). For an example, the applications are developed on Microsoft development framework may work efficiently on the Linux platform.
Considering the aim of the study, it is required analyzing the relationship between brand equity as well as purchase behavior of a consumer. The research is a descriptive as well as co-relational in terms of collecting data and based on the structural equations. In addition, structural equation model is considered as a statistical comprehensive approach that is helpful to test the hypothesis associated with the relationship between observed as well as latent variables (Ding and Tseng 2015). With the help of this approach, acceptability of theoretical models in the communities is tested and as most of the variables in the field of management, research is latent.
Research philosophy:
In the study, positivism philosophy will be used. Selection of positivism philosophy will be helpful to analyze highly structured, large samples of the research in easy and effective way.
Research design:
Descriptive research will be used in the study. It will be helpful to explore the particular aspects of the research area. In addition, with the help of descriptive research design, the research will have expected and accurate outcome.
Research approach:
Inductive and deductive approach is the type of approaches followed in the academic research (Taylor et al. 2016). Deductive research approach will be used in the research as the research will analyze the existing theories and models related to the topic.
Sample and sampling:
In the research, simple random probability sampling technique will be selected for the research. 75 numbers of cloud computing users across Australia will be selected for the research.
Data collection tools: Tools utilized consist of reliable questionnaire, library studies and online surveys. Each process will be used in the research for complication of particular data.
Validity and reliability: Validity of content will be used for reviewing the research as well as evaluate reliability of the research (Lewis 2015). Cronbach’s alpha test will be used to test the variables. The questionnaire will accept reliability. On the other hand, based on the analysis, the research findings will be generated.
Inferential analysis: In the study, the statistical inference associate with the data analysis and hypothesis testing will be used. In the first stage, normality of data will be analyzed. After completion of the process, the structural validity of the variables as well as indicators derived from the examined process will confirm factor analysis (Flick 2015). At the final stage, the research hypothesis will be tested utilizing structural equation modeling along with correlation coefficient.
Conclusion
The above study concludes that cloud computing has made an effortless change for all access applications as well as software from internet. In past days, software as well as applications was physically installed. It results several issues. However, the current evolution of technology as well as feasibility for accessing the applications of cloud computing are become reaping advantages. On the contrary, the disadvantages of cloud computing are evident and concerning point for the users. Thus, the study will be helpful to gather opinion of cloud computing users regarding the issues and challenges faced while using cloud computing. It will be helpful to recommend solutions in order to overcome the issues and obtain potential advantages.
Reference List
Alzahrani, A., Alalwan, N. and Sarrab, M., 2014, April. Mobile cloud computing: advantage, disadvantage and open challenge. In Proceedings of the 7th Euro American Conference on Telematics and Information Systems (p. 21). ACM.
Asghari, S. and Navimipour, N.J., 2016. Review and comparison of meta-heuristic algorithms for service composition in cloud computing. Majlesi Journal of Multimedia Processing, 4(4).
Boutaba, R., Zhang, Q. and Zhani, M.F., 2014. Virtual machine migration in cloud computing environments: Benefits, challenges, and approaches. In Communication Infrastructures for Cloud Computing (pp. 383-408). IGI Global.
de Bruin, B. and Floridi, L., 2017. The ethics of cloud computing. Science and engineering ethics, 23(1), pp.21-39.
Fernández, A., del Río, S., López, V., Bawakid, A., del Jesus, M.J., Benítez, J.M. and Herrera, F., 2014. Big Data with Cloud Computing: an insight on the computing environment, MapReduce, and programming frameworks. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 4(5), pp.380-409.
Flick, U., 2015. Introducing research methodology: A beginner’s guide to doing a research project. Sage.
Girma, A., Garuba, M., Li, J. and Liu, C., 2015, April. Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect DDoS attacks on cloud computing environment. In Information Technology-New Generations (ITNG), 2015 12th International Conference on (pp. 212-217). IEEE.
Gutierrez, A., Boukrami, E. and Lumsden, R., 2015. Technological, organisational and environmental factors influencing managers’ decision to adopt cloud computing in the UK. Journal of Enterprise Information Management, 28(6), pp.788-807.
Hameed, A., Khoshkbarforoushha, A., Ranjan, R., Jayaraman, P.P., Kolodziej, J., Balaji, P., Zeadally, S., Malluhi, Q.M., Tziritas, N., Vishnu, A. and Khan, S.U., 2016. A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems. Computing, 98(7), pp.751-774.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, pp.98-115.
Lewis, S., 2015. Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice, 16(4), pp.473-475.
Shameli-Sendi, A., Pourzandi, M., Fekih-Ahmed, M. and Cheriet, M., 2015. Taxonomy of distributed denial of service mitigation approaches for cloud computing. Journal of Network and Computer Applications, 58, pp.165-179.
Sookhak, M., Gani, A., Talebian, H., Akhunzada, A., Khan, S.U., Buyya, R. and Zomaya, A.Y., 2015. Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Computing Surveys (CSUR), 47(4), p.65.
Stergiou, C., Psannis, K.E., Kim, B.G. and Gupta, B., 2018. Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, pp.964-975.
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download