Introduction And Benefits Of Cloud Computing

History and Launch of Cloud Computing


Make a Report on Current Challenges Facing the ICT Professional.

Cloud computing earlier appeared in 1996, it was earlier mentioned by the Compaq internal document. The term was traced in 2006 when Elastic Compute Cloud. It was introduced by Amazon. Massive computing energy is needed to grow business and competitive advantage [Orban and Lui, 2008]. Earlier an organization used to load their data is to use their computing power for their data centers. But, using their own data center for processing of the data is costly and it is also very complicated. The cloud computing was a substitute for this. It is the term that is used for a computing service, which is based on internet. It was launched by big organizations like Amazon and Google, etc. in 2006. It serves a computing service whenever you need it, it is also of low maintenance and also it can be implemented quickly. It uses less staff of IT, which helps in cost reduction. These were the promises made by the cloud computing few years ago. It was assumed and calculated by the IDC that cloud spending will hike from 16 billion USD (2008) to 42 billion USD (2012) [Leavitt, 2009]. It is in the top ten issues for CIOs recognized by the commentators like the VP [Preston, 2011].

The increase in the growth of the same is making it a great topic for research. We make a current view of the research, some suggested that we should give more efforts to focus on the future to do consumer research [Robey, 1998].

In this section, cloud computing is introduced, and it is differentiated with technologies like grid computing. Cloud computing, it is stated as 5th utility, with electricity, telephone, gas and water. This service is available in society [Buvya, Venugopal, 2009]. This is not a new vision. In 1961 John McCarthy predicted that in future cloud computing will be publicly utilized. [Wheeler and Waggener, 2009].

It is a way of computing, it has capabilities that are related to IT are massively scalable. This service is provided over the internet to multiple users. Gartner [Smith, Bittman, Scott, et al., 2009]. Cloud computing is a collection of conceptual, highly scalable and controlled infrastructure which is capable of hosting end user application and billed according to its consumption. Forrester [Staten, 2008]Cloud computing is in demand technology which has unlimited resources, the elimination of up-front commitments by cloud users.. It is a short term basis service in which user has to pay only for resources which are being used. [Armbrust, Griffith, Joseph, Konwinski, et al., 2009]. Cloud computing has cyber infrastructure, it is virtual distributed computing, utility computing, grid computing, software service and web service. [Vouk, 2008]. It’s a category of distributed as well as parallel system having a collection of virtualized computers that are connected with each other. These are dynamically provisioned. These are represented as a single or multiple computing resources. Agreements are based on service level. These agreements are based on the debate or talks between cloud service provider and users [Buyya, 2009].

Features of Cloud Computing

Marc Benioff, said that on-going technologies have many years of investment of billions of dollars on their side and that the cloud computing is risky, unproven and light weight

Stephen Elop, convinced that the cloud computing can be future technology, also states that The convenience of increase in productivity, improved efficiency and cost savings, with the power to support and authorize a broader range of users via the cloud are clear.

The issues are also related to cloud service providers:

  • Some cases where the cloud service provider is involved, where should be these cases adjudicated and how favorable is that in the interest of cloud service provider.
  • The main point is the cost of this business, and the question is that how much money for taxes and regulations like environmental etc. is needed. One more issue is that whether work force is enough and whether business climate is good or not.
  • Cloud service providers give full access to save any kind of data, user can save any malicious and infected files. The question raised was that there should be monitoring and maintenance of this kind of data.[, 2013]
  • There is a risk of loss of data on cloud computing, due to any financial problems or there can be any system failure. If there are no backup or any copy of the data maintained, so loss of data can occur [, 2013].

The factors that affect the location of data centers of cloud computing resolve the jurisdictional issues. The policies of the same can have an impact on cloud user as well as the provider. With these governments can suffocate as well as promote the development of this computing system. There are same policy problems with cloud computing, which could be a problem for the user as well as the provider of cloud computing (Jaeger, 2008).

  • Users want to access their data on cloud whenever and wherever they want, without any obstacle from providers
  • Users expect that it should be reliable to use the service from their cloud provider (Jaeger, 2008)
  • Users want that cloud provider should be able to stop the unauthorized access of their information (Jaeger, 2009)
  • Users want that cloud service provider and government and all the third parties would not keep check on their activities, but for quality control purpose they can monitor only when it is for. (Armbrust, 2009).
  • Users want in case of any problem a crystal clear definition of a liability.
  1. Infrastructure as a Service (IaaS) [Ronnie Bushnell, 2013]: It assists user to provide unlimited computing resources. The customer doesn’t have access of cloud infrastructure. The customer of the cloud service can access OS and customer can access storage.
  2. Platform as a Service (PaaS) [Ronnie Bushnell, 2013: The user can deploy applications, both user-created and off the shelf applications. It has control over the applications and not on the infrastructure, servers, operating systems and other storage components.
  3. Software as a Service (SaaS) [Ronnie Bushnell, 2013: The consumer can use of the applications created by the provider in the cloud infrastructure. The customer cannot control the cloud infrastructure, the customer can make changes to the settings of the applications.
  • It is useless without the Internet. Without internet, data is useless. In these days, the Internet is accessible everywhere, but when it disappears, it cuts us off from the information on a cloud computing service. If internet access goes off, a person won’t be able to login and check or read his/her files. An unreliable connection can disappoint and can also leave us in a situation where files or data is urgently required and we are unable to read them. (V3 Staff, 2014)
  • Another question raised was that it a business data could go into the danger zone. As this information is available wherever we want and whenever we want, the only thing we need is a password or authentication, so this information can be used by any person who knows the password. So this information is accessible to a person who can misuse it and knows the passwords. It can also be used to blackmail any firm or any organization. This can also be used to access bank related information or sensitive data that is not meant to be seen by unauthorized persons. So in this case this information is in the risk zone if accessed by unauthorized persons. (V3 Staff, 2014)
  • It was also a problem that whether the data on the server side is secured or not. There can be external threats on the server side that can access and it can also modify data. The data of used on the server side can be accessed and used for bad purposes. It can also cause a great financial loss to the user. So, there should be good security on the server side to protect the data from external unauthorized user.


Cloud computing service is very beneficial for business purposes and also we can share information across the globe. It also reduces cost for users and providers. Whenever we can access the internet we can access the data and information with the help of cloud computing on the other hand without connection we cannot access it. There is also the risk of unauthorized access or theft of data. But it gives quicker access to data. No more data are needed to be stored on a device, which reduces the cost on user side. It is available on each internet access device, which makes it easier for user to use it anywhere and on any device.

Cloud computing is obviously not risk free, but it is manageable. If some facts are considered such as not sharing any personal information that can help an unauthorized person to access the data, and also considering the fact that internet access is available all the, so that data can be accessed whenever it is needed. So, we can conclude that cloud computing is a very efficient technology and can be very useful for business or personal use in the future.


Armbrust, M., Stoica, I., Zaharia, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D. and Rabkin, A. (2010). A view of cloud computing. Commun. ACM, 53(4), p.50.

Bushnell, R. (2013). The Alphabet Soup of Technology and Outsourcing: IaaS, PaaS, SaaS, BPaaS.

Buyya, R., Yeo, C., Venugopal, S., Broberg, J. and Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), pp.599-616.

Cervone, H. (2010). An overview of virtual and cloud computing. OCLC Systems & Services: International digital library perspectives, 26(3), pp.162-165.

Cloud Computing―Issues,Research and Implementations,. (2008). Computing and Information Technology, pp.235–246.

Jaeger, T. and Schiffman, J. (2010). Outlook: Cloudy with a Chance of Security Challenges and Improvements. IEEE Security & Privacy Magazine, 8(1), pp.77-80.

Leavitt, N. (2009). Is Cloud Computing Really Ready for Prime Time?. Computer, 42(1), pp.15-20.

Problems on cloud computing?. (2013).

Robey, D. and Markus, M. (1998). Beyond Rigor and Relevance. Information Resources Management Journal, 11(1), pp.7-16.

Top 10 CIO Priorities. (2011).

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with Answers Market
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Political science
I like the way it is organized, summarizes the main point, and compare the two articles. Thank you!
Customer 452701, February 12th, 2023
Thank you very much!! I should definitely pass my class now. I appreciate you!!
Customer 452591, June 18th, 2022
I requested a revision and it was returned in less than 24 hours. Great job!
Customer 452467, November 15th, 2020
Thank you so much, Reaserch writer. you are so helpfull. I appreciate all the hard works. See you.
Customer 452701, February 12th, 2023
Thank you. I will forward critique once I receive it.
Customer 452467, July 25th, 2020
Thank you for your work
Customer 452551, October 22nd, 2021
Thank you for your help. I made a few minor adjustments to the paper but overall it was good.
Customer 452591, November 11th, 2021
Business Studies
Great paper thanks!
Customer 452543, January 23rd, 2023
Political science
Thank you!
Customer 452701, February 12th, 2023
Customer reviews in total
Current satisfaction rate
3 pages
Average paper length
Customers referred by a friend
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat